12874c5fdSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-or-later 214cf11afSPaul Mackerras /* 314cf11afSPaul Mackerras * Copyright (C) 1995-1996 Gary Thomas (gdt@linuxppc.org) 4fe04b112SScott Wood * Copyright 2007-2010 Freescale Semiconductor, Inc. 514cf11afSPaul Mackerras * 614cf11afSPaul Mackerras * Modified by Cort Dougan (cort@cs.nmt.edu) 714cf11afSPaul Mackerras * and Paul Mackerras (paulus@samba.org) 814cf11afSPaul Mackerras */ 914cf11afSPaul Mackerras 1014cf11afSPaul Mackerras /* 1114cf11afSPaul Mackerras * This file handles the architecture-dependent parts of hardware exceptions 1214cf11afSPaul Mackerras */ 1314cf11afSPaul Mackerras 1414cf11afSPaul Mackerras #include <linux/errno.h> 1514cf11afSPaul Mackerras #include <linux/sched.h> 16b17b0153SIngo Molnar #include <linux/sched/debug.h> 1714cf11afSPaul Mackerras #include <linux/kernel.h> 1814cf11afSPaul Mackerras #include <linux/mm.h> 1999cd1302SRam Pai #include <linux/pkeys.h> 2014cf11afSPaul Mackerras #include <linux/stddef.h> 2114cf11afSPaul Mackerras #include <linux/unistd.h> 228dad3f92SPaul Mackerras #include <linux/ptrace.h> 2314cf11afSPaul Mackerras #include <linux/user.h> 2414cf11afSPaul Mackerras #include <linux/interrupt.h> 2514cf11afSPaul Mackerras #include <linux/init.h> 268a39b05fSPaul Gortmaker #include <linux/extable.h> 278a39b05fSPaul Gortmaker #include <linux/module.h> /* print_modules */ 288dad3f92SPaul Mackerras #include <linux/prctl.h> 2914cf11afSPaul Mackerras #include <linux/delay.h> 3014cf11afSPaul Mackerras #include <linux/kprobes.h> 31cc532915SMichael Ellerman #include <linux/kexec.h> 325474c120SMichael Hanselmann #include <linux/backlight.h> 3373c9ceabSJeremy Fitzhardinge #include <linux/bug.h> 341eeb66a1SChristoph Hellwig #include <linux/kdebug.h> 3576462232SChristian Dietrich #include <linux/ratelimit.h> 36ba12eedeSLi Zhong #include <linux/context_tracking.h> 375080332cSMichael Neuling #include <linux/smp.h> 3835adacd6SNicholas Piggin #include <linux/console.h> 3935adacd6SNicholas Piggin #include <linux/kmsg_dump.h> 4014cf11afSPaul Mackerras 4180947e7cSGeert Uytterhoeven #include <asm/emulated_ops.h> 427c0f6ba6SLinus Torvalds #include <linux/uaccess.h> 437644d581SMichael Ellerman #include <asm/debugfs.h> 4414cf11afSPaul Mackerras #include <asm/io.h> 4586417780SPaul Mackerras #include <asm/machdep.h> 4686417780SPaul Mackerras #include <asm/rtas.h> 47f7f6f4feSDavid Gibson #include <asm/pmc.h> 4814cf11afSPaul Mackerras #include <asm/reg.h> 4914cf11afSPaul Mackerras #ifdef CONFIG_PMAC_BACKLIGHT 5014cf11afSPaul Mackerras #include <asm/backlight.h> 5114cf11afSPaul Mackerras #endif 52dc1c1ca3SStephen Rothwell #ifdef CONFIG_PPC64 5386417780SPaul Mackerras #include <asm/firmware.h> 54dc1c1ca3SStephen Rothwell #include <asm/processor.h> 556ce6c629SMichael Neuling #include <asm/tm.h> 56dc1c1ca3SStephen Rothwell #endif 57c0ce7d08SDavid Wilder #include <asm/kexec.h> 5816c57b36SKumar Gala #include <asm/ppc-opcode.h> 59cce1f106SShaohui Xie #include <asm/rio.h> 60ebaeb5aeSMahesh Salgaonkar #include <asm/fadump.h> 61ae3a197eSDavid Howells #include <asm/switch_to.h> 62f54db641SMichael Neuling #include <asm/tm.h> 63ae3a197eSDavid Howells #include <asm/debug.h> 6442f5b4caSDaniel Axtens #include <asm/asm-prototypes.h> 65fd7bacbcSMahesh Salgaonkar #include <asm/hmi.h> 664e0e3435SHongtao Jia #include <sysdev/fsl_pci.h> 676cc89badSNaveen N. Rao #include <asm/kprobes.h> 68a99b9c5eSMurilo Opsfelder Araujo #include <asm/stacktrace.h> 69de3c83c2SMathieu Malaterre #include <asm/nmi.h> 70dc1c1ca3SStephen Rothwell 71da665885SThiago Jung Bauermann #if defined(CONFIG_DEBUGGER) || defined(CONFIG_KEXEC_CORE) 725be3492fSAnton Blanchard int (*__debugger)(struct pt_regs *regs) __read_mostly; 735be3492fSAnton Blanchard int (*__debugger_ipi)(struct pt_regs *regs) __read_mostly; 745be3492fSAnton Blanchard int (*__debugger_bpt)(struct pt_regs *regs) __read_mostly; 755be3492fSAnton Blanchard int (*__debugger_sstep)(struct pt_regs *regs) __read_mostly; 765be3492fSAnton Blanchard int (*__debugger_iabr_match)(struct pt_regs *regs) __read_mostly; 779422de3eSMichael Neuling int (*__debugger_break_match)(struct pt_regs *regs) __read_mostly; 785be3492fSAnton Blanchard int (*__debugger_fault_handler)(struct pt_regs *regs) __read_mostly; 7914cf11afSPaul Mackerras 8014cf11afSPaul Mackerras EXPORT_SYMBOL(__debugger); 8114cf11afSPaul Mackerras EXPORT_SYMBOL(__debugger_ipi); 8214cf11afSPaul Mackerras EXPORT_SYMBOL(__debugger_bpt); 8314cf11afSPaul Mackerras EXPORT_SYMBOL(__debugger_sstep); 8414cf11afSPaul Mackerras EXPORT_SYMBOL(__debugger_iabr_match); 859422de3eSMichael Neuling EXPORT_SYMBOL(__debugger_break_match); 8614cf11afSPaul Mackerras EXPORT_SYMBOL(__debugger_fault_handler); 8714cf11afSPaul Mackerras #endif 8814cf11afSPaul Mackerras 898b3c34cfSMichael Neuling /* Transactional Memory trap debug */ 908b3c34cfSMichael Neuling #ifdef TM_DEBUG_SW 918b3c34cfSMichael Neuling #define TM_DEBUG(x...) printk(KERN_INFO x) 928b3c34cfSMichael Neuling #else 938b3c34cfSMichael Neuling #define TM_DEBUG(x...) do { } while(0) 948b3c34cfSMichael Neuling #endif 958b3c34cfSMichael Neuling 960f642d61SMurilo Opsfelder Araujo static const char *signame(int signr) 970f642d61SMurilo Opsfelder Araujo { 980f642d61SMurilo Opsfelder Araujo switch (signr) { 990f642d61SMurilo Opsfelder Araujo case SIGBUS: return "bus error"; 1000f642d61SMurilo Opsfelder Araujo case SIGFPE: return "floating point exception"; 1010f642d61SMurilo Opsfelder Araujo case SIGILL: return "illegal instruction"; 1020f642d61SMurilo Opsfelder Araujo case SIGSEGV: return "segfault"; 1030f642d61SMurilo Opsfelder Araujo case SIGTRAP: return "unhandled trap"; 1040f642d61SMurilo Opsfelder Araujo } 1050f642d61SMurilo Opsfelder Araujo 1060f642d61SMurilo Opsfelder Araujo return "unknown signal"; 1070f642d61SMurilo Opsfelder Araujo } 1080f642d61SMurilo Opsfelder Araujo 10914cf11afSPaul Mackerras /* 11014cf11afSPaul Mackerras * Trap & Exception support 11114cf11afSPaul Mackerras */ 11214cf11afSPaul Mackerras 1136031d9d9Santon@samba.org #ifdef CONFIG_PMAC_BACKLIGHT 1146031d9d9Santon@samba.org static void pmac_backlight_unblank(void) 1156031d9d9Santon@samba.org { 1166031d9d9Santon@samba.org mutex_lock(&pmac_backlight_mutex); 1176031d9d9Santon@samba.org if (pmac_backlight) { 1186031d9d9Santon@samba.org struct backlight_properties *props; 1196031d9d9Santon@samba.org 1206031d9d9Santon@samba.org props = &pmac_backlight->props; 1216031d9d9Santon@samba.org props->brightness = props->max_brightness; 1226031d9d9Santon@samba.org props->power = FB_BLANK_UNBLANK; 1236031d9d9Santon@samba.org backlight_update_status(pmac_backlight); 1246031d9d9Santon@samba.org } 1256031d9d9Santon@samba.org mutex_unlock(&pmac_backlight_mutex); 1266031d9d9Santon@samba.org } 1276031d9d9Santon@samba.org #else 1286031d9d9Santon@samba.org static inline void pmac_backlight_unblank(void) { } 1296031d9d9Santon@samba.org #endif 1306031d9d9Santon@samba.org 1316fcd6baaSNicholas Piggin /* 1326fcd6baaSNicholas Piggin * If oops/die is expected to crash the machine, return true here. 1336fcd6baaSNicholas Piggin * 1346fcd6baaSNicholas Piggin * This should not be expected to be 100% accurate, there may be 1356fcd6baaSNicholas Piggin * notifiers registered or other unexpected conditions that may bring 1366fcd6baaSNicholas Piggin * down the kernel. Or if the current process in the kernel is holding 1376fcd6baaSNicholas Piggin * locks or has other critical state, the kernel may become effectively 1386fcd6baaSNicholas Piggin * unusable anyway. 1396fcd6baaSNicholas Piggin */ 1406fcd6baaSNicholas Piggin bool die_will_crash(void) 1416fcd6baaSNicholas Piggin { 1426fcd6baaSNicholas Piggin if (should_fadump_crash()) 1436fcd6baaSNicholas Piggin return true; 1446fcd6baaSNicholas Piggin if (kexec_should_crash(current)) 1456fcd6baaSNicholas Piggin return true; 1466fcd6baaSNicholas Piggin if (in_interrupt() || panic_on_oops || 1476fcd6baaSNicholas Piggin !current->pid || is_global_init(current)) 1486fcd6baaSNicholas Piggin return true; 1496fcd6baaSNicholas Piggin 1506fcd6baaSNicholas Piggin return false; 1516fcd6baaSNicholas Piggin } 1526fcd6baaSNicholas Piggin 153760ca4dcSAnton Blanchard static arch_spinlock_t die_lock = __ARCH_SPIN_LOCK_UNLOCKED; 154760ca4dcSAnton Blanchard static int die_owner = -1; 155760ca4dcSAnton Blanchard static unsigned int die_nest_count; 156c0ce7d08SDavid Wilder static int die_counter; 157760ca4dcSAnton Blanchard 15835adacd6SNicholas Piggin extern void panic_flush_kmsg_start(void) 15935adacd6SNicholas Piggin { 16035adacd6SNicholas Piggin /* 16135adacd6SNicholas Piggin * These are mostly taken from kernel/panic.c, but tries to do 16235adacd6SNicholas Piggin * relatively minimal work. Don't use delay functions (TB may 16335adacd6SNicholas Piggin * be broken), don't crash dump (need to set a firmware log), 16435adacd6SNicholas Piggin * don't run notifiers. We do want to get some information to 16535adacd6SNicholas Piggin * Linux console. 16635adacd6SNicholas Piggin */ 16735adacd6SNicholas Piggin console_verbose(); 16835adacd6SNicholas Piggin bust_spinlocks(1); 16935adacd6SNicholas Piggin } 17035adacd6SNicholas Piggin 17135adacd6SNicholas Piggin extern void panic_flush_kmsg_end(void) 17235adacd6SNicholas Piggin { 17335adacd6SNicholas Piggin printk_safe_flush_on_panic(); 17435adacd6SNicholas Piggin kmsg_dump(KMSG_DUMP_PANIC); 17535adacd6SNicholas Piggin bust_spinlocks(0); 17635adacd6SNicholas Piggin debug_locks_off(); 177de6da1e8SFeng Tang console_flush_on_panic(CONSOLE_FLUSH_PENDING); 17835adacd6SNicholas Piggin } 17935adacd6SNicholas Piggin 18003465f89SNicholas Piggin static unsigned long oops_begin(struct pt_regs *regs) 181760ca4dcSAnton Blanchard { 182760ca4dcSAnton Blanchard int cpu; 18334c2a14fSanton@samba.org unsigned long flags; 18414cf11afSPaul Mackerras 185293e4688Santon@samba.org oops_enter(); 186293e4688Santon@samba.org 187760ca4dcSAnton Blanchard /* racy, but better than risking deadlock. */ 188760ca4dcSAnton Blanchard raw_local_irq_save(flags); 189760ca4dcSAnton Blanchard cpu = smp_processor_id(); 190760ca4dcSAnton Blanchard if (!arch_spin_trylock(&die_lock)) { 191760ca4dcSAnton Blanchard if (cpu == die_owner) 192760ca4dcSAnton Blanchard /* nested oops. should stop eventually */; 193760ca4dcSAnton Blanchard else 194760ca4dcSAnton Blanchard arch_spin_lock(&die_lock); 195760ca4dcSAnton Blanchard } 196760ca4dcSAnton Blanchard die_nest_count++; 197760ca4dcSAnton Blanchard die_owner = cpu; 19814cf11afSPaul Mackerras console_verbose(); 19914cf11afSPaul Mackerras bust_spinlocks(1); 2006031d9d9Santon@samba.org if (machine_is(powermac)) 2016031d9d9Santon@samba.org pmac_backlight_unblank(); 202760ca4dcSAnton Blanchard return flags; 20334c2a14fSanton@samba.org } 20403465f89SNicholas Piggin NOKPROBE_SYMBOL(oops_begin); 2055474c120SMichael Hanselmann 20603465f89SNicholas Piggin static void oops_end(unsigned long flags, struct pt_regs *regs, 207760ca4dcSAnton Blanchard int signr) 208760ca4dcSAnton Blanchard { 20914cf11afSPaul Mackerras bust_spinlocks(0); 210373d4d09SRusty Russell add_taint(TAINT_DIE, LOCKDEP_NOW_UNRELIABLE); 211760ca4dcSAnton Blanchard die_nest_count--; 21258154c8cSAnton Blanchard oops_exit(); 21358154c8cSAnton Blanchard printk("\n"); 2147458e8b2SNicholas Piggin if (!die_nest_count) { 215760ca4dcSAnton Blanchard /* Nest count reaches zero, release the lock. */ 2167458e8b2SNicholas Piggin die_owner = -1; 217760ca4dcSAnton Blanchard arch_spin_unlock(&die_lock); 2187458e8b2SNicholas Piggin } 219760ca4dcSAnton Blanchard raw_local_irq_restore(flags); 220cc532915SMichael Ellerman 221d40b6768SNicholas Piggin /* 222d40b6768SNicholas Piggin * system_reset_excption handles debugger, crash dump, panic, for 0x100 223d40b6768SNicholas Piggin */ 224d40b6768SNicholas Piggin if (TRAP(regs) == 0x100) 225d40b6768SNicholas Piggin return; 226d40b6768SNicholas Piggin 227ebaeb5aeSMahesh Salgaonkar crash_fadump(regs, "die oops"); 228ebaeb5aeSMahesh Salgaonkar 2294388c9b3SNicholas Piggin if (kexec_should_crash(current)) 230cc532915SMichael Ellerman crash_kexec(regs); 2319b00ac06SAnton Blanchard 232760ca4dcSAnton Blanchard if (!signr) 233760ca4dcSAnton Blanchard return; 234760ca4dcSAnton Blanchard 23558154c8cSAnton Blanchard /* 23658154c8cSAnton Blanchard * While our oops output is serialised by a spinlock, output 23758154c8cSAnton Blanchard * from panic() called below can race and corrupt it. If we 23858154c8cSAnton Blanchard * know we are going to panic, delay for 1 second so we have a 23958154c8cSAnton Blanchard * chance to get clean backtraces from all CPUs that are oopsing. 24058154c8cSAnton Blanchard */ 24158154c8cSAnton Blanchard if (in_interrupt() || panic_on_oops || !current->pid || 24258154c8cSAnton Blanchard is_global_init(current)) { 24358154c8cSAnton Blanchard mdelay(MSEC_PER_SEC); 24458154c8cSAnton Blanchard } 24558154c8cSAnton Blanchard 246cea6a4baSHorms if (panic_on_oops) 247012c437dSHorms panic("Fatal exception"); 248760ca4dcSAnton Blanchard do_exit(signr); 249760ca4dcSAnton Blanchard } 25003465f89SNicholas Piggin NOKPROBE_SYMBOL(oops_end); 251cea6a4baSHorms 252d7e02f7bSAneesh Kumar K.V static char *get_mmu_str(void) 253d7e02f7bSAneesh Kumar K.V { 254d7e02f7bSAneesh Kumar K.V if (early_radix_enabled()) 255d7e02f7bSAneesh Kumar K.V return " MMU=Radix"; 256d7e02f7bSAneesh Kumar K.V if (early_mmu_has_feature(MMU_FTR_HPTE_TABLE)) 257d7e02f7bSAneesh Kumar K.V return " MMU=Hash"; 258d7e02f7bSAneesh Kumar K.V return ""; 259d7e02f7bSAneesh Kumar K.V } 260d7e02f7bSAneesh Kumar K.V 26103465f89SNicholas Piggin static int __die(const char *str, struct pt_regs *regs, long err) 262760ca4dcSAnton Blanchard { 263760ca4dcSAnton Blanchard printk("Oops: %s, sig: %ld [#%d]\n", str, err, ++die_counter); 2642e82ca3cSMichael Ellerman 265d7e02f7bSAneesh Kumar K.V printk("%s PAGE_SIZE=%luK%s%s%s%s%s%s %s\n", 26678227443SMichael Ellerman IS_ENABLED(CONFIG_CPU_LITTLE_ENDIAN) ? "LE" : "BE", 267d7e02f7bSAneesh Kumar K.V PAGE_SIZE / 1024, get_mmu_str(), 26878227443SMichael Ellerman IS_ENABLED(CONFIG_PREEMPT) ? " PREEMPT" : "", 26978227443SMichael Ellerman IS_ENABLED(CONFIG_SMP) ? " SMP" : "", 27078227443SMichael Ellerman IS_ENABLED(CONFIG_SMP) ? (" NR_CPUS=" __stringify(NR_CPUS)) : "", 27178227443SMichael Ellerman debug_pagealloc_enabled() ? " DEBUG_PAGEALLOC" : "", 27278227443SMichael Ellerman IS_ENABLED(CONFIG_NUMA) ? " NUMA" : "", 27378227443SMichael Ellerman ppc_md.name ? ppc_md.name : ""); 274760ca4dcSAnton Blanchard 275760ca4dcSAnton Blanchard if (notify_die(DIE_OOPS, str, regs, err, 255, SIGSEGV) == NOTIFY_STOP) 276760ca4dcSAnton Blanchard return 1; 277760ca4dcSAnton Blanchard 278760ca4dcSAnton Blanchard print_modules(); 279760ca4dcSAnton Blanchard show_regs(regs); 28014cf11afSPaul Mackerras 28114cf11afSPaul Mackerras return 0; 28214cf11afSPaul Mackerras } 28303465f89SNicholas Piggin NOKPROBE_SYMBOL(__die); 28414cf11afSPaul Mackerras 285760ca4dcSAnton Blanchard void die(const char *str, struct pt_regs *regs, long err) 286760ca4dcSAnton Blanchard { 2876f44b20eSNicholas Piggin unsigned long flags; 288760ca4dcSAnton Blanchard 289d40b6768SNicholas Piggin /* 290d40b6768SNicholas Piggin * system_reset_excption handles debugger, crash dump, panic, for 0x100 291d40b6768SNicholas Piggin */ 292d40b6768SNicholas Piggin if (TRAP(regs) != 0x100) { 2936f44b20eSNicholas Piggin if (debugger(regs)) 2946f44b20eSNicholas Piggin return; 295d40b6768SNicholas Piggin } 2966f44b20eSNicholas Piggin 2976f44b20eSNicholas Piggin flags = oops_begin(regs); 298760ca4dcSAnton Blanchard if (__die(str, regs, err)) 299760ca4dcSAnton Blanchard err = 0; 300760ca4dcSAnton Blanchard oops_end(flags, regs, err); 301760ca4dcSAnton Blanchard } 30215770a13SNaveen N. Rao NOKPROBE_SYMBOL(die); 303760ca4dcSAnton Blanchard 304efc463adSEric W. Biederman void user_single_step_report(struct pt_regs *regs) 30525baa35bSOleg Nesterov { 3062e1661d2SEric W. Biederman force_sig_fault(SIGTRAP, TRAP_TRACE, (void __user *)regs->nip); 30725baa35bSOleg Nesterov } 30825baa35bSOleg Nesterov 309658b0f92SMurilo Opsfelder Araujo static void show_signal_msg(int signr, struct pt_regs *regs, int code, 310658b0f92SMurilo Opsfelder Araujo unsigned long addr) 31114cf11afSPaul Mackerras { 312997dd26cSMichael Ellerman static DEFINE_RATELIMIT_STATE(rs, DEFAULT_RATELIMIT_INTERVAL, 313997dd26cSMichael Ellerman DEFAULT_RATELIMIT_BURST); 314997dd26cSMichael Ellerman 315997dd26cSMichael Ellerman if (!show_unhandled_signals) 31635a52a10SMurilo Opsfelder Araujo return; 31735a52a10SMurilo Opsfelder Araujo 31835a52a10SMurilo Opsfelder Araujo if (!unhandled_signal(current, signr)) 31935a52a10SMurilo Opsfelder Araujo return; 32035a52a10SMurilo Opsfelder Araujo 321997dd26cSMichael Ellerman if (!