19c6d1c50SAntonio Nino Diaz /* 28aabea33SPaul Beesley * Copyright (c) 2018-2019, ARM Limited and Contributors. All rights reserved. 39c6d1c50SAntonio Nino Diaz * 49c6d1c50SAntonio Nino Diaz * SPDX-License-Identifier: BSD-3-Clause 59c6d1c50SAntonio Nino Diaz */ 69c6d1c50SAntonio Nino Diaz 79c6d1c50SAntonio Nino Diaz #include <assert.h> 89c6d1c50SAntonio Nino Diaz #include <stdbool.h> 99c6d1c50SAntonio Nino Diaz #include <stdint.h> 109c6d1c50SAntonio Nino Diaz 1109d40e0eSAntonio Nino Diaz #include <arch_helpers.h> 1209d40e0eSAntonio Nino Diaz #include <common/debug.h> 1309d40e0eSAntonio Nino Diaz #include <drivers/console.h> 1409d40e0eSAntonio Nino Diaz 159c6d1c50SAntonio Nino Diaz /* Maximum number of entries in the backtrace to display */ 169c6d1c50SAntonio Nino Diaz #define UNWIND_LIMIT 20U 179c6d1c50SAntonio Nino Diaz 189c6d1c50SAntonio Nino Diaz /* 199c6d1c50SAntonio Nino Diaz * If -fno-omit-frame-pointer is used: 209c6d1c50SAntonio Nino Diaz * 219c6d1c50SAntonio Nino Diaz * - AArch64: The AAPCS defines the format of the frame records and mandates the 229c6d1c50SAntonio Nino Diaz * usage of r29 as frame pointer. 239c6d1c50SAntonio Nino Diaz * 249c6d1c50SAntonio Nino Diaz * - AArch32: The format of the frame records is not defined in the AAPCS. 259c6d1c50SAntonio Nino Diaz * However, at least GCC and Clang use the same format. When they are forced 269c6d1c50SAntonio Nino Diaz * to only generate A32 code (with -marm), they use r11 as frame pointer and a 279c6d1c50SAntonio Nino Diaz * similar format as in AArch64. If interworking with T32 is enabled, the 289c6d1c50SAntonio Nino Diaz * frame pointer is r7 and the format is different. This is not supported by 299c6d1c50SAntonio Nino Diaz * this implementation of backtrace, so it is needed to use -marm. 309c6d1c50SAntonio Nino Diaz */ 319c6d1c50SAntonio Nino Diaz 329c6d1c50SAntonio Nino Diaz /* Frame records form a linked list in the stack */ 339c6d1c50SAntonio Nino Diaz struct frame_record { 349c6d1c50SAntonio Nino Diaz /* Previous frame record in the list */ 359c6d1c50SAntonio Nino Diaz struct frame_record *parent; 369c6d1c50SAntonio Nino Diaz /* Return address of the function at this level */ 379c6d1c50SAntonio Nino Diaz uintptr_t return_addr; 389c6d1c50SAntonio Nino Diaz }; 399c6d1c50SAntonio Nino Diaz 40b8b31ad0SLouis Mayencourt /* 41b8b31ad0SLouis Mayencourt * Strip the Pointer Authentication Code (PAC) from the address to retrieve the 42b8b31ad0SLouis Mayencourt * original one. 43b8b31ad0SLouis Mayencourt * 44b8b31ad0SLouis Mayencourt * The PAC field is stored on the high bits of the address and defined as: 45b8b31ad0SLouis Mayencourt * - PAC field = Xn[54:bottom_PAC_bit], when address tagging is used. 46b8b31ad0SLouis Mayencourt * - PAC field = Xn[63:56, 54:bottom_PAC_bit], without address tagging. 