xref: /rk3399_ARM-atf/common/backtrace/backtrace.c (revision 402b3cf8766fe2cb4ae462f7ee7761d08a1ba56c)
19c6d1c50SAntonio Nino Diaz /*
28aabea33SPaul Beesley  * Copyright (c) 2018-2019, ARM Limited and Contributors. All rights reserved.
39c6d1c50SAntonio Nino Diaz  *
49c6d1c50SAntonio Nino Diaz  * SPDX-License-Identifier: BSD-3-Clause
59c6d1c50SAntonio Nino Diaz  */
69c6d1c50SAntonio Nino Diaz 
79c6d1c50SAntonio Nino Diaz #include <assert.h>
89c6d1c50SAntonio Nino Diaz #include <stdbool.h>
99c6d1c50SAntonio Nino Diaz #include <stdint.h>
109c6d1c50SAntonio Nino Diaz 
1109d40e0eSAntonio Nino Diaz #include <arch_helpers.h>
1209d40e0eSAntonio Nino Diaz #include <common/debug.h>
1309d40e0eSAntonio Nino Diaz #include <drivers/console.h>
1409d40e0eSAntonio Nino Diaz 
159c6d1c50SAntonio Nino Diaz /* Maximum number of entries in the backtrace to display */
169c6d1c50SAntonio Nino Diaz #define UNWIND_LIMIT	20U
179c6d1c50SAntonio Nino Diaz 
189c6d1c50SAntonio Nino Diaz /*
199c6d1c50SAntonio Nino Diaz  * If -fno-omit-frame-pointer is used:
209c6d1c50SAntonio Nino Diaz  *
219c6d1c50SAntonio Nino Diaz  * - AArch64: The AAPCS defines the format of the frame records and mandates the
229c6d1c50SAntonio Nino Diaz  *   usage of r29 as frame pointer.
239c6d1c50SAntonio Nino Diaz  *
249c6d1c50SAntonio Nino Diaz  * - AArch32: The format of the frame records is not defined in the AAPCS.
259c6d1c50SAntonio Nino Diaz  *   However, at least GCC and Clang use the same format. When they are forced
269c6d1c50SAntonio Nino Diaz  *   to only generate A32 code (with -marm), they use r11 as frame pointer and a
279c6d1c50SAntonio Nino Diaz  *   similar format as in AArch64. If interworking with T32 is enabled, the
289c6d1c50SAntonio Nino Diaz  *   frame pointer is r7 and the format is  different. This is not supported by
299c6d1c50SAntonio Nino Diaz  *   this implementation of backtrace, so it is needed to use -marm.
309c6d1c50SAntonio Nino Diaz  */
319c6d1c50SAntonio Nino Diaz 
329c6d1c50SAntonio Nino Diaz /* Frame records form a linked list in the stack */
339c6d1c50SAntonio Nino Diaz struct frame_record {
349c6d1c50SAntonio Nino Diaz 	/* Previous frame record in the list */
359c6d1c50SAntonio Nino Diaz 	struct frame_record *parent;
369c6d1c50SAntonio Nino Diaz 	/* Return address of the function at this level */
379c6d1c50SAntonio Nino Diaz 	uintptr_t return_addr;
389c6d1c50SAntonio Nino Diaz };
399c6d1c50SAntonio Nino Diaz 
40b8b31ad0SLouis Mayencourt /*
41b8b31ad0SLouis Mayencourt  * Strip the Pointer Authentication Code (PAC) from the address to retrieve the
42b8b31ad0SLouis Mayencourt  * original one.
43b8b31ad0SLouis Mayencourt  *
44b8b31ad0SLouis Mayencourt  * The PAC field is stored on the high bits of the address and defined as:
45b8b31ad0SLouis Mayencourt  * - PAC field = Xn[54:bottom_PAC_bit], when address tagging is used.
46b8b31ad0SLouis Mayencourt  * - PAC field = Xn[63:56, 54:bottom_PAC_bit], without address tagging.