__ratelimit(&rs)) 322997dd26cSMichael Ellerman return; 323997dd26cSMichael Ellerman 3240f642d61SMurilo Opsfelder Araujo pr_info("%s[%d]: %s (%d) at %lx nip %lx lr %lx code %x", 3250f642d61SMurilo Opsfelder Araujo current->comm, current->pid, signame(signr), signr, 326d0c3d534SOlof Johansson addr, regs->nip, regs->link, code); 3270f642d61SMurilo Opsfelder Araujo 3280f642d61SMurilo Opsfelder Araujo print_vma_addr(KERN_CONT " in ", regs->nip); 3290f642d61SMurilo Opsfelder Araujo 3300f642d61SMurilo Opsfelder Araujo pr_cont("\n"); 331a99b9c5eSMurilo Opsfelder Araujo 332a99b9c5eSMurilo Opsfelder Araujo show_user_instructions(regs); 33314cf11afSPaul Mackerras } 334658b0f92SMurilo Opsfelder Araujo 3352c44ce28SEric W. Biederman static bool exception_common(int signr, struct pt_regs *regs, int code, 3362c44ce28SEric W. Biederman unsigned long addr) 337658b0f92SMurilo Opsfelder Araujo { 338658b0f92SMurilo Opsfelder Araujo if (!user_mode(regs)) { 339658b0f92SMurilo Opsfelder Araujo die("Exception in kernel mode", regs, signr); 3402c44ce28SEric W. Biederman return false; 341658b0f92SMurilo Opsfelder Araujo } 342658b0f92SMurilo Opsfelder Araujo 343658b0f92SMurilo Opsfelder Araujo show_signal_msg(signr, regs, code, addr); 34414cf11afSPaul Mackerras 345a3512b2dSBenjamin Herrenschmidt if (arch_irqs_disabled() && !arch_irq_disabled_regs(regs)) 3469f2f79e3SBenjamin Herrenschmidt local_irq_enable(); 3479f2f79e3SBenjamin Herrenschmidt 34841ab5266SAnanth N Mavinakayanahalli current->thread.trap_nr = code; 349c5cc1f4dSThiago Jung Bauermann 3502c44ce28SEric W. Biederman return true; 3512c44ce28SEric W. Biederman } 3522c44ce28SEric W. Biederman 3535d8fb8a5SEric W. Biederman void _exception_pkey(struct pt_regs *regs, unsigned long addr, int key) 3542c44ce28SEric W. Biederman { 3555d8fb8a5SEric W. Biederman if (!exception_common(SIGSEGV, regs, SEGV_PKUERR, addr)) 3562c44ce28SEric W. Biederman return; 3572c44ce28SEric W. Biederman 35877c70728SEric W. Biederman force_sig_pkuerr((void __user *) addr, key); 35914cf11afSPaul Mackerras } 36014cf11afSPaul Mackerras 36199cd1302SRam Pai void _exception(int signr, struct pt_regs *regs, int code, unsigned long addr) 36299cd1302SRam Pai { 363c1c7c85cSEric W. Biederman if (!exception_common(signr, regs, code, addr)) 364c1c7c85cSEric W. Biederman return; 365c1c7c85cSEric W. Biederman 3662e1661d2SEric W. Biederman force_sig_fault(signr, code, (void __user *)addr); 36799cd1302SRam Pai } 36899cd1302SRam Pai 369ccd47702SNicholas Piggin /* 370ccd47702SNicholas Piggin * The interrupt architecture has a quirk in that the HV interrupts excluding 371ccd47702SNicholas Piggin * the NMIs (0x100 and 0x200) do not clear MSR[RI] at entry. The first thing 372ccd47702SNicholas Piggin * that an interrupt handler must do is save off a GPR into a scratch register, 373ccd47702SNicholas Piggin * and all interrupts on POWERNV (HV=1) use the HSPRG1 register as scratch. 374ccd47702SNicholas Piggin * Therefore an NMI can clobber an HV interrupt's live HSPRG1 without noticing 375ccd47702SNicholas Piggin * that it is non-reentrant, which leads to random data corruption. 376ccd47702SNicholas Piggin * 377ccd47702SNicholas Piggin * The solution is for NMI interrupts in HV mode to check if they originated 378ccd47702SNicholas Piggin * from these critical HV interrupt regions. If so, then mark them not 379ccd47702SNicholas Piggin * recoverable. 380ccd47702SNicholas Piggin * 381ccd47702SNicholas Piggin * An alternative would be for HV NMIs to use SPRG for scratch to avoid the 382ccd47702SNicholas Piggin * HSPRG1 clobber, however this would cause guest SPRG to be clobbered. Linux 383ccd47702SNicholas Piggin * guests should always have MSR[RI]=0 when its scratch SPRG is in use, so 384ccd47702SNicholas Piggin * that would work. However any other guest OS that may have the SPRG live 385ccd47702SNicholas Piggin * and MSR[RI]=1 could encounter silent corruption. 386ccd47702SNicholas Piggin * 387ccd47702SNicholas Piggin * Builds that do not support KVM could take this second option to increase 388ccd47702SNicholas Piggin * the recoverability of NMIs. 389ccd47702SNicholas Piggin */ 390ccd47702SNicholas Piggin void hv_nmi_check_nonrecoverable(struct pt_regs *regs) 391ccd47702SNicholas Piggin { 392ccd47702SNicholas Piggin #ifdef CONFIG_PPC_POWERNV 393ccd47702SNicholas Piggin unsigned long kbase = (unsigned long)_stext; 394ccd47702SNicholas Piggin unsigned long nip = regs->nip; 395ccd47702SNicholas Piggin 396ccd47702SNicholas Piggin if (!(regs->msr & MSR_RI)) 397ccd47702SNicholas Piggin return; 398ccd47702SNicholas Piggin if (!(regs->msr & MSR_HV)) 399ccd47702SNicholas Piggin return; 400ccd47702SNicholas Piggin if (regs->msr & MSR_PR) 401ccd47702SNicholas Piggin return; 402ccd47702SNicholas Piggin 403ccd47702SNicholas Piggin /* 404ccd47702SNicholas Piggin * Now test if the interrupt has hit a range that may be using 405ccd47702SNicholas Piggin * HSPRG1 without having RI=0 (i.e., an HSRR interrupt). The 406ccd47702SNicholas Piggin * problem ranges all run un-relocated. Test real and virt modes 407ccd47702SNicholas Piggin * at the same time by droping the high bit of the nip (virt mode 408ccd47702SNicholas Piggin * entry points still have the +0x4000 offset). 409ccd47702SNicholas Piggin */ 410ccd47702SNicholas Piggin nip &= ~0xc000000000000000ULL; 411ccd47702SNicholas Piggin if ((nip >= 0x500 && nip < 0x600) || (nip >= 0x4500 && nip < 0x4600)) 412ccd47702SNicholas Piggin goto nonrecoverable; 413ccd47702SNicholas Piggin if ((nip >= 0x980 && nip < 0xa00) || (nip >= 0x4980 && nip < 0x4a00)) 414ccd47702SNicholas Piggin goto nonrecoverable; 415ccd47702SNicholas Piggin if ((nip >= 0xe00 && nip < 0xec0) || (nip >= 0x4e00 && nip < 0x4ec0)) 416ccd47702SNicholas Piggin goto nonrecoverable; 417ccd47702SNicholas Piggin if ((nip >= 0xf80 && nip < 0xfa0) || (nip >= 0x4f80 && nip < 0x4fa0)) 418ccd47702SNicholas Piggin goto nonrecoverable; 419bd3524feSNicholas Piggin 420ccd47702SNicholas Piggin /* Trampoline code runs un-relocated so subtract kbase. */ 421bd3524feSNicholas Piggin if (nip >= (unsigned long)(start_real_trampolines - kbase) && 422bd3524feSNicholas Piggin nip < (unsigned long)(end_real_trampolines - kbase)) 423ccd47702SNicholas Piggin goto nonrecoverable; 424bd3524feSNicholas Piggin if (nip >= (unsigned long)(start_virt_trampolines - kbase) && 425bd3524feSNicholas Piggin nip < (unsigned long)(end_virt_trampolines - kbase)) 426ccd47702SNicholas Piggin goto nonrecoverable; 427ccd47702SNicholas Piggin return; 428ccd47702SNicholas Piggin 429ccd47702SNicholas Piggin nonrecoverable: 430ccd47702SNicholas Piggin regs->msr &= ~MSR_RI; 431ccd47702SNicholas Piggin #endif 432ccd47702SNicholas Piggin } 433ccd47702SNicholas Piggin 43414cf11afSPaul Mackerras void system_reset_exception(struct pt_regs *regs) 43514cf11afSPaul Mackerras { 436cbf2ba95SNicholas Piggin unsigned long hsrr0, hsrr1; 437cbf2ba95SNicholas Piggin bool saved_hsrrs = false; 438bbbc8032SNicholas Piggin u8 ftrace_enabled = this_cpu_get_ftrace_enabled(); 439bbbc8032SNicholas Piggin 440bbbc8032SNicholas Piggin this_cpu_set_ftrace_enabled(0); 441cbf2ba95SNicholas Piggin 4422b4f3ac5SNicholas Piggin nmi_enter(); 4432b4f3ac5SNicholas Piggin 444cbf2ba95SNicholas Piggin /* 445cbf2ba95SNicholas Piggin * System reset can interrupt code where HSRRs are live and MSR[RI]=1. 446cbf2ba95SNicholas Piggin * The system reset interrupt itself may clobber HSRRs (e.g., to call 447cbf2ba95SNicholas Piggin * OPAL), so save them here and restore them before returning. 448cbf2ba95SNicholas Piggin * 449cbf2ba95SNicholas Piggin * Machine checks don't need to save HSRRs, as the real mode handler 450cbf2ba95SNicholas Piggin * is careful to avoid them, and the regular handler is not delivered 451cbf2ba95SNicholas Piggin * as an NMI. 452cbf2ba95SNicholas Piggin */ 453cbf2ba95SNicholas Piggin if (cpu_has_feature(CPU_FTR_HVMODE)) { 454cbf2ba95SNicholas Piggin hsrr0 = mfspr(SPRN_HSRR0); 455cbf2ba95SNicholas Piggin hsrr1 = mfspr(SPRN_HSRR1); 456cbf2ba95SNicholas Piggin saved_hsrrs = true; 457cbf2ba95SNicholas Piggin } 458cbf2ba95SNicholas Piggin 459ccd47702SNicholas Piggin hv_nmi_check_nonrecoverable(regs); 460ccd47702SNicholas Piggin 461ca41ad43SNicholas Piggin __this_cpu_inc(irq_stat.sreset_irqs); 462ca41ad43SNicholas Piggin 46314cf11afSPaul Mackerras /* See if any machine dependent calls */ 464c902be71SArnd Bergmann if (ppc_md.system_reset_exception) { 465c902be71SArnd Bergmann if (ppc_md.system_reset_exception(regs)) 466c4f3b52cSNicholas Piggin goto out; 467c902be71SArnd Bergmann } 46814cf11afSPaul Mackerras 4694388c9b3SNicholas Piggin if (debugger(regs)) 4704388c9b3SNicholas Piggin goto out; 4714388c9b3SNicholas Piggin 472e7ca44edSGanesh Goudar kmsg_dump(KMSG_DUMP_OOPS); 4734388c9b3SNicholas Piggin /* 4744388c9b3SNicholas Piggin * A system reset is a request to dump, so we always send 4754388c9b3SNicholas Piggin * it through the crashdump code (if fadump or kdump are 4764388c9b3SNicholas Piggin * registered). 4774388c9b3SNicholas Piggin */ 4784388c9b3SNicholas Piggin crash_fadump(regs, "System Reset"); 4794388c9b3SNicholas Piggin 4804388c9b3SNicholas Piggin crash_kexec(regs); 4814388c9b3SNicholas Piggin 4824388c9b3SNicholas Piggin /* 4834388c9b3SNicholas Piggin * We aren't the primary crash CPU. We need to send it 4844388c9b3SNicholas Piggin * to a holding pattern to avoid it ending up in the panic 4854388c9b3SNicholas Piggin * code. 4864388c9b3SNicholas Piggin */ 4874388c9b3SNicholas Piggin crash_kexec_secondary(regs); 4884388c9b3SNicholas Piggin 4894388c9b3SNicholas Piggin /* 4904388c9b3SNicholas Piggin * No debugger or crash dump registered, print logs then 4914388c9b3SNicholas Piggin * panic. 4924388c9b3SNicholas Piggin */ 4934552d128SNicholas Piggin die("System Reset", regs, SIGABRT); 4944388c9b3SNicholas Piggin 4954388c9b3SNicholas Piggin mdelay(2*MSEC_PER_SEC); /* Wait a little while for others to print */ 4964388c9b3SNicholas Piggin add_taint(TAINT_DIE, LOCKDEP_NOW_UNRELIABLE); 4974388c9b3SNicholas Piggin nmi_panic(regs, "System Reset"); 49814cf11afSPaul Mackerras 499c4f3b52cSNicholas Piggin out: 500c4f3b52cSNicholas Piggin #ifdef CONFIG_PPC_BOOK3S_64 501c4f3b52cSNicholas Piggin BUG_ON(get_paca()->in_nmi == 0); 502c4f3b52cSNicholas Piggin if (get_paca()->in_nmi > 1) 503265d6e58SNicholas Piggin die("Unrecoverable nested System Reset", regs, SIGABRT); 504c4f3b52cSNicholas Piggin #endif 50514cf11afSPaul Mackerras /* Must die if the interrupt is not recoverable */ 50611cb0a25SNicholas Piggin if (!(regs->msr & MSR_RI)) { 50711cb0a25SNicholas Piggin /* For the reason explained in die_mce, nmi_exit before die */ 50811cb0a25SNicholas Piggin nmi_exit(); 509265d6e58SNicholas Piggin die("Unrecoverable System Reset", regs, SIGABRT); 51011cb0a25SNicholas Piggin } 51114cf11afSPaul Mackerras 512cbf2ba95SNicholas Piggin if (saved_hsrrs) { 513cbf2ba95SNicholas Piggin mtspr(SPRN_HSRR0, hsrr0); 514cbf2ba95SNicholas Piggin mtspr(SPRN_HSRR1, hsrr1); 515cbf2ba95SNicholas Piggin } 516cbf2ba95SNicholas Piggin 5172b4f3ac5SNicholas Piggin nmi_exit(); 5182b4f3ac5SNicholas Piggin 519bbbc8032SNicholas Piggin this_cpu_set_ftrace_enabled(ftrace_enabled); 520bbbc8032SNicholas Piggin 52114cf11afSPaul Mackerras /* What should we do here? We could issue a shutdown or hard reset. */ 52214cf11afSPaul Mackerras } 5233a313883SNicholas Piggin NOKPROBE_SYMBOL(system_reset_exception); 5241e9b4507SMahesh Salgaonkar 52514cf11afSPaul Mackerras /* 52614cf11afSPaul Mackerras * I/O accesses can cause machine checks on powermacs. 52714cf11afSPaul Mackerras * Check if the NIP corresponds to the address of a sync 52814cf11afSPaul Mackerras * instruction for which there is an entry in the exception 52914cf11afSPaul Mackerras * table. 53014cf11afSPaul Mackerras * -- paulus. 53114cf11afSPaul Mackerras */ 53214cf11afSPaul Mackerras static inline int check_io_access(struct pt_regs *regs) 53314cf11afSPaul Mackerras { 53468a64357SBenjamin Herrenschmidt #ifdef CONFIG_PPC32 53514cf11afSPaul Mackerras unsigned long msr = regs->msr; 53614cf11afSPaul Mackerras const struct exception_table_entry *entry; 53714cf11afSPaul Mackerras unsigned int *nip = (unsigned int *)regs->nip; 53814cf11afSPaul Mackerras 53914cf11afSPaul Mackerras if (((msr & 0xffff0000) == 0 || (msr & (0x80000 | 0x40000))) 54014cf11afSPaul Mackerras && (entry = search_exception_tables(regs->nip)) != NULL) { 54114cf11afSPaul Mackerras /* 54214cf11afSPaul Mackerras * Check that it's a sync instruction, or somewhere 54314cf11afSPaul Mackerras * in the twi; isync; nop sequence that inb/inw/inl uses. 54414cf11afSPaul Mackerras * As the address is in the exception table 54514cf11afSPaul Mackerras * we should be able to read the instr there. 54614cf11afSPaul Mackerras * For the debug message, we look at the preceding 54714cf11afSPaul Mackerras * load or store. 