blob: d0018dd17e0a63500d5a499f15e5eb2f8096cb76 [file] [log] [blame]
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001/* SPDX-License-Identifier: GPL-2.0 */
2/*
3 * This file contains the 64-bit "server" PowerPC variant
4 * of the low level exception handling including exception
5 * vectors, exception return, part of the slb and stab
6 * handling and other fixed offset specific things.
7 *
8 * This file is meant to be #included from head_64.S due to
9 * position dependent assembly.
10 *
11 * Most of this originates from head_64.S and thus has the same
12 * copyright history.
13 *
14 */
15
16#include <asm/hw_irq.h>
17#include <asm/exception-64s.h>
18#include <asm/ptrace.h>
19#include <asm/cpuidle.h>
20#include <asm/head-64.h>
21#include <asm/feature-fixups.h>
David Brazdil0f672f62019-12-10 10:32:29 +000022#include <asm/kup.h>
23
24/* PACA save area offsets (exgen, exmc, etc) */
25#define EX_R9 0
26#define EX_R10 8
27#define EX_R11 16
28#define EX_R12 24
29#define EX_R13 32
30#define EX_DAR 40
31#define EX_DSISR 48
32#define EX_CCR 52
33#define EX_CFAR 56
34#define EX_PPR 64
35#if defined(CONFIG_RELOCATABLE)
36#define EX_CTR 72
37.if EX_SIZE != 10
38 .error "EX_SIZE is wrong"
39.endif
40#else
41.if EX_SIZE != 9
42 .error "EX_SIZE is wrong"
43.endif
44#endif
45
46/*
47 * Following are fixed section helper macros.
48 *
49 * EXC_REAL_BEGIN/END - real, unrelocated exception vectors
50 * EXC_VIRT_BEGIN/END - virt (AIL), unrelocated exception vectors
51 * TRAMP_REAL_BEGIN - real, unrelocated helpers (virt may call these)
52 * TRAMP_VIRT_BEGIN - virt, unreloc helpers (in practice, real can use)
53 * TRAMP_KVM_BEGIN - KVM handlers, these are put into real, unrelocated
54 * EXC_COMMON - After switching to virtual, relocated mode.
55 */
56
57#define EXC_REAL_BEGIN(name, start, size) \
58 FIXED_SECTION_ENTRY_BEGIN_LOCATION(real_vectors, exc_real_##start##_##name, start, size)
59
60#define EXC_REAL_END(name, start, size) \
61 FIXED_SECTION_ENTRY_END_LOCATION(real_vectors, exc_real_##start##_##name, start, size)
62
63#define EXC_VIRT_BEGIN(name, start, size) \
64 FIXED_SECTION_ENTRY_BEGIN_LOCATION(virt_vectors, exc_virt_##start##_##name, start, size)
65
66#define EXC_VIRT_END(name, start, size) \
67 FIXED_SECTION_ENTRY_END_LOCATION(virt_vectors, exc_virt_##start##_##name, start, size)
68
69#define EXC_COMMON_BEGIN(name) \
70 USE_TEXT_SECTION(); \
71 .balign IFETCH_ALIGN_BYTES; \
72 .global name; \
73 _ASM_NOKPROBE_SYMBOL(name); \
74 DEFINE_FIXED_SYMBOL(name); \
75name:
76
77#define TRAMP_REAL_BEGIN(name) \
78 FIXED_SECTION_ENTRY_BEGIN(real_trampolines, name)
79
80#define TRAMP_VIRT_BEGIN(name) \
81 FIXED_SECTION_ENTRY_BEGIN(virt_trampolines, name)
82
83#ifdef CONFIG_KVM_BOOK3S_64_HANDLER
84#define TRAMP_KVM_BEGIN(name) \
85 TRAMP_VIRT_BEGIN(name)
86#else
87#define TRAMP_KVM_BEGIN(name)
88#endif
89
90#define EXC_REAL_NONE(start, size) \
91 FIXED_SECTION_ENTRY_BEGIN_LOCATION(real_vectors, exc_real_##start##_##unused, start, size); \
92 FIXED_SECTION_ENTRY_END_LOCATION(real_vectors, exc_real_##start##_##unused, start, size)
93
94#define EXC_VIRT_NONE(start, size) \
95 FIXED_SECTION_ENTRY_BEGIN_LOCATION(virt_vectors, exc_virt_##start##_##unused, start, size); \
96 FIXED_SECTION_ENTRY_END_LOCATION(virt_vectors, exc_virt_##start##_##unused, start, size)
97
98/*
99 * We're short on space and time in the exception prolog, so we can't
100 * use the normal LOAD_REG_IMMEDIATE macro to load the address of label.
