1*e1a6547dSJerome Forissier // SPDX-License-Identifier: BSD-2-Clause
2*e1a6547dSJerome Forissier /*
3*e1a6547dSJerome Forissier * Copyright 2015-2019 Linaro Limited
4*e1a6547dSJerome Forissier * Copyright 2013-2014 Andrew Turner.
5*e1a6547dSJerome Forissier * Copyright 2013-2014 Ian Lepore.
6*e1a6547dSJerome Forissier * Copyright 2013-2014 Rui Paulo.
7*e1a6547dSJerome Forissier * Copyright 2013 Eitan Adler.
8*e1a6547dSJerome Forissier * All rights reserved.
9*e1a6547dSJerome Forissier *
10*e1a6547dSJerome Forissier * Redistribution and use in source and binary forms, with or without
11*e1a6547dSJerome Forissier * modification, are permitted provided that the following conditions are
12*e1a6547dSJerome Forissier * met:
13*e1a6547dSJerome Forissier *
14*e1a6547dSJerome Forissier * 1. Redistributions of source code must retain the above copyright
15*e1a6547dSJerome Forissier * notice, this list of conditions and the following disclaimer.
16*e1a6547dSJerome Forissier * 2. Redistributions in binary form must reproduce the above copyright
17*e1a6547dSJerome Forissier * notice, this list of conditions and the following disclaimer in the
18*e1a6547dSJerome Forissier * documentation and/or other materials provided with the distribution.
19*e1a6547dSJerome Forissier *
20*e1a6547dSJerome Forissier * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21*e1a6547dSJerome Forissier * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22*e1a6547dSJerome Forissier * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23*e1a6547dSJerome Forissier * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE
24*e1a6547dSJerome Forissier * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25*e1a6547dSJerome Forissier * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26*e1a6547dSJerome Forissier * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
27*e1a6547dSJerome Forissier * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
28*e1a6547dSJerome Forissier * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
29*e1a6547dSJerome Forissier * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
30*e1a6547dSJerome Forissier * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31*e1a6547dSJerome Forissier */
32*e1a6547dSJerome Forissier
33*e1a6547dSJerome Forissier #include <string.h>
34*e1a6547dSJerome Forissier #include <trace.h>
35*e1a6547dSJerome Forissier #include <types_ext.h>
36*e1a6547dSJerome Forissier #include <unw/unwind.h>
37*e1a6547dSJerome Forissier #include <util.h>
38*e1a6547dSJerome Forissier
39*e1a6547dSJerome Forissier /* The register names */
40*e1a6547dSJerome Forissier #define FP 11
41*e1a6547dSJerome Forissier #define SP 13
42*e1a6547dSJerome Forissier #define LR 14
43*e1a6547dSJerome Forissier #define PC 15
44*e1a6547dSJerome Forissier
45*e1a6547dSJerome Forissier /*
46*e1a6547dSJerome Forissier * Definitions for the instruction interpreter.
47*e1a6547dSJerome Forissier *
48*e1a6547dSJerome Forissier * The ARM EABI specifies how to perform the frame unwinding in the
49*e1a6547dSJerome Forissier * Exception Handling ABI for the ARM Architecture document. To perform
50*e1a6547dSJerome Forissier * the unwind we need to know the initial frame pointer, stack pointer,
51*e1a6547dSJerome Forissier * link register and program counter. We then find the entry within the
52*e1a6547dSJerome Forissier * index table that points to the function the program counter is within.
53*e1a6547dSJerome Forissier * This gives us either a list of three instructions to process, a 31-bit
54*e1a6547dSJerome Forissier * relative offset to a table of instructions, or a value telling us
55*e1a6547dSJerome Forissier * we can't unwind any further.
56*e1a6547dSJerome Forissier *
57*e1a6547dSJerome Forissier * When we have the instructions to process we need to decode them
58*e1a6547dSJerome Forissier * following table 4 in section 9.3. This describes a collection of bit
59*e1a6547dSJerome Forissier * patterns to encode that steps to take to update the stack pointer and
60*e1a6547dSJerome Forissier * link register to the correct values at the start of the function.
