summaryrefslogtreecommitdiff
path: root/arch/s390/boot/pgm_check.c
blob: fa621fa5bc02ae858ebcd096f76904e5a7a2312b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
// SPDX-License-Identifier: GPL-2.0
#include <linux/kernel.h>
#include <linux/stdarg.h>
#include <linux/string.h>
#include <linux/ctype.h>
#include <asm/stacktrace.h>
#include <asm/boot_data.h>
#include <asm/lowcore.h>
#include <asm/setup.h>
#include <asm/sclp.h>
#include <asm/uv.h>
#include "boot.h"

void print_stacktrace(unsigned long sp)
{
	struct stack_info boot_stack = { STACK_TYPE_TASK, (unsigned long)_stack_start,
					 (unsigned long)_stack_end };
	bool first = true;

	boot_emerg("Call Trace:\n");
	while (!(sp & 0x7) && on_stack(&boot_stack, sp, sizeof(struct stack_frame))) {
		struct stack_frame *sf = (struct stack_frame *)sp;

		if (first)
			boot_emerg("(sp:%016lx [<%016lx>] %pS)\n", sp, sf->gprs[8], (void *)sf->gprs[8]);
		else
			boot_emerg(" sp:%016lx [<%016lx>] %pS\n", sp, sf->gprs[8], (void *)sf->gprs[8]);
		if (sf->back_chain <= sp)
			break;
		sp = sf->back_chain;
		first = false;
	}
}

extern struct exception_table_entry __start___ex_table[];
extern struct exception_table_entry __stop___ex_table[];

static inline unsigned long extable_insn(const struct exception_table_entry *x)
{
	return (unsigned long)&x->insn + x->insn;
}

static bool ex_handler(struct pt_regs *regs)
{
	const struct exception_table_entry *ex;

	for (ex = __start___ex_table; ex < __stop___ex_table; ex++) {
		if (extable_insn(ex) != regs->psw.addr)
			continue;
		if (ex->type != EX_TYPE_FIXUP)
			return false;
		regs->psw.addr = extable_fixup(ex);
		return true;
	}
	return false;
}

void do_pgm_check(struct pt_regs *regs)
{
	struct psw_bits *psw = &psw_bits(regs->psw);
	unsigned long *gpregs = regs->gprs;

	if (ex_handler(regs))
		return;
	if (bootdebug)
		boot_rb_dump();
	boot_emerg("Linux version %s\n", kernel_version);
	if (!is_prot_virt_guest() && early_command_line[0])
		boot_emerg("Kernel command line: %s\n", early_command_line);
	boot_emerg("Kernel fault: interruption code %04x ilc:%d\n",
		   regs->int_code & 0xffff, regs->int_code >> 17);
	if (kaslr_enabled()) {
		boot_emerg("Kernel random base: %lx\n", __kaslr_offset);
		boot_emerg("Kernel random base phys: %lx\n", __kaslr_offset_phys);
	}
	boot_emerg("PSW : %016lx %016lx (%pS)\n",
		   regs->psw.mask, regs->psw.addr, (void *)regs->psw.addr);
	boot_emerg("      R:%x T:%x IO:%x EX:%x Key:%x M:%x W:%x P:%x AS:%x CC:%x PM:%x RI:%x EA:%x\n",
		   psw->per, psw->dat, psw->io, psw->ext, psw->key, psw->mcheck,
		   psw->wait, psw->pstate, psw->as, psw->cc, psw->pm, psw->ri, psw->eaba);
	boot_emerg("GPRS: %016lx %016lx %016lx %016lx\n", gpregs[0], gpregs[1], gpregs[2], gpregs[3]);
	boot_emerg("      %016lx %016lx %016lx %016lx\n", gpregs[4], gpregs[5], gpregs[6], gpregs[7]);
	boot_emerg("      %016lx %016lx %016lx %016lx\n", gpregs[8], gpregs[9], gpregs[10], gpregs[11]);
	boot_emerg("      %016lx %016lx %016lx %016lx\n", gpregs[12], gpregs[13], gpregs[14], gpregs[15]);
	print_stacktrace(gpregs[15]);
	boot_emerg("Last Breaking-Event-Address:\n");
	boot_emerg(" [<%016lx>] %pS\n", regs->last_break, (void *)regs->last_break);
	/* Convert to disabled wait PSW */
	psw->io = 0;
	psw->ext = 0;
	psw->wait = 1;
}