101 * Instead we get the base of the kernel from paca->kernelbase and or in the low
102 * part of label. This requires that the label be within 64KB of kernelbase, and
103 * that kernelbase be 64K aligned.
104 */
105#define LOAD_HANDLER(reg, label) \
106 ld reg,PACAKBASE(r13); /* get high part of &label */ \
107 ori reg,reg,FIXED_SYMBOL_ABS_ADDR(label)
108
109#define __LOAD_HANDLER(reg, label) \
110 ld reg,PACAKBASE(r13); \
111 ori reg,reg,(ABS_ADDR(label))@l
112
113/*
114 * Branches from unrelocated code (e.g., interrupts) to labels outside
115 * head-y require >64K offsets.
116 */
117#define __LOAD_FAR_HANDLER(reg, label) \
118 ld reg,PACAKBASE(r13); \
119 ori reg,reg,(ABS_ADDR(label))@l; \
120 addis reg,reg,(ABS_ADDR(label))@h
121
122/* Exception register prefixes */
123#define EXC_HV_OR_STD 2 /* depends on HVMODE */
124#define EXC_HV 1
125#define EXC_STD 0
126
127#if defined(CONFIG_RELOCATABLE)
128/*
129 * If we support interrupts with relocation on AND we're a relocatable kernel,
130 * we need to use CTR to get to the 2nd level handler. So, save/restore it
131 * when required.
132 */
133#define SAVE_CTR(reg, area) mfctr reg ; std reg,area+EX_CTR(r13)
134#define GET_CTR(reg, area) ld reg,area+EX_CTR(r13)
135#define RESTORE_CTR(reg, area) ld reg,area+EX_CTR(r13) ; mtctr reg
136#else
137/* ...else CTR is unused and in register. */
138#define SAVE_CTR(reg, area)
139#define GET_CTR(reg, area) mfctr reg
140#define RESTORE_CTR(reg, area)
141#endif
142
143/*
144 * PPR save/restore macros used in exceptions-64s.S
145 * Used for P7 or later processors
146 */
147#define SAVE_PPR(area, ra) \
148BEGIN_FTR_SECTION_NESTED(940) \
149 ld ra,area+EX_PPR(r13); /* Read PPR from paca */ \
150 std ra,_PPR(r1); \
151END_FTR_SECTION_NESTED(CPU_FTR_HAS_PPR,CPU_FTR_HAS_PPR,940)
152
153#define RESTORE_PPR_PACA(area, ra) \
154BEGIN_FTR_SECTION_NESTED(941) \
155 ld ra,area+EX_PPR(r13); \
156 mtspr SPRN_PPR,ra; \
157END_FTR_SECTION_NESTED(CPU_FTR_HAS_PPR,CPU_FTR_HAS_PPR,941)
158
159/*
160 * Get an SPR into a register if the CPU has the given feature
161 */
162#define OPT_GET_SPR(ra, spr, ftr) \
163BEGIN_FTR_SECTION_NESTED(943) \
164 mfspr ra,spr; \
165END_FTR_SECTION_NESTED(ftr,ftr,943)
166
167/*
168 * Set an SPR from a register if the CPU has the given feature
169 */
170#define OPT_SET_SPR(ra, spr, ftr) \
171BEGIN_FTR_SECTION_NESTED(943) \
172 mtspr spr,ra; \
173END_FTR_SECTION_NESTED(ftr,ftr,943)
174
175/*
176 * Save a register to the PACA if the CPU has the given feature
177 */
178#define OPT_SAVE_REG_TO_PACA(offset, ra, ftr) \
179BEGIN_FTR_SECTION_NESTED(943) \
180 std ra,offset(r13); \
181END_FTR_SECTION_NESTED(ftr,ftr,943)
182
183/*
184 * Branch to label using its 0xC000 address. This results in instruction
185 * address suitable for MSR[IR]=0 or 1, which allows relocation to be turned
186 * on using mtmsr rather than rfid.