61*e1a6547dSJerome Forissier */
62*e1a6547dSJerome Forissier
63*e1a6547dSJerome Forissier /* A special case when we are unable to unwind past this function */
64*e1a6547dSJerome Forissier #define EXIDX_CANTUNWIND 1
65*e1a6547dSJerome Forissier
66*e1a6547dSJerome Forissier /*
67*e1a6547dSJerome Forissier * Entry types.
68*e1a6547dSJerome Forissier * These are the only entry types that have been seen in the kernel.
69*e1a6547dSJerome Forissier */
70*e1a6547dSJerome Forissier #define ENTRY_MASK 0xff000000
71*e1a6547dSJerome Forissier #define ENTRY_ARM_SU16 0x80000000
72*e1a6547dSJerome Forissier #define ENTRY_ARM_LU16 0x81000000
73*e1a6547dSJerome Forissier
74*e1a6547dSJerome Forissier /* Instruction masks. */
75*e1a6547dSJerome Forissier #define INSN_VSP_MASK 0xc0
76*e1a6547dSJerome Forissier #define INSN_VSP_SIZE_MASK 0x3f
77*e1a6547dSJerome Forissier #define INSN_STD_MASK 0xf0
78*e1a6547dSJerome Forissier #define INSN_STD_DATA_MASK 0x0f
79*e1a6547dSJerome Forissier #define INSN_POP_TYPE_MASK 0x08
80*e1a6547dSJerome Forissier #define INSN_POP_COUNT_MASK 0x07
81*e1a6547dSJerome Forissier #define INSN_VSP_LARGE_INC_MASK 0xff
82*e1a6547dSJerome Forissier
83*e1a6547dSJerome Forissier /* Instruction definitions */
84*e1a6547dSJerome Forissier #define INSN_VSP_INC 0x00
85*e1a6547dSJerome Forissier #define INSN_VSP_DEC 0x40
86*e1a6547dSJerome Forissier #define INSN_POP_MASKED 0x80
87*e1a6547dSJerome Forissier #define INSN_VSP_REG 0x90
88*e1a6547dSJerome Forissier #define INSN_POP_COUNT 0xa0
89*e1a6547dSJerome Forissier #define INSN_FINISH 0xb0
90*e1a6547dSJerome Forissier #define INSN_POP_REGS 0xb1
91*e1a6547dSJerome Forissier #define INSN_VSP_LARGE_INC 0xb2
92*e1a6547dSJerome Forissier
93*e1a6547dSJerome Forissier /* An item in the exception index table */
94*e1a6547dSJerome Forissier struct unwind_idx {
95*e1a6547dSJerome Forissier uint32_t offset;
96*e1a6547dSJerome Forissier uint32_t insn;
97*e1a6547dSJerome Forissier };
98*e1a6547dSJerome Forissier
copy_in(void * dst,const void * src,size_t n)99*e1a6547dSJerome Forissier static bool copy_in(void *dst, const void *src, size_t n)
100*e1a6547dSJerome Forissier {
101*e1a6547dSJerome Forissier memcpy(dst, src, n);
102*e1a6547dSJerome Forissier return true;
103*e1a6547dSJerome Forissier }
104*e1a6547dSJerome Forissier
105*e1a6547dSJerome Forissier /* Expand a 31-bit signed value to a 32-bit signed value */
expand_prel31(uint32_t prel31)106*e1a6547dSJerome Forissier static int32_t expand_prel31(uint32_t prel31)
107*e1a6547dSJerome Forissier {
108*e1a6547dSJerome Forissier return prel31 | SHIFT_U32(prel31 & BIT32(30), 1);
109*e1a6547dSJerome Forissier }
110*e1a6547dSJerome Forissier
111*e1a6547dSJerome Forissier /*
112*e1a6547dSJerome Forissier * Perform a binary search of the index table to find the function
113*e1a6547dSJerome Forissier * with the largest address that does not exceed addr.
