xref: /openbmc/linux/arch/powerpc/kernel/interrupt.c (revision c4f461a1)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 
3 #include <linux/context_tracking.h>
4 #include <linux/err.h>
5 #include <linux/compat.h>
6 #include <linux/sched/debug.h> /* for show_regs */
7 
8 #include <asm/kup.h>
9 #include <asm/cputime.h>
10 #include <asm/hw_irq.h>
11 #include <asm/interrupt.h>
12 #include <asm/kprobes.h>
13 #include <asm/paca.h>
14 #include <asm/ptrace.h>
15 #include <asm/reg.h>
16 #include <asm/signal.h>
17 #include <asm/switch_to.h>
18 #include <asm/syscall.h>
19 #include <asm/time.h>
20 #include <asm/tm.h>
21 #include <asm/unistd.h>
22 
23 #if defined(CONFIG_PPC_ADV_DEBUG_REGS) && defined(CONFIG_PPC32)
24 unsigned long global_dbcr0[NR_CPUS];
25 #endif
26 
27 #ifdef CONFIG_PPC_BOOK3S_64
28 DEFINE_STATIC_KEY_FALSE(interrupt_exit_not_reentrant);
29 static inline bool exit_must_hard_disable(void)
30 {
31 	return static_branch_unlikely(&interrupt_exit_not_reentrant);
32 }
33 #else
34 static inline bool exit_must_hard_disable(void)
35 {
36 	return true;
37 }
38 #endif
39 
40 /*
41  * local irqs must be disabled. Returns false if the caller must re-enable
42  * them, check for new work, and try again.
43  *
44  * This should be called with local irqs disabled, but if they were previously
45  * enabled when the interrupt handler returns (indicating a process-context /
46  * synchronous interrupt) then irqs_enabled should be true.
47  *
48  * restartable is true then EE/RI can be left on because interrupts are handled
49  * with a restart sequence.
50  */
51 static notrace __always_inline bool prep_irq_for_enabled_exit(bool restartable)
52 {
53 	bool must_hard_disable = (exit_must_hard_disable() || !restartable);
54 
55 	/* This must be done with RI=1 because tracing may touch vmaps */
56 	trace_hardirqs_on();
57 
58 	if (must_hard_disable)
59 		__hard_EE_RI_disable();
60 
61 #ifdef CONFIG_PPC64
62 	/* This pattern matches prep_irq_for_idle */
63 	if (unlikely(lazy_irq_pending_nocheck())) {
64 		if (must_hard_disable) {
65 			local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
66 			__hard_RI_enable();
67 		}
68 		trace_hardirqs_off();
69 
70 		return false;
71 	}
72 #endif
73 	return true;
74 }
75 
76 static notrace void booke_load_dbcr0(void)
77 {
78 #ifdef CONFIG_PPC_ADV_DEBUG_REGS
79 	unsigned long dbcr0 = current->thread.debug.dbcr0;
80 
81 	if (likely(!(dbcr0 & DBCR0_IDM)))
82 		return;
83 
84 	/*
85 	 * Check to see if the dbcr0 register is set up to debug.
86 	 * Use the internal debug mode bit to do this.
87 	 */
88 	mtmsr(mfmsr() & ~MSR_DE);
89 	if (IS_ENABLED(CONFIG_PPC32)) {
90 		isync();
91 		global_dbcr0[smp_processor_id()] = mfspr(SPRN_DBCR0);
92 	}
93 	mtspr(SPRN_DBCR0, dbcr0);
94 	mtspr(SPRN_DBSR, -1);
95 #endif
96 }
97 
98 static notrace void check_return_regs_valid(struct pt_regs *regs)
99 {
100 #ifdef CONFIG_PPC_BOOK3S_64
101 	unsigned long trap, srr0, srr1;
102 	static bool warned;
103 	u8 *validp;
104 	char *h;
105 
106 	if (trap_is_scv(regs))
107 		return;
108 
109 	trap = TRAP(regs);
110 	// EE in HV mode sets HSRRs like 0xea0
111 	if (cpu_has_feature(CPU_FTR_HVMODE) && trap == INTERRUPT_EXTERNAL)
112 		trap = 0xea0;
113 
114 	switch (trap) {
115 	case 0x980:
116 	case INTERRUPT_H_DATA_STORAGE:
117 	case 0xe20:
118 	case 0xe40:
119 	case INTERRUPT_HMI:
120 	case 0xe80:
121 	case 0xea0:
122 	case INTERRUPT_H_FAC_UNAVAIL:
123 	case 0x1200:
124 	case 0x1500:
125 	case 0x1600:
126 	case 0x1800:
127 		validp = &local_paca->hsrr_valid;
128 		if (!*validp)
129 			return;
130 
131 		srr0 = mfspr(SPRN_HSRR0);
132 		srr1 = mfspr(SPRN_HSRR1);
133 		h = "H";
134 
135 		break;
136 	default:
137 		validp = &local_paca->srr_valid;
138 		if (!*validp)
139 			return;
140 
141 		srr0 = mfspr(SPRN_SRR0);
142 		srr1 = mfspr(SPRN_SRR1);
143 		h = "";
144 		break;
145 	}
146 
147 	if (srr0 == regs->nip && srr1 == regs->msr)
148 		return;
149 
150 	/*
151 	 * A NMI / soft-NMI interrupt may have come in after we found
152 	 * srr_valid and before the SRRs are loaded. The interrupt then
153 	 * comes in and clobbers SRRs and clears srr_valid. Then we load
154 	 * the SRRs here and test them above and find they don't match.