187 *
188 * This could set the 0xc bits for !RELOCATABLE as an immediate, rather than
189 * load KBASE for a slight optimisation.
190 */
191#define BRANCH_TO_C000(reg, label) \
192 __LOAD_FAR_HANDLER(reg, label); \
193 mtctr reg; \
194 bctr
195
196.macro INT_KVM_HANDLER name, vec, hsrr, area, skip
197 TRAMP_KVM_BEGIN(\name\()_kvm)
198 KVM_HANDLER \vec, \hsrr, \area, \skip
199.endm
200
201#ifdef CONFIG_KVM_BOOK3S_64_HANDLER
202#ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE
203/*
204 * If hv is possible, interrupts come into to the hv version
205 * of the kvmppc_interrupt code, which then jumps to the PR handler,
206 * kvmppc_interrupt_pr, if the guest is a PR guest.
207 */
208#define kvmppc_interrupt kvmppc_interrupt_hv
209#else
210#define kvmppc_interrupt kvmppc_interrupt_pr
211#endif
212
213.macro KVMTEST name, hsrr, n
214 lbz r10,HSTATE_IN_GUEST(r13)
215 cmpwi r10,0
216 bne \name\()_kvm
217.endm
218
219.macro KVM_HANDLER vec, hsrr, area, skip
220 .if \skip
221 cmpwi r10,KVM_GUEST_MODE_SKIP
222 beq 89f
223 .else
224BEGIN_FTR_SECTION_NESTED(947)
225 ld r10,\area+EX_CFAR(r13)
226 std r10,HSTATE_CFAR(r13)
227END_FTR_SECTION_NESTED(CPU_FTR_CFAR,CPU_FTR_CFAR,947)
228 .endif
229
230BEGIN_FTR_SECTION_NESTED(948)
231 ld r10,\area+EX_PPR(r13)
232 std r10,HSTATE_PPR(r13)
233END_FTR_SECTION_NESTED(CPU_FTR_HAS_PPR,CPU_FTR_HAS_PPR,948)
234 ld r10,\area+EX_R10(r13)
235 std r12,HSTATE_SCRATCH0(r13)
236 sldi r12,r9,32
237 /* HSRR variants have the 0x2 bit added to their trap number */
238 .if \hsrr == EXC_HV_OR_STD
239 BEGIN_FTR_SECTION
240 ori r12,r12,(\vec + 0x2)
241 FTR_SECTION_ELSE
242 ori r12,r12,(\vec)
243 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
244 .elseif \hsrr
245 ori r12,r12,(\vec + 0x2)
246 .else
247 ori r12,r12,(\vec)
248 .endif
249
250#ifdef CONFIG_RELOCATABLE
251 /*
252 * KVM requires __LOAD_FAR_HANDLER beause kvmppc_interrupt lives
253 * outside the head section. CONFIG_RELOCATABLE KVM expects CTR
254 * to be saved in HSTATE_SCRATCH1.
