2010-01-27 03:47:47 +01:00
/** @file
Default exception handler
Copyright ( c ) 2008 - 2010 , Apple Inc . All rights reserved .
All rights reserved . This program and the accompanying materials
are licensed and made available under the terms and conditions of the BSD License
which accompanies this distribution . The full text of the license may be found at
http : //opensource.org/licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN " AS IS " BASIS ,
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND , EITHER EXPRESS OR IMPLIED .
* */
# include <Uefi.h>
# include <Library/UefiLib.h>
# include <Library/BaseLib.h>
# include <Library/DebugLib.h>
# include <Library/PeCoffGetEntryPointLib.h>
2010-02-01 19:25:18 +01:00
# include <Library/ArmDisassemblerLib.h>
2010-01-27 03:47:47 +01:00
# include <Guid/DebugImageInfoTable.h>
# include <Protocol/DebugSupport.h>
# include <Protocol/LoadedImage.h>
EFI_DEBUG_IMAGE_INFO_TABLE_HEADER * gDebugImageTableHeader = NULL ;
typedef struct {
UINT32 BIT ;
CHAR8 Char ;
} CPSR_CHAR ;
/**
Use the EFI Debug Image Table to lookup the FaultAddress and find which PE / COFF image
it came from . As long as the PE / COFF image contains a debug directory entry a
string can be returned . For ELF and Mach - O images the string points to the Mach - O or ELF
image . Microsoft tools contain a pointer to the PDB file that contains the debug information .
@ param FaultAddress Address to find PE / COFF image for .
@ param ImageBase Return load address of found image
@ param PeCoffSizeOfHeaders Return the size of the PE / COFF header for the image that was found
@ retval NULL FaultAddress not in a loaded PE / COFF image .
@ retval Path and file name of PE / COFF image .
* */
CHAR8 *
GetImageName (
IN UINT32 FaultAddress ,
OUT UINT32 * ImageBase ,
OUT UINT32 * PeCoffSizeOfHeaders
)
{
EFI_DEBUG_IMAGE_INFO * DebugTable ;
UINTN Entry ;
CHAR8 * Address ;
DebugTable = gDebugImageTableHeader - > EfiDebugImageInfoTable ;
if ( DebugTable = = NULL ) {
return NULL ;
}
Address = ( CHAR8 * ) ( UINTN ) FaultAddress ;
for ( Entry = 0 ; Entry < gDebugImageTableHeader - > TableSize ; Entry + + , DebugTable + + ) {
if ( DebugTable - > NormalImage ! = NULL ) {
if ( ( DebugTable - > NormalImage - > ImageInfoType = = EFI_DEBUG_IMAGE_INFO_TYPE_NORMAL ) & &
( DebugTable - > NormalImage - > LoadedImageProtocolInstance ! = NULL ) ) {
if ( ( Address > = ( CHAR8 * ) DebugTable - > NormalImage - > LoadedImageProtocolInstance - > ImageBase ) & &
( Address < = ( ( CHAR8 * ) DebugTable - > NormalImage - > LoadedImageProtocolInstance - > ImageBase + DebugTable - > NormalImage - > LoadedImageProtocolInstance - > ImageSize ) ) ) {
* ImageBase = ( UINT32 ) DebugTable - > NormalImage - > LoadedImageProtocolInstance - > ImageBase ;
* PeCoffSizeOfHeaders = PeCoffGetSizeOfHeaders ( ( VOID * ) ( UINTN ) * ImageBase ) ;
return PeCoffLoaderGetPdbPointer ( DebugTable - > NormalImage - > LoadedImageProtocolInstance - > ImageBase ) ;
}
}
}
}
return NULL ;
}
/**
Convert the Current Program Status Register ( CPSR ) to a string . The string is
a defacto standard in the ARM world .
It is possible to add extra bits by adding them to CpsrChar array .