47b8b31ad0SLouis Mayencourt * 48b8b31ad0SLouis Mayencourt * With bottom_PAC_bit = 64 - TCR_ELx.TnSZ 49b8b31ad0SLouis Mayencourt */ 50b8b31ad0SLouis Mayencourt #if ENABLE_PAUTH 51b8b31ad0SLouis Mayencourt static uintptr_t demangle_address(uintptr_t addr) 52b8b31ad0SLouis Mayencourt { 53b8b31ad0SLouis Mayencourt unsigned int el, t0sz, bottom_pac_bit; 54b8b31ad0SLouis Mayencourt uint64_t tcr, pac_mask; 55b8b31ad0SLouis Mayencourt 56b8b31ad0SLouis Mayencourt /* 57b8b31ad0SLouis Mayencourt * Different virtual address space size can be defined for each EL. 58b8b31ad0SLouis Mayencourt * Ensure that we use the proper one by reading the corresponding 59b8b31ad0SLouis Mayencourt * TCR_ELx register. 60b8b31ad0SLouis Mayencourt */ 61b8b31ad0SLouis Mayencourt el = get_current_el(); 62b8b31ad0SLouis Mayencourt 63b8b31ad0SLouis Mayencourt if (el == 3U) { 64b8b31ad0SLouis Mayencourt tcr = read_tcr_el3(); 65b8b31ad0SLouis Mayencourt } else if (el == 2U) { 66b8b31ad0SLouis Mayencourt tcr = read_tcr_el2(); 67b8b31ad0SLouis Mayencourt } else { 68b8b31ad0SLouis Mayencourt tcr = read_tcr_el1(); 69b8b31ad0SLouis Mayencourt } 70b8b31ad0SLouis Mayencourt 71b8b31ad0SLouis Mayencourt /* T0SZ = TCR_ELx[5:0] */ 72b8b31ad0SLouis Mayencourt t0sz = tcr & 0x1f; 73b8b31ad0SLouis Mayencourt bottom_pac_bit = 64 - t0sz; 74b8b31ad0SLouis Mayencourt pac_mask = (1ULL << bottom_pac_bit) - 1; 75b8b31ad0SLouis Mayencourt 76b8b31ad0SLouis Mayencourt /* demangle the address with the computed mask */ 77b8b31ad0SLouis Mayencourt return (addr & pac_mask); 78b8b31ad0SLouis Mayencourt } 79b8b31ad0SLouis Mayencourt #endif /* ENABLE_PAUTH */ 80b8b31ad0SLouis Mayencourt 819c6d1c50SAntonio Nino Diaz static const char *get_el_str(unsigned int el) 829c6d1c50SAntonio Nino Diaz { 839c6d1c50SAntonio Nino Diaz if (el == 3U) { 849c6d1c50SAntonio Nino Diaz return "EL3"; 859c6d1c50SAntonio Nino Diaz } else if (el == 2U) { 869c6d1c50SAntonio Nino Diaz return "EL2"; 879c6d1c50SAntonio Nino Diaz } else { 889c6d1c50SAntonio Nino Diaz return "S-EL1"; 899c6d1c50SAntonio Nino Diaz } 909c6d1c50SAntonio Nino Diaz } 919c6d1c50SAntonio Nino Diaz 929c6d1c50SAntonio Nino Diaz /* 939c6d1c50SAntonio Nino Diaz * Returns true if the address points to a virtual address that can be read at 949c6d1c50SAntonio Nino Diaz * the current EL, false otherwise. 959c6d1c50SAntonio Nino Diaz */ 96*402b3cf8SJulius Werner #ifdef __aarch64__ 979c6d1c50SAntonio Nino Diaz static bool is_address_readable(uintptr_t addr) 989c6d1c50SAntonio Nino Diaz { 999c6d1c50SAntonio Nino Diaz unsigned int el = get_current_el(); 1009c6d1c50SAntonio Nino Diaz 101b8b31ad0SLouis Mayencourt #if ENABLE_PAUTH 102b8b31ad0SLouis Mayencourt /* 103b8b31ad0SLouis Mayencourt * When pointer authentication is enabled, the LR value saved on the 104b8b31ad0SLouis Mayencourt * stack contains a PAC. It must be stripped to retrieve the return 105b8b31ad0SLouis Mayencourt * address. 