255 */
256 mfctr r9
257 std r9,HSTATE_SCRATCH1(r13)
258 __LOAD_FAR_HANDLER(r9, kvmppc_interrupt)
259 mtctr r9
260 ld r9,\area+EX_R9(r13)
261 bctr
262#else
263 ld r9,\area+EX_R9(r13)
264 b kvmppc_interrupt
265#endif
266
267
268 .if \skip
26989: mtocrf 0x80,r9
270 ld r9,\area+EX_R9(r13)
271 ld r10,\area+EX_R10(r13)
272 .if \hsrr == EXC_HV_OR_STD
273 BEGIN_FTR_SECTION
274 b kvmppc_skip_Hinterrupt
275 FTR_SECTION_ELSE
276 b kvmppc_skip_interrupt
277 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
278 .elseif \hsrr
279 b kvmppc_skip_Hinterrupt
280 .else
281 b kvmppc_skip_interrupt
282 .endif
283 .endif
284.endm
285
286#else
287.macro KVMTEST name, hsrr, n
288.endm
289.macro KVM_HANDLER name, vec, hsrr, area, skip
290.endm
291#endif
292
293.macro INT_SAVE_SRR_AND_JUMP label, hsrr, set_ri
294 ld r10,PACAKMSR(r13) /* get MSR value for kernel */
295 .if ! \set_ri
296 xori r10,r10,MSR_RI /* Clear MSR_RI */
297 .endif
298 .if \hsrr == EXC_HV_OR_STD
299 BEGIN_FTR_SECTION
300 mfspr r11,SPRN_HSRR0 /* save HSRR0 */
301 mfspr r12,SPRN_HSRR1 /* and HSRR1 */
302 mtspr SPRN_HSRR1,r10
303 FTR_SECTION_ELSE
304 mfspr r11,SPRN_SRR0 /* save SRR0 */
305 mfspr r12,SPRN_SRR1 /* and SRR1 */
306 mtspr SPRN_SRR1,r10
307 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
308 .elseif \hsrr
309 mfspr r11,SPRN_HSRR0 /* save HSRR0 */
310 mfspr r12,SPRN_HSRR1 /* and HSRR1 */
311 mtspr SPRN_HSRR1,r10
312 .else
313 mfspr r11,SPRN_SRR0 /* save SRR0 */
314 mfspr r12,SPRN_SRR1 /* and SRR1 */
315 mtspr SPRN_SRR1,r10
316 .endif
317 LOAD_HANDLER(r10, \label\())
318 .if \hsrr == EXC_HV_OR_STD
319 BEGIN_FTR_SECTION
320 mtspr SPRN_HSRR0,r10
321 HRFI_TO_KERNEL
322 FTR_SECTION_ELSE
323 mtspr SPRN_SRR0,r10
324 RFI_TO_KERNEL
325 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
326 .elseif \hsrr
327 mtspr SPRN_HSRR0,r10
328 HRFI_TO_KERNEL
329 .else
330 mtspr SPRN_SRR0,r10
331 RFI_TO_KERNEL
332 .endif
333 b . /* prevent speculative execution */
334.endm
335
336/* INT_SAVE_SRR_AND_JUMP works for real or virt, this is faster but virt only */
337.macro INT_VIRT_SAVE_SRR_AND_JUMP label, hsrr
338#ifdef CONFIG_RELOCATABLE
339 .if \hsrr == EXC_HV_OR_STD
340 BEGIN_FTR_SECTION
341 mfspr r11,SPRN_HSRR0 /* save HSRR0 */
342 FTR_SECTION_ELSE
343 mfspr r11,SPRN_SRR0 /* save SRR0 */
344 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
345 .elseif \hsrr
346 mfspr r11,SPRN_HSRR0 /* save HSRR0 */
347 .else
348 mfspr r11,SPRN_SRR0 /* save SRR0 */
349 .endif
350 LOAD_HANDLER(r12, \label\())
351 mtctr r12
352 .if \hsrr == EXC_HV_OR_STD
353 BEGIN_FTR_SECTION
354 mfspr r12,SPRN_HSRR1 /* and HSRR1 */
355 FTR_SECTION_ELSE
356 mfspr r12,SPRN_SRR1 /* and HSRR1 */
357 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
358 .elseif \hsrr
359 mfspr r12,SPRN_HSRR1 /* and HSRR1 */
360 .else
361 mfspr r12,SPRN_SRR1 /* and HSRR1 */
362 .endif
363 li r10,MSR_RI
364 mtmsrd r10,1 /* Set RI (EE=0) */
365 bctr
366#else
367 .if \hsrr == EXC_HV_OR_STD
368 BEGIN_FTR_SECTION
369 mfspr r11,SPRN_HSRR0 /* save HSRR0 */
370 mfspr r12,SPRN_HSRR1 /* and HSRR1 */
371 FTR_SECTION_ELSE
372 mfspr r11,SPRN_SRR0 /* save SRR0 */
373 mfspr r12,SPRN_SRR1 /* and SRR1 */
374 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
375 .elseif \hsrr
376 mfspr r11,SPRN_HSRR0 /* save HSRR0 */
377 mfspr r12,SPRN_HSRR1 /* and HSRR1 */
378 .else
379 mfspr r11,SPRN_SRR0 /* save SRR0 */
380 mfspr r12,SPRN_SRR1 /* and SRR1 */
381 .endif
382 li r10,MSR_RI
383 mtmsrd r10,1 /* Set RI (EE=0) */
384 b \label
385#endif
386.endm
387
388/*
389 * This is the BOOK3S interrupt entry code macro.
