• Rohit Thapliyal's avatar
    arm64: modify the dump mem for 64 bit addresses · e147ae6d
    Rohit Thapliyal authored
    
    
    On 64bit kernel, the dump_mem gives 32 bit addresses
    on the stack dump. This gives unorganized information regarding
    the 64bit values on the stack. Hence, modified to get a complete 64bit memory
    dump.
    
    With patch:
    [   93.534801] Process insmod (pid: 1587, stack limit = 0xffffffc976be4058)
    [   93.541441] Stack: (0xffffffc976be7cf0 to 0xffffffc976be8000)
    [   93.547136] 7ce0:                                   ffffffc976be7d00 ffffffc00008163c
    [   93.554898] 7d00: ffffffc976be7d40 ffffffc0000f8a44 ffffffc00098ef38 ffffffbffc000088
    [   93.562659] 7d20: ffffffc00098ef50 ffffffbffc0000c0 0000000000000001 ffffffbffc000070
    [   93.570419] 7d40: ffffffc976be7e40 ffffffc0000f935c 0000000000000000 000000002b424090
    [   93.578179] 7d60: 000000002b424010 0000007facc555f4 0000000080000000 0000000000000015
    [   93.585937] 7d80: 0000000000000116 0000000000000069 ffffffc00097b000 ffffffc976be4000
    [   93.593694] 7da0: 0000000000000064 0000000000000072 000000000000006e 000000000000003f
    [   93.601453] 7dc0: 000000000000feff 000000000000fff1 ffffffbffc002028 0000000000000124
    [   93.609211] 7de0: ffffffc976be7e10 0000000000000001 ffffff8000000000 ffffffbbffff0000
    [   93.616969] 7e00: ffffffc976be7e60 0000000000000000 0000000000000000 0000000000000000
    [   93.624726] 7e20: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
    [   93.632484] 7e40: 0000007fcc474550 ffffffc0000841ec 000000002b424010 0000007facda0710
    [   93.640241] 7e60: ffffffffffffffff ffffffc0000be6dc ffffff80007d2000 000000000001c010
    [   93.647999] 7e80: ffffff80007e0ae0 ffffff80007e09d0 ffffff80007edf70 0000000000000288
    [   93.655757] 7ea0: 00000000000002e8 0000000000000000 0000000000000000 0000001c0000001b
    [   93.663514] 7ec0: 0000000000000009 0000000000000007 000000002b424090 000000000001c010
    [   93.671272] 7ee0: 000000002b424010 0000007faccd3a48 0000000000000000 0000000000000000
    [   93.679030] 7f00: 0000007fcc4743f8 0000007fcc4743f8 0000000000000069 0000000000000003
    [   93.686787] 7f20: 0101010101010101 0000000000000004 0000000000000020 00000000000003f3
    [   93.694544] 7f40: 0000007facb95664 0000007facda7030 0000007facc555d0 0000000000498378
    [   93.702301] 7f60: 0000000000000000 000000002b424010 0000007facda0710 000000002b424090
    [   93.710058] 7f80: 0000007fcc474698 0000000000498000 0000007fcc474ebb 0000000000474f58
    [   93.717815] 7fa0: 0000000000498000 0000000000000000 0000000000000000 0000007fcc474550
    [   93.725573] 7fc0: 00000000004104bc 0000007fcc474430 0000007facc555f4 0000000080000000
    [   93.733330] 7fe0: 000000002b424090 0000000000000069 0950020128000244 4104000008000004
    [   93.741084] Call trace:
    
    The above output makes a debugger life a lot more easier.
    Signed-off-by: default avatarRohit Thapliyal <r.thapliyal@samsung.com>
    Signed-off-by: default avatarManinder Singh <maninder1.s@samsung.com>
    Reviewed-by: default avatarCatalin Marinas <catalin.marinas@arm.com>
    Signed-off-by: default avatarWill Deacon <will.deacon@arm.com>
    e147ae6d
traps.c 11.7 KB