diff options
author | Ard Biesheuvel <ard.biesheuvel@linaro.org> | 2017-03-16 13:23:42 +0000 |
---|---|---|
committer | Ard Biesheuvel <ard.biesheuvel@linaro.org> | 2017-03-22 15:48:01 +0000 |
commit | 173bf5c847e3ca8b42c11796ce048d8e2e916ff8 (patch) | |
tree | 7f52698f040d7ab1b584b3fbab3c1039b6afb225 /IntelFspWrapperPkg/FspWrapperSecCore | |
parent | b8fc72bd7d5e99f67aa55ce0ba5bc51560c40277 (diff) | |
download | edk2-platforms-173bf5c847e3ca8b42c11796ce048d8e2e916ff8.tar.xz |
ArmPkg/DefaultExceptionHandlerLib: walk call stack unconditionally
Currently, we only attempt to walk the call stack and print a backtrace
if the program counter refers to a location covered by a PE/COFF image.
However, regardless of the value of PC, the frame pointer may still have
a meaningful value, and so we can still produce the remainder of the
backtrace.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Reviewed-by: Leif Lindholm <leif.lindholm@linaro.org>
Diffstat (limited to 'IntelFspWrapperPkg/FspWrapperSecCore')
0 files changed, 0 insertions, 0 deletions