390 *
391 * This can result in one of several things happening:
392 * - Branch to the _common handler, relocated, in virtual mode.
393 * These are normal interrupts (synchronous and asynchronous) handled by
394 * the kernel.
395 * - Branch to KVM, relocated but real mode interrupts remain in real mode.
396 * These occur when HSTATE_IN_GUEST is set. The interrupt may be caused by
397 * / intended for host or guest kernel, but KVM must always be involved
398 * because the machine state is set for guest execution.
399 * - Branch to the masked handler, unrelocated.
400 * These occur when maskable asynchronous interrupts are taken with the
401 * irq_soft_mask set.
402 * - Branch to an "early" handler in real mode but relocated.
403 * This is done if early=1. MCE and HMI use these to handle errors in real
404 * mode.
405 * - Fall through and continue executing in real, unrelocated mode.
406 * This is done if early=2.
407 */
408.macro INT_HANDLER name, vec, ool=0, early=0, virt=0, hsrr=0, area=PACA_EXGEN, ri=1, dar=0, dsisr=0, bitmask=0, kvm=0
409 SET_SCRATCH0(r13) /* save r13 */
410 GET_PACA(r13)
411 std r9,\area\()+EX_R9(r13) /* save r9 */
412 OPT_GET_SPR(r9, SPRN_PPR, CPU_FTR_HAS_PPR)
413 HMT_MEDIUM
414 std r10,\area\()+EX_R10(r13) /* save r10 - r12 */
415 OPT_GET_SPR(r10, SPRN_CFAR, CPU_FTR_CFAR)
416 .if \ool
417 .if !\virt
418 b tramp_real_\name
419 .pushsection .text
420 TRAMP_REAL_BEGIN(tramp_real_\name)
421 .else
422 b tramp_virt_\name
423 .pushsection .text
424 TRAMP_VIRT_BEGIN(tramp_virt_\name)
425 .endif
426 .endif
427
428 OPT_SAVE_REG_TO_PACA(\area\()+EX_PPR, r9, CPU_FTR_HAS_PPR)
429 OPT_SAVE_REG_TO_PACA(\area\()+EX_CFAR, r10, CPU_FTR_CFAR)
430 INTERRUPT_TO_KERNEL
431 SAVE_CTR(r10, \area\())
432 mfcr r9
433 .if \kvm
434 KVMTEST \name \hsrr \vec
435 .endif
436 .if \bitmask
437 lbz r10,PACAIRQSOFTMASK(r13)
438 andi. r10,r10,\bitmask
439 /* Associate vector numbers with bits in paca->irq_happened */
440 .if \vec == 0x500 || \vec == 0xea0
441 li r10,PACA_IRQ_EE
442 .elseif \vec == 0x900
443 li r10,PACA_IRQ_DEC
444 .elseif \vec == 0xa00 || \vec == 0xe80
445 li r10,PACA_IRQ_DBELL
446 .elseif \vec == 0xe60
447 li r10,PACA_IRQ_HMI
448 .elseif \vec == 0xf00
449 li r10,PACA_IRQ_PMI
450 .else
451 .abort "Bad maskable vector"
452 .endif
453
454 .if \hsrr == EXC_HV_OR_STD
455 BEGIN_FTR_SECTION
456 bne masked_Hinterrupt
457 FTR_SECTION_ELSE
458 bne masked_interrupt
459 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
460 .elseif \hsrr
461 bne masked_Hinterrupt
462 .else
463 bne masked_interrupt
464 .endif
465 .endif
466
467 std r11,\area\()+EX_R11(r13)
468 std r12,\area\()+EX_R12(r13)
469
470 /*
471 * DAR/DSISR, SCRATCH0 must be read before setting MSR[RI],
472 * because a d-side MCE will clobber those registers so is
473 * not recoverable if they are live.