@ param Cpsr ARM CPSR register value
@ param ReturnStr 32 byte string that contains string version of CPSR
* */
VOID
CpsrString (
IN UINT32 Cpsr ,
OUT CHAR8 * ReturnStr
)
{
UINTN Index ;
CHAR8 * Str = ReturnStr ;
CHAR8 * ModeStr ;
CPSR_CHAR CpsrChar [ ] = {
{ 31 , ' n ' } ,
{ 30 , ' z ' } ,
{ 29 , ' c ' } ,
{ 28 , ' v ' } ,
{ 9 , ' e ' } ,
{ 8 , ' a ' } ,
{ 7 , ' i ' } ,
{ 6 , ' f ' } ,
{ 5 , ' t ' } ,
{ 0 , ' ? ' }
} ;
for ( Index = 0 ; CpsrChar [ Index ] . BIT ! = 0 ; Index + + , Str + + ) {
* Str = CpsrChar [ Index ] . Char ;
if ( ( Cpsr & ( 1 < < CpsrChar [ Index ] . BIT ) ) ! = 0 ) {
// Concert to upper case if bit is set
* Str & = ~ 0x20 ;
}
}
* Str + + = ' _ ' ;
* Str = ' \0 ' ;
switch ( Cpsr & 0x1f ) {
case 0x10 :
ModeStr = " usr " ;
break ;
case 0x011 :
ModeStr = " fiq " ;
break ;
case 0x12 :
ModeStr = " irq " ;
break ;
case 0x13 :
ModeStr = " svc " ;
break ;
case 0x16 :
ModeStr = " mon " ;
break ;
case 0x17 :
ModeStr = " abt " ;
break ;
case 0x1b :
ModeStr = " und " ;
break ;
case 0x1f :
ModeStr = " sys " ;
break ;
default :
ModeStr = " ??? " ;
break ;
}
AsciiStrCat ( Str , ModeStr ) ;
return ;
}
2010-01-29 22:49:26 +01:00
CHAR8 *
FaultStatusToString (
IN UINT32 Status
)
{
CHAR8 * FaultSource ;
switch ( Status ) {
case 0x01 : FaultSource = " Alignment fault " ; break ;
case 0x02 : FaultSource = " Debug event fault " ; break ;
case 0x03 : FaultSource = " Access Flag fault on Section " ; break ;
case 0x04 : FaultSource = " Cache maintenance operation fault[2] " ; break ;
case 0x05 : FaultSource = " Translation fault on Section " ; break ;
case 0x06 : FaultSource = " Access Flag fault on Page " ; break ;
case 0x07 : FaultSource = " Translation fault on Page " ; break ;
case 0x08 : FaultSource = " Precise External Abort " ; break ;
case 0x09 : FaultSource = " Domain fault on Section " ; break ;
case 0x0b : FaultSource = " Domain fault on Page " ; break ;
case 0x0c : FaultSource = " External abort on translation, first level " ; break ;
case 0x0d : FaultSource = " Permission fault on Section " ; break ;
case 0x0e : FaultSource = " External abort on translation, second level " ; break ;
case 0x0f : FaultSource = " Permission fault on Page " ; break ;
case 0x16 : FaultSource = " Imprecise External Abort " ; break ;
default : FaultSource = " No function " ; break ;
}
return FaultSource ;
}
2010-01-27 03:47:47 +01:00
CHAR8 * gExceptionTypeString [ ] = {
" Reset " ,
" Undefined OpCode " ,
" SWI " ,
" Prefetch Abort " ,
" Data Abort " ,
" Undefined " ,
" IRQ " ,
" FIQ "
} ;
/**
This is the default action to take on an unexpected exception
Since this is exception context don ' t do anything crazy like try to allcoate memory .
@ param ExceptionType Type of the exception
@ param SystemContext Register state at the time of the Exception
* */
VOID
DefaultExceptionHandler (
IN EFI_EXCEPTION_TYPE ExceptionType ,
IN OUT EFI_SYSTEM_CONTEXT SystemContext
)
{
2010-01-29 22:49:26 +01:00
UINT32 DfsrStatus ;
BOOLEAN DfsrWrite ;
2010-01-27 03:47:47 +01:00
DEBUG ( ( EFI_D_ERROR , " \n %a Exception PC at 0x%08x CPSR 0x%08x " , gExceptionTypeString [ ExceptionType ] , SystemContext . SystemContextArm - > PC , SystemContext . SystemContextArm - > CPSR ) ) ;
DEBUG_CODE_BEGIN ( ) ;
CHAR8 * Pdb ;
UINT32 ImageBase ;
UINT32 PeCoffSizeOfHeader ;
UINT32 Offset ;
CHAR8 CpsrStr [ 32 ] ; // char per bit. Lower 5-bits are mode that is a 3 char string
CHAR8 Buffer [ 80 ] ;
2010-02-01 19:25:18 +01:00
UINT8 * DisAsm ;
2010-02-05 07:50:09 +01:00
UINT32 ItBlock ;
2010-01-27 03:47:47 +01:00
CpsrString ( SystemContext . SystemContextArm - > CPSR , CpsrStr ) ;
DEBUG ( ( EFI_D_ERROR , " %a \n " , CpsrStr ) ) ;
Pdb = GetImageName ( SystemContext . SystemContextArm - > PC , & ImageBase , & PeCoffSizeOfHeader ) ;
Offset = SystemContext . SystemContextArm - > PC - ImageBase ;
if ( Pdb ! = NULL ) {
DEBUG ( ( EFI_D_ERROR , " %a \n " , Pdb ) ) ;
//
// A PE/COFF image loads its headers into memory so the headers are
// included in the linked addressess. ELF and Mach-O images do not
// include the headers so the first byte of the image is usually
// text (code). If you look at link maps from ELF or Mach-O images
// you need to subtact out the size of the PE/COFF header to get
// get the offset that matches the link map.