54814cf11afSPaul Mackerras */ 549ddc6cd0dSChristophe Leroy if (*nip == PPC_INST_NOP) 55014cf11afSPaul Mackerras nip -= 2; 551ddc6cd0dSChristophe Leroy else if (*nip == PPC_INST_ISYNC) 55214cf11afSPaul Mackerras --nip; 553ddc6cd0dSChristophe Leroy if (*nip == PPC_INST_SYNC || (*nip >> 26) == OP_TRAP) { 55414cf11afSPaul Mackerras unsigned int rb; 55514cf11afSPaul Mackerras 55614cf11afSPaul Mackerras --nip; 55714cf11afSPaul Mackerras rb = (*nip >> 11) & 0x1f; 55814cf11afSPaul Mackerras printk(KERN_DEBUG "%s bad port %lx at %p\n", 55914cf11afSPaul Mackerras (*nip & 0x100)? "OUT to": "IN from", 56014cf11afSPaul Mackerras regs->gpr[rb] - _IO_BASE, nip); 56114cf11afSPaul Mackerras regs->msr |= MSR_RI; 56261a92f70SNicholas Piggin regs->nip = extable_fixup(entry); 56314cf11afSPaul Mackerras return 1; 56414cf11afSPaul Mackerras } 56514cf11afSPaul Mackerras } 56668a64357SBenjamin Herrenschmidt #endif /* CONFIG_PPC32 */ 56714cf11afSPaul Mackerras return 0; 56814cf11afSPaul Mackerras } 56914cf11afSPaul Mackerras 570172ae2e7SDave Kleikamp #ifdef CONFIG_PPC_ADV_DEBUG_REGS 57114cf11afSPaul Mackerras /* On 4xx, the reason for the machine check or program exception 57214cf11afSPaul Mackerras is in the ESR. */ 57314cf11afSPaul Mackerras #define get_reason(regs) ((regs)->dsisr) 57414cf11afSPaul Mackerras #define REASON_FP ESR_FP 57514cf11afSPaul Mackerras #define REASON_ILLEGAL (ESR_PIL | ESR_PUO) 57614cf11afSPaul Mackerras #define REASON_PRIVILEGED ESR_PPR 57714cf11afSPaul Mackerras #define REASON_TRAP ESR_PTR 5789409d2f9SJordan Niethe #define REASON_PREFIXED 0 5799409d2f9SJordan Niethe #define REASON_BOUNDARY 0 58014cf11afSPaul Mackerras 58114cf11afSPaul Mackerras /* single-step stuff */ 58251ae8d4aSBharat Bhushan #define single_stepping(regs) (current->thread.debug.dbcr0 & DBCR0_IC) 58351ae8d4aSBharat Bhushan #define clear_single_step(regs) (current->thread.debug.dbcr0 &= ~DBCR0_IC) 5840e524e76SMatt Evans #define clear_br_trace(regs) do {} while(0) 58514cf11afSPaul Mackerras #else 58614cf11afSPaul Mackerras /* On non-4xx, the reason for the machine check or program 58714cf11afSPaul Mackerras exception is in the MSR. */ 58814cf11afSPaul Mackerras #define get_reason(regs) ((regs)->msr) 589d30a5a52SMichael Ellerman #define REASON_TM SRR1_PROGTM 590d30a5a52SMichael Ellerman #define REASON_FP SRR1_PROGFPE 591d30a5a52SMichael Ellerman #define REASON_ILLEGAL SRR1_PROGILL 592d30a5a52SMichael Ellerman #define REASON_PRIVILEGED SRR1_PROGPRIV 593d30a5a52SMichael Ellerman #define REASON_TRAP SRR1_PROGTRAP 5949409d2f9SJordan Niethe #define REASON_PREFIXED SRR1_PREFIXED 5959409d2f9SJordan Niethe #define REASON_BOUNDARY SRR1_BOUNDARY 59614cf11afSPaul Mackerras 59714cf11afSPaul Mackerras #define single_stepping(regs) ((regs)->msr & MSR_SE) 59814cf11afSPaul Mackerras #define clear_single_step(regs) ((regs)->msr &= ~MSR_SE) 5990e524e76SMatt Evans #define clear_br_trace(regs) ((regs)->msr &= ~MSR_BE) 60014cf11afSPaul Mackerras #endif 60114cf11afSPaul Mackerras 6029409d2f9SJordan Niethe #define inst_length(reason) (((reason) & REASON_PREFIXED) ? 8 : 4) 6039409d2f9SJordan Niethe 6040d0935b3SMichael Ellerman #if defined(CONFIG_E500) 605fe04b112SScott Wood int machine_check_e500mc(struct pt_regs *regs) 606fe04b112SScott Wood { 607fe04b112SScott Wood unsigned long mcsr = mfspr(SPRN_MCSR); 608a4e89ffbSMatt Weber unsigned long pvr = mfspr(SPRN_PVR); 609fe04b112SScott Wood unsigned long reason = mcsr; 610fe04b112SScott Wood int recoverable = 1; 611fe04b112SScott Wood 61282a9a480SScott Wood if (reason & MCSR_LD) { 613cce1f106SShaohui Xie recoverable = fsl_rio_mcheck_exception(regs); 614cce1f106SShaohui Xie if (recoverable == 1) 615cce1f106SShaohui Xie goto silent_out; 616cce1f106SShaohui Xie } 617cce1f106SShaohui Xie 618fe04b112SScott Wood printk("Machine check in kernel mode.\n"); 619fe04b112SScott Wood printk("Caused by (from MCSR=%lx): ", reason); 620fe04b112SScott Wood 621fe04b112SScott Wood if (reason & MCSR_MCP) 622422123ccSChristophe Leroy pr_cont("Machine Check Signal\n"); 623fe04b112SScott Wood 624fe04b112SScott Wood if (reason & MCSR_ICPERR) { 625422123ccSChristophe Leroy pr_cont("Instruction Cache Parity Error\n"); 626fe04b112SScott Wood 627fe04b112SScott Wood /* 628fe04b112SScott Wood * This is recoverable by invalidating the i-cache. 629fe04b112SScott Wood */ 630fe04b112SScott Wood mtspr(SPRN_L1CSR1, mfspr(SPRN_L1CSR1) | L1CSR1_ICFI); 631fe04b112SScott Wood while (mfspr(SPRN_L1CSR1) & L1CSR1_ICFI) 632fe04b112SScott Wood ; 633fe04b112SScott Wood 634fe04b112SScott Wood /* 635fe04b112SScott Wood * This will generally be accompanied by an instruction 636fe04b112SScott Wood * fetch error report -- only treat MCSR_IF as fatal 637fe04b112SScott Wood * if it wasn't due to an L1 parity error. 638fe04b112SScott Wood */ 639fe04b112SScott Wood reason &= ~MCSR_IF; 640fe04b112SScott Wood } 641fe04b112SScott Wood 642fe04b112SScott Wood if (reason & MCSR_DCPERR_MC) { 643422123ccSChristophe Leroy pr_cont("Data Cache Parity Error\n"); 64437caf9f2SKumar Gala 64537caf9f2SKumar Gala /* 64637caf9f2SKumar Gala * In write shadow mode we auto-recover from the error, but it 64737caf9f2SKumar Gala * may still get logged and cause a machine check. We should 64837caf9f2SKumar Gala * only treat the non-write shadow case as non-recoverable. 64937caf9f2SKumar Gala */ 650a4e89ffbSMatt Weber /* On e6500 core, L1 DCWS (Data cache write shadow mode) bit 651a4e89ffbSMatt Weber * is not implemented but L1 data cache always runs in write 652a4e89ffbSMatt Weber * shadow mode. Hence on data cache parity errors HW will 653a4e89ffbSMatt Weber * automatically invalidate the L1 Data Cache. 654a4e89ffbSMatt Weber */ 655a4e89ffbSMatt Weber if (PVR_VER(pvr) != PVR_VER_E6500) { 65637caf9f2SKumar Gala if (!(mfspr(SPRN_L1CSR2) & L1CSR2_DCWS)) 657fe04b112SScott Wood recoverable = 0; 658fe04b112SScott Wood } 659a4e89ffbSMatt Weber } 660fe04b112SScott Wood 661fe04b112SScott Wood if (reason & MCSR_L2MMU_MHIT) { 662422123ccSChristophe Leroy pr_cont("Hit on multiple TLB entries\n"); 663fe04b112SScott Wood recoverable = 0; 664fe04b112SScott Wood } 665fe04b112SScott Wood 666fe04b112SScott Wood if (reason & MCSR_NMI) 667422123ccSChristophe Leroy pr_cont("Non-maskable interrupt\n"); 668fe04b112SScott Wood 669fe04b112SScott Wood if (reason & MCSR_IF) { 670422123ccSChristophe Leroy pr_cont("Instruction Fetch Error Report\n"); 671fe04b112SScott Wood recoverable = 0; 672fe04b112SScott Wood } 673fe04b112SScott Wood 674fe04b112SScott Wood if (reason & MCSR_LD) { 675422123ccSChristophe Leroy pr_cont("Load Error Report\n"); 676fe04b112SScott Wood recoverable = 0; 677fe04b112SScott Wood } 678fe04b112SScott Wood 679fe04b112SScott Wood if (reason & MCSR_ST) { 680422123ccSChristophe Leroy pr_cont("Store Error Report\n"); 681fe04b112SScott Wood recoverable = 0; 682fe04b112SScott Wood } 683fe04b112SScott Wood 684fe04b112SScott Wood if (reason & MCSR_LDG) { 685422123ccSChristophe Leroy pr_cont("Guarded Load Error Report\n"); 686fe04b112SScott Wood recoverable = 0; 687fe04b112SScott Wood } 688fe04b112SScott Wood 689fe04b112SScott Wood if (reason & MCSR_TLBSYNC) 690422123ccSChristophe Leroy pr_cont("Simultaneous tlbsync operations\n"); 691fe04b112SScott Wood 692fe04b112SScott Wood if (reason & MCSR_BSL2_ERR) { 693422123ccSChristophe Leroy pr_cont("Level 2 Cache Error\n"); 694fe04b112SScott Wood recoverable = 0; 695fe04b112SScott Wood } 696fe04b112SScott Wood 697fe04b112SScott Wood if (reason & MCSR_MAV) { 698fe04b112SScott Wood u64 addr; 699fe04b112SScott Wood 700fe04b112SScott Wood addr = mfspr(SPRN_MCAR); 701fe04b112SScott Wood addr |= (u64)mfspr(SPRN_MCARU) << 32; 702fe04b112SScott Wood 703422123ccSChristophe Leroy pr_cont("Machine Check %s Address: %#llx\n", 704fe04b112SScott Wood reason & MCSR_MEA ? "Effective" : "Physical", addr); 705fe04b112SScott Wood } 706fe04b112SScott Wood 707cce1f106SShaohui Xie silent_out: 708fe04b112SScott Wood mtspr(SPRN_MCSR, mcsr); 709fe04b112SScott Wood return mfspr(SPRN_MCSR) == 0 && recoverable; 710fe04b112SScott Wood } 711fe04b112SScott Wood 71247c0bd1aSBenjamin Herrenschmidt int machine_check_e500(struct pt_regs *regs) 71347c0bd1aSBenjamin Herrenschmidt { 71442bff234SMichael Ellerman unsigned long reason = mfspr(SPRN_MCSR); 71547c0bd1aSBenjamin Herrenschmidt 716cce1f106SShaohui Xie if (reason & MCSR_BUS_RBERR) { 717cce1f106SShaohui Xie if (fsl_rio_mcheck_exception(regs)) 718cce1f106SShaohui Xie return 1; 7194e0e3435SHongtao Jia if (fsl_pci_mcheck_exception(regs)) 7204e0e3435SHongtao Jia return 1; 721cce1f106SShaohui Xie } 722cce1f106SShaohui Xie 72314cf11afSPaul Mackerras printk("Machine check in kernel mode.\n"); 72414cf11afSPaul Mackerras printk("Caused by (from MCSR=%lx): ", reason); 72514cf11afSPaul Mackerras 72614cf11afSPaul Mackerras if (reason & MCSR_MCP) 727422123ccSChristophe Leroy pr_cont("Machine Check Signal\n"); 72814cf11afSPaul Mackerras if (reason & MCSR_ICPERR) 729422123ccSChristophe Leroy pr_cont("Instruction Cache Parity Error\n"); 73014cf11afSPaul Mackerras if (reason & MCSR_DCP_PERR) 731422123ccSChristophe Leroy pr_cont("Data Cache Push Parity Error\n"); 73214cf11afSPaul Mackerras if (reason & MCSR_DCPERR) 733422123ccSChristophe Leroy pr_cont("Data Cache Parity Error\n"); 73414cf11afSPaul Mackerras if (reason & MCSR_BUS_IAERR) 735422123ccSChristophe Leroy pr_cont("Bus - Instruction Address Error\n"); 73614cf11afSPaul Mackerras if (reason & MCSR_BUS_RAERR) 737422123ccSChristophe Leroy pr_cont("Bus - Read Address Error\n"); 73814cf11afSPaul Mackerras if (reason & MCSR_BUS_WAERR) 739422123ccSChristophe Leroy pr_cont("Bus - Write Address Error\n"); 74014cf11afSPaul Mackerras if (reason & MCSR_BUS_IBERR) 741422123ccSChristophe Leroy pr_cont("Bus - Instruction Data Error\n"); 74214cf11afSPaul Mackerras if (reason & MCSR_BUS_RBERR) 743422123ccSChristophe Leroy pr_cont("Bus - Read Data Bus Error\n"); 74414cf11afSPaul Mackerras if (reason & MCSR_BUS_WBERR) 745422123ccSChristophe Leroy pr_cont("Bus - Write Data Bus Error\n"); 74614cf11afSPaul Mackerras if (reason & MCSR_BUS_IPERR) 747422123ccSChristophe Leroy pr_cont("Bus - Instruction Parity Error\n"); 74814cf11afSPaul Mackerras if (reason & MCSR_BUS_RPERR) 749422123ccSChristophe Leroy pr_cont("Bus - Read Parity Error\n"); 75047c0bd1aSBenjamin Herrenschmidt 75147c0bd1aSBenjamin Herrenschmidt return 0; 75247c0bd1aSBenjamin Herrenschmidt } 7534490c06bSKumar Gala 7544490c06bSKumar Gala int machine_check_generic(struct pt_regs *regs) 7554490c06bSKumar Gala { 7564490c06bSKumar Gala return 0; 7574490c06bSKumar Gala } 7587f3f819eSMichael Ellerman #elif defined(CONFIG_PPC32) 75947c0bd1aSBenjamin Herrenschmidt int machine_check_generic(struct pt_regs *regs) 76047c0bd1aSBenjamin Herrenschmidt { 76142bff234SMichael Ellerman unsigned long reason = regs->msr; 76247c0bd1aSBenjamin Herrenschmidt 76314cf11afSPaul Mackerras printk("Machine check in kernel mode.\n"); 76414cf11afSPaul Mackerras printk("Caused by (from SRR1=%lx): ", reason); 76514cf11afSPaul Mackerras switch (reason & 0x601F0000) { 76614cf11afSPaul Mackerras case 0x80000: 767422123ccSChristophe Leroy pr_cont("Machine check signal\n"); 76814cf11afSPaul Mackerras break; 76914cf11afSPaul Mackerras case 0x40000: 77014cf11afSPaul Mackerras case 0x140000: /* 7450 MSS error and TEA */ 771422123ccSChristophe Leroy pr_cont("Transfer error ack signal\n"); 77214cf11afSPaul Mackerras break; 77314cf11afSPaul Mackerras case 0x20000: 774422123ccSChristophe Leroy pr_cont("Data parity error signal\n"); 77514cf11afSPaul Mackerras break; 77614cf11afSPaul Mackerras case 0x10000: 777422123ccSChristophe Leroy pr_cont("Address parity error signal\n"); 77814cf11afSPaul Mackerras break; 77914cf11afSPaul Mackerras case 0x20000000: 780422123ccSChristophe Leroy pr_cont("L1 Data Cache error\n"); 78114cf11afSPaul Mackerras break; 78214cf11afSPaul Mackerras case 0x40000000: 783422123ccSChristophe Leroy pr_cont("L1 Instruction Cache error\n"); 78414cf11afSPaul Mackerras break; 78514cf11afSPaul Mackerras case 0x00100000: 786422123ccSChristophe Leroy pr_cont("L2 data cache parity error\n"); 78714cf11afSPaul Mackerras break; 78814cf11afSPaul Mackerras default: 789422123ccSChristophe Leroy pr_cont("Unknown values in msr\n"); 79014cf11afSPaul Mackerras } 79175918a4bSOlof Johansson return 0; 79275918a4bSOlof Johansson } 79347c0bd1aSBenjamin Herrenschmidt #endif /* everything else */ 79475918a4bSOlof Johansson 795209e9d50SNicholas Piggin void die_mce(const char *str, struct pt_regs *regs, long err) 796209e9d50SNicholas Piggin { 797209e9d50SNicholas Piggin /* 798209e9d50SNicholas Piggin * The machine check wants to kill the interrupted context, but 799209e9d50SNicholas Piggin * do_exit() checks for in_interrupt() and panics in that case, so 800209e9d50SNicholas Piggin * exit the irq/nmi before calling die. 801209e9d50SNicholas Piggin */ 802209e9d50SNicholas Piggin if (!IS_ENABLED(CONFIG_PPC_BOOK3S_64)) 803209e9d50SNicholas Piggin nmi_exit(); 804209e9d50SNicholas Piggin die(str, regs, err); 805209e9d50SNicholas Piggin } 806209e9d50SNicholas Piggin NOKPROBE_SYMBOL(die_mce); 807209e9d50SNicholas Piggin 80875918a4bSOlof Johansson void machine_check_exception(struct pt_regs *regs) 80975918a4bSOlof Johansson { 81075918a4bSOlof Johansson int recover = 0; 81169ea03b5SPeter Zijlstra 812116ac378SNicholas Piggin /* 813116ac378SNicholas Piggin * BOOK3S_64 does not call this handler as a non-maskable interrupt 814116ac378SNicholas Piggin * (it uses its own early real-mode handler to handle the MCE proper 815116ac378SNicholas Piggin * and then raises irq_work to call this handler when interrupts are 8167ae77150SLinus Torvalds * enabled). 8177ae77150SLinus Torvalds * 8187ae77150SLinus Torvalds * This is silly. The BOOK3S_64 should just call a different function 8197ae77150SLinus Torvalds * rather than expecting semantics to magically change. Something 8207ae77150SLinus Torvalds * like 'non_nmi_machine_check_exception()', perhaps? 821116ac378SNicholas Piggin */ 8227ae77150SLinus Torvalds const bool nmi = !IS_ENABLED(CONFIG_PPC_BOOK3S_64); 8237ae77150SLinus Torvalds 8247ae77150SLinus Torvalds if (nmi) nmi_enter(); 82575918a4bSOlof Johansson 82669111bacSChristoph Lameter __this_cpu_inc(irq_stat.mce_exceptions); 82789713ed1SAnton Blanchard 828d93b0ac0SMahesh Salgaonkar add_taint(TAINT_MACHINE_CHECK, LOCKDEP_NOW_UNRELIABLE); 829d93b0ac0SMahesh Salgaonkar 83047c0bd1aSBenjamin Herrenschmidt /* See if any machine dependent calls. In theory, we would want 83147c0bd1aSBenjamin Herrenschmidt * to call the CPU first, and call the ppc_md. one if the CPU 83247c0bd1aSBenjamin Herrenschmidt * one returns a positive number. However there is existing code 83347c0bd1aSBenjamin Herrenschmidt * that assumes the board gets a first chance, so let's keep it 83447c0bd1aSBenjamin Herrenschmidt * that way for now and fix things later. --BenH. 83547c0bd1aSBenjamin Herrenschmidt */ 83675918a4bSOlof Johansson if (ppc_md.machine_check_exception) 83775918a4bSOlof Johansson recover = ppc_md.machine_check_exception(regs); 83847c0bd1aSBenjamin Herrenschmidt else if (cur_cpu_spec->machine_check) 83947c0bd1aSBenjamin Herrenschmidt recover = cur_cpu_spec->machine_check(regs); 84075918a4bSOlof Johansson 84147c0bd1aSBenjamin Herrenschmidt if (recover > 0) 842ba12eedeSLi Zhong goto bail; 84375918a4bSOlof Johansson 844a443506bSAnton Blanchard if (debugger_fault_handler(regs)) 845ba12eedeSLi Zhong goto bail; 84675918a4bSOlof Johansson 84775918a4bSOlof Johansson if (check_io_access(regs)) 848ba12eedeSLi Zhong goto bail; 84975918a4bSOlof Johansson 850209e9d50SNicholas Piggin die_mce("Machine check", regs, SIGBUS); 851daf00ae7SChristophe Leroy 852c538938fSNicholas Piggin bail: 8530bbea75cSChristophe Leroy /* Must die if the interrupt is not recoverable */ 8540bbea75cSChristophe Leroy if (!