474 */
475 GET_SCRATCH0(r10)
476 std r10,\area\()+EX_R13(r13)
477 .if \dar
478 .if \hsrr
479 mfspr r10,SPRN_HDAR
480 .else
481 mfspr r10,SPRN_DAR
482 .endif
483 std r10,\area\()+EX_DAR(r13)
484 .endif
485 .if \dsisr
486 .if \hsrr
487 mfspr r10,SPRN_HDSISR
488 .else
489 mfspr r10,SPRN_DSISR
490 .endif
491 stw r10,\area\()+EX_DSISR(r13)
492 .endif
493
494 .if \early == 2
495 /* nothing more */
496 .elseif \early
497 mfctr r10 /* save ctr, even for !RELOCATABLE */
498 BRANCH_TO_C000(r11, \name\()_early_common)
499 .elseif !\virt
500 INT_SAVE_SRR_AND_JUMP \name\()_common, \hsrr, \ri
501 .else
502 INT_VIRT_SAVE_SRR_AND_JUMP \name\()_common, \hsrr
503 .endif
504 .if \ool
505 .popsection
506 .endif
507.endm
508
509/*
510 * On entry r13 points to the paca, r9-r13 are saved in the paca,
511 * r9 contains the saved CR, r11 and r12 contain the saved SRR0 and
512 * SRR1, and relocation is on.
513 *
514 * If stack=0, then the stack is already set in r1, and r1 is saved in r10.
515 * PPR save and CPU accounting is not done for the !stack case (XXX why not?)
516 */
517.macro INT_COMMON vec, area, stack, kaup, reconcile, dar, dsisr
518 .if \stack
519 andi. r10,r12,MSR_PR /* See if coming from user */
520 mr r10,r1 /* Save r1 */
521 subi r1,r1,INT_FRAME_SIZE /* alloc frame on kernel stack */
522 beq- 100f
523 ld r1,PACAKSAVE(r13) /* kernel stack to use */
524100: tdgei r1,-INT_FRAME_SIZE /* trap if r1 is in userspace */
525 EMIT_BUG_ENTRY 100b,__FILE__,__LINE__,0
526 .endif
527
528 std r9,_CCR(r1) /* save CR in stackframe */
529 std r11,_NIP(r1) /* save SRR0 in stackframe */
530 std r12,_MSR(r1) /* save SRR1 in stackframe */
531 std r10,0(r1) /* make stack chain pointer */
532 std r0,GPR0(r1) /* save r0 in stackframe */
533 std r10,GPR1(r1) /* save r1 in stackframe */
534
535 .if \stack
536 .if \kaup
537 kuap_save_amr_and_lock r9, r10, cr1, cr0
538 .endif
539 beq 101f /* if from kernel mode */
540 ACCOUNT_CPU_USER_ENTRY(r13, r9, r10)
541 SAVE_PPR(\area, r9)
542101:
543 .else
544 .if \kaup
545 kuap_save_amr_and_lock r9, r10, cr1
546 .endif
547 .endif
548
549 /* Save original regs values from save area to stack frame. */
550 ld r9,\area+EX_R9(r13) /* move r9, r10 to stackframe */
551 ld r10,\area+EX_R10(r13)
552 std r9,GPR9(r1)
553 std r10,GPR10(r1)
554 ld r9,\area+EX_R11(r13) /* move r11 - r13 to stackframe */
555 ld r10,\area+EX_R12(r13)
556 ld r11,\area+EX_R13(r13)
557 std r9,GPR11(r1)
558 std r10,GPR12(r1)
559 std r11,GPR13(r1)
560 .if \dar
561 .if \dar == 2
