On Mon, Oct 09, 2017 at 07:00:52PM +0200, Marcin Wojtas wrote: > From: Ard Biesheuvel <[email protected]> > > To avoid dereferencing junk when walking the call stack in exception > handlers (which may prevent us from getting a full backtrace), set > the frame pointer to 0x0 when first entering UEFI. > > Contributed-under: TianoCore Contribution Agreement 1.1 > Signed-off-by: Ard Biesheuvel <[email protected]> > Signed-off-by: Marcin Wojtas <[email protected]>
Reviewed-by: Leif Lindholm <[email protected]> > --- > Platform/Marvell/Armada/Library/Armada70x0Lib/AArch64/ArmPlatformHelper.S | > 1 + > 1 file changed, 1 insertion(+) > > diff --git > a/Platform/Marvell/Armada/Library/Armada70x0Lib/AArch64/ArmPlatformHelper.S > b/Platform/Marvell/Armada/Library/Armada70x0Lib/AArch64/ArmPlatformHelper.S > index 9265636..72f8cfc 100644 > --- > a/Platform/Marvell/Armada/Library/Armada70x0Lib/AArch64/ArmPlatformHelper.S > +++ > b/Platform/Marvell/Armada/Library/Armada70x0Lib/AArch64/ArmPlatformHelper.S > @@ -16,6 +16,7 @@ > #include <Library/ArmLib.h> > > ASM_FUNC(ArmPlatformPeiBootAction) > + mov x29, xzr > ret > > //UINTN > -- > 1.8.3.1 > _______________________________________________ edk2-devel mailing list [email protected] https://lists.01.org/mailman/listinfo/edk2-devel