(regs->msr & MSR_RI)) 855209e9d50SNicholas Piggin die_mce("Unrecoverable Machine check", regs, SIGBUS); 856daf00ae7SChristophe Leroy 8577ae77150SLinus Torvalds if (nmi) nmi_exit(); 85814cf11afSPaul Mackerras } 8593a313883SNicholas Piggin NOKPROBE_SYMBOL(machine_check_exception); 86014cf11afSPaul Mackerras 86114cf11afSPaul Mackerras void SMIException(struct pt_regs *regs) 86214cf11afSPaul Mackerras { 86314cf11afSPaul Mackerras die("System Management Interrupt", regs, SIGABRT); 86414cf11afSPaul Mackerras } 86514cf11afSPaul Mackerras 8665080332cSMichael Neuling #ifdef CONFIG_VSX 8675080332cSMichael Neuling static void p9_hmi_special_emu(struct pt_regs *regs) 8685080332cSMichael Neuling { 8695080332cSMichael Neuling unsigned int ra, rb, t, i, sel, instr, rc; 8705080332cSMichael Neuling const void __user *addr; 8711da4a027SMichael Neuling u8 vbuf[16] __aligned(16), *vdst; 8725080332cSMichael Neuling unsigned long ea, msr, msr_mask; 8735080332cSMichael Neuling bool swap; 8745080332cSMichael Neuling 8755080332cSMichael Neuling if (__get_user_inatomic(instr, (unsigned int __user *)regs->nip)) 8765080332cSMichael Neuling return; 8775080332cSMichael Neuling 8785080332cSMichael Neuling /* 8795080332cSMichael Neuling * lxvb16x opcode: 0x7c0006d8 8805080332cSMichael Neuling * lxvd2x opcode: 0x7c000698 8815080332cSMichael Neuling * lxvh8x opcode: 0x7c000658 8825080332cSMichael Neuling * lxvw4x opcode: 0x7c000618 8835080332cSMichael Neuling */ 8845080332cSMichael Neuling if ((instr & 0xfc00073e) != 0x7c000618) { 8855080332cSMichael Neuling pr_devel("HMI vec emu: not vector CI %i:%s[%d] nip=%016lx" 8865080332cSMichael Neuling " instr=%08x\n", 8875080332cSMichael Neuling smp_processor_id(), current->comm, current->pid, 8885080332cSMichael Neuling regs->nip, instr); 8895080332cSMichael Neuling return; 8905080332cSMichael Neuling } 8915080332cSMichael Neuling 8925080332cSMichael Neuling /* Grab vector registers into the task struct */ 8935080332cSMichael Neuling msr = regs->msr; /* Grab msr before we flush the bits */ 8945080332cSMichael Neuling flush_vsx_to_thread(current); 8955080332cSMichael Neuling enable_kernel_altivec(); 8965080332cSMichael Neuling 8975080332cSMichael Neuling /* 8985080332cSMichael Neuling * Is userspace running with a different endian (this is rare but 8995080332cSMichael Neuling * not impossible) 9005080332cSMichael Neuling */ 9015080332cSMichael Neuling swap = (msr & MSR_LE) != (MSR_KERNEL & MSR_LE); 9025080332cSMichael Neuling 9035080332cSMichael Neuling /* Decode the instruction */ 9045080332cSMichael Neuling ra = (instr >> 16) & 0x1f; 9055080332cSMichael Neuling rb = (instr >> 11) & 0x1f; 9065080332cSMichael Neuling t = (instr >> 21) & 0x1f; 9075080332cSMichael Neuling if (instr & 1) 9085080332cSMichael Neuling vdst = (u8 *)¤t->thread.vr_state.vr[t]; 9095080332cSMichael Neuling else 9105080332cSMichael Neuling vdst = (u8 *)¤t->thread.fp_state.fpr[t][0]; 9115080332cSMichael Neuling 9125080332cSMichael Neuling /* Grab the vector address */ 9135080332cSMichael Neuling ea = regs->gpr[rb] + (ra ? regs->gpr[ra] : 0); 9145080332cSMichael Neuling if (is_32bit_task()) 9155080332cSMichael Neuling ea &= 0xfffffffful; 9165080332cSMichael Neuling addr = (__force const void __user *)ea; 9175080332cSMichael Neuling 9185080332cSMichael Neuling /* Check it */ 91996d4f267SLinus Torvalds if (!access_ok(addr, 16)) { 9205080332cSMichael Neuling pr_devel("HMI vec emu: bad access %i:%s[%d] nip=%016lx" 9215080332cSMichael Neuling " instr=%08x addr=%016lx\n", 9225080332cSMichael Neuling smp_processor_id(), current->comm, current->pid, 9235080332cSMichael Neuling regs->nip, instr, (unsigned long)addr); 9245080332cSMichael Neuling return; 9255080332cSMichael Neuling } 9265080332cSMichael Neuling 9275080332cSMichael Neuling /* Read the vector */ 9285080332cSMichael Neuling rc = 0; 9295080332cSMichael Neuling if ((unsigned long)addr & 0xfUL) 9305080332cSMichael Neuling /* unaligned case */ 9315080332cSMichael Neuling rc = __copy_from_user_inatomic(vbuf, addr, 16); 9325080332cSMichael Neuling else 9335080332cSMichael Neuling __get_user_atomic_128_aligned(vbuf, addr, rc); 9345080332cSMichael Neuling if (rc) { 9355080332cSMichael Neuling pr_devel("HMI vec emu: page fault %i:%s[%d] nip=%016lx" 9365080332cSMichael Neuling " instr=%08x addr=%016lx\n", 9375080332cSMichael Neuling smp_processor_id(), current->comm, current->pid, 9385080332cSMichael Neuling regs->nip, instr, (unsigned long)addr); 9395080332cSMichael Neuling return; 9405080332cSMichael Neuling } 9415080332cSMichael Neuling 9425080332cSMichael Neuling pr_devel("HMI vec emu: emulated vector CI %i:%s[%d] nip=%016lx" 9435080332cSMichael Neuling " instr=%08x addr=%016lx\n", 9445080332cSMichael Neuling smp_processor_id(), current->comm, current->pid, regs->nip, 9455080332cSMichael Neuling instr, (unsigned long) addr); 9465080332cSMichael Neuling 9475080332cSMichael Neuling /* Grab instruction "selector" */ 9485080332cSMichael Neuling sel = (instr >> 6) & 3; 9495080332cSMichael Neuling 9505080332cSMichael Neuling /* 9515080332cSMichael Neuling * Check to make sure the facility is actually enabled. This 9525080332cSMichael Neuling * could happen if we get a false positive hit. 9535080332cSMichael Neuling * 9545080332cSMichael Neuling * lxvd2x/lxvw4x always check MSR VSX sel = 0,2 9555080332cSMichael Neuling * lxvh8x/lxvb16x check MSR VSX or VEC depending on VSR used sel = 1,3 9565080332cSMichael Neuling */ 9575080332cSMichael Neuling msr_mask = MSR_VSX; 9585080332cSMichael Neuling if ((sel & 1) && (instr & 1)) /* lxvh8x & lxvb16x + VSR >= 32 */ 9595080332cSMichael Neuling msr_mask = MSR_VEC; 9605080332cSMichael Neuling if (!(msr & msr_mask)) { 9615080332cSMichael Neuling pr_devel("HMI vec emu: MSR fac clear %i:%s[%d] nip=%016lx" 9625080332cSMichael Neuling " instr=%08x msr:%016lx\n", 9635080332cSMichael Neuling smp_processor_id(), current->comm, current->pid, 9645080332cSMichael Neuling regs->nip, instr, msr); 9655080332cSMichael Neuling return; 9665080332cSMichael Neuling } 9675080332cSMichael Neuling 9685080332cSMichael Neuling /* Do logging here before we modify sel based on endian */ 9695080332cSMichael Neuling switch (sel) { 9705080332cSMichael Neuling case 0: /* lxvw4x */ 9715080332cSMichael Neuling PPC_WARN_EMULATED(lxvw4x, regs); 9725080332cSMichael Neuling break; 9735080332cSMichael Neuling case 1: /* lxvh8x */ 9745080332cSMichael Neuling PPC_WARN_EMULATED(lxvh8x, regs); 9755080332cSMichael Neuling break; 9765080332cSMichael Neuling case 2: /* lxvd2x */ 9775080332cSMichael Neuling PPC_WARN_EMULATED(lxvd2x, regs); 9785080332cSMichael Neuling break; 9795080332cSMichael Neuling case 3: /* lxvb16x */ 9805080332cSMichael Neuling PPC_WARN_EMULATED(lxvb16x, regs); 9815080332cSMichael Neuling break; 9825080332cSMichael Neuling } 9835080332cSMichael Neuling 9845080332cSMichael Neuling #ifdef __LITTLE_ENDIAN__ 9855080332cSMichael Neuling /* 9865080332cSMichael Neuling * An LE kernel stores the vector in the task struct as an LE 9875080332cSMichael Neuling * byte array (effectively swapping both the components and 9885080332cSMichael Neuling * the content of the components). Those instructions expect 9895080332cSMichael Neuling * the components to remain in ascending address order, so we 9905080332cSMichael Neuling * swap them back. 9915080332cSMichael Neuling * 9925080332cSMichael Neuling * If we are running a BE user space, the expectation is that 9935080332cSMichael Neuling * of a simple memcpy, so forcing the emulation to look like 9945080332cSMichael Neuling * a lxvb16x should do the trick. 9955080332cSMichael Neuling */ 9965080332cSMichael Neuling if (swap) 9975080332cSMichael Neuling sel = 3; 9985080332cSMichael Neuling 9995080332cSMichael Neuling switch (sel) { 10005080332cSMichael Neuling case 0: /* lxvw4x */ 10015080332cSMichael Neuling for (i = 0; i < 4; i++) 10025080332cSMichael Neuling ((u32 *)vdst)[i] = ((u32 *)vbuf)[3-i]; 10035080332cSMichael Neuling break; 10045080332cSMichael Neuling case 1: /* lxvh8x */ 10055080332cSMichael Neuling for (i = 0; i < 8; i++) 10065080332cSMichael Neuling ((u16 *)vdst)[i] = ((u16 *)vbuf)[7-i]; 10075080332cSMichael Neuling break; 10085080332cSMichael Neuling case 2: /* lxvd2x */ 10095080332cSMichael Neuling for (i = 0; i < 2; i++) 10105080332cSMichael Neuling ((u64 *)vdst)[i] = ((u64 *)vbuf)[1-i]; 10115080332cSMichael Neuling break; 10125080332cSMichael Neuling case 3: /* lxvb16x */ 10135080332cSMichael Neuling for (i = 0; i < 16; i++) 10145080332cSMichael Neuling vdst[i] = vbuf[15-i]; 10155080332cSMichael Neuling break; 10165080332cSMichael Neuling } 10175080332cSMichael Neuling #else /* __LITTLE_ENDIAN__ */ 10185080332cSMichael Neuling /* On a big endian kernel, a BE userspace only needs a memcpy */ 10195080332cSMichael Neuling if (!swap) 10205080332cSMichael Neuling sel = 3; 10215080332cSMichael Neuling 10225080332cSMichael Neuling /* Otherwise, we need to swap the content of the components */ 10235080332cSMichael Neuling switch (sel) { 10245080332cSMichael Neuling case 0: /* lxvw4x */ 10255080332cSMichael Neuling for (i = 0; i < 4; i++) 10265080332cSMichael Neuling ((u32 *)vdst)[i] = cpu_to_le32(((u32 *)vbuf)[i]); 10275080332cSMichael Neuling break; 10285080332cSMichael Neuling case 1: /* lxvh8x */ 10295080332cSMichael Neuling for (i = 0; i < 8; i++) 10305080332cSMichael Neuling ((u16 *)vdst)[i] = cpu_to_le16(((u16 *)vbuf)[i]); 10315080332cSMichael Neuling break; 10325080332cSMichael Neuling case 2: /* lxvd2x */ 10335080332cSMichael Neuling for (i = 0; i < 2; i++) 10345080332cSMichael Neuling ((u64 *)vdst)[i] = cpu_to_le64(((u64 *)vbuf)[i]); 10355080332cSMichael Neuling break; 10365080332cSMichael Neuling case 3: /* lxvb16x */ 10375080332cSMichael Neuling memcpy(vdst, vbuf, 16); 10385080332cSMichael Neuling break; 10395080332cSMichael Neuling } 10405080332cSMichael Neuling #endif /* !__LITTLE_ENDIAN__ */ 10415080332cSMichael Neuling 10425080332cSMichael Neuling /* Go to next instruction */ 10435080332cSMichael Neuling regs->nip += 4; 10445080332cSMichael Neuling } 10455080332cSMichael Neuling #endif /* CONFIG_VSX */ 10465080332cSMichael Neuling 10470869b6fdSMahesh Salgaonkar void handle_hmi_exception(struct pt_regs *regs) 10480869b6fdSMahesh Salgaonkar { 10490869b6fdSMahesh Salgaonkar struct pt_regs *old_regs; 10500869b6fdSMahesh Salgaonkar 10510869b6fdSMahesh Salgaonkar old_regs = set_irq_regs(regs); 10520869b6fdSMahesh Salgaonkar irq_enter(); 10530869b6fdSMahesh Salgaonkar 10545080332cSMichael Neuling #ifdef CONFIG_VSX 10555080332cSMichael Neuling /* Real mode flagged P9 special emu is needed */ 10565080332cSMichael Neuling if (local_paca->hmi_p9_special_emu) { 10575080332cSMichael Neuling local_paca->hmi_p9_special_emu = 0; 10585080332cSMichael Neuling 10595080332cSMichael Neuling /* 10605080332cSMichael Neuling * We don't want to take page faults while doing the 10615080332cSMichael Neuling * emulation, we just replay the instruction if necessary. 10625080332cSMichael Neuling */ 10635080332cSMichael Neuling pagefault_disable(); 10645080332cSMichael Neuling p9_hmi_special_emu(regs); 10655080332cSMichael Neuling pagefault_enable(); 10665080332cSMichael Neuling } 10675080332cSMichael Neuling #endif /* CONFIG_VSX */ 10685080332cSMichael Neuling 10690869b6fdSMahesh Salgaonkar if (ppc_md.handle_hmi_exception) 10700869b6fdSMahesh Salgaonkar ppc_md.handle_hmi_exception(regs); 10710869b6fdSMahesh Salgaonkar 10720869b6fdSMahesh Salgaonkar irq_exit(); 10730869b6fdSMahesh Salgaonkar set_irq_regs(old_regs); 10740869b6fdSMahesh Salgaonkar } 10750869b6fdSMahesh Salgaonkar 1076dc1c1ca3SStephen Rothwell void unknown_exception(struct pt_regs *regs) 107714cf11afSPaul Mackerras { 1078ba12eedeSLi Zhong enum ctx_state prev_state = exception_enter(); 1079ba12eedeSLi Zhong 108014cf11afSPaul Mackerras printk("Bad trap at PC: %lx, SR: %lx, vector=%lx\n", 108114cf11afSPaul Mackerras regs->nip, regs->msr, regs->trap); 108214cf11afSPaul Mackerras 1083e821fa42SEric W. Biederman _exception(SIGTRAP, regs, TRAP_UNK, 0); 1084ba12eedeSLi Zhong 1085ba12eedeSLi Zhong exception_exit(prev_state); 108614cf11afSPaul Mackerras } 108714cf11afSPaul Mackerras 10886c6aee00SNicholas Piggin void unknown_async_exception(struct pt_regs *regs) 10896c6aee00SNicholas Piggin { 10906c6aee00SNicholas Piggin enum ctx_state prev_state = exception_enter(); 10916c6aee00SNicholas Piggin 10926c6aee00SNicholas Piggin printk("Bad trap at PC: %lx, SR: %lx, vector=%lx\n", 10936c6aee00SNicholas Piggin regs->nip, regs->msr, regs->trap); 10946c6aee00SNicholas Piggin 10956c6aee00SNicholas Piggin _exception(SIGTRAP, regs, TRAP_UNK, 0); 10966c6aee00SNicholas Piggin 10976c6aee00SNicholas Piggin exception_exit(prev_state); 10986c6aee00SNicholas Piggin } 10996c6aee00SNicholas Piggin 1100dc1c1ca3SStephen Rothwell void instruction_breakpoint_exception(struct pt_regs *regs) 110114cf11afSPaul Mackerras { 1102ba12eedeSLi Zhong enum ctx_state prev_state = exception_enter(); 1103ba12eedeSLi Zhong 110414cf11afSPaul Mackerras if (notify_die(DIE_IABR_MATCH, "iabr_match", regs, 5, 110514cf11afSPaul Mackerras 5, SIGTRAP) == NOTIFY_STOP) 1106ba12eedeSLi Zhong goto bail; 110714cf11afSPaul Mackerras if (debugger_iabr_match(regs)) 1108ba12eedeSLi Zhong goto bail; 110914cf11afSPaul Mackerras _exception(SIGTRAP, regs, TRAP_BRKPT, regs->nip); 1110ba12eedeSLi Zhong 1111ba12eedeSLi Zhong bail: 1112ba12eedeSLi Zhong exception_exit(prev_state); 111314cf11afSPaul Mackerras } 111414cf11afSPaul Mackerras 111514cf11afSPaul Mackerras void RunModeException(struct pt_regs *regs) 111614cf11afSPaul Mackerras { 1117e821fa42SEric W. Biederman _exception(SIGTRAP, regs, TRAP_UNK, 0); 111814cf11afSPaul Mackerras } 111914cf11afSPaul Mackerras 112003465f89SNicholas Piggin void single_step_exception(struct pt_regs *regs) 112114cf11afSPaul Mackerras { 1122ba12eedeSLi Zhong enum ctx_state prev_state = exception_enter(); 1123ba12eedeSLi Zhong 11242538c2d0SK.Prasad clear_single_step(regs); 11250e524e76SMatt Evans clear_br_trace(regs); 112614cf11afSPaul Mackerras 11276cc89badSNaveen N. Rao if (kprobe_post_handler(regs)) 11286cc89badSNaveen N. Rao return; 11296cc89badSNaveen N. Rao 113014cf11afSPaul Mackerras if (notify_die(DIE_SSTEP, "single_step", regs, 5, 113114cf11afSPaul Mackerras 5, SIGTRAP) == NOTIFY_STOP) 1132ba12eedeSLi Zhong goto bail; 113314cf11afSPaul Mackerras if (debugger_sstep(regs)) 1134ba12eedeSLi Zhong goto bail; 113514cf11afSPaul Mackerras 113614cf11afSPaul Mackerras _exception(SIGTRAP, regs, TRAP_TRACE, regs->nip); 1137ba12eedeSLi Zhong 1138ba12eedeSLi Zhong bail: 1139ba12eedeSLi Zhong exception_exit(prev_state); 114014cf11afSPaul Mackerras } 114103465f89SNicholas Piggin NOKPROBE_SYMBOL(single_step_exception); 114214cf11afSPaul Mackerras 114314cf11afSPaul Mackerras /* 114414cf11afSPaul Mackerras * After we have successfully emulated an instruction, we have to 114514cf11afSPaul Mackerras * check if the instruction was being single-stepped, and if so, 114614cf11afSPaul Mackerras * pretend we got a single-step exception. This was pointed out 114714cf11afSPaul Mackerras * by Kumar Gala. -- paulus 114814cf11afSPaul Mackerras */ 11498dad3f92SPaul Mackerras static void emulate_single_step(struct pt_regs *regs) 115014cf11afSPaul Mackerras { 11512538c2d0SK.Prasad if (single_stepping(regs)) 11522538c2d0SK.Prasad single_step_exception(regs); 115314cf11afSPaul Mackerras } 115414cf11afSPaul Mackerras 11555fad293bSKumar Gala static inline int __parse_fpscr(unsigned long fpscr) 1156dc1c1ca3SStephen Rothwell { 1157aeb1c0f6SEric W. Biederman int ret = FPE_FLTUNK; 1158dc1c1ca3SStephen Rothwell 1159dc1c1ca3SStephen Rothwell /* Invalid operation */ 1160dc1c1ca3SStephen Rothwell if ((fpscr & FPSCR_VE) && (fpscr & FPSCR_VX)) 11615fad293bSKumar Gala ret = FPE_FLTINV; 1162dc1c1ca3SStephen Rothwell 1163dc1c1ca3SStephen Rothwell /* Overflow */ 1164dc1c1ca3SStephen Rothwell else if ((fpscr & FPSCR_OE) && (fpscr & FPSCR_OX)) 11655fad293bSKumar Gala ret = FPE_FLTOVF; 1166dc1c1ca3SStephen Rothwell 1167dc1c1ca3SStephen Rothwell /* Underflow */ 1168dc1c1ca3SStephen Rothwell else if ((fpscr & FPSCR_UE) && (fpscr & FPSCR_UX)) 11695fad293bSKumar Gala ret = FPE_FLTUND; 1170dc1c1ca3SStephen Rothwell 1171dc1c1ca3SStephen Rothwell /* Divide by zero */ 1172dc1c1ca3SStephen Rothwell else if ((fpscr & FPSCR_ZE) && (fpscr & FPSCR_ZX)) 11735fad293bSKumar Gala ret = FPE_FLTDIV; 1174dc1c1ca3SStephen Rothwell 1175dc1c1ca3SStephen Rothwell /* Inexact result */ 1176dc1c1ca3SStephen Rothwell else if ((fpscr & FPSCR_XE) && (fpscr & FPSCR_XX)) 11775fad293bSKumar Gala ret = FPE_FLTRES; 11785fad293bSKumar Gala 11795fad293bSKumar Gala return ret; 11805fad293bSKumar Gala } 11815fad293bSKumar Gala 11825fad293bSKumar Gala static void parse_fpe(struct pt_regs *regs) 11835fad293bSKumar Gala { 11845fad293bSKumar Gala int code = 0; 11855fad293bSKumar Gala 11865fad293bSKumar Gala flush_fp_to_thread(current); 11875fad293bSKumar Gala 1188b6254cedSChristophe Leroy #ifdef CONFIG_PPC_FPU_REGS 1189de79f7b9SPaul Mackerras code = __parse_fpscr(current->thread.fp_state.fpscr); 1190b6254cedSChristophe Leroy #endif 1191dc1c1ca3SStephen Rothwell 1192dc1c1ca3SStephen Rothwell _exception(SIGFPE, regs, code, regs->nip); 1193dc1c1ca3SStephen Rothwell } 1194dc1c1ca3SStephen Rothwell 1195dc1c1ca3SStephen Rothwell /* 1196dc1c1ca3SStephen Rothwell * Illegal instruction emulation support. Originally written to 119714cf11afSPaul Mackerras * provide the PVR to user applications using the mfspr rd, PVR. 119814cf11afSPaul Mackerras * Return non-zero if we can't emulate, or -EFAULT if the associated 119914cf11afSPaul Mackerras * memory access caused an access fault. Return zero on success. 