562 ld r10,_NIP(r1)
563 .else
564 ld r10,\area+EX_DAR(r13)
565 .endif
566 std r10,_DAR(r1)
567 .endif
568 .if \dsisr
569 .if \dsisr == 2
570 ld r10,_MSR(r1)
571 lis r11,DSISR_SRR1_MATCH_64S@h
572 and r10,r10,r11
573 .else
574 lwz r10,\area+EX_DSISR(r13)
575 .endif
576 std r10,_DSISR(r1)
577 .endif
578BEGIN_FTR_SECTION_NESTED(66)
579 ld r10,\area+EX_CFAR(r13)
580 std r10,ORIG_GPR3(r1)
581END_FTR_SECTION_NESTED(CPU_FTR_CFAR, CPU_FTR_CFAR, 66)
582 GET_CTR(r10, \area)
583 std r10,_CTR(r1)
584 std r2,GPR2(r1) /* save r2 in stackframe */
585 SAVE_4GPRS(3, r1) /* save r3 - r6 in stackframe */
586 SAVE_2GPRS(7, r1) /* save r7, r8 in stackframe */
587 mflr r9 /* Get LR, later save to stack */
588 ld r2,PACATOC(r13) /* get kernel TOC into r2 */
589 std r9,_LINK(r1)
590 lbz r10,PACAIRQSOFTMASK(r13)
591 mfspr r11,SPRN_XER /* save XER in stackframe */
592 std r10,SOFTE(r1)
593 std r11,_XER(r1)
594 li r9,(\vec)+1
595 std r9,_TRAP(r1) /* set trap number */
596 li r10,0
597 ld r11,exception_marker@toc(r2)
598 std r10,RESULT(r1) /* clear regs->result */
599 std r11,STACK_FRAME_OVERHEAD-16(r1) /* mark the frame */
600
601 .if \stack
602 ACCOUNT_STOLEN_TIME
603 .endif
604
605 .if \reconcile
606 RECONCILE_IRQ_STATE(r10, r11)
607 .endif
608.endm
609
610/*
611 * Restore all registers including H/SRR0/1 saved in a stack frame of a
612 * standard exception.
613 */
614.macro EXCEPTION_RESTORE_REGS hsrr
615 /* Move original SRR0 and SRR1 into the respective regs */
616 ld r9,_MSR(r1)
617 .if \hsrr == EXC_HV_OR_STD
618 .error "EXC_HV_OR_STD Not implemented for EXCEPTION_RESTORE_REGS"
619 .endif
620 .if \hsrr
621 mtspr SPRN_HSRR1,r9
622 .else
623 mtspr SPRN_SRR1,r9
624 .endif
625 ld r9,_NIP(r1)
626 .if \hsrr
627 mtspr SPRN_HSRR0,r9
628 .else
629 mtspr SPRN_SRR0,r9
630 .endif
631 ld r9,_CTR(r1)
632 mtctr r9
633 ld r9,_XER(r1)
634 mtxer r9
635 ld r9,_LINK(r1)
636 mtlr r9
637 ld r9,_CCR(r1)
638 mtcr r9
639 REST_8GPRS(2, r1)
640 REST_4GPRS(10, r1)
641 REST_GPR(0, r1)
642 /* restore original r1. */
643 ld r1,GPR1(r1)
644.endm
645
646#define RUNLATCH_ON \
647BEGIN_FTR_SECTION \
648 ld r3, PACA_THREAD_INFO(r13); \
649 ld r4,TI_LOCAL_FLAGS(r3); \
650 andi. r0,r4,_TLF_RUNLATCH; \
651 beql ppc64_runlatch_on_trampoline; \
652END_FTR_SECTION_IFSET(CPU_FTR_CTRL)
653
654/*
655 * When the idle code in power4_idle puts the CPU into NAP mode,
656 * it has to do so in a loop, and relies on the external interrupt
657 * and decrementer interrupt entry code to get it out of the loop.