47b8b31ad0SLouis Mayencourt  *
48b8b31ad0SLouis Mayencourt  * With bottom_PAC_bit = 64 - TCR_ELx.TnSZ
49b8b31ad0SLouis Mayencourt  */
50b8b31ad0SLouis Mayencourt #if ENABLE_PAUTH
51b8b31ad0SLouis Mayencourt static uintptr_t demangle_address(uintptr_t addr)
52b8b31ad0SLouis Mayencourt {
53b8b31ad0SLouis Mayencourt 	unsigned int el, t0sz, bottom_pac_bit;
54b8b31ad0SLouis Mayencourt 	uint64_t tcr, pac_mask;
55b8b31ad0SLouis Mayencourt 
56b8b31ad0SLouis Mayencourt 	/*
57b8b31ad0SLouis Mayencourt 	 * Different virtual address space size can be defined for each EL.
58b8b31ad0SLouis Mayencourt 	 * Ensure that we use the proper one by reading the corresponding
59b8b31ad0SLouis Mayencourt 	 * TCR_ELx register.
60b8b31ad0SLouis Mayencourt 	 */
61b8b31ad0SLouis Mayencourt 	el = get_current_el();
62b8b31ad0SLouis Mayencourt 
63b8b31ad0SLouis Mayencourt 	if (el == 3U) {
64b8b31ad0SLouis Mayencourt 		tcr = read_tcr_el3();
65b8b31ad0SLouis Mayencourt 	} else if (el == 2U) {
66b8b31ad0SLouis Mayencourt 		tcr = read_tcr_el2();
67b8b31ad0SLouis Mayencourt 	} else {
68b8b31ad0SLouis Mayencourt 		tcr = read_tcr_el1();
69b8b31ad0SLouis Mayencourt 	}
70b8b31ad0SLouis Mayencourt 
71b8b31ad0SLouis Mayencourt 	/* T0SZ = TCR_ELx[5:0] */
72b8b31ad0SLouis Mayencourt 	t0sz = tcr & 0x1f;
73b8b31ad0SLouis Mayencourt 	bottom_pac_bit = 64 - t0sz;
74b8b31ad0SLouis Mayencourt 	pac_mask = (1ULL << bottom_pac_bit) - 1;
75b8b31ad0SLouis Mayencourt 
76b8b31ad0SLouis Mayencourt 	/* demangle the address with the computed mask */
77b8b31ad0SLouis Mayencourt 	return (addr & pac_mask);
78b8b31ad0SLouis Mayencourt }
79b8b31ad0SLouis Mayencourt #endif /* ENABLE_PAUTH */
80b8b31ad0SLouis Mayencourt 
819c6d1c50SAntonio Nino Diaz static const char *get_el_str(unsigned int el)
829c6d1c50SAntonio Nino Diaz {
839c6d1c50SAntonio Nino Diaz 	if (el == 3U) {
849c6d1c50SAntonio Nino Diaz 		return "EL3";
859c6d1c50SAntonio Nino Diaz 	} else if (el == 2U) {
869c6d1c50SAntonio Nino Diaz 		return "EL2";
879c6d1c50SAntonio Nino Diaz 	} else {
889c6d1c50SAntonio Nino Diaz 		return "S-EL1";
899c6d1c50SAntonio Nino Diaz 	}
909c6d1c50SAntonio Nino Diaz }
919c6d1c50SAntonio Nino Diaz 
929c6d1c50SAntonio Nino Diaz /*
939c6d1c50SAntonio Nino Diaz  * Returns true if the address points to a virtual address that can be read at
949c6d1c50SAntonio Nino Diaz  * the current EL, false otherwise.
959c6d1c50SAntonio Nino Diaz  */
96*402b3cf8SJulius Werner #ifdef __aarch64__
979c6d1c50SAntonio Nino Diaz static bool is_address_readable(uintptr_t addr)
989c6d1c50SAntonio Nino Diaz {
999c6d1c50SAntonio Nino Diaz 	unsigned int el = get_current_el();
1009c6d1c50SAntonio Nino Diaz 
101b8b31ad0SLouis Mayencourt #if ENABLE_PAUTH
102b8b31ad0SLouis Mayencourt 	/*
103b8b31ad0SLouis Mayencourt 	 * When pointer authentication is enabled, the LR value saved on the
104b8b31ad0SLouis Mayencourt 	 * stack contains a PAC. It must be stripped to retrieve the return
105b8b31ad0SLouis Mayencourt 	 * address.