120014cf11afSPaul Mackerras * 120114cf11afSPaul Mackerras * There are a couple of ways to do this, either "decode" the instruction 120214cf11afSPaul Mackerras * or directly match lots of bits. In this case, matching lots of 120314cf11afSPaul Mackerras * bits is faster and easier. 120486417780SPaul Mackerras * 120514cf11afSPaul Mackerras */ 120614cf11afSPaul Mackerras static int emulate_string_inst(struct pt_regs *regs, u32 instword) 120714cf11afSPaul Mackerras { 120814cf11afSPaul Mackerras u8 rT = (instword >> 21) & 0x1f; 120914cf11afSPaul Mackerras u8 rA = (instword >> 16) & 0x1f; 121014cf11afSPaul Mackerras u8 NB_RB = (instword >> 11) & 0x1f; 121114cf11afSPaul Mackerras u32 num_bytes; 121214cf11afSPaul Mackerras unsigned long EA; 121314cf11afSPaul Mackerras int pos = 0; 121414cf11afSPaul Mackerras 121514cf11afSPaul Mackerras /* Early out if we are an invalid form of lswx */ 121616c57b36SKumar Gala if ((instword & PPC_INST_STRING_MASK) == PPC_INST_LSWX) 121714cf11afSPaul Mackerras if ((rT == rA) || (rT == NB_RB)) 121814cf11afSPaul Mackerras return -EINVAL; 121914cf11afSPaul Mackerras 122014cf11afSPaul Mackerras EA = (rA == 0) ? 0 : regs->gpr[rA]; 122114cf11afSPaul Mackerras 122216c57b36SKumar Gala switch (instword & PPC_INST_STRING_MASK) { 122316c57b36SKumar Gala case PPC_INST_LSWX: 122416c57b36SKumar Gala case PPC_INST_STSWX: 122514cf11afSPaul Mackerras EA += NB_RB; 122614cf11afSPaul Mackerras num_bytes = regs->xer & 0x7f; 122714cf11afSPaul Mackerras break; 122816c57b36SKumar Gala case PPC_INST_LSWI: 122916c57b36SKumar Gala case PPC_INST_STSWI: 123014cf11afSPaul Mackerras num_bytes = (NB_RB == 0) ? 32 : NB_RB; 123114cf11afSPaul Mackerras break; 123214cf11afSPaul Mackerras default: 123314cf11afSPaul Mackerras return -EINVAL; 123414cf11afSPaul Mackerras } 123514cf11afSPaul Mackerras 123614cf11afSPaul Mackerras while (num_bytes != 0) 123714cf11afSPaul Mackerras { 123814cf11afSPaul Mackerras u8 val; 123914cf11afSPaul Mackerras u32 shift = 8 * (3 - (pos & 0x3)); 124014cf11afSPaul Mackerras 124180aa0fb4SJames Yang /* if process is 32-bit, clear upper 32 bits of EA */ 124280aa0fb4SJames Yang if ((regs->msr & MSR_64BIT) == 0) 124380aa0fb4SJames Yang EA &= 0xFFFFFFFF; 124480aa0fb4SJames Yang 124516c57b36SKumar Gala switch ((instword & PPC_INST_STRING_MASK)) { 124616c57b36SKumar Gala case PPC_INST_LSWX: 124716c57b36SKumar Gala case PPC_INST_LSWI: 124814cf11afSPaul Mackerras if (get_user(val, (u8 __user *)EA)) 124914cf11afSPaul Mackerras return -EFAULT; 125014cf11afSPaul Mackerras /* first time updating this reg, 125114cf11afSPaul Mackerras * zero it out */ 125214cf11afSPaul Mackerras if (pos == 0) 125314cf11afSPaul Mackerras regs->gpr[rT] = 0; 125414cf11afSPaul Mackerras regs->gpr[rT] |= val << shift; 125514cf11afSPaul Mackerras break; 125616c57b36SKumar Gala case PPC_INST_STSWI: 125716c57b36SKumar Gala case PPC_INST_STSWX: 125814cf11afSPaul Mackerras val = regs->gpr[rT] >> shift; 125914cf11afSPaul Mackerras if (put_user(val, (u8 __user *)EA)) 126014cf11afSPaul Mackerras return -EFAULT; 126114cf11afSPaul Mackerras break; 126214cf11afSPaul Mackerras } 126314cf11afSPaul Mackerras /* move EA to next address */ 126414cf11afSPaul Mackerras EA += 1; 126514cf11afSPaul Mackerras num_bytes--; 126614cf11afSPaul Mackerras 126714cf11afSPaul Mackerras /* manage our position within the register */ 126814cf11afSPaul Mackerras if (++pos == 4) { 126914cf11afSPaul Mackerras pos = 0; 127014cf11afSPaul Mackerras if (++rT == 32) 127114cf11afSPaul Mackerras rT = 0; 127214cf11afSPaul Mackerras } 127314cf11afSPaul Mackerras } 127414cf11afSPaul Mackerras 127514cf11afSPaul Mackerras return 0; 127614cf11afSPaul Mackerras } 127714cf11afSPaul Mackerras 1278c3412dcbSWill Schmidt static int emulate_popcntb_inst(struct pt_regs *regs, u32 instword) 1279c3412dcbSWill Schmidt { 1280c3412dcbSWill Schmidt u32 ra,rs; 1281c3412dcbSWill Schmidt unsigned long tmp; 1282c3412dcbSWill Schmidt 1283c3412dcbSWill Schmidt ra = (instword >> 16) & 0x1f; 1284c3412dcbSWill Schmidt rs = (instword >> 21) & 0x1f; 1285c3412dcbSWill Schmidt 1286c3412dcbSWill Schmidt tmp = regs->gpr[rs]; 1287c3412dcbSWill Schmidt tmp = tmp - ((tmp >> 1) & 0x5555555555555555ULL); 1288c3412dcbSWill Schmidt tmp = (tmp & 0x3333333333333333ULL) + ((tmp >> 2) & 0x3333333333333333ULL); 1289c3412dcbSWill Schmidt tmp = (tmp + (tmp >> 4)) & 0x0f0f0f0f0f0f0f0fULL; 1290c3412dcbSWill Schmidt regs->gpr[ra] = tmp; 1291c3412dcbSWill Schmidt 1292c3412dcbSWill Schmidt return 0; 1293c3412dcbSWill Schmidt } 1294c3412dcbSWill Schmidt 1295c1469f13SKumar Gala static int emulate_isel(struct pt_regs *regs, u32 instword) 1296c1469f13SKumar Gala { 1297c1469f13SKumar Gala u8 rT = (instword >> 21) & 0x1f; 1298c1469f13SKumar Gala u8 rA = (instword >> 16) & 0x1f; 1299c1469f13SKumar Gala u8 rB = (instword >> 11) & 0x1f; 1300c1469f13SKumar Gala u8 BC = (instword >> 6) & 0x1f; 1301c1469f13SKumar Gala u8 bit; 1302c1469f13SKumar Gala unsigned long tmp; 1303c1469f13SKumar Gala 1304c1469f13SKumar Gala tmp = (rA == 0) ? 0 : regs->gpr[rA]; 1305c1469f13SKumar Gala bit = (regs->ccr >> (31 - BC)) & 0x1; 1306c1469f13SKumar Gala 1307c1469f13SKumar Gala regs->gpr[rT] = bit ? tmp : regs->gpr[rB]; 1308c1469f13SKumar Gala 1309c1469f13SKumar Gala return 0; 1310c1469f13SKumar Gala } 1311c1469f13SKumar Gala 13126ce6c629SMichael Neuling #ifdef CONFIG_PPC_TRANSACTIONAL_MEM 13136ce6c629SMichael Neuling static inline bool tm_abort_check(struct pt_regs *regs, int cause) 13146ce6c629SMichael Neuling { 13156ce6c629SMichael Neuling /* If we're emulating a load/store in an active transaction, we cannot 13166ce6c629SMichael Neuling * emulate it as the kernel operates in transaction suspended context. 13176ce6c629SMichael Neuling * We need to abort the transaction. This creates a persistent TM 13186ce6c629SMichael Neuling * abort so tell the user what caused it with a new code. 13196ce6c629SMichael Neuling */ 13206ce6c629SMichael Neuling if (MSR_TM_TRANSACTIONAL(regs->msr)) { 13216ce6c629SMichael Neuling tm_enable(); 13226ce6c629SMichael Neuling tm_abort(cause); 13236ce6c629SMichael Neuling return true; 13246ce6c629SMichael Neuling } 13256ce6c629SMichael Neuling return false; 13266ce6c629SMichael Neuling } 13276ce6c629SMichael Neuling #else 13286ce6c629SMichael Neuling static inline bool tm_abort_check(struct pt_regs *regs, int reason) 13296ce6c629SMichael Neuling { 13306ce6c629SMichael Neuling return false; 13316ce6c629SMichael Neuling } 13326ce6c629SMichael Neuling #endif 13336ce6c629SMichael Neuling 133414cf11afSPaul Mackerras static int emulate_instruction(struct pt_regs *regs) 133514cf11afSPaul Mackerras { 133614cf11afSPaul Mackerras u32 instword; 133714cf11afSPaul Mackerras u32 rd; 133814cf11afSPaul Mackerras 13394288e343SAnton Blanchard if (!user_mode(regs)) 134014cf11afSPaul Mackerras return -EINVAL; 134114cf11afSPaul Mackerras CHECK_FULL_REGS(regs); 134214cf11afSPaul Mackerras 134314cf11afSPaul Mackerras if (get_user(instword, (u32 __user *)(regs->nip))) 134414cf11afSPaul Mackerras return -EFAULT; 134514cf11afSPaul Mackerras 134614cf11afSPaul Mackerras /* Emulate the mfspr rD, PVR. */ 134716c57b36SKumar Gala if ((instword & PPC_INST_MFSPR_PVR_MASK) == PPC_INST_MFSPR_PVR) { 1348eecff81dSAnton Blanchard PPC_WARN_EMULATED(mfpvr, regs); 134914cf11afSPaul Mackerras rd = (instword >> 21) & 0x1f; 135014cf11afSPaul Mackerras regs->gpr[rd] = mfspr(SPRN_PVR); 135114cf11afSPaul Mackerras return 0; 135214cf11afSPaul Mackerras } 135314cf11afSPaul Mackerras 135414cf11afSPaul Mackerras /* Emulating the dcba insn is just a no-op. */ 135580947e7cSGeert Uytterhoeven if ((instword & PPC_INST_DCBA_MASK) == PPC_INST_DCBA) { 1356eecff81dSAnton Blanchard PPC_WARN_EMULATED(dcba, regs); 135714cf11afSPaul Mackerras return 0; 135880947e7cSGeert Uytterhoeven } 135914cf11afSPaul Mackerras 136014cf11afSPaul Mackerras /* Emulate the mcrxr insn. */ 136116c57b36SKumar Gala if ((instword & PPC_INST_MCRXR_MASK) == PPC_INST_MCRXR) { 136286417780SPaul Mackerras int shift = (instword >> 21) & 0x1c; 136314cf11afSPaul Mackerras unsigned long msk = 0xf0000000UL >> shift; 136414cf11afSPaul Mackerras 1365eecff81dSAnton Blanchard PPC_WARN_EMULATED(mcrxr, regs); 136614cf11afSPaul Mackerras regs->ccr = (regs->ccr & ~msk) | ((regs->xer >> shift) & msk); 136714cf11afSPaul Mackerras regs->xer &= ~0xf0000000UL; 136814cf11afSPaul Mackerras return 0; 136914cf11afSPaul Mackerras } 137014cf11afSPaul Mackerras 137114cf11afSPaul Mackerras /* Emulate load/store string insn. */ 137280947e7cSGeert Uytterhoeven if ((instword & PPC_INST_STRING_GEN_MASK) == PPC_INST_STRING) { 13736ce6c629SMichael Neuling if (tm_abort_check(regs, 13746ce6c629SMichael Neuling TM_CAUSE_EMULATE | TM_CAUSE_PERSISTENT)) 13756ce6c629SMichael Neuling return -EINVAL; 1376eecff81dSAnton Blanchard PPC_WARN_EMULATED(string, regs); 137714cf11afSPaul Mackerras return emulate_string_inst(regs, instword); 137880947e7cSGeert Uytterhoeven } 137914cf11afSPaul Mackerras 1380c3412dcbSWill Schmidt /* Emulate the popcntb (Population Count Bytes) instruction. */ 138116c57b36SKumar Gala if ((instword & PPC_INST_POPCNTB_MASK) == PPC_INST_POPCNTB) { 1382eecff81dSAnton Blanchard PPC_WARN_EMULATED(popcntb, regs); 1383c3412dcbSWill Schmidt return emulate_popcntb_inst(regs, instword); 1384c3412dcbSWill Schmidt } 1385c3412dcbSWill Schmidt 1386c1469f13SKumar Gala /* Emulate isel (Integer Select) instruction */ 138716c57b36SKumar Gala if ((instword & PPC_INST_ISEL_MASK) == PPC_INST_ISEL) { 1388eecff81dSAnton Blanchard PPC_WARN_EMULATED(isel, regs); 1389c1469f13SKumar Gala return emulate_isel(regs, instword); 1390c1469f13SKumar Gala } 1391c1469f13SKumar Gala 13929863c28aSJames Yang /* Emulate sync instruction variants */ 13939863c28aSJames Yang if ((instword & PPC_INST_SYNC_MASK) == PPC_INST_SYNC) { 13949863c28aSJames Yang PPC_WARN_EMULATED(sync, regs); 13959863c28aSJames Yang asm volatile("sync"); 13969863c28aSJames Yang return 0; 13979863c28aSJames Yang } 13989863c28aSJames Yang 1399efcac658SAlexey Kardashevskiy #ifdef CONFIG_PPC64 1400efcac658SAlexey Kardashevskiy /* Emulate the mfspr rD, DSCR. */ 140173d2fb75SAnton Blanchard if ((((instword & PPC_INST_MFSPR_DSCR_USER_MASK) == 140273d2fb75SAnton Blanchard PPC_INST_MFSPR_DSCR_USER) || 140373d2fb75SAnton Blanchard ((instword & PPC_INST_MFSPR_DSCR_MASK) == 140473d2fb75SAnton Blanchard PPC_INST_MFSPR_DSCR)) && 1405efcac658SAlexey Kardashevskiy cpu_has_feature(CPU_FTR_DSCR)) { 1406efcac658SAlexey Kardashevskiy PPC_WARN_EMULATED(mfdscr, regs); 1407efcac658SAlexey Kardashevskiy rd = (instword >> 21) & 0x1f; 1408efcac658SAlexey Kardashevskiy regs->gpr[rd] = mfspr(SPRN_DSCR); 1409efcac658SAlexey Kardashevskiy return 0; 1410efcac658SAlexey Kardashevskiy } 1411efcac658SAlexey Kardashevskiy /* Emulate the mtspr DSCR, rD. */ 141273d2fb75SAnton Blanchard if ((((instword & PPC_INST_MTSPR_DSCR_USER_MASK) == 141373d2fb75SAnton Blanchard PPC_INST_MTSPR_DSCR_USER) || 141473d2fb75SAnton Blanchard ((instword & PPC_INST_MTSPR_DSCR_MASK) == 141573d2fb75SAnton Blanchard PPC_INST_MTSPR_DSCR)) && 1416efcac658SAlexey Kardashevskiy cpu_has_feature(CPU_FTR_DSCR)) { 1417efcac658SAlexey Kardashevskiy PPC_WARN_EMULATED(mtdscr, regs); 1418efcac658SAlexey Kardashevskiy rd = (instword >> 21) & 0x1f; 141900ca0de0SAnton Blanchard current->thread.dscr = regs->gpr[rd]; 1420efcac658SAlexey Kardashevskiy current->thread.dscr_inherit = 1; 142100ca0de0SAnton Blanchard mtspr(SPRN_DSCR, current->thread.dscr); 1422efcac658SAlexey Kardashevskiy return 0; 1423efcac658SAlexey Kardashevskiy } 1424efcac658SAlexey Kardashevskiy #endif 1425efcac658SAlexey Kardashevskiy 142614cf11afSPaul Mackerras return -EINVAL; 142714cf11afSPaul Mackerras } 142814cf11afSPaul Mackerras 142973c9ceabSJeremy Fitzhardinge int is_valid_bugaddr(unsigned long addr) 143014cf11afSPaul Mackerras { 143173c9ceabSJeremy Fitzhardinge return is_kernel_addr(addr); 143214cf11afSPaul Mackerras } 143314cf11afSPaul Mackerras 14343a3b5aa6SKevin Hao #ifdef CONFIG_MATH_EMULATION 14353a3b5aa6SKevin Hao static int emulate_math(struct pt_regs *regs) 14363a3b5aa6SKevin Hao { 14373a3b5aa6SKevin Hao int ret; 14383a3b5aa6SKevin Hao extern int do_mathemu(struct pt_regs *regs); 14393a3b5aa6SKevin Hao 14403a3b5aa6SKevin Hao ret = do_mathemu(regs); 14413a3b5aa6SKevin Hao if (ret >= 0) 14423a3b5aa6SKevin Hao PPC_WARN_EMULATED(math, regs); 14433a3b5aa6SKevin Hao 14443a3b5aa6SKevin Hao switch (ret) { 14453a3b5aa6SKevin Hao case 0: 14463a3b5aa6SKevin Hao emulate_single_step(regs); 14473a3b5aa6SKevin Hao return 0; 14483a3b5aa6SKevin Hao case 1: { 14493a3b5aa6SKevin Hao int code = 0; 1450de79f7b9SPaul Mackerras code = __parse_fpscr(current->thread.fp_state.fpscr); 14513a3b5aa6SKevin Hao _exception(SIGFPE, regs, code, regs->nip); 14523a3b5aa6SKevin Hao return 0; 14533a3b5aa6SKevin Hao } 14543a3b5aa6SKevin Hao case -EFAULT: 14553a3b5aa6SKevin Hao _exception(SIGSEGV, regs, SEGV_MAPERR, regs->nip); 14563a3b5aa6SKevin Hao return 0; 14573a3b5aa6SKevin Hao } 14583a3b5aa6SKevin Hao 14593a3b5aa6SKevin Hao return -1; 14603a3b5aa6SKevin Hao } 14613a3b5aa6SKevin Hao #else 14623a3b5aa6SKevin Hao static inline int emulate_math(struct pt_regs *regs) { return -1; } 14633a3b5aa6SKevin Hao #endif 14643a3b5aa6SKevin Hao 1465*fd3f1e0fSNicholas Piggin static void do_program_check(struct pt_regs *regs) 146614cf11afSPaul Mackerras { 146714cf11afSPaul Mackerras unsigned int reason = get_reason(regs); 146814cf11afSPaul Mackerras 1469aa42c69cSKim Phillips /* We can now get here via a FP Unavailable exception if the core 147004903a30SKumar Gala * has no FPU, in that case the reason flags will be 0 */ 147114cf11afSPaul Mackerras 147214cf11afSPaul Mackerras if (reason & REASON_FP) { 147314cf11afSPaul Mackerras /* IEEE FP exception */ 1474dc1c1ca3SStephen Rothwell parse_fpe(regs); 1475*fd3f1e0fSNicholas Piggin return; 14768dad3f92SPaul Mackerras } 14778dad3f92SPaul Mackerras if (reason & REASON_TRAP) { 1478a4c3f909SBalbir Singh unsigned long bugaddr; 1479ba797b28SJason Wessel /* Debugger is first in line to stop recursive faults in 1480ba797b28SJason Wessel * rcu_lock, notify_die, or atomic_notifier_call_chain */ 1481ba797b28SJason Wessel if (debugger_bpt(regs)) 1482*fd3f1e0fSNicholas Piggin return; 1483ba797b28SJason Wessel 14846cc89badSNaveen N. Rao if (kprobe_handler(regs)) 1485*fd3f1e0fSNicholas Piggin return; 14866cc89badSNaveen N. Rao 148714cf11afSPaul Mackerras /* trap exception */ 1488dc1c1ca3SStephen Rothwell if (notify_die(DIE_BPT, "breakpoint", regs, 5, 5, SIGTRAP) 1489dc1c1ca3SStephen Rothwell == NOTIFY_STOP) 1490*fd3f1e0fSNicholas Piggin return; 149173c9ceabSJeremy Fitzhardinge 1492a4c3f909SBalbir Singh bugaddr = regs->nip; 1493a4c3f909SBalbir Singh /* 1494a4c3f909SBalbir Singh * Fixup bugaddr for BUG_ON() in real mode 1495a4c3f909SBalbir Singh */ 1496a4c3f909SBalbir Singh if (!is_kernel_addr(bugaddr) && !