xref: /openbmc/linux/arch/powerpc/kernel/interrupt.c (revision 0eb089a72fda3f7969e6277804bde75dc1474a14)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 
3 #include <linux/context_tracking.h>
4 #include <linux/err.h>
5 #include <linux/compat.h>
6 #include <linux/sched/debug.h> /* for show_regs */
7 
8 #include <asm/kup.h>
9 #include <asm/cputime.h>
10 #include <asm/hw_irq.h>
11 #include <asm/interrupt.h>
12 #include <asm/kprobes.h>
13 #include <asm/paca.h>
14 #include <asm/ptrace.h>
15 #include <asm/reg.h>
16 #include <asm/signal.h>
17 #include <asm/switch_to.h>
18 #include <asm/syscall.h>
19 #include <asm/time.h>
20 #include <asm/tm.h>
21 #include <asm/unistd.h>
22 
23 #if defined(CONFIG_PPC_ADV_DEBUG_REGS) && defined(CONFIG_PPC32)
24 unsigned long global_dbcr0[NR_CPUS];
25 #endif
26 
27 #ifdef CONFIG_PPC_BOOK3S_64
28 DEFINE_STATIC_KEY_FALSE(interrupt_exit_not_reentrant);
29 static inline bool exit_must_hard_disable(void)
30 {
31 	return static_branch_unlikely(&interrupt_exit_not_reentrant);
32 }
33 #else
34 static inline bool exit_must_hard_disable(void)
35 {
36 	return true;
37 }
38 #endif
39 
40 /*
41  * local irqs must be disabled. Returns false if the caller must re-enable
42  * them, check for new work, and try again.
43  *
44  * This should be called with local irqs disabled, but if they were previously
45  * enabled when the interrupt handler returns (indicating a process-context /
46  * synchronous interrupt) then irqs_enabled should be true.
47  *
48  * restartable is true then EE/RI can be left on because interrupts are handled
49  * with a restart sequence.
50  */
51 static notrace __always_inline bool prep_irq_for_enabled_exit(bool restartable)
52 {
53 	bool must_hard_disable = (exit_must_hard_disable() || !restartable);
54 
55 	/* This must be done with RI=1 because tracing may touch vmaps */
56 	trace_hardirqs_on();
57 
58 	if (must_hard_disable)
59 		__hard_EE_RI_disable();
60 
61 #ifdef CONFIG_PPC64
62 	/* This pattern matches prep_irq_for_idle */
63 	if (unlikely(lazy_irq_pending_nocheck())) {
64 		if (must_hard_disable) {
65 			local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
66 			__hard_RI_enable();
67 		}
68 		trace_hardirqs_off();
69 
70 		return false;
71 	}
72 #endif
73 	return true;
74 }
75 
76 static notrace void booke_load_dbcr0(void)
77 {
78 #ifdef CONFIG_PPC_ADV_DEBUG_REGS
79 	unsigned long dbcr0 = current->thread.debug.dbcr0;
80 
81 	if (likely(!(dbcr0 & DBCR0_IDM)))
82 		return;
83 
84 	/*
85 	 * Check to see if the dbcr0 register is set up to debug.
86 	 * Use the internal debug mode bit to do this.
87 	 */
88 	mtmsr(mfmsr() & ~MSR_DE);
89 	if (IS_ENABLED(CONFIG_PPC32)) {
90 		isync();
91 		global_dbcr0[smp_processor_id()] = mfspr(SPRN_DBCR0);
92 	}
93 	mtspr(SPRN_DBCR0, dbcr0);
94 	mtspr(SPRN_DBSR, -1);
95 #endif
96 }
97 
98 static notrace void check_return_regs_valid(struct pt_regs *regs)
99 {
100 #ifdef CONFIG_PPC_BOOK3S_64
101 	unsigned long trap, srr0, srr1;
102 	static bool warned;
103 	u8 *validp;
104 	char *h;
105 
106 	if (trap_is_scv(regs))
107 		return;
108 
109 	trap = TRAP(regs);
110 	// EE in HV mode sets HSRRs like 0xea0
111 	if (cpu_has_feature(CPU_FTR_HVMODE) && trap == INTERRUPT_EXTERNAL)
112 		trap = 0xea0;
113 
114 	switch (trap) {
115 	case 0x980:
116 	case INTERRUPT_H_DATA_STORAGE:
117 	case 0xe20:
118 	case 0xe40:
119 	case INTERRUPT_HMI:
120 	case 0xe80:
121 	case 0xea0:
122 	case INTERRUPT_H_FAC_UNAVAIL:
123 	case 0x1200:
124 	case 0x1500:
125 	case 0x1600:
126 	case 0x1800:
127 		validp = &local_paca->hsrr_valid;
128 		if (!*validp)
129 			return;
130 
131 		srr0 = mfspr(SPRN_HSRR0);
132 		srr1 = mfspr(SPRN_HSRR1);
133 		h = "H";
134 
135 		break;
136 	default:
137 		validp = &local_paca->srr_valid;
138 		if (!*validp)
139 			return;
140 
141 		srr0 = mfspr(SPRN_SRR0);
142 		srr1 = mfspr(SPRN_SRR1);
143 		h = "";
144 		break;
145 	}
146 
147 	if (srr0 == regs->nip && srr1 == regs->msr)
148 		return;
149 
150 	/*
151 	 * A NMI / soft-NMI interrupt may have come in after we found
152 	 * srr_valid and before the SRRs are loaded. The interrupt then
153 	 * comes in and clobbers SRRs and clears srr_valid. Then we load
154 	 * the SRRs here and test them above and find they don't match.
