diff options
author | Heinrich Schuchardt | 2019-09-12 19:09:26 +0200 |
---|---|---|
committer | Tom Rini | 2019-10-11 15:33:27 -0400 |
commit | 57bbf44de6db8408e2b368475ca33dab3bab638a (patch) | |
tree | 387c34a7361954ff60a26b27c3a4a13201077f08 /common/spl/Kconfig | |
parent | 100e75bbdbe3e2c02f004f7d26055ce57e6472eb (diff) |
arm64: print instructions leading to exception
If an exception occurs in a loaded image and the relocation offset is
unknown, it is helpful to know the instructions pointed to by the
program counter. This patch adds the missing output.
A possible output is:
Code: 910c4021 aa1303e0 f9400662 d63f0040 (e7f7defb)
The parentheses indicate the instruction causing the exception.
The output can be disassembled using scripts/decodecode:
echo 'Code: 90000360 9100b800 94002782 17ffff8f (e7f7defb)' | \
ARCH=arm64 scripts/decodecode
Code: 90000360 9100b800 94002782 17ffff8f (e7f7defb)
All code
========
0: 90000360 adrp x0, 0x6c000
4: 9100b800 add x0, x0, #0x2e
8: 94002782 bl 0x9e10
c: 17ffff8f b 0xfffffffffffffe48
10:* e7f7defb .inst 0xe7f7defb ; undefined <-- trapping instruction
Code starting with the faulting instruction
===========================================
0: e7f7defb .inst 0xe7f7defb ; undefined
We already have implemented the same for armv7.
For testing command 'exception undefined' can be used.
Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
Diffstat (limited to 'common/spl/Kconfig')
0 files changed, 0 insertions, 0 deletions