106b8b31ad0SLouis Mayencourt */ 107b8b31ad0SLouis Mayencourt addr = demangle_address(addr); 108b8b31ad0SLouis Mayencourt #endif 109b8b31ad0SLouis Mayencourt 1109c6d1c50SAntonio Nino Diaz if (el == 3U) { 1119c6d1c50SAntonio Nino Diaz ats1e3r(addr); 1129c6d1c50SAntonio Nino Diaz } else if (el == 2U) { 1139c6d1c50SAntonio Nino Diaz ats1e2r(addr); 1149c6d1c50SAntonio Nino Diaz } else { 1159c6d1c50SAntonio Nino Diaz ats1e1r(addr); 1169c6d1c50SAntonio Nino Diaz } 1179c6d1c50SAntonio Nino Diaz 1189c6d1c50SAntonio Nino Diaz isb(); 1199c6d1c50SAntonio Nino Diaz 1209c6d1c50SAntonio Nino Diaz /* If PAR.F == 1 the address translation was aborted. */ 1219c6d1c50SAntonio Nino Diaz if ((read_par_el1() & PAR_F_MASK) != 0U) 1229c6d1c50SAntonio Nino Diaz return false; 1239c6d1c50SAntonio Nino Diaz 1249c6d1c50SAntonio Nino Diaz return true; 1259c6d1c50SAntonio Nino Diaz } 126*402b3cf8SJulius Werner #else /* !__aarch64__ */ 1279c6d1c50SAntonio Nino Diaz static bool is_address_readable(uintptr_t addr) 1289c6d1c50SAntonio Nino Diaz { 1299c6d1c50SAntonio Nino Diaz unsigned int el = get_current_el(); 1309c6d1c50SAntonio Nino Diaz 1319c6d1c50SAntonio Nino Diaz if (el == 3U) { 1329c6d1c50SAntonio Nino Diaz write_ats1cpr(addr); 1339c6d1c50SAntonio Nino Diaz } else if (el == 2U) { 1349c6d1c50SAntonio Nino Diaz write_ats1hr(addr); 1359c6d1c50SAntonio Nino Diaz } else { 1369c6d1c50SAntonio Nino Diaz write_ats1cpr(addr); 1379c6d1c50SAntonio Nino Diaz } 1389c6d1c50SAntonio Nino Diaz 1399c6d1c50SAntonio Nino Diaz isb(); 1409c6d1c50SAntonio Nino Diaz 1419c6d1c50SAntonio Nino Diaz /* If PAR.F == 1 the address translation was aborted. */ 1429c6d1c50SAntonio Nino Diaz if ((read64_par() & PAR_F_MASK) != 0U) 1439c6d1c50SAntonio Nino Diaz return false; 1449c6d1c50SAntonio Nino Diaz 1459c6d1c50SAntonio Nino Diaz return true; 1469c6d1c50SAntonio Nino Diaz } 147*402b3cf8SJulius Werner #endif /* __aarch64__ */ 1489c6d1c50SAntonio Nino Diaz 1499c6d1c50SAntonio Nino Diaz /* 1509c6d1c50SAntonio Nino Diaz * Returns true if all the bytes in a given object are in mapped memory and an 1519c6d1c50SAntonio Nino Diaz * LDR using this pointer would succeed, false otherwise. 1529c6d1c50SAntonio Nino Diaz */ 1539c6d1c50SAntonio Nino Diaz static bool is_valid_object(uintptr_t addr, size_t size) 1549c6d1c50SAntonio Nino Diaz { 1559c6d1c50SAntonio Nino Diaz assert(size > 0U); 1569c6d1c50SAntonio Nino Diaz 1579c6d1c50SAntonio Nino Diaz if (addr == 0U) 1589c6d1c50SAntonio Nino Diaz return false; 1599c6d1c50SAntonio Nino Diaz 1609c6d1c50SAntonio Nino Diaz /* Detect overflows */ 1619c6d1c50SAntonio Nino Diaz if ((addr + size) < addr) 1629c6d1c50SAntonio Nino Diaz return false; 1639c6d1c50SAntonio Nino Diaz 1649c6d1c50SAntonio Nino Diaz /* A pointer not aligned properly could trigger an alignment fault. */ 1659c6d1c50SAntonio Nino Diaz if ((addr & (sizeof(uintptr_t) - 1U)) != 0U) 1669c6d1c50SAntonio Nino Diaz return