155 	 *
156 	 * Test validity again after that, to catch such false positives.
157 	 *
158 	 * This test in general will have some window for false negatives
159 	 * and may not catch and fix all such cases if an NMI comes in
160 	 * later and clobbers SRRs without clearing srr_valid, but hopefully
161 	 * such things will get caught most of the time, statistically
162 	 * enough to be able to get a warning out.
163 	 */
164 	barrier();
165 
166 	if (!*validp)
167 		return;
168 
169 	if (!warned) {
170 		warned = true;
171 		printk("%sSRR0 was: %lx should be: %lx\n", h, srr0, regs->nip);
172 		printk("%sSRR1 was: %lx should be: %lx\n", h, srr1, regs->msr);
173 		show_regs(regs);
174 	}
175 
176 	*validp = 0; /* fixup */
177 #endif
178 }
179 
180 static notrace unsigned long
181 interrupt_exit_user_prepare_main(unsigned long ret, struct pt_regs *regs)
182 {
183 	unsigned long ti_flags;
184 
185 again:
186 	ti_flags = read_thread_flags();
187 	while (unlikely(ti_flags & (_TIF_USER_WORK_MASK & ~_TIF_RESTORE_TM))) {
188 		local_irq_enable();
189 		if (ti_flags & _TIF_NEED_RESCHED) {
190 			schedule();
191 		} else {
192 			/*
193 			 * SIGPENDING must restore signal handler function
194 			 * argument GPRs, and some non-volatiles (e.g., r1).
195 			 * Restore all for now. This could be made lighter.
196 			 */
197 			if (ti_flags & _TIF_SIGPENDING)
198 				ret |= _TIF_RESTOREALL;
199 			do_notify_resume(regs, ti_flags);
200 		}
201 		local_irq_disable();
202 		ti_flags = read_thread_flags();
203 	}
204 
205 	if (IS_ENABLED(CONFIG_PPC_BOOK3S_64) && IS_ENABLED(CONFIG_PPC_FPU)) {
206 		if (IS_ENABLED(CONFIG_PPC_TRANSACTIONAL_MEM) &&
207 				unlikely((ti_flags & _TIF_RESTORE_TM))) {
208 			restore_tm_state(regs);
209 		} else {
210 			unsigned long mathflags = MSR_FP;
211 
212 			if (cpu_has_feature(CPU_FTR_VSX))
213 				mathflags |= MSR_VEC | MSR_VSX;
214 			else if (cpu_has_feature(CPU_FTR_ALTIVEC))
215 				mathflags |= MSR_VEC;
216 
217 			/*
218 			 * If userspace MSR has all available FP bits set,
219 			 * then they are live and no need to restore. If not,
220 			 * it means the regs were given up and restore_math
221 			 * may decide to restore them (to avoid taking an FP
222 			 * fault).
223 			 */
224 			if ((regs->msr & mathflags) != mathflags)
225 				restore_math(regs);
226 		}
227 	}
228 
229 	check_return_regs_valid(regs);
230 
231 	user_enter_irqoff();
232 	if (!prep_irq_for_enabled_exit(true)) {
233 		user_exit_irqoff();
234 		local_irq_enable();
235 		local_irq_disable();
236 		goto again;
237 	}
238 
239 #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
240 	local_paca->tm_scratch = regs->msr;
241 #endif
242 
243 	booke_load_dbcr0();
244 
245 	account_cpu_user_exit();
246 
247 	/* Restore user access locks last */
248 	kuap_user_restore(regs);
249 
250 	return ret;
251 }
252 
253 /*
254  * This should be called after a syscall returns, with r3 the return value
255  * from the syscall. If this function returns non-zero, the system call
256  * exit assembly should additionally load all GPR registers and CTR and XER
257  * from the interrupt frame.