114*e1a6547dSJerome Forissier */
find_index(uint32_t addr)115*e1a6547dSJerome Forissier static struct unwind_idx *find_index(uint32_t addr)
116*e1a6547dSJerome Forissier {
117*e1a6547dSJerome Forissier vaddr_t idx_start = 0;
118*e1a6547dSJerome Forissier vaddr_t idx_end = 0;
119*e1a6547dSJerome Forissier unsigned int min = 0;
120*e1a6547dSJerome Forissier unsigned int mid = 0;
121*e1a6547dSJerome Forissier unsigned int max = 0;
122*e1a6547dSJerome Forissier struct unwind_idx *start = NULL;
123*e1a6547dSJerome Forissier struct unwind_idx *item = NULL;
124*e1a6547dSJerome Forissier int32_t prel31_addr = 0;
125*e1a6547dSJerome Forissier vaddr_t func_addr = 0;
126*e1a6547dSJerome Forissier
127*e1a6547dSJerome Forissier if (!find_exidx(addr, &idx_start, &idx_end))
128*e1a6547dSJerome Forissier return NULL;
129*e1a6547dSJerome Forissier
130*e1a6547dSJerome Forissier start = (struct unwind_idx *)idx_start;
131*e1a6547dSJerome Forissier
132*e1a6547dSJerome Forissier min = 0;
133*e1a6547dSJerome Forissier max = (idx_end - idx_start) / sizeof(struct unwind_idx);
134*e1a6547dSJerome Forissier
135*e1a6547dSJerome Forissier while (min != max) {
136*e1a6547dSJerome Forissier mid = min + (max - min + 1) / 2;
137*e1a6547dSJerome Forissier
138*e1a6547dSJerome Forissier item = &start[mid];
139*e1a6547dSJerome Forissier
140*e1a6547dSJerome Forissier prel31_addr = expand_prel31(item->offset);
141*e1a6547dSJerome Forissier func_addr = (vaddr_t)&item->offset + prel31_addr;
142*e1a6547dSJerome Forissier
143*e1a6547dSJerome Forissier if (func_addr <= addr)
144*e1a6547dSJerome Forissier min = mid;
145*e1a6547dSJerome Forissier else
146*e1a6547dSJerome Forissier max = mid - 1;
147*e1a6547dSJerome Forissier }
148*e1a6547dSJerome Forissier
149*e1a6547dSJerome Forissier return &start[min];
150*e1a6547dSJerome Forissier }
151*e1a6547dSJerome Forissier
152*e1a6547dSJerome Forissier /* Reads the next byte from the instruction list */
unwind_exec_read_byte(struct unwind_state_arm32 * state,uint32_t * ret_insn)153*e1a6547dSJerome Forissier static bool unwind_exec_read_byte(struct unwind_state_arm32 *state,
154*e1a6547dSJerome Forissier uint32_t *ret_insn)
155*e1a6547dSJerome Forissier {
156*e1a6547dSJerome Forissier uint32_t insn;
157*e1a6547dSJerome Forissier
158*e1a6547dSJerome Forissier if (!copy_in(&insn, (void *)state->insn, sizeof(insn)))
159*e1a6547dSJerome Forissier return false;
160*e1a6547dSJerome Forissier
161*e1a6547dSJerome Forissier /* Read the unwind instruction */
162*e1a6547dSJerome Forissier *ret_insn = (insn >> (state->byte * 8)) & 0xff;
163*e1a6547dSJerome Forissier
164*e1a6547dSJerome Forissier /* Update the location of the next instruction */
165*e1a6547dSJerome Forissier if (state->byte == 0) {
166*e1a6547dSJerome Forissier state->byte = 3;
167*e1a6547dSJerome Forissier state->insn += sizeof(uint32_t);
168*e1a6547dSJerome Forissier state->entries--;
169*e1a6547dSJerome Forissier } else {
170*e1a6547dSJerome Forissier state->byte--;
171*e1a6547dSJerome Forissier }
172*e1a6547dSJerome Forissier
173*e1a6547dSJerome Forissier return true;
174*e1a6547dSJerome Forissier }
175*e1a6547dSJerome Forissier