false; 1679c6d1c50SAntonio Nino Diaz 1689c6d1c50SAntonio Nino Diaz /* Check that all the object is readable */ 1699c6d1c50SAntonio Nino Diaz for (size_t i = 0; i < size; i++) { 1709c6d1c50SAntonio Nino Diaz if (!is_address_readable(addr + i)) 1719c6d1c50SAntonio Nino Diaz return false; 1729c6d1c50SAntonio Nino Diaz } 1739c6d1c50SAntonio Nino Diaz 1749c6d1c50SAntonio Nino Diaz return true; 1759c6d1c50SAntonio Nino Diaz } 1769c6d1c50SAntonio Nino Diaz 1779c6d1c50SAntonio Nino Diaz /* 1789c6d1c50SAntonio Nino Diaz * Returns true if the specified address is correctly aligned and points to a 1799c6d1c50SAntonio Nino Diaz * valid memory region. 1809c6d1c50SAntonio Nino Diaz */ 1819c6d1c50SAntonio Nino Diaz static bool is_valid_jump_address(uintptr_t addr) 1829c6d1c50SAntonio Nino Diaz { 1839c6d1c50SAntonio Nino Diaz if (addr == 0U) 1849c6d1c50SAntonio Nino Diaz return false; 1859c6d1c50SAntonio Nino Diaz 1869c6d1c50SAntonio Nino Diaz /* Check alignment. Both A64 and A32 use 32-bit opcodes */ 1879c6d1c50SAntonio Nino Diaz if ((addr & (sizeof(uint32_t) - 1U)) != 0U) 1889c6d1c50SAntonio Nino Diaz return false; 1899c6d1c50SAntonio Nino Diaz 1909c6d1c50SAntonio Nino Diaz if (!is_address_readable(addr)) 1919c6d1c50SAntonio Nino Diaz return false; 1929c6d1c50SAntonio Nino Diaz 1939c6d1c50SAntonio Nino Diaz return true; 1949c6d1c50SAntonio Nino Diaz } 1959c6d1c50SAntonio Nino Diaz 1969c6d1c50SAntonio Nino Diaz /* 1979c6d1c50SAntonio Nino Diaz * Returns true if the pointer points at a valid frame record, false otherwise. 1989c6d1c50SAntonio Nino Diaz */ 1999c6d1c50SAntonio Nino Diaz static bool is_valid_frame_record(struct frame_record *fr) 2009c6d1c50SAntonio Nino Diaz { 2019c6d1c50SAntonio Nino Diaz return is_valid_object((uintptr_t)fr, sizeof(struct frame_record)); 2029c6d1c50SAntonio Nino Diaz } 2039c6d1c50SAntonio Nino Diaz 2049c6d1c50SAntonio Nino Diaz /* 2059c6d1c50SAntonio Nino Diaz * Adjust the frame-pointer-register value by 4 bytes on AArch32 to have the 2069c6d1c50SAntonio Nino Diaz * same layout as AArch64. 2079c6d1c50SAntonio Nino Diaz */ 2089c6d1c50SAntonio Nino Diaz static struct frame_record *adjust_frame_record(struct frame_record *fr) 2099c6d1c50SAntonio Nino Diaz { 210*402b3cf8SJulius Werner #ifdef __aarch64__ 2119c6d1c50SAntonio Nino Diaz return fr; 2129c6d1c50SAntonio Nino Diaz #else 2139c6d1c50SAntonio Nino Diaz return (struct frame_record *)((uintptr_t)fr - 4U); 2149c6d1c50SAntonio Nino Diaz #endif 2159c6d1c50SAntonio Nino Diaz } 2169c6d1c50SAntonio Nino Diaz 2179c6d1c50SAntonio Nino Diaz static void unwind_stack(struct frame_record *fr, uintptr_t current_pc, 2189c6d1c50SAntonio Nino Diaz uintptr_t link_register) 2199c6d1c50SAntonio Nino Diaz { 2209c6d1c50SAntonio Nino Diaz uintptr_t call_site; 2219c6d1c50SAntonio Nino Diaz static const char *backtrace_str = "%u: %s: 0x%lx\n"; 2229c6d1c50SAntonio Nino Diaz const