(regs->msr & MSR_IR)) 1497a4c3f909SBalbir Singh bugaddr += PAGE_OFFSET; 1498a4c3f909SBalbir Singh 149973c9ceabSJeremy Fitzhardinge if (!(regs->msr & MSR_PR) && /* not user-mode */ 1500a4c3f909SBalbir Singh report_bug(bugaddr, regs) == BUG_TRAP_TYPE_WARN) { 150114cf11afSPaul Mackerras regs->nip += 4; 1502*fd3f1e0fSNicholas Piggin return; 150314cf11afSPaul Mackerras } 15048dad3f92SPaul Mackerras _exception(SIGTRAP, regs, TRAP_BRKPT, regs->nip); 1505*fd3f1e0fSNicholas Piggin return; 15068dad3f92SPaul Mackerras } 1507bc2a9408SMichael Neuling #ifdef CONFIG_PPC_TRANSACTIONAL_MEM 1508bc2a9408SMichael Neuling if (reason & REASON_TM) { 1509bc2a9408SMichael Neuling /* This is a TM "Bad Thing Exception" program check. 1510bc2a9408SMichael Neuling * This occurs when: 1511bc2a9408SMichael Neuling * - An rfid/hrfid/mtmsrd attempts to cause an illegal 1512bc2a9408SMichael Neuling * transition in TM states. 1513bc2a9408SMichael Neuling * - A trechkpt is attempted when transactional. 1514bc2a9408SMichael Neuling * - A treclaim is attempted when non transactional. 1515bc2a9408SMichael Neuling * - A tend is illegally attempted. 1516bc2a9408SMichael Neuling * - writing a TM SPR when transactional. 1517632f0574SMichael Ellerman * 1518632f0574SMichael Ellerman * If usermode caused this, it's done something illegal and 1519bc2a9408SMichael Neuling * gets a SIGILL slap on the wrist. We call it an illegal 1520bc2a9408SMichael Neuling * operand to distinguish from the instruction just being bad 1521bc2a9408SMichael Neuling * (e.g. executing a 'tend' on a CPU without TM!); it's an 1522bc2a9408SMichael Neuling * illegal /placement/ of a valid instruction. 1523bc2a9408SMichael Neuling */ 1524bc2a9408SMichael Neuling if (user_mode(regs)) { 1525bc2a9408SMichael Neuling _exception(SIGILL, regs, ILL_ILLOPN, regs->nip); 1526*fd3f1e0fSNicholas Piggin return; 1527bc2a9408SMichael Neuling } else { 1528bc2a9408SMichael Neuling printk(KERN_EMERG "Unexpected TM Bad Thing exception " 152911be3958SBreno Leitao "at %lx (msr 0x%lx) tm_scratch=%llx\n", 153011be3958SBreno Leitao regs->nip, regs->msr, get_paca()->tm_scratch); 1531bc2a9408SMichael Neuling die("Unrecoverable exception", regs, SIGABRT); 1532bc2a9408SMichael Neuling } 1533bc2a9408SMichael Neuling } 1534bc2a9408SMichael Neuling #endif 15358dad3f92SPaul Mackerras 1536b3f6a459SMichael Ellerman /* 1537b3f6a459SMichael Ellerman * If we took the program check in the kernel skip down to sending a 1538b3f6a459SMichael Ellerman * SIGILL. The subsequent cases all relate to emulating instructions 1539b3f6a459SMichael Ellerman * which we should only do for userspace. We also do not want to enable 1540b3f6a459SMichael Ellerman * interrupts for kernel faults because that might lead to further 1541b3f6a459SMichael Ellerman * faults, and loose the context of the original exception. 1542b3f6a459SMichael Ellerman */ 1543b3f6a459SMichael Ellerman if (!user_mode(regs)) 1544b3f6a459SMichael Ellerman goto sigill; 1545b3f6a459SMichael Ellerman 1546a3512b2dSBenjamin Herrenschmidt /* We restore the interrupt state now */ 1547a3512b2dSBenjamin Herrenschmidt if (!arch_irq_disabled_regs(regs)) 1548cd8a5673SPaul Mackerras local_irq_enable(); 1549cd8a5673SPaul Mackerras 155004903a30SKumar Gala /* (reason & REASON_ILLEGAL) would be the obvious thing here, 155104903a30SKumar Gala * but there seems to be a hardware bug on the 405GP (RevD) 155204903a30SKumar Gala * that means ESR is sometimes set incorrectly - either to 155304903a30SKumar Gala * ESR_DST (!?) or 0. In the process of chasing this with the 155404903a30SKumar Gala * hardware people - not sure if it can happen on any illegal 155504903a30SKumar Gala * instruction or only on FP instructions, whether there is a 15564e63f8edSBenjamin Herrenschmidt * pattern to occurrences etc. -dgibson 31/Mar/2003 15574e63f8edSBenjamin Herrenschmidt */ 15583a3b5aa6SKevin Hao if (!emulate_math(regs)) 1559*fd3f1e0fSNicholas Piggin return; 156004903a30SKumar Gala 15618dad3f92SPaul Mackerras /* Try to emulate it if we should. */ 15628dad3f92SPaul Mackerras if (reason & (REASON_ILLEGAL | REASON_PRIVILEGED)) { 156314cf11afSPaul Mackerras switch (emulate_instruction(regs)) { 156414cf11afSPaul Mackerras case 0: 156514cf11afSPaul Mackerras regs->nip += 4; 156614cf11afSPaul Mackerras emulate_single_step(regs); 1567*fd3f1e0fSNicholas Piggin return; 156814cf11afSPaul Mackerras case -EFAULT: 156914cf11afSPaul Mackerras _exception(SIGSEGV, regs, SEGV_MAPERR, regs->nip); 1570*fd3f1e0fSNicholas Piggin return; 15718dad3f92SPaul Mackerras } 15728dad3f92SPaul Mackerras } 15738dad3f92SPaul Mackerras 1574b3f6a459SMichael Ellerman sigill: 157514cf11afSPaul Mackerras if (reason & REASON_PRIVILEGED) 157614cf11afSPaul Mackerras _exception(SIGILL, regs, ILL_PRVOPC, regs->nip); 157714cf11afSPaul Mackerras else 157814cf11afSPaul Mackerras _exception(SIGILL, regs, ILL_ILLOPC, regs->nip); 1579ba12eedeSLi Zhong 1580*fd3f1e0fSNicholas Piggin } 1581*fd3f1e0fSNicholas Piggin 1582*fd3f1e0fSNicholas Piggin void program_check_exception(struct pt_regs *regs) 1583*fd3f1e0fSNicholas Piggin { 1584*fd3f1e0fSNicholas Piggin enum ctx_state prev_state = exception_enter(); 1585*fd3f1e0fSNicholas Piggin 1586*fd3f1e0fSNicholas Piggin do_program_check(regs); 1587*fd3f1e0fSNicholas Piggin 1588ba12eedeSLi Zhong exception_exit(prev_state); 158914cf11afSPaul Mackerras } 159003465f89SNicholas Piggin NOKPROBE_SYMBOL(program_check_exception); 159114cf11afSPaul Mackerras 1592bf593907SPaul Mackerras /* 1593bf593907SPaul Mackerras * This occurs when running in hypervisor mode on POWER6 or later 1594bf593907SPaul Mackerras * and an illegal instruction is encountered. 1595bf593907SPaul Mackerras */ 159603465f89SNicholas Piggin void emulation_assist_interrupt(struct pt_regs *regs) 1597bf593907SPaul Mackerras { 1598*fd3f1e0fSNicholas Piggin enum ctx_state prev_state = exception_enter(); 1599*fd3f1e0fSNicholas Piggin 1600bf593907SPaul Mackerras regs->msr |= REASON_ILLEGAL; 1601*fd3f1e0fSNicholas Piggin do_program_check(regs); 1602*fd3f1e0fSNicholas Piggin 1603*fd3f1e0fSNicholas Piggin exception_exit(prev_state); 1604bf593907SPaul Mackerras } 160503465f89SNicholas Piggin NOKPROBE_SYMBOL(emulation_assist_interrupt); 1606bf593907SPaul Mackerras 1607dc1c1ca3SStephen Rothwell void alignment_exception(struct pt_regs *regs) 160814cf11afSPaul Mackerras { 1609ba12eedeSLi Zhong enum ctx_state prev_state = exception_enter(); 16104393c4f6SBenjamin Herrenschmidt int sig, code, fixed = 0; 16119409d2f9SJordan Niethe unsigned long reason; 161214cf11afSPaul Mackerras 1613a3512b2dSBenjamin Herrenschmidt /* We restore the interrupt state now */ 1614a3512b2dSBenjamin Herrenschmidt if (!arch_irq_disabled_regs(regs)) 1615a3512b2dSBenjamin Herrenschmidt local_irq_enable(); 1616a3512b2dSBenjamin Herrenschmidt 16179409d2f9SJordan Niethe reason = get_reason(regs); 16189409d2f9SJordan Niethe 16199409d2f9SJordan Niethe if (reason & REASON_BOUNDARY) { 16209409d2f9SJordan Niethe sig = SIGBUS; 16219409d2f9SJordan Niethe code = BUS_ADRALN; 16229409d2f9SJordan Niethe goto bad; 16239409d2f9SJordan Niethe } 16249409d2f9SJordan Niethe 16256ce6c629SMichael Neuling if (tm_abort_check(regs, TM_CAUSE_ALIGNMENT | TM_CAUSE_PERSISTENT)) 16266ce6c629SMichael Neuling goto bail; 16276ce6c629SMichael Neuling 1628e9370ae1SPaul Mackerras /* we don't implement logging of alignment exceptions */ 1629e9370ae1SPaul Mackerras if (!(current->thread.align_ctl & PR_UNALIGN_SIGBUS)) 163014cf11afSPaul Mackerras fixed = fix_alignment(regs); 163114cf11afSPaul Mackerras 163214cf11afSPaul Mackerras if (fixed == 1) { 16339409d2f9SJordan Niethe /* skip over emulated instruction */ 16349409d2f9SJordan Niethe regs->nip += inst_length(reason); 163514cf11afSPaul Mackerras emulate_single_step(regs); 1636ba12eedeSLi Zhong goto bail; 163714cf11afSPaul Mackerras } 163814cf11afSPaul Mackerras 163914cf11afSPaul Mackerras /* Operand address was bad */ 164014cf11afSPaul Mackerras if (fixed == -EFAULT) { 16414393c4f6SBenjamin Herrenschmidt sig = SIGSEGV; 16424393c4f6SBenjamin Herrenschmidt code = SEGV_ACCERR; 16434393c4f6SBenjamin Herrenschmidt } else { 16444393c4f6SBenjamin Herrenschmidt sig = SIGBUS; 16454393c4f6SBenjamin Herrenschmidt code = BUS_ADRALN; 164614cf11afSPaul Mackerras } 16479409d2f9SJordan Niethe bad: 16484393c4f6SBenjamin Herrenschmidt if (user_mode(regs)) 16494393c4f6SBenjamin Herrenschmidt _exception(sig, regs, code, regs->dar); 16504393c4f6SBenjamin Herrenschmidt else 16518458c628SNicholas Piggin bad_page_fault(regs, sig); 1652ba12eedeSLi Zhong 1653ba12eedeSLi Zhong bail: 1654ba12eedeSLi Zhong exception_exit(prev_state); 165514cf11afSPaul Mackerras } 165614cf11afSPaul Mackerras 165714cf11afSPaul Mackerras void StackOverflow(struct pt_regs *regs) 165814cf11afSPaul Mackerras { 16599bf3d3c4SChristophe Leroy pr_crit("Kernel stack overflow in process %s[%d], r1=%lx\n", 16609bf3d3c4SChristophe Leroy current->comm, task_pid_nr(current), regs->gpr[1]); 166114cf11afSPaul Mackerras debugger(regs); 166214cf11afSPaul Mackerras show_regs(regs); 166314cf11afSPaul Mackerras panic("kernel stack overflow"); 166414cf11afSPaul Mackerras } 166514cf11afSPaul Mackerras 16663978eb78SChristophe Leroy void stack_overflow_exception(struct pt_regs *regs) 16673978eb78SChristophe Leroy { 16683978eb78SChristophe Leroy enum ctx_state prev_state = exception_enter(); 16693978eb78SChristophe Leroy 16703978eb78SChristophe Leroy die("Kernel stack overflow", regs, SIGSEGV); 16713978eb78SChristophe Leroy 16723978eb78SChristophe Leroy exception_exit(prev_state); 16733978eb78SChristophe Leroy } 16743978eb78SChristophe Leroy 1675dc1c1ca3SStephen Rothwell void kernel_fp_unavailable_exception(struct pt_regs *regs) 1676dc1c1ca3SStephen Rothwell { 1677ba12eedeSLi Zhong enum ctx_state prev_state = exception_enter(); 1678ba12eedeSLi Zhong 1679dc1c1ca3SStephen Rothwell printk(KERN_EMERG "Unrecoverable FP Unavailable Exception " 1680dc1c1ca3SStephen Rothwell "%lx at %lx\n", regs->trap, regs->nip); 1681dc1c1ca3SStephen Rothwell die("Unrecoverable FP Unavailable Exception", regs, SIGABRT); 1682ba12eedeSLi Zhong 1683ba12eedeSLi Zhong exception_exit(prev_state); 1684dc1c1ca3SStephen Rothwell } 1685dc1c1ca3SStephen Rothwell 1686dc1c1ca3SStephen Rothwell void altivec_unavailable_exception(struct pt_regs *regs) 1687dc1c1ca3SStephen Rothwell { 1688ba12eedeSLi Zhong enum ctx_state prev_state = exception_enter(); 1689ba12eedeSLi Zhong 1690dc1c1ca3SStephen Rothwell if (user_mode(regs)) { 1691dc1c1ca3SStephen Rothwell /* A user program has executed an altivec instruction, 1692dc1c1ca3SStephen Rothwell but this kernel doesn't support altivec. */ 1693dc1c1ca3SStephen Rothwell _exception(SIGILL, regs, ILL_ILLOPC, regs->nip); 1694ba12eedeSLi Zhong goto bail; 1695dc1c1ca3SStephen Rothwell } 16966c4841c2SAnton Blanchard 1697dc1c1ca3SStephen Rothwell printk(KERN_EMERG "Unrecoverable VMX/Altivec Unavailable Exception " 1698dc1c1ca3SStephen Rothwell "%lx at %lx\n", regs->trap, regs->nip); 1699dc1c1ca3SStephen Rothwell die("Unrecoverable VMX/Altivec Unavailable Exception", regs, SIGABRT); 1700ba12eedeSLi Zhong 1701ba12eedeSLi Zhong bail: 1702ba12eedeSLi Zhong exception_exit(prev_state); 1703dc1c1ca3SStephen Rothwell } 1704dc1c1ca3SStephen Rothwell 1705ce48b210SMichael Neuling void vsx_unavailable_exception(struct pt_regs *regs) 1706ce48b210SMichael Neuling { 1707ce48b210SMichael Neuling if (user_mode(regs)) { 1708ce48b210SMichael Neuling /* A user program has executed an vsx instruction, 1709ce48b210SMichael Neuling but this kernel doesn't support vsx. */ 1710ce48b210SMichael Neuling _exception(SIGILL, regs, ILL_ILLOPC, regs->nip); 1711ce48b210SMichael Neuling return; 1712ce48b210SMichael Neuling } 1713ce48b210SMichael Neuling 1714ce48b210SMichael Neuling printk(KERN_EMERG "Unrecoverable VSX Unavailable Exception " 1715ce48b210SMichael Neuling "%lx at %lx\n", regs->trap, regs->nip); 1716ce48b210SMichael Neuling die("Unrecoverable VSX Unavailable Exception", regs, SIGABRT); 1717ce48b210SMichael Neuling } 1718ce48b210SMichael Neuling 17192517617eSMichael Neuling #ifdef CONFIG_PPC64 1720172f7aaaSCyril Bur static void tm_unavailable(struct pt_regs *regs) 1721172f7aaaSCyril Bur { 17225d176f75SCyril Bur #ifdef CONFIG_PPC_TRANSACTIONAL_MEM 17235d176f75SCyril Bur if (user_mode(regs)) { 17245d176f75SCyril Bur current->thread.load_tm++; 17255d176f75SCyril Bur regs->msr |= MSR_TM; 17265d176f75SCyril Bur tm_enable(); 17275d176f75SCyril Bur tm_restore_sprs(¤t->thread); 17285d176f75SCyril Bur return; 17295d176f75SCyril Bur } 17305d176f75SCyril Bur #endif 1731172f7aaaSCyril Bur pr_emerg("Unrecoverable TM Unavailable Exception " 1732172f7aaaSCyril Bur "%lx at %lx\n", regs->trap, regs->nip); 1733172f7aaaSCyril Bur die("Unrecoverable TM Unavailable Exception", regs, SIGABRT); 1734172f7aaaSCyril Bur } 1735172f7aaaSCyril Bur 1736021424a1SMichael Ellerman void facility_unavailable_exception(struct pt_regs *regs) 1737d0c0c9a1SMichael Neuling { 1738021424a1SMichael Ellerman static char *facility_strings[] = { 17392517617eSMichael Neuling [FSCR_FP_LG] = "FPU", 17402517617eSMichael Neuling [FSCR_VECVSX_LG] = "VMX/VSX", 17412517617eSMichael Neuling [FSCR_DSCR_LG] = "DSCR", 17422517617eSMichael Neuling [FSCR_PM_LG] = "PMU SPRs", 17432517617eSMichael Neuling [FSCR_BHRB_LG] = "BHRB", 17442517617eSMichael Neuling [FSCR_TM_LG] = "TM", 17452517617eSMichael Neuling [FSCR_EBB_LG] = "EBB", 17462517617eSMichael Neuling [FSCR_TAR_LG] = "TAR", 1747794464f4SNicholas Piggin [FSCR_MSGP_LG] = "MSGP", 17489b7ff0c6SNicholas Piggin [FSCR_SCV_LG] = "SCV", 17492aa6195eSAlistair Popple [FSCR_PREFIX_LG] = "PREFIX", 1750021424a1SMichael Ellerman }; 17512517617eSMichael Neuling char *facility = "unknown"; 1752021424a1SMichael Ellerman u64 value; 1753c952c1c4SAnshuman Khandual u32 instword, rd; 17542517617eSMichael Neuling u8 status; 17552517617eSMichael Neuling bool hv; 1756021424a1SMichael Ellerman 17572271db20SBenjamin Herrenschmidt hv = (TRAP(regs) == 0xf80); 17582517617eSMichael Neuling if (hv) 1759b14b6260SMichael Ellerman value = mfspr(SPRN_HFSCR); 17602517617eSMichael Neuling else 17612517617eSMichael Neuling value = mfspr(SPRN_FSCR); 17622517617eSMichael Neuling 17632517617eSMichael Neuling status = value >> 56; 1764709b973cSAnshuman Khandual if ((hv || status >= 2) && 1765709b973cSAnshuman Khandual (status < ARRAY_SIZE(facility_strings)) && 1766709b973cSAnshuman Khandual facility_strings[status]) 1767709b973cSAnshuman Khandual facility = facility_strings[status]; 1768709b973cSAnshuman Khandual 1769709b973cSAnshuman Khandual /* We should not have taken this interrupt in kernel */ 1770709b973cSAnshuman Khandual if (!user_mode(regs)) { 1771709b973cSAnshuman Khandual pr_emerg("Facility '%s' unavailable (%d) exception in kernel mode at %lx\n", 1772709b973cSAnshuman Khandual facility, status, regs->nip); 1773709b973cSAnshuman Khandual die("Unexpected facility unavailable exception", regs, SIGABRT); 1774709b973cSAnshuman Khandual } 1775709b973cSAnshuman Khandual 1776709b973cSAnshuman Khandual /* We restore the interrupt state now */ 1777709b973cSAnshuman Khandual if (!arch_irq_disabled_regs(regs)) 1778709b973cSAnshuman Khandual local_irq_enable(); 1779709b973cSAnshuman Khandual 17802517617eSMichael Neuling if (status == FSCR_DSCR_LG) { 1781c952c1c4SAnshuman Khandual /* 1782c952c1c4SAnshuman Khandual * User is accessing the DSCR register using the problem 1783c952c1c4SAnshuman Khandual * state only SPR number (0x03) either through a mfspr or 1784c952c1c4SAnshuman Khandual * a mtspr instruction. If it is a write attempt through 1785c952c1c4SAnshuman Khandual * a mtspr, then we set the inherit bit. This also allows 1786c952c1c4SAnshuman Khandual * the user to write or read the register directly in the 1787c952c1c4SAnshuman Khandual * future by setting via the FSCR DSCR bit. But in case it 1788c952c1c4SAnshuman Khandual * is a read DSCR attempt through a mfspr instruction, we 1789c952c1c4SAnshuman Khandual * just emulate the instruction instead. This code path will 1790c952c1c4SAnshuman Khandual * always emulate all the mfspr instructions till the user 1791c952c1c4SAnshuman Khandual * has attempted at least one mtspr instruction. This way it 1792c952c1c4SAnshuman Khandual * preserves the same behaviour when the user is accessing 1793c952c1c4SAnshuman Khandual * the DSCR through privilege level only SPR number (0x11) 1794c952c1c4SAnshuman Khandual * which is emulated through illegal instruction exception. 