pop_vsp(uint32_t * reg,vaddr_t * vsp,vaddr_t stack,size_t stack_size)176*e1a6547dSJerome Forissier static bool pop_vsp(uint32_t *reg, vaddr_t *vsp, vaddr_t stack,
177*e1a6547dSJerome Forissier size_t stack_size)
178*e1a6547dSJerome Forissier {
179*e1a6547dSJerome Forissier if (*vsp < stack)
180*e1a6547dSJerome Forissier return false;
181*e1a6547dSJerome Forissier if (*vsp + sizeof(*reg) > stack + stack_size)
182*e1a6547dSJerome Forissier return false;
183*e1a6547dSJerome Forissier
184*e1a6547dSJerome Forissier if (!copy_in(reg, (void *)*vsp, sizeof(*reg)))
185*e1a6547dSJerome Forissier return false;
186*e1a6547dSJerome Forissier (*vsp) += sizeof(*reg);
187*e1a6547dSJerome Forissier return true;
188*e1a6547dSJerome Forissier }
189*e1a6547dSJerome Forissier
190*e1a6547dSJerome Forissier /* Executes the next instruction on the list */
unwind_exec_insn(struct unwind_state_arm32 * state,vaddr_t stack,size_t stack_size)191*e1a6547dSJerome Forissier static bool unwind_exec_insn(struct unwind_state_arm32 *state, vaddr_t stack,
192*e1a6547dSJerome Forissier size_t stack_size)
193*e1a6547dSJerome Forissier {
194*e1a6547dSJerome Forissier uint32_t insn;
195*e1a6547dSJerome Forissier vaddr_t vsp = state->registers[SP];
196*e1a6547dSJerome Forissier int update_vsp = 0;
197*e1a6547dSJerome Forissier
198*e1a6547dSJerome Forissier /* Read the next instruction */
199*e1a6547dSJerome Forissier if (!unwind_exec_read_byte(state, &insn))
200*e1a6547dSJerome Forissier return false;
201*e1a6547dSJerome Forissier
202*e1a6547dSJerome Forissier if ((insn & INSN_VSP_MASK) == INSN_VSP_INC) {
203*e1a6547dSJerome Forissier state->registers[SP] += ((insn & INSN_VSP_SIZE_MASK) << 2) + 4;
204*e1a6547dSJerome Forissier
205*e1a6547dSJerome Forissier } else if ((insn & INSN_VSP_MASK) == INSN_VSP_DEC) {
206*e1a6547dSJerome Forissier state->registers[SP] -= ((insn & INSN_VSP_SIZE_MASK) << 2) + 4;
207*e1a6547dSJerome Forissier
208*e1a6547dSJerome Forissier } else if ((insn & INSN_STD_MASK) == INSN_POP_MASKED) {
209*e1a6547dSJerome Forissier uint32_t mask;
210*e1a6547dSJerome Forissier unsigned int reg;
211*e1a6547dSJerome Forissier
212*e1a6547dSJerome Forissier /* Load the mask */
213*e1a6547dSJerome Forissier if (!unwind_exec_read_byte(state, &mask))
214*e1a6547dSJerome Forissier return false;
215*e1a6547dSJerome Forissier mask |= (insn & INSN_STD_DATA_MASK) << 8;
216*e1a6547dSJerome Forissier
217*e1a6547dSJerome Forissier /* We have a refuse to unwind instruction */
218*e1a6547dSJerome Forissier if (mask == 0)
219*e1a6547dSJerome Forissier return false;
220*e1a6547dSJerome Forissier
221*e1a6547dSJerome Forissier /* Update SP */
222*e1a6547dSJerome Forissier update_vsp = 1;
223*e1a6547dSJerome Forissier
224*e1a6547dSJerome Forissier /* Load the registers */
225*e1a6547dSJerome Forissier for (reg = 4; mask && reg < 16; mask >>= 1, reg++) {
226*e1a6547dSJerome Forissier if (mask & 1) {
227*e1a6547dSJerome Forissier if (!pop_vsp(&state->registers[reg], &vsp,
228*e1a6547dSJerome Forissier stack, stack_size))
229*e1a6547dSJerome Forissier return false;
230*e1a6547dSJerome Forissier state->update_mask |= 1 << reg;
231*e1a6547dSJerome Forissier
232*e1a6547dSJerome Forissier /* If we have updated SP kep its value */
233*e1a6547dSJerome Forissier if (reg == SP)