char *el_str = get_el_str(get_current_el()); 2239c6d1c50SAntonio Nino Diaz 2249c6d1c50SAntonio Nino Diaz if (!is_valid_frame_record(fr)) { 2259c6d1c50SAntonio Nino Diaz printf("ERROR: Corrupted frame pointer (frame record address = %p)\n", 2269c6d1c50SAntonio Nino Diaz fr); 2279c6d1c50SAntonio Nino Diaz return; 2289c6d1c50SAntonio Nino Diaz } 2299c6d1c50SAntonio Nino Diaz 2309c6d1c50SAntonio Nino Diaz if (fr->return_addr != link_register) { 2319c6d1c50SAntonio Nino Diaz printf("ERROR: Corrupted stack (frame record address = %p)\n", 2329c6d1c50SAntonio Nino Diaz fr); 2339c6d1c50SAntonio Nino Diaz return; 2349c6d1c50SAntonio Nino Diaz } 2359c6d1c50SAntonio Nino Diaz 2369c6d1c50SAntonio Nino Diaz /* The level 0 of the backtrace is the current backtrace function */ 2379c6d1c50SAntonio Nino Diaz printf(backtrace_str, 0U, el_str, current_pc); 2389c6d1c50SAntonio Nino Diaz 2399c6d1c50SAntonio Nino Diaz /* 2409c6d1c50SAntonio Nino Diaz * The last frame record pointer in the linked list at the beginning of 2419c6d1c50SAntonio Nino Diaz * the stack should be NULL unless stack is corrupted. 2429c6d1c50SAntonio Nino Diaz */ 2439c6d1c50SAntonio Nino Diaz for (unsigned int i = 1U; i < UNWIND_LIMIT; i++) { 2449c6d1c50SAntonio Nino Diaz /* If an invalid frame record is found, exit. */ 2459c6d1c50SAntonio Nino Diaz if (!is_valid_frame_record(fr)) 2469c6d1c50SAntonio Nino Diaz return; 2479c6d1c50SAntonio Nino Diaz /* 2489c6d1c50SAntonio Nino Diaz * A32 and A64 are fixed length so the address from where the 2499c6d1c50SAntonio Nino Diaz * call was made is the instruction before the return address, 2509c6d1c50SAntonio Nino Diaz * which is always 4 bytes before it. 2519c6d1c50SAntonio Nino Diaz */ 2529c6d1c50SAntonio Nino Diaz call_site = fr->return_addr - 4U; 2539c6d1c50SAntonio Nino Diaz 254b8b31ad0SLouis Mayencourt #if ENABLE_PAUTH 255b8b31ad0SLouis Mayencourt /* 256b8b31ad0SLouis Mayencourt * When pointer authentication is enabled, the LR value saved on 257b8b31ad0SLouis Mayencourt * the stack contains a PAC. It must be stripped to retrieve the 258b8b31ad0SLouis Mayencourt * return address. 259b8b31ad0SLouis Mayencourt */ 260b8b31ad0SLouis Mayencourt call_site = demangle_address(call_site); 261b8b31ad0SLouis Mayencourt #endif 262b8b31ad0SLouis Mayencourt 2639c6d1c50SAntonio Nino Diaz /* 2649c6d1c50SAntonio Nino Diaz * If the address is invalid it means that the frame record is 2659c6d1c50SAntonio Nino Diaz * probably corrupted. 2669c6d1c50SAntonio Nino Diaz */ 2679c6d1c50SAntonio Nino Diaz if (!is_valid_jump_address(call_site)) 2689c6d1c50SAntonio Nino Diaz return; 2699c6d1c50SAntonio Nino Diaz 2709c6d1c50SAntonio Nino Diaz printf(backtrace_str, i, el_str, call_site); 2719c6d1c50SAntonio Nino Diaz 2729c6d1c50SAntonio Nino Diaz fr = adjust_frame_record(fr->parent); 2739c6d1c50SAntonio Nino Diaz } 2749c6d1c50SAntonio Nino Diaz 2759c6d1c50SAntonio Nino Diaz printf("ERROR: Max backtrace depth reached\n"); 2769c6d1c50SAntonio Nino Diaz } 2779c6d1c50SAntonio Nino Diaz 2789c6d1c50SAntonio Nino Diaz /* 2799c6d1c50SAntonio Nino Diaz * Display a backtrace. The cookie string parameter is displayed along the 2809c6d1c50SAntonio Nino Diaz * trace to help filter the log messages. 