1795c952c1c4SAnshuman Khandual * We always leave HFSCR DSCR set. 17962517617eSMichael Neuling */ 1797c952c1c4SAnshuman Khandual if (get_user(instword, (u32 __user *)(regs->nip))) { 1798c952c1c4SAnshuman Khandual pr_err("Failed to fetch the user instruction\n"); 1799c952c1c4SAnshuman Khandual return; 1800c952c1c4SAnshuman Khandual } 1801c952c1c4SAnshuman Khandual 1802c952c1c4SAnshuman Khandual /* Write into DSCR (mtspr 0x03, RS) */ 1803c952c1c4SAnshuman Khandual if ((instword & PPC_INST_MTSPR_DSCR_USER_MASK) 1804c952c1c4SAnshuman Khandual == PPC_INST_MTSPR_DSCR_USER) { 1805c952c1c4SAnshuman Khandual rd = (instword >> 21) & 0x1f; 1806c952c1c4SAnshuman Khandual current->thread.dscr = regs->gpr[rd]; 18072517617eSMichael Neuling current->thread.dscr_inherit = 1; 1808b57bd2deSMichael Neuling current->thread.fscr |= FSCR_DSCR; 1809b57bd2deSMichael Neuling mtspr(SPRN_FSCR, current->thread.fscr); 1810c952c1c4SAnshuman Khandual } 1811c952c1c4SAnshuman Khandual 1812c952c1c4SAnshuman Khandual /* Read from DSCR (mfspr RT, 0x03) */ 1813c952c1c4SAnshuman Khandual if ((instword & PPC_INST_MFSPR_DSCR_USER_MASK) 1814c952c1c4SAnshuman Khandual == PPC_INST_MFSPR_DSCR_USER) { 1815c952c1c4SAnshuman Khandual if (emulate_instruction(regs)) { 1816c952c1c4SAnshuman Khandual pr_err("DSCR based mfspr emulation failed\n"); 1817c952c1c4SAnshuman Khandual return; 1818c952c1c4SAnshuman Khandual } 1819c952c1c4SAnshuman Khandual regs->nip += 4; 1820c952c1c4SAnshuman Khandual emulate_single_step(regs); 1821c952c1c4SAnshuman Khandual } 18222517617eSMichael Neuling return; 1823b14b6260SMichael Ellerman } 1824b14b6260SMichael Ellerman 1825172f7aaaSCyril Bur if (status == FSCR_TM_LG) { 1826172f7aaaSCyril Bur /* 1827172f7aaaSCyril Bur * If we're here then the hardware is TM aware because it 1828172f7aaaSCyril Bur * generated an exception with FSRM_TM set. 1829172f7aaaSCyril Bur * 1830172f7aaaSCyril Bur * If cpu_has_feature(CPU_FTR_TM) is false, then either firmware 1831172f7aaaSCyril Bur * told us not to do TM, or the kernel is not built with TM 1832172f7aaaSCyril Bur * support. 1833172f7aaaSCyril Bur * 1834172f7aaaSCyril Bur * If both of those things are true, then userspace can spam the 1835172f7aaaSCyril Bur * console by triggering the printk() below just by continually 1836172f7aaaSCyril Bur * doing tbegin (or any TM instruction). So in that case just 1837172f7aaaSCyril Bur * send the process a SIGILL immediately. 1838172f7aaaSCyril Bur */ 1839172f7aaaSCyril Bur if (!cpu_has_feature(CPU_FTR_TM)) 1840172f7aaaSCyril Bur goto out; 1841172f7aaaSCyril Bur 1842172f7aaaSCyril Bur tm_unavailable(regs); 1843172f7aaaSCyril Bur return; 1844172f7aaaSCyril Bur } 1845172f7aaaSCyril Bur 184693c2ec0fSBalbir Singh pr_err_ratelimited("%sFacility '%s' unavailable (%d), exception at 0x%lx, MSR=%lx\n", 184793c2ec0fSBalbir Singh hv ? "Hypervisor " : "", facility, status, regs->nip, regs->msr); 1848d0c0c9a1SMichael Neuling 1849172f7aaaSCyril Bur out: 1850d0c0c9a1SMichael Neuling _exception(SIGILL, regs, ILL_ILLOPC, regs->nip); 1851d0c0c9a1SMichael Neuling } 18522517617eSMichael Neuling #endif 1853d0c0c9a1SMichael Neuling 1854f54db641SMichael Neuling #ifdef CONFIG_PPC_TRANSACTIONAL_MEM 1855f54db641SMichael Neuling 1856f54db641SMichael Neuling void fp_unavailable_tm(struct pt_regs *regs) 1857f54db641SMichael Neuling { 1858f54db641SMichael Neuling /* Note: This does not handle any kind of FP laziness. */ 1859f54db641SMichael Neuling 1860f54db641SMichael Neuling TM_DEBUG("FP Unavailable trap whilst transactional at 0x%lx, MSR=%lx\n", 1861f54db641SMichael Neuling regs->nip, regs->msr); 1862f54db641SMichael Neuling 1863f54db641SMichael Neuling /* We can only have got here if the task started using FP after 1864f54db641SMichael Neuling * beginning the transaction. So, the transactional regs are just a 1865f54db641SMichael Neuling * copy of the checkpointed ones. But, we still need to recheckpoint 1866f54db641SMichael Neuling * as we're enabling FP for the process; it will return, abort the 1867f54db641SMichael Neuling * transaction, and probably retry but now with FP enabled. So the 1868f54db641SMichael Neuling * checkpointed FP registers need to be loaded. 1869f54db641SMichael Neuling */ 1870d31626f7SPaul Mackerras tm_reclaim_current(TM_CAUSE_FAC_UNAV); 187196695563SBreno Leitao 187296695563SBreno Leitao /* 187396695563SBreno Leitao * Reclaim initially saved out bogus (lazy) FPRs to ckfp_state, and 187496695563SBreno Leitao * then it was overwrite by the thr->fp_state by tm_reclaim_thread(). 187596695563SBreno Leitao * 187696695563SBreno Leitao * At this point, ck{fp,vr}_state contains the exact values we want to 187796695563SBreno Leitao * recheckpoint. 187896695563SBreno Leitao */ 1879f54db641SMichael Neuling 1880f54db641SMichael Neuling /* Enable FP for the task: */ 1881a7771176SCyril Bur current->thread.load_fp = 1; 1882f54db641SMichael Neuling 188396695563SBreno Leitao /* 188496695563SBreno Leitao * Recheckpoint all the checkpointed ckpt, ck{fp, vr}_state registers. 1885f54db641SMichael Neuling */ 1886eb5c3f1cSCyril Bur tm_recheckpoint(¤t->thread); 1887f54db641SMichael Neuling } 1888f54db641SMichael Neuling 1889f54db641SMichael Neuling void altivec_unavailable_tm(struct pt_regs *regs) 1890f54db641SMichael Neuling { 1891f54db641SMichael Neuling /* See the comments in fp_unavailable_tm(). This function operates 1892f54db641SMichael Neuling * the same way. 1893f54db641SMichael Neuling */ 1894f54db641SMichael Neuling 1895f54db641SMichael Neuling TM_DEBUG("Vector Unavailable trap whilst transactional at 0x%lx," 1896f54db641SMichael Neuling "MSR=%lx\n", 1897f54db641SMichael Neuling regs->nip, regs->msr); 1898d31626f7SPaul Mackerras tm_reclaim_current(TM_CAUSE_FAC_UNAV); 1899a7771176SCyril Bur current->thread.load_vec = 1; 1900eb5c3f1cSCyril Bur tm_recheckpoint(¤t->thread); 1901f54db641SMichael Neuling current->thread.used_vr = 1; 19023ac8ff1cSPaul Mackerras } 19033ac8ff1cSPaul Mackerras 1904f54db641SMichael Neuling void vsx_unavailable_tm(struct pt_regs *regs) 1905f54db641SMichael Neuling { 1906f54db641SMichael Neuling /* See the comments in fp_unavailable_tm(). This works similarly, 1907f54db641SMichael Neuling * though we're loading both FP and VEC registers in here. 1908f54db641SMichael Neuling * 1909f54db641SMichael Neuling * If FP isn't in use, load FP regs. If VEC isn't in use, load VEC 1910f54db641SMichael Neuling * regs. Either way, set MSR_VSX. 1911f54db641SMichael Neuling */ 1912f54db641SMichael Neuling 1913f54db641SMichael Neuling TM_DEBUG("VSX Unavailable trap whilst transactional at 0x%lx," 1914f54db641SMichael Neuling "MSR=%lx\n", 1915f54db641SMichael Neuling regs->nip, regs->msr); 1916f54db641SMichael Neuling 19173ac8ff1cSPaul Mackerras current->thread.used_vsr = 1; 19183ac8ff1cSPaul Mackerras 1919f54db641SMichael Neuling /* This reclaims FP and/or VR regs if they're already enabled */ 1920d31626f7SPaul Mackerras tm_reclaim_current(TM_CAUSE_FAC_UNAV); 1921f54db641SMichael Neuling 1922a7771176SCyril Bur current->thread.load_vec = 1; 1923a7771176SCyril Bur current->thread.load_fp = 1; 19243ac8ff1cSPaul Mackerras 1925eb5c3f1cSCyril Bur tm_recheckpoint(¤t->thread); 1926f54db641SMichael Neuling } 1927f54db641SMichael Neuling #endif /* CONFIG_PPC_TRANSACTIONAL_MEM */ 1928f54db641SMichael Neuling 1929156b5371SNicholas Piggin static void performance_monitor_exception_nmi(struct pt_regs *regs) 1930dc1c1ca3SStephen Rothwell { 1931156b5371SNicholas Piggin nmi_enter(); 1932156b5371SNicholas Piggin 193369111bacSChristoph Lameter __this_cpu_inc(irq_stat.pmu_irqs); 193489713ed1SAnton Blanchard 1935dc1c1ca3SStephen Rothwell perf_irq(regs); 1936156b5371SNicholas Piggin 1937156b5371SNicholas Piggin nmi_exit(); 1938156b5371SNicholas Piggin } 1939156b5371SNicholas Piggin 1940156b5371SNicholas Piggin static void performance_monitor_exception_async(struct pt_regs *regs) 1941156b5371SNicholas Piggin { 1942156b5371SNicholas Piggin irq_enter(); 1943156b5371SNicholas Piggin 1944156b5371SNicholas Piggin __this_cpu_inc(irq_stat.pmu_irqs); 1945156b5371SNicholas Piggin 1946156b5371SNicholas Piggin perf_irq(regs); 1947156b5371SNicholas Piggin 1948156b5371SNicholas Piggin irq_exit(); 1949156b5371SNicholas Piggin } 1950156b5371SNicholas Piggin 1951156b5371SNicholas Piggin void performance_monitor_exception(struct pt_regs *regs) 1952156b5371SNicholas Piggin { 1953156b5371SNicholas Piggin /* 1954156b5371SNicholas Piggin * On 64-bit, if perf interrupts hit in a local_irq_disable 1955156b5371SNicholas Piggin * (soft-masked) region, we consider them as NMIs. This is required to 1956156b5371SNicholas Piggin * prevent hash faults on user addresses when reading callchains (and 1957156b5371SNicholas Piggin * looks better from an irq tracing perspective). 1958156b5371SNicholas Piggin */ 1959156b5371SNicholas Piggin if (IS_ENABLED(CONFIG_PPC64) && unlikely(arch_irq_disabled_regs(regs))) 1960156b5371SNicholas Piggin performance_monitor_exception_nmi(regs); 1961156b5371SNicholas Piggin else 1962156b5371SNicholas Piggin performance_monitor_exception_async(regs); 1963dc1c1ca3SStephen Rothwell } 1964dc1c1ca3SStephen Rothwell 1965172ae2e7SDave Kleikamp #ifdef CONFIG_PPC_ADV_DEBUG_REGS 19663bffb652SDave Kleikamp static void handle_debug(struct pt_regs *regs, unsigned long debug_status) 19673bffb652SDave Kleikamp { 19683bffb652SDave Kleikamp int changed = 0; 19693bffb652SDave Kleikamp /* 19703bffb652SDave Kleikamp * Determine the cause of the debug event, clear the 19713bffb652SDave Kleikamp * event flags and send a trap to the handler. Torez 19723bffb652SDave Kleikamp */ 19733bffb652SDave Kleikamp if (debug_status & (DBSR_DAC1R | DBSR_DAC1W)) { 19743bffb652SDave Kleikamp dbcr_dac(current) &= ~(DBCR_DAC1R | DBCR_DAC1W); 19753bffb652SDave Kleikamp #ifdef CONFIG_PPC_ADV_DEBUG_DAC_RANGE 197651ae8d4aSBharat Bhushan current->thread.debug.dbcr2 &= ~DBCR2_DAC12MODE; 19773bffb652SDave Kleikamp #endif 197847355040SEric W. Biederman do_send_trap(regs, mfspr(SPRN_DAC1), debug_status, 19793bffb652SDave Kleikamp 5); 19803bffb652SDave Kleikamp changed |= 0x01; 19813bffb652SDave Kleikamp } else if (debug_status & (DBSR_DAC2R | DBSR_DAC2W)) { 19823bffb652SDave Kleikamp dbcr_dac(current) &= ~(DBCR_DAC2R | DBCR_DAC2W); 198347355040SEric W. Biederman do_send_trap(regs, mfspr(SPRN_DAC2), debug_status, 19843bffb652SDave Kleikamp 6); 19853bffb652SDave Kleikamp changed |= 0x01; 19863bffb652SDave Kleikamp } else if (debug_status & DBSR_IAC1) { 198751ae8d4aSBharat Bhushan current->thread.debug.dbcr0 &= ~DBCR0_IAC1; 19883bffb652SDave Kleikamp dbcr_iac_range(current) &= ~DBCR_IAC12MODE; 198947355040SEric W. Biederman do_send_trap(regs, mfspr(SPRN_IAC1), debug_status, 19903bffb652SDave Kleikamp 1); 19913bffb652SDave Kleikamp changed |= 0x01; 19923bffb652SDave Kleikamp } else if (debug_status & DBSR_IAC2) { 199351ae8d4aSBharat Bhushan current->thread.debug.dbcr0 &= ~DBCR0_IAC2; 199447355040SEric W. Biederman do_send_trap(regs, mfspr(SPRN_IAC2), debug_status, 19953bffb652SDave Kleikamp 2); 19963bffb652SDave Kleikamp changed |= 0x01; 19973bffb652SDave Kleikamp } else if (debug_status & DBSR_IAC3) { 199851ae8d4aSBharat Bhushan current->thread.debug.dbcr0 &= ~DBCR0_IAC3; 19993bffb652SDave Kleikamp dbcr_iac_range(current) &= ~DBCR_IAC34MODE; 200047355040SEric W. Biederman do_send_trap(regs, mfspr(SPRN_IAC3), debug_status, 20013bffb652SDave Kleikamp 3); 20023bffb652SDave Kleikamp changed |= 0x01; 20033bffb652SDave Kleikamp } else if (debug_status & DBSR_IAC4) { 200451ae8d4aSBharat Bhushan current->thread.debug.dbcr0 &= ~DBCR0_IAC4; 200547355040SEric W. Biederman do_send_trap(regs, mfspr(SPRN_IAC4), debug_status, 20063bffb652SDave Kleikamp 4); 20073bffb652SDave Kleikamp changed |= 0x01; 20083bffb652SDave Kleikamp } 20093bffb652SDave Kleikamp /* 20103bffb652SDave Kleikamp * At the point this routine was called, the MSR(DE) was turned off. 20113bffb652SDave Kleikamp * Check all other debug flags and see if that bit needs to be turned 20123bffb652SDave Kleikamp * back on or not. 20133bffb652SDave Kleikamp */ 201451ae8d4aSBharat Bhushan if (DBCR_ACTIVE_EVENTS(current->thread.debug.dbcr0, 201551ae8d4aSBharat Bhushan current->thread.debug.dbcr1)) 20163bffb652SDave Kleikamp regs->msr |= MSR_DE; 20173bffb652SDave Kleikamp else 20183bffb652SDave Kleikamp /* Make sure the IDM flag is off */ 201951ae8d4aSBharat Bhushan current->thread.debug.dbcr0 &= ~DBCR0_IDM; 20203bffb652SDave Kleikamp 20213bffb652SDave Kleikamp if (changed & 0x01) 202251ae8d4aSBharat Bhushan mtspr(SPRN_DBCR0, current->thread.debug.dbcr0); 20233bffb652SDave Kleikamp } 202414cf11afSPaul Mackerras 2025755d6641SNicholas Piggin void DebugException(struct pt_regs *regs) 202614cf11afSPaul Mackerras { 2027755d6641SNicholas Piggin unsigned long debug_status = regs->dsisr; 2028755d6641SNicholas Piggin 202951ae8d4aSBharat Bhushan current->thread.debug.dbsr = debug_status; 20303bffb652SDave Kleikamp 2031ec097c84SRoland McGrath /* Hack alert: On BookE, Branch Taken stops on the branch itself, while 2032ec097c84SRoland McGrath * on server, it stops on the target of the branch. In order to simulate 2033ec097c84SRoland McGrath * the server behaviour, we thus restart right away with a single step 2034ec097c84SRoland McGrath * instead of stopping here when hitting a BT 2035ec097c84SRoland McGrath */ 2036ec097c84SRoland McGrath if (debug_status & DBSR_BT) { 2037ec097c84SRoland McGrath regs->msr &= ~MSR_DE; 2038ec097c84SRoland McGrath 2039ec097c84SRoland McGrath /* Disable BT */ 2040ec097c84SRoland McGrath mtspr(SPRN_DBCR0, mfspr(SPRN_DBCR0) & ~DBCR0_BT); 2041ec097c84SRoland McGrath /* Clear the BT event */ 2042ec097c84SRoland McGrath mtspr(SPRN_DBSR, DBSR_BT); 2043ec097c84SRoland McGrath 2044ec097c84SRoland McGrath /* Do the single step trick only when coming from userspace */ 2045ec097c84SRoland McGrath if (user_mode(regs)) { 204651ae8d4aSBharat Bhushan current->thread.debug.dbcr0 &= ~DBCR0_BT; 204751ae8d4aSBharat Bhushan current->thread.debug.dbcr0 |= DBCR0_IDM | DBCR0_IC; 2048ec097c84SRoland McGrath regs->msr |= MSR_DE; 2049ec097c84SRoland McGrath return; 2050ec097c84SRoland McGrath } 2051ec097c84SRoland McGrath 20526cc89badSNaveen