234*e1a6547dSJerome Forissier update_vsp = 0;
235*e1a6547dSJerome Forissier }
236*e1a6547dSJerome Forissier }
237*e1a6547dSJerome Forissier
238*e1a6547dSJerome Forissier } else if ((insn & INSN_STD_MASK) == INSN_VSP_REG &&
239*e1a6547dSJerome Forissier ((insn & INSN_STD_DATA_MASK) != 13) &&
240*e1a6547dSJerome Forissier ((insn & INSN_STD_DATA_MASK) != 15)) {
241*e1a6547dSJerome Forissier /* sp = register */
242*e1a6547dSJerome Forissier state->registers[SP] =
243*e1a6547dSJerome Forissier state->registers[insn & INSN_STD_DATA_MASK];
244*e1a6547dSJerome Forissier
245*e1a6547dSJerome Forissier } else if ((insn & INSN_STD_MASK) == INSN_POP_COUNT) {
246*e1a6547dSJerome Forissier unsigned int count, reg;
247*e1a6547dSJerome Forissier
248*e1a6547dSJerome Forissier /* Read how many registers to load */
249*e1a6547dSJerome Forissier count = insn & INSN_POP_COUNT_MASK;
250*e1a6547dSJerome Forissier
251*e1a6547dSJerome Forissier /* Update sp */
252*e1a6547dSJerome Forissier update_vsp = 1;
253*e1a6547dSJerome Forissier
254*e1a6547dSJerome Forissier /* Pop the registers */
255*e1a6547dSJerome Forissier for (reg = 4; reg <= 4 + count; reg++) {
256*e1a6547dSJerome Forissier if (!pop_vsp(&state->registers[reg], &vsp,
257*e1a6547dSJerome Forissier stack, stack_size))
258*e1a6547dSJerome Forissier return false;
259*e1a6547dSJerome Forissier state->update_mask |= 1 << reg;
260*e1a6547dSJerome Forissier }
261*e1a6547dSJerome Forissier
262*e1a6547dSJerome Forissier /* Check if we are in the pop r14 version */
263*e1a6547dSJerome Forissier if ((insn & INSN_POP_TYPE_MASK) != 0) {
264*e1a6547dSJerome Forissier if (!pop_vsp(&state->registers[14], &vsp,
265*e1a6547dSJerome Forissier stack, stack_size))
266*e1a6547dSJerome Forissier return false;
267*e1a6547dSJerome Forissier }
268*e1a6547dSJerome Forissier
269*e1a6547dSJerome Forissier } else if (insn == INSN_FINISH) {
270*e1a6547dSJerome Forissier /* Stop processing */
271*e1a6547dSJerome Forissier state->entries = 0;
272*e1a6547dSJerome Forissier
273*e1a6547dSJerome Forissier } else if (insn == INSN_POP_REGS) {
274*e1a6547dSJerome Forissier uint32_t mask;
275*e1a6547dSJerome Forissier unsigned int reg;
276*e1a6547dSJerome Forissier
277*e1a6547dSJerome Forissier if (!unwind_exec_read_byte(state, &mask))
278*e1a6547dSJerome Forissier return false;
279*e1a6547dSJerome Forissier if (mask == 0 || (mask & 0xf0) != 0)
280*e1a6547dSJerome Forissier return false;
281*e1a6547dSJerome Forissier
282*e1a6547dSJerome Forissier /* Update SP */
283*e1a6547dSJerome Forissier update_vsp = 1;
284*e1a6547dSJerome Forissier
285*e1a6547dSJerome Forissier /* Load the registers */
286*e1a6547dSJerome Forissier for (reg = 0; mask && reg < 4; mask >>= 1, reg++) {
287*e1a6547dSJerome Forissier if (mask & 1) {
288*e1a6547dSJerome Forissier if (!pop_vsp(&state->registers[reg], &vsp,
289*e1a6547dSJerome Forissier stack, stack_size))
290*e1a6547dSJerome Forissier return false;
291*e1a6547dSJerome Forissier state->update_mask |= 1 << reg;
292*e1a6547dSJerome Forissier }
293*e1a6547dSJerome Forissier }
294*e1a6547dSJerome Forissier
295*e1a6547dSJerome Forissier } else if ((insn & INSN_VSP_LARGE_INC_MASK) == INSN_VSP_LARGE_INC) {