258  *
259  * The function graph tracer can not trace the return side of this function,
260  * because RI=0 and soft mask state is "unreconciled", so it is marked notrace.
261  */
262 notrace unsigned long syscall_exit_prepare(unsigned long r3,
263 					   struct pt_regs *regs,
264 					   long scv)
265 {
266 	unsigned long ti_flags;
267 	unsigned long ret = 0;
268 	bool is_not_scv = !IS_ENABLED(CONFIG_PPC_BOOK3S_64) || !scv;
269 
270 	CT_WARN_ON(ct_state() == CONTEXT_USER);
271 
272 	kuap_assert_locked();
273 
274 	regs->result = r3;
275 
276 	/* Check whether the syscall is issued inside a restartable sequence */
277 	rseq_syscall(regs);
278 
279 	ti_flags = read_thread_flags();
280 
281 	if (unlikely(r3 >= (unsigned long)-MAX_ERRNO) && is_not_scv) {
282 		if (likely(!(ti_flags & (_TIF_NOERROR | _TIF_RESTOREALL)))) {
283 			r3 = -r3;
284 			regs->ccr |= 0x10000000; /* Set SO bit in CR */
285 		}
286 	}
287 
288 	if (unlikely(ti_flags & _TIF_PERSYSCALL_MASK)) {
289 		if (ti_flags & _TIF_RESTOREALL)
290 			ret = _TIF_RESTOREALL;
291 		else
292 			regs->gpr[3] = r3;
293 		clear_bits(_TIF_PERSYSCALL_MASK, &current_thread_info()->flags);
294 	} else {
295 		regs->gpr[3] = r3;
296 	}
297 
298 	if (unlikely(ti_flags & _TIF_SYSCALL_DOTRACE)) {
299 		do_syscall_trace_leave(regs);
300 		ret |= _TIF_RESTOREALL;
301 	}
302 
303 	local_irq_disable();
304 	ret = interrupt_exit_user_prepare_main(ret, regs);
305 
306 #ifdef CONFIG_PPC64
307 	regs->exit_result = ret;
308 #endif
309 
310 	return ret;
311 }
312 
313 #ifdef CONFIG_PPC64
314 notrace unsigned long syscall_exit_restart(unsigned long r3, struct pt_regs *regs)
315 {
316 	/*
317 	 * This is called when detecting a soft-pending interrupt as well as
318 	 * an alternate-return interrupt. So we can't just have the alternate
319 	 * return path clear SRR1[MSR] and set PACA_IRQ_HARD_DIS (unless
320 	 * the soft-pending case were to fix things up as well). RI might be
321 	 * disabled, in which case it gets re-enabled by __hard_irq_disable().
322 	 */
323 	__hard_irq_disable();
324 	local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
325 
326 #ifdef CONFIG_PPC_BOOK3S_64
327 	set_kuap(AMR_KUAP_BLOCKED);
328 #endif
329 
330 	trace_hardirqs_off();
331 	user_exit_irqoff();
332 	account_cpu_user_entry();
333 
334 	BUG_ON(!user_mode(regs));
335 
336 	regs->exit_result = interrupt_exit_user_prepare_main(regs->exit_result, regs);
337 
338 	return regs->exit_result;
339 }
340 #endif
341 
342 notrace unsigned long interrupt_exit_user_prepare(struct pt_regs *regs)
343 {
344 	unsigned long ret;
345 
346 	BUG_ON(regs_is_unrecoverable(regs));
347 	BUG_ON(arch_irq_disabled_regs(regs));
348 	CT_WARN_ON(ct_state() == CONTEXT_USER);
349 
350 	/*
351 	 * We don't need to restore AMR on the way back to userspace for KUAP.
352 	 * AMR can only have been unlocked if we interrupted the kernel.
353 	 */
354 	kuap_assert_locked();
355 
356 	local_irq_disable();
357 
358 	ret = interrupt_exit_user_prepare_main(0, regs);
359 
360 #ifdef CONFIG_PPC64
361 	regs->exit_result = ret;
362 #endif
363 
364 	return ret;
365 }
366 
367 void preempt_schedule_irq(void);
368 
369 notrace unsigned long interrupt_exit_kernel_prepare(struct pt_regs *regs)
370 {
371 	unsigned long flags;
372 	unsigned long ret = 0;
373 	unsigned long kuap;
374 	bool stack_store = read_thread_flags() & _TIF_EMULATE_STACK_STORE;
375 
376 	if (regs_is_unrecoverable(regs))
377 		unrecoverable_exception(regs);
378 	/*
379 	 * CT_WARN_ON comes here via program_check_exception, so avoid
380 	 * recursion.