155 	 *
156 	 * Test validity again after that, to catch such false positives.
157 	 *
158 	 * This test in general will have some window for false negatives
159 	 * and may not catch and fix all such cases if an NMI comes in
160 	 * later and clobbers SRRs without clearing srr_valid, but hopefully
161 	 * such things will get caught most of the time, statistically
162 	 * enough to be able to get a warning out.
163 	 */
164 	barrier();
165 
166 	if (!*validp)
167 		return;
168 
169 	if (!warned) {
170 		warned = true;
171 		printk("%sSRR0 was: %lx should be: %lx\n", h, srr0, regs->nip);
172 		printk("%sSRR1 was: %lx should be: %lx\n", h, srr1, regs->msr);
173 		show_regs(regs);
174 	}
175 
176 	*validp = 0; /* fixup */
177 #endif
178 }
179 
180 static notrace unsigned long
181 interrupt_exit_user_prepare_main(unsigned long ret, struct pt_regs *regs)
182 {
183 	unsigned long ti_flags;
184 
185 again:
186 	ti_flags = read_thread_flags();
187 	while (unlikely(ti_flags & (_TIF_USER_WORK_MASK & ~_TIF_RESTORE_TM))) {
188 		local_irq_enable();
189 		if (ti_flags & _TIF_NEED_RESCHED) {
190 			schedule();
191 		} else {
192 			/*
193 			 * SIGPENDING must restore signal handler function
194 			 * argument GPRs, and some non-volatiles (e.g., r1).
195 			 * Restore all for now. This could be made lighter.
196 			 */
197 			if (ti_flags & _TIF_SIGPENDING)
198 				ret |= _TIF_RESTOREALL;
199 			do_notify_resume(regs, ti_flags);
200 		}
201 		local_irq_disable();
202 		ti_flags = read_thread_flags();
203 	}
204 
205 	if (IS_ENABLED(CONFIG_PPC_BOOK3S_64) && IS_ENABLED(CONFIG_PPC_FPU)) {
206 		if (IS_ENABLED(CONFIG_PPC_TRANSACTIONAL_MEM) &&
207 				unlikely((ti_flags & _TIF_RESTORE_TM))) {
208 			restore_tm_state(regs);
209 		} else {
210 			unsigned long mathflags = MSR_FP;
211 
212 			if (cpu_has_feature(CPU_FTR_VSX))
213 				mathflags |= MSR_VEC | MSR_VSX;
214 			else if (cpu_has_feature(CPU_FTR_ALTIVEC))
215 				mathflags |= MSR_VEC;
216 
217 			/*
218 			 * If userspace MSR has all available FP bits set,
219 			 * then they are live and no need to restore. If not,
220 			 * it means the regs were given up and restore_math
221 			 * may decide to restore them (to avoid taking an FP
222 			 * fault).
223 			 */
224 			if ((regs->msr & mathflags) != mathflags)
225 				restore_math(regs);
226 		}
227 	}
228 
229 	check_return_regs_valid(regs);
230 
231 	user_enter_irqoff();
232 	if (!prep_irq_for_enabled_exit(true)) {
233 		user_exit_irqoff();
234 		local_irq_enable();
235 		local_irq_disable();
236 		goto again;
237 	}
238 
239 #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
240 	local_paca->tm_scratch = regs->msr;
241 #endif
242 
243 	booke_load_dbcr0();
244 
245 	account_cpu_user_exit();
246 
247 	/* Restore user access locks last */
248 	kuap_user_restore(regs);
249 
250 	return ret;
251 }
252 
253 /*
254  * This should be called after a syscall returns, with r3 the return value
255  * from the syscall. If this function returns non-zero, the system call
256  * exit assembly should additionally load all GPR registers and CTR and XER
257  * from the interrupt frame.