//
DEBUG ( ( EFI_D_ERROR , " loaded at 0x%08x (PE/COFF offset) 0x%x (ELF or Mach-O offset) 0x%x " , ImageBase , Offset , Offset - PeCoffSizeOfHeader ) ) ;
// If we come from an image it is safe to show the instruction. We know it should not fault
2010-02-01 19:25:18 +01:00
DisAsm = ( UINT8 * ) ( UINTN ) SystemContext . SystemContextArm - > PC ;
2010-02-05 07:50:09 +01:00
ItBlock = 0 ;
DisassembleInstruction ( & DisAsm , ( SystemContext . SystemContextArm - > CPSR & BIT5 ) = = BIT5 , TRUE , & ItBlock , Buffer , sizeof ( Buffer ) ) ;
2010-02-01 19:25:18 +01:00
DEBUG ( ( EFI_D_ERROR , " \n %a " , Buffer ) ) ;
2010-01-27 03:47:47 +01:00
}
DEBUG_CODE_END ( ) ;
DEBUG ( ( EFI_D_ERROR , " \n R0 0x%08x R1 0x%08x R2 0x%08x R3 0x%08x \n " , SystemContext . SystemContextArm - > R0 , SystemContext . SystemContextArm - > R1 , SystemContext . SystemContextArm - > R2 , SystemContext . SystemContextArm - > R3 ) ) ;
DEBUG ( ( EFI_D_ERROR , " R4 0x%08x R5 0x%08x R6 0x%08x R7 0x%08x \n " , SystemContext . SystemContextArm - > R4 , SystemContext . SystemContextArm - > R5 , SystemContext . SystemContextArm - > R6 , SystemContext . SystemContextArm - > R7 ) ) ;
DEBUG ( ( EFI_D_ERROR , " R8 0x%08x R9 0x%08x R10 0x%08x R11 0x%08x \n " , SystemContext . SystemContextArm - > R8 , SystemContext . SystemContextArm - > R9 , SystemContext . SystemContextArm - > R10 , SystemContext . SystemContextArm - > R11 ) ) ;
DEBUG ( ( EFI_D_ERROR , " R12 0x%08x SP 0x%08x LR 0x%08x PC 0x%08x \n " , SystemContext . SystemContextArm - > R12 , SystemContext . SystemContextArm - > SP , SystemContext . SystemContextArm - > LR , SystemContext . SystemContextArm - > PC ) ) ;
2010-01-29 22:49:26 +01:00
DEBUG ( ( EFI_D_ERROR , " DFSR 0x%08x DFAR 0x%08x IFSR 0x%08x IFAR 0x%08x \n " , SystemContext . SystemContextArm - > DFSR , SystemContext . SystemContextArm - > DFAR , SystemContext . SystemContextArm - > IFSR , SystemContext . SystemContextArm - > IFAR ) ) ;
// Bit10 is Status[4] Bit3:0 is Status[3:0]
DfsrStatus = ( SystemContext . SystemContextArm - > DFSR & 0xf ) | ( ( SystemContext . SystemContextArm - > DFSR > > 6 ) & 0x10 ) ;
DfsrWrite = ( SystemContext . SystemContextArm - > DFSR & BIT11 ) ! = 0 ;
if ( DfsrStatus ! = 0x00 ) {
DEBUG ( ( EFI_D_ERROR , " %a: %a 0x%08x \n " , FaultStatusToString ( DfsrStatus ) , DfsrWrite ? " write to " : " read from " , SystemContext . SystemContextArm - > DFAR ) ) ;
}
2010-01-30 21:57:49 +01:00
if ( ( SystemContext . SystemContextArm - > IFSR & 0xf ) ! = 0x00 ) {
2010-01-29 22:49:26 +01:00
DEBUG ( ( EFI_D_ERROR , " Instruction %a at 0x%08x, \n " , FaultStatusToString ( SystemContext . SystemContextArm - > IFSR & 0xf ) , SystemContext . SystemContextArm - > IFAR ) ) ;
}
2010-01-27 03:47:47 +01:00
2010-01-29 22:49:26 +01:00
DEBUG ( ( EFI_D_ERROR , " \n " ) ) ;
2010-01-27 03:47:47 +01:00
ASSERT ( FALSE ) ;
}
/**
The constructor function caches EFI Debug table information for use in the exception handler .
@ param ImageHandle The firmware allocated handle for the EFI image .
@ param SystemTable A pointer to the EFI System Table .
@ retval EFI_SUCCESS The constructor always returns EFI_SUCCESS .
* */
EFI_STATUS
EFIAPI
DefaultExceptionHandlerConstructor (
IN EFI_HANDLE ImageHandle ,
IN EFI_SYSTEM_TABLE * SystemTable
)
{
EFI_STATUS Status ;
Status = EfiGetSystemConfigurationTable ( & gEfiDebugImageInfoTableGuid , ( VOID * * ) & gDebugImageTableHeader ) ;
if ( EFI_ERROR ( Status ) ) {
gDebugImageTableHeader = NULL ;
}
return Status ;
}