381 	 *
382 	 * Skip the assertion on PMIs on 64e to work around a problem caused
383 	 * by NMI PMIs incorrectly taking this interrupt return path, it's
384 	 * possible for this to hit after interrupt exit to user switches
385 	 * context to user. See also the comment in the performance monitor
386 	 * handler in exceptions-64e.S
387 	 */
388 	if (!IS_ENABLED(CONFIG_PPC_BOOK3E_64) &&
389 	    TRAP(regs) != INTERRUPT_PROGRAM &&
390 	    TRAP(regs) != INTERRUPT_PERFMON)
391 		CT_WARN_ON(ct_state() == CONTEXT_USER);
392 
393 	kuap = kuap_get_and_assert_locked();
394 
395 	local_irq_save(flags);
396 
397 	if (!arch_irq_disabled_regs(regs)) {
398 		/* Returning to a kernel context with local irqs enabled. */
399 		WARN_ON_ONCE(!(regs->msr & MSR_EE));
400 again:
401 		if (IS_ENABLED(CONFIG_PREEMPT)) {
402 			/* Return to preemptible kernel context */
403 			if (unlikely(read_thread_flags() & _TIF_NEED_RESCHED)) {
404 				if (preempt_count() == 0)
405 					preempt_schedule_irq();
406 			}
407 		}
408 
409 		check_return_regs_valid(regs);
410 
411 		/*
412 		 * Stack store exit can't be restarted because the interrupt
413 		 * stack frame might have been clobbered.
414 		 */
415 		if (!prep_irq_for_enabled_exit(unlikely(stack_store))) {
416 			/*
417 			 * Replay pending soft-masked interrupts now. Don't
418 			 * just local_irq_enabe(); local_irq_disable(); because
419 			 * if we are returning from an asynchronous interrupt
420 			 * here, another one might hit after irqs are enabled,
421 			 * and it would exit via this same path allowing
422 			 * another to fire, and so on unbounded.
423 			 */
424 			hard_irq_disable();
425 			replay_soft_interrupts();
426 			/* Took an interrupt, may have more exit work to do. */
427 			goto again;
428 		}
429 #ifdef CONFIG_PPC64
430 		/*
431 		 * An interrupt may clear MSR[EE] and set this concurrently,
432 		 * but it will be marked pending and the exit will be retried.
433 		 * This leaves a racy window where MSR[EE]=0 and HARD_DIS is
434 		 * clear, until interrupt_exit_kernel_restart() calls
435 		 * hard_irq_disable(), which will set HARD_DIS again.
436 		 */
437 		local_paca->irq_happened &= ~PACA_IRQ_HARD_DIS;
438 
439 	} else {
440 		check_return_regs_valid(regs);
441 
442 		if (unlikely(stack_store))
443 			__hard_EE_RI_disable();
444 #endif /* CONFIG_PPC64 */
445 	}
446 
447 	if (unlikely(stack_store)) {
448 		clear_bits(_TIF_EMULATE_STACK_STORE, &current_thread_info()->flags);
449 		ret = 1;
450 	}
451 
452 #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
453 	local_paca->tm_scratch = regs->msr;
454 #endif
455 
456 	/*
457 	 * 64s does not want to mfspr(SPRN_AMR) here, because this comes after
458 	 * mtmsr, which would cause Read-After-Write stalls. Hence, take the
459 	 * AMR value from the check above.
460 	 */
461 	kuap_kernel_restore(regs, kuap);
462 
463 	return ret;
464 }
465 
466 #ifdef CONFIG_PPC64
467 notrace unsigned long interrupt_exit_user_restart(struct pt_regs *regs)
468 {
469 	__hard_irq_disable();
470 	local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
471 
472 #ifdef CONFIG_PPC_BOOK3S_64
473 	set_kuap(AMR_KUAP_BLOCKED);
474 #endif
475 
476 	trace_hardirqs_off();
477 	user_exit_irqoff();
478 	account_cpu_user_entry();
479 
480 	BUG_ON(!user_mode(regs));
481 
482 	regs->exit_result |= interrupt_exit_user_prepare(regs);
483 
484 	return regs->exit_result;
485 }
486 
487 /*
488  * No real need to return a value here because the stack store case does not
489  * get restarted.
490  */
491 notrace unsigned long interrupt_exit_kernel_restart(struct pt_regs *regs)
492 {
493 	__hard_irq_disable();
494 	local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
495 
496 #ifdef CONFIG_PPC_BOOK3S_64
497 	set_kuap(AMR_KUAP_BLOCKED);
498 #endif
499 
500 	if (regs->softe == IRQS_ENABLED)
501 		trace_hardirqs_off();
502 
503 	BUG_ON(user_mode(regs));
504 
505 	return interrupt_exit_kernel_prepare(regs);
506 }
507 #endif
508