2819c6d1c50SAntonio Nino Diaz * 2829c6d1c50SAntonio Nino Diaz * Many things can prevent displaying the expected backtrace. For example, 2839c6d1c50SAntonio Nino Diaz * compiler optimizations can use a branch instead of branch with link when it 2849c6d1c50SAntonio Nino Diaz * detects a tail call. The backtrace level for this caller will not be 2859c6d1c50SAntonio Nino Diaz * displayed, as it does not appear in the call stack anymore. Also, assembly 2869c6d1c50SAntonio Nino Diaz * functions will not be displayed unless they setup AAPCS compliant frame 2879c6d1c50SAntonio Nino Diaz * records on AArch64 and compliant with GCC-specific frame record format on 2889c6d1c50SAntonio Nino Diaz * AArch32. 2899c6d1c50SAntonio Nino Diaz * 2909c6d1c50SAntonio Nino Diaz * Usage of the trace: addr2line can be used to map the addresses to function 2919c6d1c50SAntonio Nino Diaz * and source code location when given the ELF file compiled with debug 2929c6d1c50SAntonio Nino Diaz * information. The "-i" flag is highly recommended to improve display of 2938aabea33SPaul Beesley * inlined function. The *.dump files generated when building each image can 2949c6d1c50SAntonio Nino Diaz * also be used. 2959c6d1c50SAntonio Nino Diaz * 2969c6d1c50SAntonio Nino Diaz * WARNING: In case of corrupted stack, this function could display security 2979c6d1c50SAntonio Nino Diaz * sensitive information past the beginning of the stack so it must not be used 2989c6d1c50SAntonio Nino Diaz * in production build. This function is only compiled in when ENABLE_BACKTRACE 2999c6d1c50SAntonio Nino Diaz * is set to 1. 3009c6d1c50SAntonio Nino Diaz */ 3019c6d1c50SAntonio Nino Diaz void backtrace(const char *cookie) 3029c6d1c50SAntonio Nino Diaz { 3039c6d1c50SAntonio Nino Diaz uintptr_t return_address = (uintptr_t)__builtin_return_address(0U); 3049c6d1c50SAntonio Nino Diaz struct frame_record *fr = __builtin_frame_address(0U); 3059c6d1c50SAntonio Nino Diaz 3069c6d1c50SAntonio Nino Diaz /* Printing the backtrace may crash the system, flush before starting */ 3079c6d1c50SAntonio Nino Diaz (void)console_flush(); 3089c6d1c50SAntonio Nino Diaz 3099c6d1c50SAntonio Nino Diaz fr = adjust_frame_record(fr); 3109c6d1c50SAntonio Nino Diaz 3119c6d1c50SAntonio Nino Diaz printf("BACKTRACE: START: %s\n", cookie); 3129c6d1c50SAntonio Nino Diaz 3139c6d1c50SAntonio Nino Diaz unwind_stack(fr, (uintptr_t)&backtrace, return_address); 3149c6d1c50SAntonio Nino Diaz 3159c6d1c50SAntonio Nino Diaz printf("BACKTRACE: END: %s\n", cookie); 3169c6d1c50SAntonio Nino Diaz } 317