106b8b31ad0SLouis Mayencourt 	 */
107b8b31ad0SLouis Mayencourt 	addr = demangle_address(addr);
108b8b31ad0SLouis Mayencourt #endif
109b8b31ad0SLouis Mayencourt 
1109c6d1c50SAntonio Nino Diaz 	if (el == 3U) {
1119c6d1c50SAntonio Nino Diaz 		ats1e3r(addr);
1129c6d1c50SAntonio Nino Diaz 	} else if (el == 2U) {
1139c6d1c50SAntonio Nino Diaz 		ats1e2r(addr);
1149c6d1c50SAntonio Nino Diaz 	} else {
1159c6d1c50SAntonio Nino Diaz 		ats1e1r(addr);
1169c6d1c50SAntonio Nino Diaz 	}
1179c6d1c50SAntonio Nino Diaz 
1189c6d1c50SAntonio Nino Diaz 	isb();
1199c6d1c50SAntonio Nino Diaz 
1209c6d1c50SAntonio Nino Diaz 	/* If PAR.F == 1 the address translation was aborted.  */
1219c6d1c50SAntonio Nino Diaz 	if ((read_par_el1() & PAR_F_MASK) != 0U)
1229c6d1c50SAntonio Nino Diaz 		return false;
1239c6d1c50SAntonio Nino Diaz 
1249c6d1c50SAntonio Nino Diaz 	return true;
1259c6d1c50SAntonio Nino Diaz }
126*402b3cf8SJulius Werner #else /* !__aarch64__ */
1279c6d1c50SAntonio Nino Diaz static bool is_address_readable(uintptr_t addr)
1289c6d1c50SAntonio Nino Diaz {
1299c6d1c50SAntonio Nino Diaz 	unsigned int el = get_current_el();
1309c6d1c50SAntonio Nino Diaz 
1319c6d1c50SAntonio Nino Diaz 	if (el == 3U) {
1329c6d1c50SAntonio Nino Diaz 		write_ats1cpr(addr);
1339c6d1c50SAntonio Nino Diaz 	} else if (el == 2U) {
1349c6d1c50SAntonio Nino Diaz 		write_ats1hr(addr);
1359c6d1c50SAntonio Nino Diaz 	} else {
1369c6d1c50SAntonio Nino Diaz 		write_ats1cpr(addr);
1379c6d1c50SAntonio Nino Diaz 	}
1389c6d1c50SAntonio Nino Diaz 
1399c6d1c50SAntonio Nino Diaz 	isb();
1409c6d1c50SAntonio Nino Diaz 
1419c6d1c50SAntonio Nino Diaz 	/* If PAR.F == 1 the address translation was aborted.  */
1429c6d1c50SAntonio Nino Diaz 	if ((read64_par() & PAR_F_MASK) != 0U)
1439c6d1c50SAntonio Nino Diaz 		return false;
1449c6d1c50SAntonio Nino Diaz 
1459c6d1c50SAntonio Nino Diaz 	return true;
1469c6d1c50SAntonio Nino Diaz }
147*402b3cf8SJulius Werner #endif /* __aarch64__ */
1489c6d1c50SAntonio Nino Diaz 
1499c6d1c50SAntonio Nino Diaz /*
1509c6d1c50SAntonio Nino Diaz  * Returns true if all the bytes in a given object are in mapped memory and an
1519c6d1c50SAntonio Nino Diaz  * LDR using this pointer would succeed, false otherwise.