296*e1a6547dSJerome Forissier uint32_t uleb128;
297*e1a6547dSJerome Forissier
298*e1a6547dSJerome Forissier /* Read the increment value */
299*e1a6547dSJerome Forissier if (!unwind_exec_read_byte(state, &uleb128))
300*e1a6547dSJerome Forissier return false;
301*e1a6547dSJerome Forissier
302*e1a6547dSJerome Forissier state->registers[SP] += 0x204 + (uleb128 << 2);
303*e1a6547dSJerome Forissier
304*e1a6547dSJerome Forissier } else {
305*e1a6547dSJerome Forissier /* We hit a new instruction that needs to be implemented */
306*e1a6547dSJerome Forissier DMSG("Unhandled instruction %.2x", insn);
307*e1a6547dSJerome Forissier return false;
308*e1a6547dSJerome Forissier }
309*e1a6547dSJerome Forissier
310*e1a6547dSJerome Forissier if (update_vsp)
311*e1a6547dSJerome Forissier state->registers[SP] = vsp;
312*e1a6547dSJerome Forissier
313*e1a6547dSJerome Forissier return true;
314*e1a6547dSJerome Forissier }
315*e1a6547dSJerome Forissier
316*e1a6547dSJerome Forissier /* Performs the unwind of a function */
unwind_tab(struct unwind_state_arm32 * state,vaddr_t stack,size_t stack_size)317*e1a6547dSJerome Forissier static bool unwind_tab(struct unwind_state_arm32 *state, vaddr_t stack,
318*e1a6547dSJerome Forissier size_t stack_size)
319*e1a6547dSJerome Forissier {
320*e1a6547dSJerome Forissier uint32_t entry;
321*e1a6547dSJerome Forissier uint32_t insn;
322*e1a6547dSJerome Forissier
323*e1a6547dSJerome Forissier /* Set PC to a known value */
324*e1a6547dSJerome Forissier state->registers[PC] = 0;
325*e1a6547dSJerome Forissier
326*e1a6547dSJerome Forissier if (!copy_in(&insn, (void *)state->insn, sizeof(insn))) {
327*e1a6547dSJerome Forissier DMSG("Bad insn addr %p", (void *)state->insn);
328*e1a6547dSJerome Forissier return true;
329*e1a6547dSJerome Forissier }
330*e1a6547dSJerome Forissier
331*e1a6547dSJerome Forissier /* Read the personality */
332*e1a6547dSJerome Forissier entry = insn & ENTRY_MASK;
333*e1a6547dSJerome Forissier
334*e1a6547dSJerome Forissier if (entry == ENTRY_ARM_SU16) {
335*e1a6547dSJerome Forissier state->byte = 2;
336*e1a6547dSJerome Forissier state->entries = 1;
337*e1a6547dSJerome Forissier } else if (entry == ENTRY_ARM_LU16) {
338*e1a6547dSJerome Forissier state->byte = 1;
339*e1a6547dSJerome Forissier state->entries = ((insn >> 16) & 0xFF) + 1;
340*e1a6547dSJerome Forissier } else {
341*e1a6547dSJerome Forissier DMSG("Unknown entry: %x", entry);
342*e1a6547dSJerome Forissier return true;
343*e1a6547dSJerome Forissier }
344*e1a6547dSJerome Forissier
345*e1a6547dSJerome Forissier while (state->entries > 0) {
346*e1a6547dSJerome Forissier if (!unwind_exec_insn(state, stack, stack_size))
347*e1a6547dSJerome Forissier return true;
348*e1a6547dSJerome Forissier }
349*e1a6547dSJerome Forissier
350*e1a6547dSJerome Forissier /*
351*e1a6547dSJerome Forissier * The program counter was not updated, load it from the link register.
352*e1a6547dSJerome Forissier */
353*e1a6547dSJerome Forissier if (state->registers[PC] == 0) {
354*e1a6547dSJerome Forissier state->registers[PC] = state->registers[LR];
355*e1a6547dSJerome Forissier
356*e1a6547dSJerome Forissier /*
357*e1a6547dSJerome Forissier * If the program counter changed, flag it in the update mask.