N. Rao if (kprobe_post_handler(regs)) 20536cc89badSNaveen N. Rao return; 20546cc89badSNaveen N. Rao 2055ec097c84SRoland McGrath if (notify_die(DIE_SSTEP, "block_step", regs, 5, 2056ec097c84SRoland McGrath 5, SIGTRAP) == NOTIFY_STOP) { 2057ec097c84SRoland McGrath return; 2058ec097c84SRoland McGrath } 2059ec097c84SRoland McGrath if (debugger_sstep(regs)) 2060ec097c84SRoland McGrath return; 2061ec097c84SRoland McGrath } else if (debug_status & DBSR_IC) { /* Instruction complete */ 206214cf11afSPaul Mackerras regs->msr &= ~MSR_DE; 2063f8279621SKumar Gala 206414cf11afSPaul Mackerras /* Disable instruction completion */ 206514cf11afSPaul Mackerras mtspr(SPRN_DBCR0, mfspr(SPRN_DBCR0) & ~DBCR0_IC); 206614cf11afSPaul Mackerras /* Clear the instruction completion event */ 206714cf11afSPaul Mackerras mtspr(SPRN_DBSR, DBSR_IC); 2068f8279621SKumar Gala 20696cc89badSNaveen N. Rao if (kprobe_post_handler(regs)) 20706cc89badSNaveen N. Rao return; 20716cc89badSNaveen N. Rao 2072f8279621SKumar Gala if (notify_die(DIE_SSTEP, "single_step", regs, 5, 2073f8279621SKumar Gala 5, SIGTRAP) == NOTIFY_STOP) { 207414cf11afSPaul Mackerras return; 207514cf11afSPaul Mackerras } 2076f8279621SKumar Gala 2077f8279621SKumar Gala if (debugger_sstep(regs)) 2078f8279621SKumar Gala return; 2079f8279621SKumar Gala 20803bffb652SDave Kleikamp if (user_mode(regs)) { 208151ae8d4aSBharat Bhushan current->thread.debug.dbcr0 &= ~DBCR0_IC; 208251ae8d4aSBharat Bhushan if (DBCR_ACTIVE_EVENTS(current->thread.debug.dbcr0, 208351ae8d4aSBharat Bhushan current->thread.debug.dbcr1)) 20843bffb652SDave Kleikamp regs->msr |= MSR_DE; 20853bffb652SDave Kleikamp else 20863bffb652SDave Kleikamp /* Make sure the IDM bit is off */ 208751ae8d4aSBharat Bhushan current->thread.debug.dbcr0 &= ~DBCR0_IDM; 20883bffb652SDave Kleikamp } 2089f8279621SKumar Gala 2090f8279621SKumar Gala _exception(SIGTRAP, regs, TRAP_TRACE, regs->nip); 20913bffb652SDave Kleikamp } else 20923bffb652SDave Kleikamp handle_debug(regs, debug_status); 209314cf11afSPaul Mackerras } 209403465f89SNicholas Piggin NOKPROBE_SYMBOL(DebugException); 2095172ae2e7SDave Kleikamp #endif /* CONFIG_PPC_ADV_DEBUG_REGS */ 209614cf11afSPaul Mackerras 209714cf11afSPaul Mackerras #ifdef CONFIG_ALTIVEC 2098dc1c1ca3SStephen Rothwell void altivec_assist_exception(struct pt_regs *regs) 209914cf11afSPaul Mackerras { 210014cf11afSPaul Mackerras int err; 210114cf11afSPaul Mackerras 210214cf11afSPaul Mackerras if (!user_mode(regs)) { 210314cf11afSPaul Mackerras printk(KERN_EMERG "VMX/Altivec assist exception in kernel mode" 210414cf11afSPaul Mackerras " at %lx\n", regs->nip); 21058dad3f92SPaul Mackerras die("Kernel VMX/Altivec assist exception", regs, SIGILL); 210614cf11afSPaul Mackerras } 210714cf11afSPaul Mackerras 2108dc1c1ca3SStephen Rothwell flush_altivec_to_thread(current); 2109dc1c1ca3SStephen Rothwell 2110eecff81dSAnton Blanchard PPC_WARN_EMULATED(altivec, regs); 211114cf11afSPaul Mackerras err = emulate_altivec(regs); 211214cf11afSPaul Mackerras if (err == 0) { 211314cf11afSPaul Mackerras regs->nip += 4; /* skip emulated instruction */ 211414cf11afSPaul Mackerras emulate_single_step(regs); 211514cf11afSPaul Mackerras return; 211614cf11afSPaul Mackerras } 211714cf11afSPaul Mackerras 211814cf11afSPaul Mackerras if (err == -EFAULT) { 211914cf11afSPaul Mackerras /* got an error reading the instruction */ 212014cf11afSPaul Mackerras _exception(SIGSEGV, regs, SEGV_ACCERR, regs->nip); 212114cf11afSPaul Mackerras } else { 212214cf11afSPaul Mackerras /* didn't recognize the instruction */ 212314cf11afSPaul Mackerras /* XXX quick hack for now: set the non-Java bit in the VSCR */ 212476462232SChristian Dietrich printk_ratelimited(KERN_ERR "Unrecognized altivec instruction " 212514cf11afSPaul Mackerras "in %s at %lx\n", current->comm, regs->nip); 2126de79f7b9SPaul Mackerras current->thread.vr_state.vscr.u[3] |= 0x10000; 212714cf11afSPaul Mackerras } 212814cf11afSPaul Mackerras } 212914cf11afSPaul Mackerras #endif /* CONFIG_ALTIVEC */ 213014cf11afSPaul Mackerras 213114cf11afSPaul Mackerras #ifdef CONFIG_FSL_BOOKE 2132b4ced803SNicholas Piggin void CacheLockingException(struct pt_regs *regs) 213314cf11afSPaul Mackerras { 2134b4ced803SNicholas Piggin unsigned long error_code = regs->dsisr; 2135b4ced803SNicholas Piggin 213614cf11afSPaul Mackerras /* We treat cache locking instructions from the user 213714cf11afSPaul Mackerras * as priv ops, in the future we could try to do 213814cf11afSPaul Mackerras * something smarter 213914cf11afSPaul Mackerras */ 214014cf11afSPaul Mackerras if (error_code & (ESR_DLK|ESR_ILK)) 214114cf11afSPaul Mackerras _exception(SIGILL, regs, ILL_PRVOPC, regs->nip); 214214cf11afSPaul Mackerras return; 214314cf11afSPaul Mackerras } 214414cf11afSPaul Mackerras #endif /* CONFIG_FSL_BOOKE */ 214514cf11afSPaul Mackerras 214614cf11afSPaul Mackerras #ifdef CONFIG_SPE 214714cf11afSPaul Mackerras void SPEFloatingPointException(struct pt_regs *regs) 214814cf11afSPaul Mackerras { 21496a800f36SLiu Yu extern int do_spe_mathemu(struct pt_regs *regs); 215014cf11afSPaul Mackerras unsigned long spefscr; 215114cf11afSPaul Mackerras int fpexc_mode; 2152aeb1c0f6SEric W. Biederman int code = FPE_FLTUNK; 21536a800f36SLiu Yu int err; 21546a800f36SLiu Yu 2155ef429124SChristophe Leroy /* We restore the interrupt state now */ 2156ef429124SChristophe Leroy if (!arch_irq_disabled_regs(regs)) 2157ef429124SChristophe Leroy local_irq_enable(); 2158ef429124SChristophe Leroy 2159685659eeSyu liu flush_spe_to_thread(current); 216014cf11afSPaul Mackerras 216114cf11afSPaul Mackerras spefscr = current->thread.spefscr; 216214cf11afSPaul Mackerras fpexc_mode = current->thread.fpexc_mode; 216314cf11afSPaul Mackerras 216414cf11afSPaul Mackerras if ((spefscr & SPEFSCR_FOVF) && (fpexc_mode & PR_FP_EXC_OVF)) { 216514cf11afSPaul Mackerras code = FPE_FLTOVF; 216614cf11afSPaul Mackerras } 216714cf11afSPaul Mackerras else if ((spefscr & SPEFSCR_FUNF) && (fpexc_mode & PR_FP_EXC_UND)) { 216814cf11afSPaul Mackerras code = FPE_FLTUND; 216914cf11afSPaul Mackerras } 217014cf11afSPaul Mackerras else if ((spefscr & SPEFSCR_FDBZ) && (fpexc_mode & PR_FP_EXC_DIV)) 217114cf11afSPaul Mackerras code = FPE_FLTDIV; 217214cf11afSPaul Mackerras else if ((spefscr & SPEFSCR_FINV) && (fpexc_mode & PR_FP_EXC_INV)) { 217314cf11afSPaul Mackerras code = FPE_FLTINV; 217414cf11afSPaul Mackerras } 217514cf11afSPaul Mackerras else if ((spefscr & (SPEFSCR_FG | SPEFSCR_FX)) && (fpexc_mode & PR_FP_EXC_RES)) 217614cf11afSPaul Mackerras code = FPE_FLTRES; 217714cf11afSPaul Mackerras 21786a800f36SLiu Yu err = do_spe_mathemu(regs); 21796a800f36SLiu Yu if (err == 0) { 21806a800f36SLiu Yu regs->nip += 4; /* skip emulated instruction */ 21816a800f36SLiu Yu emulate_single_step(regs); 218214cf11afSPaul Mackerras return; 218314cf11afSPaul Mackerras } 21846a800f36SLiu Yu 21856a800f36SLiu Yu if (err == -EFAULT) { 21866a800f36SLiu Yu /* got an error reading the instruction */ 21876a800f36SLiu Yu _exception(SIGSEGV, regs, SEGV_ACCERR, regs->nip); 21886a800f36SLiu Yu } else if (err == -EINVAL) { 21896a800f36SLiu Yu /* didn't recognize the instruction */ 21906a800f36SLiu Yu printk(KERN_ERR "unrecognized spe instruction " 21916a800f36SLiu Yu "in %s at %lx\n", current->comm, regs->nip); 21926a800f36SLiu Yu } else { 21936a800f36SLiu Yu _exception(SIGFPE, regs, code, regs->nip); 21946a800f36SLiu Yu } 21956a800f36SLiu Yu 21966a800f36SLiu Yu return; 21976a800f36SLiu Yu } 21986a800f36SLiu Yu 21996a800f36SLiu Yu void SPEFloatingPointRoundException(struct pt_regs *regs) 22006a800f36SLiu Yu { 22016a800f36SLiu Yu extern int speround_handler(struct pt_regs *regs); 22026a800f36SLiu Yu int err; 22036a800f36SLiu Yu 2204ef429124SChristophe Leroy /* We restore the interrupt state now */ 2205ef429124SChristophe Leroy if (!arch_irq_disabled_regs(regs)) 2206ef429124SChristophe Leroy local_irq_enable(); 2207ef429124SChristophe Leroy 22086a800f36SLiu Yu preempt_disable(); 22096a800f36SLiu Yu if (regs->msr & MSR_SPE) 22106a800f36SLiu Yu giveup_spe(current); 22116a800f36SLiu Yu preempt_enable(); 22126a800f36SLiu Yu 22136a800f36SLiu Yu regs->nip -= 4; 22146a800f36SLiu Yu err = speround_handler(regs); 22156a800f36SLiu Yu if (err == 0) { 22166a800f36SLiu Yu regs->nip += 4; /* skip emulated instruction */ 22176a800f36SLiu Yu emulate_single_step(regs); 22186a800f36SLiu Yu return; 22196a800f36SLiu Yu } 22206a800f36SLiu Yu 22216a800f36SLiu Yu if (err == -EFAULT) { 22226a800f36SLiu Yu /* got an error reading the instruction */ 22236a800f36SLiu Yu _exception(SIGSEGV, regs, SEGV_ACCERR, regs->nip); 22246a800f36SLiu Yu } else if (err == -EINVAL) { 22256a800f36SLiu Yu /* didn't recognize the instruction */ 22266a800f36SLiu Yu printk(KERN_ERR "unrecognized spe instruction " 22276a800f36SLiu Yu "in %s at %lx\n", current->comm, regs->nip); 22286a800f36SLiu Yu } else { 2229aeb1c0f6SEric W. Biederman _exception(SIGFPE, regs, FPE_FLTUNK, regs->nip); 22306a800f36SLiu Yu return; 22316a800f36SLiu Yu } 22326a800f36SLiu Yu } 223314cf11afSPaul Mackerras #endif 223414cf11afSPaul Mackerras 2235dc1c1ca3SStephen Rothwell /* 2236dc1c1ca3SStephen Rothwell * We enter here if we get an unrecoverable exception, that is, one 2237dc1c1ca3SStephen Rothwell * that happened at a point where the RI (recoverable interrupt) bit 2238dc1c1ca3SStephen Rothwell * in the MSR is 0. This indicates that SRR0/1 are live, and that 2239dc1c1ca3SStephen Rothwell * we therefore lost state by taking this exception. 2240dc1c1ca3SStephen Rothwell */ 2241dc1c1ca3SStephen Rothwell void unrecoverable_exception(struct pt_regs *regs) 2242dc1c1ca3SStephen Rothwell { 224351423a9cSChristophe Leroy pr_emerg("Unrecoverable exception %lx at %lx (msr=%lx)\n", 224451423a9cSChristophe Leroy regs->trap, regs->nip, regs->msr); 2245dc1c1ca3SStephen Rothwell die("Unrecoverable exception", regs, SIGABRT); 2246dc1c1ca3SStephen Rothwell } 224715770a13SNaveen N. Rao NOKPROBE_SYMBOL(unrecoverable_exception); 2248dc1c1ca3SStephen Rothwell 22491e18c17aSJason Gunthorpe #if defined(CONFIG_BOOKE_WDT) || defined(CONFIG_40x) 225014cf11afSPaul Mackerras /* 225114cf11afSPaul Mackerras * Default handler for a Watchdog exception, 225214cf11afSPaul Mackerras * spins until a reboot occurs 225314cf11afSPaul Mackerras */ 225414cf11afSPaul Mackerras void __attribute__ ((weak)) WatchdogHandler(struct pt_regs *regs) 225514cf11afSPaul Mackerras { 225614cf11afSPaul Mackerras /* Generic WatchdogHandler, implement your own */ 225714cf11afSPaul Mackerras mtspr(SPRN_TCR, mfspr(SPRN_TCR)&(~TCR_WIE)); 225814cf11afSPaul Mackerras return; 225914cf11afSPaul Mackerras } 226014cf11afSPaul Mackerras 226114cf11afSPaul Mackerras void WatchdogException(struct pt_regs *regs) 226214cf11afSPaul Mackerras { 226314cf11afSPaul Mackerras printk (KERN_EMERG "PowerPC Book-E Watchdog Exception\n"); 226414cf11afSPaul Mackerras WatchdogHandler(regs); 226514cf11afSPaul Mackerras } 226614cf11afSPaul Mackerras #endif 2267dc1c1ca3SStephen Rothwell 2268dc1c1ca3SStephen Rothwell /* 2269dc1c1ca3SStephen Rothwell * We enter here if we discover during exception entry that we are 2270dc1c1ca3SStephen Rothwell * running in supervisor mode with a userspace value in the stack pointer. 2271dc1c1ca3SStephen Rothwell */ 2272dc1c1ca3SStephen Rothwell void kernel_bad_stack(struct pt_regs *regs) 2273dc1c1ca3SStephen Rothwell { 2274dc1c1ca3SStephen Rothwell printk(KERN_EMERG "Bad kernel stack pointer %lx at %lx\n", 2275dc1c1ca3SStephen Rothwell regs->gpr[1], regs->nip); 2276dc1c1ca3SStephen Rothwell die("Bad kernel stack pointer", regs, SIGABRT); 2277dc1c1ca3SStephen Rothwell } 227815770a13SNaveen N. Rao NOKPROBE_SYMBOL(kernel_bad_stack); 227914cf11afSPaul Mackerras 228014cf11afSPaul Mackerras void __init trap_init(void) 228114cf11afSPaul Mackerras { 228214cf11afSPaul Mackerras } 228380947e7cSGeert Uytterhoeven 228480947e7cSGeert Uytterhoeven 228580947e7cSGeert Uytterhoeven #ifdef CONFIG_PPC_EMULATED_STATS 228680947e7cSGeert Uytterhoeven 228780947e7cSGeert Uytterhoeven #define WARN_EMULATED_SETUP(type) .type = { .name = #type } 228880947e7cSGeert Uytterhoeven 228980947e7cSGeert Uytterhoeven struct ppc_emulated ppc_emulated = { 229080947e7cSGeert Uytterhoeven #ifdef CONFIG_ALTIVEC 229180947e7cSGeert Uytterhoeven WARN_EMULATED_SETUP(altivec), 229280947e7cSGeert Uytterhoeven #endif 229380947e7cSGeert Uytterhoeven WARN_EMULATED_SETUP(dcba), 229480947e7cSGeert Uytterhoeven WARN_EMULATED_SETUP(dcbz), 229580947e7cSGeert Uytterhoeven WARN_EMULATED_SETUP(fp_pair), 229680947e7cSGeert Uytterhoeven WARN_EMULATED_SETUP(isel), 229780947e7cSGeert Uytterhoeven WARN_EMULATED_SETUP(mcrxr), 229880947e7cSGeert Uytterhoeven WARN_EMULATED_SETUP(mfpvr), 229980947e7cSGeert Uytterhoeven WARN_EMULATED_SETUP(multiple), 230080947e7cSGeert Uytterhoeven WARN_EMULATED_SETUP(popcntb), 230180947e7cSGeert Uytterhoeven WARN_EMULATED_SETUP(spe), 230280947e7cSGeert Uytterhoeven WARN_EMULATED_SETUP(string), 2303a3821b2aSScott Wood WARN_EMULATED_SETUP(sync), 230480947e7cSGeert Uytterhoeven WARN_EMULATED_SETUP(unaligned), 230580947e7cSGeert Uytterhoeven #ifdef CONFIG_MATH_EMULATION 230680947e7cSGeert Uytterhoeven WARN_EMULATED_SETUP(math), 230780947e7cSGeert Uytterhoeven #endif 230880947e7cSGeert Uytterhoeven #ifdef CONFIG_VSX 230980947e7cSGeert Uytterhoeven WARN_EMULATED_SETUP(vsx), 231080947e7cSGeert Uytterhoeven #endif 2311efcac658SAlexey Kardashevskiy #ifdef CONFIG_PPC64 2312efcac658SAlexey Kardashevskiy WARN_EMULATED_SETUP(mfdscr), 2313efcac658SAlexey Kardashevskiy WARN_EMULATED_SETUP(mtdscr), 2314f83319d7SAnton Blanchard WARN_EMULATED_SETUP(lq_stq), 23155080332cSMichael Neuling WARN_EMULATED_SETUP(lxvw4x), 23165080332cSMichael Neuling WARN_EMULATED_SETUP(lxvh8x), 23175080332cSMichael Neuling WARN_EMULATED_SETUP(lxvd2x), 23185080332cSMichael Neuling WARN_EMULATED_SETUP(lxvb16x), 2319efcac658SAlexey Kardashevskiy #endif 232080947e7cSGeert Uytterhoeven }; 232180947e7cSGeert Uytterhoeven 232280947e7cSGeert Uytterhoeven u32 ppc_warn_emulated; 232380947e7cSGeert Uytterhoeven 232480947e7cSGeert Uytterhoeven void ppc_warn_emulated_print(const char *type) 232580947e7cSGeert Uytterhoeven { 232676462232SChristian Dietrich pr_warn_ratelimited("%s used emulated %s instruction\n", current->comm, 232780947e7cSGeert Uytterhoeven type); 232880947e7cSGeert Uytterhoeven } 232980947e7cSGeert Uytterhoeven 233080947e7cSGeert Uytterhoeven static int __init ppc_warn_emulated_init(void) 233180947e7cSGeert Uytterhoeven { 2332860286cfSGreg Kroah-Hartman struct dentry *dir; 233380947e7cSGeert Uytterhoeven unsigned int i; 233480947e7cSGeert Uytterhoeven struct ppc_emulated_entry *entries = (void *)&ppc_emulated; 233580947e7cSGeert Uytterhoeven 233680947e7cSGeert Uytterhoeven dir = debugfs_create_dir("emulated_instructions", 233780947e7cSGeert Uytterhoeven powerpc_debugfs_root); 233880947e7cSGeert Uytterhoeven 2339860286cfSGreg Kroah-Hartman debugfs_create_u32("do_warn", 0644, dir, &ppc_warn_emulated); 234080947e7cSGeert Uytterhoeven 2341860286cfSGreg Kroah-Hartman for (i = 0; i < sizeof(ppc_emulated)/sizeof(*entries); i++) 2342860286cfSGreg Kroah-Hartman debugfs_create_u32(entries[i].name, 0644, dir, 234380947e7cSGeert Uytterhoeven (u32 *)&entries[i].val.counter); 234480947e7cSGeert Uytterhoeven 234580947e7cSGeert Uytterhoeven return 0; 234680947e7cSGeert Uytterhoeven } 234780947e7cSGeert Uytterhoeven 234880947e7cSGeert Uytterhoeven device_initcall(ppc_warn_emulated_init); 234980947e7cSGeert Uytterhoeven 235080947e7cSGeert Uytterhoeven #endif /* CONFIG_PPC_EMULATED_STATS */ 2351