| // SPDX-License-Identifier: GPL-2.0 |
| #include <linux/kernel.h> |
| #include <linux/stdarg.h> |
| #include <linux/string.h> |
| #include <linux/ctype.h> |
| #include <asm/stacktrace.h> |
| #include <asm/boot_data.h> |
| #include <asm/lowcore.h> |
| #include <asm/setup.h> |
| #include <asm/sclp.h> |
| #include <asm/uv.h> |
| #include "boot.h" |
| |
| void print_stacktrace(unsigned long sp) |
| { |
| struct stack_info boot_stack = { STACK_TYPE_TASK, (unsigned long)_stack_start, |
| (unsigned long)_stack_end }; |
| bool first = true; |
| |
| boot_emerg("Call Trace:\n"); |
| while (!(sp & 0x7) && on_stack(&boot_stack, sp, sizeof(struct stack_frame))) { |
| struct stack_frame *sf = (struct stack_frame *)sp; |
| |
| if (first) |
| boot_emerg("(sp:%016lx [<%016lx>] %pS)\n", sp, sf->gprs[8], (void *)sf->gprs[8]); |
| else |
| boot_emerg(" sp:%016lx [<%016lx>] %pS\n", sp, sf->gprs[8], (void *)sf->gprs[8]); |
| if (sf->back_chain <= sp) |
| break; |
| sp = sf->back_chain; |
| first = false; |
| } |
| } |
| |
| extern struct exception_table_entry __start___ex_table[]; |
| extern struct exception_table_entry __stop___ex_table[]; |
| |
| static inline unsigned long extable_insn(const struct exception_table_entry *x) |
| { |
| return (unsigned long)&x->insn + x->insn; |
| } |
| |
| static bool ex_handler(struct pt_regs *regs) |
| { |
| const struct exception_table_entry *ex; |
| |
| for (ex = __start___ex_table; ex < __stop___ex_table; ex++) { |
| if (extable_insn(ex) != regs->psw.addr) |
| continue; |
| if (ex->type != EX_TYPE_FIXUP) |
| return false; |
| regs->psw.addr = extable_fixup(ex); |
| return true; |
| } |
| return false; |
| } |
| |
| void do_pgm_check(struct pt_regs *regs) |
| { |
| struct psw_bits *psw = &psw_bits(regs->psw); |
| unsigned long *gpregs = regs->gprs; |
| |
| if (ex_handler(regs)) |
| return; |
| if (bootdebug) |
| boot_rb_dump(); |
| boot_emerg("Linux version %s\n", kernel_version); |
| if (!is_prot_virt_guest() && early_command_line[0]) |
| boot_emerg("Kernel command line: %s\n", early_command_line); |
| boot_emerg("Kernel fault: interruption code %04x ilc:%d\n", |
| regs->int_code & 0xffff, regs->int_code >> 17); |
| if (kaslr_enabled()) { |
| boot_emerg("Kernel random base: %lx\n", __kaslr_offset); |
| boot_emerg("Kernel random base phys: %lx\n", __kaslr_offset_phys); |
| } |
| boot_emerg("PSW : %016lx %016lx (%pS)\n", |
| regs->psw.mask, regs->psw.addr, (void *)regs->psw.addr); |
| boot_emerg(" R:%x T:%x IO:%x EX:%x Key:%x M:%x W:%x P:%x AS:%x CC:%x PM:%x RI:%x EA:%x\n", |
| psw->per, psw->dat, psw->io, psw->ext, psw->key, psw->mcheck, |
| psw->wait, psw->pstate, psw->as, psw->cc, psw->pm, psw->ri, psw->eaba); |
| boot_emerg("GPRS: %016lx %016lx %016lx %016lx\n", gpregs[0], gpregs[1], gpregs[2], gpregs[3]); |
| boot_emerg(" %016lx %016lx %016lx %016lx\n", gpregs[4], gpregs[5], gpregs[6], gpregs[7]); |
| boot_emerg(" %016lx %016lx %016lx %016lx\n", gpregs[8], gpregs[9], gpregs[10], gpregs[11]); |
| boot_emerg(" %016lx %016lx %016lx %016lx\n", gpregs[12], gpregs[13], gpregs[14], gpregs[15]); |
| print_stacktrace(gpregs[15]); |
| boot_emerg("Last Breaking-Event-Address:\n"); |
| boot_emerg(" [<%016lx>] %pS\n", regs->last_break, (void *)regs->last_break); |
| /* Convert to disabled wait PSW */ |
| psw->io = 0; |
| psw->ext = 0; |
| psw->wait = 1; |
| } |