1529c6d1c50SAntonio Nino Diaz  */
1539c6d1c50SAntonio Nino Diaz static bool is_valid_object(uintptr_t addr, size_t size)
1549c6d1c50SAntonio Nino Diaz {
1559c6d1c50SAntonio Nino Diaz 	assert(size > 0U);
1569c6d1c50SAntonio Nino Diaz 
1579c6d1c50SAntonio Nino Diaz 	if (addr == 0U)
1589c6d1c50SAntonio Nino Diaz 		return false;
1599c6d1c50SAntonio Nino Diaz 
1609c6d1c50SAntonio Nino Diaz 	/* Detect overflows */
1619c6d1c50SAntonio Nino Diaz 	if ((addr + size) < addr)
1629c6d1c50SAntonio Nino Diaz 		return false;
1639c6d1c50SAntonio Nino Diaz 
1649c6d1c50SAntonio Nino Diaz 	/* A pointer not aligned properly could trigger an alignment fault. */
1659c6d1c50SAntonio Nino Diaz 	if ((addr & (sizeof(uintptr_t) - 1U)) != 0U)
1669c6d1c50SAntonio Nino Diaz 		return false;
1679c6d1c50SAntonio Nino Diaz 
1689c6d1c50SAntonio Nino Diaz 	/* Check that all the object is readable */
1699c6d1c50SAntonio Nino Diaz 	for (size_t i = 0; i < size; i++) {
1709c6d1c50SAntonio Nino Diaz 		if (!is_address_readable(addr + i))
1719c6d1c50SAntonio Nino Diaz 			return false;
1729c6d1c50SAntonio Nino Diaz 	}
1739c6d1c50SAntonio Nino Diaz 
1749c6d1c50SAntonio Nino Diaz 	return true;
1759c6d1c50SAntonio Nino Diaz }
1769c6d1c50SAntonio Nino Diaz 
1779c6d1c50SAntonio Nino Diaz /*
1789c6d1c50SAntonio Nino Diaz  * Returns true if the specified address is correctly aligned and points to a
1799c6d1c50SAntonio Nino Diaz  * valid memory region.
1809c6d1c50SAntonio Nino Diaz  */
1819c6d1c50SAntonio Nino Diaz static bool is_valid_jump_address(uintptr_t addr)
1829c6d1c50SAntonio Nino Diaz {
1839c6d1c50SAntonio Nino Diaz 	if (addr == 0U)
1849c6d1c50SAntonio Nino Diaz 		return false;
1859c6d1c50SAntonio Nino Diaz 
1869c6d1c50SAntonio Nino Diaz 	/* Check alignment. Both A64 and A32 use 32-bit opcodes */
1879c6d1c50SAntonio Nino Diaz 	if ((addr & (sizeof(uint32_t) - 1U)) != 0U)
1889c6d1c50SAntonio Nino Diaz 		return false;
1899c6d1c50SAntonio Nino Diaz 
1909c6d1c50SAntonio Nino Diaz 	if (!is_address_readable(addr))
1919c6d1c50SAntonio Nino Diaz 		return false;
1929c6d1c50SAntonio Nino Diaz 
1939c6d1c50SAntonio Nino Diaz 	return true;
1949c6d1c50SAntonio Nino Diaz }
1959c6d1c50SAntonio Nino Diaz 
1969c6d1c50SAntonio Nino Diaz /*
1979c6d1c50SAntonio Nino Diaz  * Returns true if the pointer points at a valid frame record, false otherwise.
1989c6d1c50SAntonio Nino Diaz  */
1999c6d1c50SAntonio Nino Diaz static bool is_valid_frame_record(struct frame_record *fr)
2009c6d1c50SAntonio Nino Diaz {
2019c6d1c50SAntonio Nino Diaz 	return is_valid_object((uintptr_t)fr, sizeof(struct frame_record));
2029c6d1c50SAntonio Nino Diaz }
2039c6d1c50SAntonio Nino Diaz 
2049c6d1c50SAntonio Nino Diaz /*
2059c6d1c50SAntonio Nino Diaz  * Adjust the frame-pointer-register value by 4 bytes on AArch32 to have the
2069c6d1c50SAntonio Nino Diaz  * same layout as AArch64.