258  *
259  * The function graph tracer can not trace the return side of this function,
260  * because RI=0 and soft mask state is "unreconciled", so it is marked notrace.
261  */
262 notrace unsigned long syscall_exit_prepare(unsigned long r3,
263 					   struct pt_regs *regs,
264 					   long scv)
265 {
266 	unsigned long ti_flags;
267 	unsigned long ret = 0;
268 	bool is_not_scv = !IS_ENABLED(CONFIG_PPC_BOOK3S_64) || !scv;
269 
270 	CT_WARN_ON(ct_state() == CONTEXT_USER);
271 
272 	kuap_assert_locked();
273 
274 	regs->result = r3;
275 
276 	/* Check whether the syscall is issued inside a restartable sequence */
277 	rseq_syscall(regs);
278 
279 	ti_flags = read_thread_flags();
280 
281 	if (unlikely(r3 >= (unsigned long)-MAX_ERRNO) && is_not_scv) {
282 		if (likely(!(ti_flags & (_TIF_NOERROR | _TIF_RESTOREALL)))) {
283 			r3 = -r3;
284 			regs->ccr |= 0x10000000; /* Set SO bit in CR */
285 		}
286 	}
287 
288 	if (unlikely(ti_flags & _TIF_PERSYSCALL_MASK)) {
289 		if (ti_flags & _TIF_RESTOREALL)
290 			ret = _TIF_RESTOREALL;
291 		else
292 			regs->gpr[3] = r3;
293 		clear_bits(_TIF_PERSYSCALL_MASK, &current_thread_info()->flags);
294 	} else {
295 		regs->gpr[3] = r3;
296 	}
297 
298 	if (unlikely(ti_flags & _TIF_SYSCALL_DOTRACE)) {
299 		do_syscall_trace_leave(regs);
300 		ret |= _TIF_RESTOREALL;
301 	}
302 
303 	local_irq_disable();
304 	ret = interrupt_exit_user_prepare_main(ret, regs);
305 
306 #ifdef CONFIG_PPC64
307 	regs->exit_result = ret;
308 #endif
309 
310 	return ret;
311 }
312 
313 #ifdef CONFIG_PPC64
314 notrace unsigned long syscall_exit_restart(unsigned long r3, struct pt_regs *regs)
315 {
316 	/*
317 	 * This is called when detecting a soft-pending interrupt as well as
318 	 * an alternate-return interrupt. So we can't just have the alternate
319 	 * return path clear SRR1[MSR] and set PACA_IRQ_HARD_DIS (unless
320 	 * the soft-pending case were to fix things up as well). RI might be
321 	 * disabled, in which case it gets re-enabled by __hard_irq_disable().
322 	 */
323 	__hard_irq_disable();
324 	local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
325 
326 #ifdef CONFIG_PPC_BOOK3S_64
327 	set_kuap(AMR_KUAP_BLOCKED);
328 #endif
329 
330 	trace_hardirqs_off();
331 	user_exit_irqoff();
332 	account_cpu_user_entry();
333 
334 	BUG_ON(!user_mode(regs));
335 
336 	regs->exit_result = interrupt_exit_user_prepare_main(regs->exit_result, regs);
337 
338 	return regs->exit_result;
339 }
340 #endif
341 
342 notrace unsigned long interrupt_exit_user_prepare(struct pt_regs *regs)
343 {
344 	unsigned long ret;
345 
346 	BUG_ON(regs_is_unrecoverable(regs));
347 	BUG_ON(arch_irq_disabled_regs(regs));
348 	CT_WARN_ON(ct_state() == CONTEXT_USER);
349 
350 	/*
351 	 * We don't need to restore AMR on the way back to userspace for KUAP.
352 	 * AMR can only have been unlocked if we interrupted the kernel.
353 	 */
354 	kuap_assert_locked();
355 
356 	local_irq_disable();
357 
358 	ret = interrupt_exit_user_prepare_main(0, regs);
359 
360 #ifdef CONFIG_PPC64
361 	regs->exit_result = ret;
362 #endif
363 
364 	return ret;
365 }
366 
367 void preempt_schedule_irq(void);
368 
369 notrace unsigned long interrupt_exit_kernel_prepare(struct pt_regs *regs)
370 {
371 	unsigned long ret = 0;
372 	unsigned long kuap;
373 	bool stack_store = read_thread_flags() & _TIF_EMULATE_STACK_STORE;
374 
375 	if (regs_is_unrecoverable(regs))
376 		unrecoverable_exception(regs);
377 	/*
378 	 * CT_WARN_ON comes here via program_check_exception, so avoid
379 	 * recursion.