358*e1a6547dSJerome Forissier */
359*e1a6547dSJerome Forissier if (state->start_pc != state->registers[PC])
360*e1a6547dSJerome Forissier state->update_mask |= 1 << PC;
361*e1a6547dSJerome Forissier }
362*e1a6547dSJerome Forissier
363*e1a6547dSJerome Forissier return false;
364*e1a6547dSJerome Forissier }
365*e1a6547dSJerome Forissier
unwind_stack_arm32(struct unwind_state_arm32 * state,vaddr_t stack,size_t stack_size)366*e1a6547dSJerome Forissier bool unwind_stack_arm32(struct unwind_state_arm32 *state,
367*e1a6547dSJerome Forissier vaddr_t stack, size_t stack_size)
368*e1a6547dSJerome Forissier {
369*e1a6547dSJerome Forissier struct unwind_idx *index;
370*e1a6547dSJerome Forissier bool finished;
371*e1a6547dSJerome Forissier
372*e1a6547dSJerome Forissier /* Reset the mask of updated registers */
373*e1a6547dSJerome Forissier state->update_mask = 0;
374*e1a6547dSJerome Forissier
375*e1a6547dSJerome Forissier /* The pc value is correct and will be overwritten, save it */
376*e1a6547dSJerome Forissier state->start_pc = state->registers[PC];
377*e1a6547dSJerome Forissier
378*e1a6547dSJerome Forissier /*
379*e1a6547dSJerome Forissier * Find the item to run. Subtract 2 from PC to make sure that we're
380*e1a6547dSJerome Forissier * still inside the calling function in case a __no_return function
381*e1a6547dSJerome Forissier * (typically panic()) is called unconditionally and may cause LR and
382*e1a6547dSJerome Forissier * thus this PC to point into the next and entirely unrelated function.
383*e1a6547dSJerome Forissier */
384*e1a6547dSJerome Forissier index = find_index(state->start_pc - 2);
385*e1a6547dSJerome Forissier if (!index)
386*e1a6547dSJerome Forissier return false;
387*e1a6547dSJerome Forissier
388*e1a6547dSJerome Forissier finished = false;
389*e1a6547dSJerome Forissier if (index->insn != EXIDX_CANTUNWIND) {
390*e1a6547dSJerome Forissier if (index->insn & (1U << 31)) {
391*e1a6547dSJerome Forissier /* The data is within the instruction */
392*e1a6547dSJerome Forissier state->insn = (vaddr_t)&index->insn;
393*e1a6547dSJerome Forissier } else {
394*e1a6547dSJerome Forissier /* A prel31 offset to the unwind table */
395*e1a6547dSJerome Forissier state->insn = (vaddr_t)&index->insn +
396*e1a6547dSJerome Forissier expand_prel31(index->insn);
397*e1a6547dSJerome Forissier }
398*e1a6547dSJerome Forissier
399*e1a6547dSJerome Forissier /* Run the unwind function */
400*e1a6547dSJerome Forissier finished = unwind_tab(state, stack, stack_size);
401*e1a6547dSJerome Forissier }
402*e1a6547dSJerome Forissier
403*e1a6547dSJerome Forissier /* This is the top of the stack, finish */
404*e1a6547dSJerome Forissier if (index->insn == EXIDX_CANTUNWIND)
405*e1a6547dSJerome Forissier finished = true;
406*e1a6547dSJerome Forissier
407*e1a6547dSJerome Forissier return !finished;
408*e1a6547dSJerome Forissier }
409*e1a6547dSJerome Forissier
print_stack_arm32(struct unwind_state_arm32 * state,vaddr_t stack,size_t stack_size)410*e1a6547dSJerome Forissier void print_stack_arm32(struct unwind_state_arm32 *state,
411*e1a6547dSJerome Forissier vaddr_t stack, size_t stack_size)
412*e1a6547dSJerome Forissier {
413*e1a6547dSJerome Forissier trace_printf_helper_raw(TRACE_ERROR, true, "Call stack:");
414*e1a6547dSJerome Forissier do {
415*e1a6547dSJerome Forissier trace_printf_helper_raw(TRACE_ERROR, true, " 0x%08" PRIx32,
416*e1a6547dSJerome Forissier state->registers[PC]);
417*e1a6547dSJerome Forissier } while (unwind_stack_arm32(state, stack, stack_size));
418*e1a6547dSJerome Forissier }
419