2079c6d1c50SAntonio Nino Diaz  */
2089c6d1c50SAntonio Nino Diaz static struct frame_record *adjust_frame_record(struct frame_record *fr)
2099c6d1c50SAntonio Nino Diaz {
210*402b3cf8SJulius Werner #ifdef __aarch64__
2119c6d1c50SAntonio Nino Diaz 	return fr;
2129c6d1c50SAntonio Nino Diaz #else
2139c6d1c50SAntonio Nino Diaz 	return (struct frame_record *)((uintptr_t)fr - 4U);
2149c6d1c50SAntonio Nino Diaz #endif
2159c6d1c50SAntonio Nino Diaz }
2169c6d1c50SAntonio Nino Diaz 
2179c6d1c50SAntonio Nino Diaz static void unwind_stack(struct frame_record *fr, uintptr_t current_pc,
2189c6d1c50SAntonio Nino Diaz 			 uintptr_t link_register)
2199c6d1c50SAntonio Nino Diaz {
2209c6d1c50SAntonio Nino Diaz 	uintptr_t call_site;
2219c6d1c50SAntonio Nino Diaz 	static const char *backtrace_str = "%u: %s: 0x%lx\n";
2229c6d1c50SAntonio Nino Diaz 	const char *el_str = get_el_str(get_current_el());
2239c6d1c50SAntonio Nino Diaz 
2249c6d1c50SAntonio Nino Diaz 	if (!is_valid_frame_record(fr)) {
2259c6d1c50SAntonio Nino Diaz 		printf("ERROR: Corrupted frame pointer (frame record address = %p)\n",
2269c6d1c50SAntonio Nino Diaz 		       fr);
2279c6d1c50SAntonio Nino Diaz 		return;
2289c6d1c50SAntonio Nino Diaz 	}
2299c6d1c50SAntonio Nino Diaz 
2309c6d1c50SAntonio Nino Diaz 	if (fr->return_addr != link_register) {
2319c6d1c50SAntonio Nino Diaz 		printf("ERROR: Corrupted stack (frame record address = %p)\n",
2329c6d1c50SAntonio Nino Diaz 		       fr);
2339c6d1c50SAntonio Nino Diaz 		return;
2349c6d1c50SAntonio Nino Diaz 	}
2359c6d1c50SAntonio Nino Diaz 
2369c6d1c50SAntonio Nino Diaz 	/* The level 0 of the backtrace is the current backtrace function */
2379c6d1c50SAntonio Nino Diaz 	printf(backtrace_str, 0U, el_str, current_pc);
2389c6d1c50SAntonio Nino Diaz 
2399c6d1c50SAntonio Nino Diaz 	/*
2409c6d1c50SAntonio Nino Diaz 	 * The last frame record pointer in the linked list at the beginning of
2419c6d1c50SAntonio Nino Diaz 	 * the stack should be NULL unless stack is corrupted.
2429c6d1c50SAntonio Nino Diaz 	 */
2439c6d1c50SAntonio Nino Diaz 	for (unsigned int i = 1U; i < UNWIND_LIMIT; i++) {
2449c6d1c50SAntonio Nino Diaz 		/* If an invalid frame record is found, exit. */
2459c6d1c50SAntonio Nino Diaz 		if (!is_valid_frame_record(fr))
2469c6d1c50SAntonio Nino Diaz 			return;
2479c6d1c50SAntonio Nino Diaz 		/*
2489c6d1c50SAntonio Nino Diaz 		 * A32 and A64 are fixed length so the address from where the
2499c6d1c50SAntonio Nino Diaz 		 * call was made is the instruction before the return address,
2509c6d1c50SAntonio Nino Diaz 		 * which is always 4 bytes before it.
2519c6d1c50SAntonio Nino Diaz 		 */
2529c6d1c50SAntonio Nino Diaz 		call_site = fr->return_addr - 4U;
2539c6d1c50SAntonio Nino Diaz 
254b8b31ad0SLouis Mayencourt #if ENABLE_PAUTH
255b8b31ad0SLouis Mayencourt 		/*
256b8b31ad0SLouis Mayencourt 		 * When pointer authentication is enabled, the LR value saved on
257b8b31ad0SLouis Mayencourt 		 * the stack contains a PAC. It must be stripped to retrieve the
258b8b31ad0SLouis Mayencourt 		 * return address.
259b8b31ad0SLouis Mayencourt 		 */
260b8b31ad0SLouis Mayencourt 		call_site = demangle_address(call_site);
261b8b31ad0SLouis Mayencourt #endif
262b8b31ad0SLouis Mayencourt 
2639c6d1c50SAntonio Nino Diaz 		/*
2649c6d1c50SAntonio Nino Diaz 		 * If the address is invalid it means that the frame record is
2659c6d1c50SAntonio Nino Diaz 		 * probably corrupted.