380 	 *
381 	 * Skip the assertion on PMIs on 64e to work around a problem caused
382 	 * by NMI PMIs incorrectly taking this interrupt return path, it's
383 	 * possible for this to hit after interrupt exit to user switches
384 	 * context to user. See also the comment in the performance monitor
385 	 * handler in exceptions-64e.S
386 	 */
387 	if (!IS_ENABLED(CONFIG_PPC_BOOK3E_64) &&
388 	    TRAP(regs) != INTERRUPT_PROGRAM &&
389 	    TRAP(regs) != INTERRUPT_PERFMON)
390 		CT_WARN_ON(ct_state() == CONTEXT_USER);
391 
392 	kuap = kuap_get_and_assert_locked();
393 
394 	local_irq_disable();
395 
396 	if (!arch_irq_disabled_regs(regs)) {
397 		/* Returning to a kernel context with local irqs enabled. */
398 		WARN_ON_ONCE(!(regs->msr & MSR_EE));
399 again:
400 		if (IS_ENABLED(CONFIG_PREEMPT)) {
401 			/* Return to preemptible kernel context */
402 			if (unlikely(read_thread_flags() & _TIF_NEED_RESCHED)) {
403 				if (preempt_count() == 0)
404 					preempt_schedule_irq();
405 			}
406 		}
407 
408 		check_return_regs_valid(regs);
409 
410 		/*
411 		 * Stack store exit can't be restarted because the interrupt
412 		 * stack frame might have been clobbered.
413 		 */
414 		if (!prep_irq_for_enabled_exit(unlikely(stack_store))) {
415 			/*
416 			 * Replay pending soft-masked interrupts now. Don't
417 			 * just local_irq_enabe(); local_irq_disable(); because
418 			 * if we are returning from an asynchronous interrupt
419 			 * here, another one might hit after irqs are enabled,
420 			 * and it would exit via this same path allowing
421 			 * another to fire, and so on unbounded.
422 			 */
423 			hard_irq_disable();
424 			replay_soft_interrupts();
425 			/* Took an interrupt, may have more exit work to do. */
426 			goto again;
427 		}
428 #ifdef CONFIG_PPC64
429 		/*
430 		 * An interrupt may clear MSR[EE] and set this concurrently,
431 		 * but it will be marked pending and the exit will be retried.
432 		 * This leaves a racy window where MSR[EE]=0 and HARD_DIS is
433 		 * clear, until interrupt_exit_kernel_restart() calls
434 		 * hard_irq_disable(), which will set HARD_DIS again.
435 		 */
436 		local_paca->irq_happened &= ~PACA_IRQ_HARD_DIS;
437 
438 	} else {
439 		check_return_regs_valid(regs);
440 
441 		if (unlikely(stack_store))
442 			__hard_EE_RI_disable();
443 #endif /* CONFIG_PPC64 */
444 	}
445 
446 	if (unlikely(stack_store)) {
447 		clear_bits(_TIF_EMULATE_STACK_STORE, &current_thread_info()->flags);
448 		ret = 1;
449 	}
450 
451 #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
452 	local_paca->tm_scratch = regs->msr;
453 #endif
454 
455 	/*
456 	 * 64s does not want to mfspr(SPRN_AMR) here, because this comes after
457 	 * mtmsr, which would cause Read-After-Write stalls. Hence, take the
458 	 * AMR value from the check above.
459 	 */
460 	kuap_kernel_restore(regs, kuap);
461 
462 	return ret;
463 }
464 
465 #ifdef CONFIG_PPC64
466 notrace unsigned long interrupt_exit_user_restart(struct pt_regs *regs)
467 {
468 	__hard_irq_disable();
469 	local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
470 
471 #ifdef CONFIG_PPC_BOOK3S_64
472 	set_kuap(AMR_KUAP_BLOCKED);
473 #endif
474 
475 	trace_hardirqs_off();
476 	user_exit_irqoff();
477 	account_cpu_user_entry();
478 
479 	BUG_ON(!user_mode(regs));
480 
481 	regs->exit_result |= interrupt_exit_user_prepare(regs);
482 
483 	return regs->exit_result;
484 }
485 
486 /*
487  * No real need to return a value here because the stack store case does not
488  * get restarted.
489  */
490 notrace unsigned long interrupt_exit_kernel_restart(struct pt_regs *regs)
491 {
492 	__hard_irq_disable();
493 	local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
494 
495 #ifdef CONFIG_PPC_BOOK3S_64
496 	set_kuap(AMR_KUAP_BLOCKED);
497 #endif
498 
499 	if (regs->softe == IRQS_ENABLED)
500 		trace_hardirqs_off();
501 
502 	BUG_ON(user_mode(regs));
503 
504 	return interrupt_exit_kernel_prepare(regs);
505 }
506 #endif
507