2669c6d1c50SAntonio Nino Diaz 		 */
2679c6d1c50SAntonio Nino Diaz 		if (!is_valid_jump_address(call_site))
2689c6d1c50SAntonio Nino Diaz 			return;
2699c6d1c50SAntonio Nino Diaz 
2709c6d1c50SAntonio Nino Diaz 		printf(backtrace_str, i, el_str, call_site);
2719c6d1c50SAntonio Nino Diaz 
2729c6d1c50SAntonio Nino Diaz 		fr = adjust_frame_record(fr->parent);
2739c6d1c50SAntonio Nino Diaz 	}
2749c6d1c50SAntonio Nino Diaz 
2759c6d1c50SAntonio Nino Diaz 	printf("ERROR: Max backtrace depth reached\n");
2769c6d1c50SAntonio Nino Diaz }
2779c6d1c50SAntonio Nino Diaz 
2789c6d1c50SAntonio Nino Diaz /*
2799c6d1c50SAntonio Nino Diaz  * Display a backtrace. The cookie string parameter is displayed along the
2809c6d1c50SAntonio Nino Diaz  * trace to help filter the log messages.
2819c6d1c50SAntonio Nino Diaz  *
2829c6d1c50SAntonio Nino Diaz  * Many things can prevent displaying the expected backtrace. For example,
2839c6d1c50SAntonio Nino Diaz  * compiler optimizations can use a branch instead of branch with link when it
2849c6d1c50SAntonio Nino Diaz  * detects a tail call. The backtrace level for this caller will not be
2859c6d1c50SAntonio Nino Diaz  * displayed, as it does not appear in the call stack anymore. Also, assembly
2869c6d1c50SAntonio Nino Diaz  * functions will not be displayed unless they setup AAPCS compliant frame
2879c6d1c50SAntonio Nino Diaz  * records on AArch64 and compliant with GCC-specific frame record format on
2889c6d1c50SAntonio Nino Diaz  * AArch32.
2899c6d1c50SAntonio Nino Diaz  *
2909c6d1c50SAntonio Nino Diaz  * Usage of the trace: addr2line can be used to map the addresses to function
2919c6d1c50SAntonio Nino Diaz  * and source code location when given the ELF file compiled with debug
2929c6d1c50SAntonio Nino Diaz  * information. The "-i" flag is highly recommended to improve display of
2938aabea33SPaul Beesley  * inlined function. The *.dump files generated when building each image can
2949c6d1c50SAntonio Nino Diaz  * also be used.
2959c6d1c50SAntonio Nino Diaz  *
2969c6d1c50SAntonio Nino Diaz  * WARNING: In case of corrupted stack, this function could display security
2979c6d1c50SAntonio Nino Diaz  * sensitive information past the beginning of the stack so it must not be used
2989c6d1c50SAntonio Nino Diaz  * in production build. This function is only compiled in when ENABLE_BACKTRACE
2999c6d1c50SAntonio Nino Diaz  * is set to 1.
3009c6d1c50SAntonio Nino Diaz  */
3019c6d1c50SAntonio Nino Diaz void backtrace(const char *cookie)
3029c6d1c50SAntonio Nino Diaz {
3039c6d1c50SAntonio Nino Diaz 	uintptr_t return_address = (uintptr_t)__builtin_return_address(0U);
3049c6d1c50SAntonio Nino Diaz 	struct frame_record *fr = __builtin_frame_address(0U);
3059c6d1c50SAntonio Nino Diaz 
3069c6d1c50SAntonio Nino Diaz 	/* Printing the backtrace may crash the system, flush before starting */
3079c6d1c50SAntonio Nino Diaz 	(void)console_flush();
3089c6d1c50SAntonio Nino Diaz 
3099c6d1c50SAntonio Nino Diaz 	fr = adjust_frame_record(fr);
3109c6d1c50SAntonio Nino Diaz 
3119c6d1c50SAntonio Nino Diaz 	printf("BACKTRACE: START: %s\n", cookie);
3129c6d1c50SAntonio Nino Diaz 
3139c6d1c50SAntonio Nino Diaz 	unwind_stack(fr, (uintptr_t)&backtrace, return_address);
3149c6d1c50SAntonio Nino Diaz 
3159c6d1c50SAntonio Nino Diaz 	printf("BACKTRACE: END: %s\n", cookie);
3169c6d1c50SAntonio Nino Diaz }
317