658 * It sets the _TLF_NAPPING bit in current_thread_info()->local_flags
659 * to signal that it is in the loop and needs help to get out.
660 */
661#ifdef CONFIG_PPC_970_NAP
662#define FINISH_NAP \
663BEGIN_FTR_SECTION \
664 ld r11, PACA_THREAD_INFO(r13); \
665 ld r9,TI_LOCAL_FLAGS(r11); \
666 andi. r10,r9,_TLF_NAPPING; \
667 bnel power4_fixup_nap; \
668END_FTR_SECTION_IFSET(CPU_FTR_CAN_NAP)
669#else
670#define FINISH_NAP
671#endif
672
673#define EXC_COMMON(name, realvec, hdlr) \
674 EXC_COMMON_BEGIN(name); \
675 INT_COMMON realvec, PACA_EXGEN, 1, 1, 1, 0, 0 ; \
676 bl save_nvgprs; \
677 addi r3,r1,STACK_FRAME_OVERHEAD; \
678 bl hdlr; \
679 b ret_from_except
680
681/*
682 * Like EXC_COMMON, but for exceptions that can occur in the idle task and
683 * therefore need the special idle handling (finish nap and runlatch)
684 */
685#define EXC_COMMON_ASYNC(name, realvec, hdlr) \
686 EXC_COMMON_BEGIN(name); \
687 INT_COMMON realvec, PACA_EXGEN, 1, 1, 1, 0, 0 ; \
688 FINISH_NAP; \
689 RUNLATCH_ON; \
690 addi r3,r1,STACK_FRAME_OVERHEAD; \
691 bl hdlr; \
692 b ret_from_except_lite
693
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000694
695/*
696 * There are a few constraints to be concerned with.
697 * - Real mode exceptions code/data must be located at their physical location.
698 * - Virtual mode exceptions must be mapped at their 0xc000... location.
699 * - Fixed location code must not call directly beyond the __end_interrupts
700 * area when built with CONFIG_RELOCATABLE. LOAD_HANDLER / bctr sequence
701 * must be used.
702 * - LOAD_HANDLER targets must be within first 64K of physical 0 /
703 * virtual 0xc00...
704 * - Conditional branch targets must be within +/-32K of caller.
705 *
706 * "Virtual exceptions" run with relocation on (MSR_IR=1, MSR_DR=1), and
707 * therefore don't have to run in physically located code or rfid to
708 * virtual mode kernel code. However on relocatable kernels they do have
709 * to branch to KERNELBASE offset because the rest of the kernel (outside
710 * the exception vectors) may be located elsewhere.
711 *
712 * Virtual exceptions correspond with physical, except their entry points
713 * are offset by 0xc000000000000000 and also tend to get an added 0x4000
714 * offset applied. Virtual exceptions are enabled with the Alternate
715 * Interrupt Location (AIL) bit set in the LPCR. However this does not
716 * guarantee they will be delivered virtually. Some conditions (see the ISA)
717 * cause exceptions to be delivered in real mode.
718 *
719 * It's impossible to receive interrupts below 0x300 via AIL.
720 *
721 * KVM: None of the virtual exceptions are from the guest. Anything that
722 * escalated to HV=1 from HV=0 is delivered via real mode handlers.
723 *
724 *
725 * We layout physical memory as follows:
726 * 0x0000 - 0x00ff : Secondary processor spin code
727 * 0x0100 - 0x18ff : Real mode pSeries interrupt vectors
728 * 0x1900 - 0x3fff : Real mode trampolines
729 * 0x4000 - 0x58ff : Relon (IR=1,DR=1) mode pSeries interrupt vectors
730 * 0x5900 - 0x6fff : Relon mode trampolines
731 * 0x7000 - 0x7fff : FWNMI data area
732 * 0x8000 - .... : Common interrupt handlers, remaining early
733 * setup code, rest of kernel.
734 *
735 * We could reclaim 0x4000-0x42ff for real mode trampolines if the space
736 * is necessary. Until then it's more consistent to explicitly put VIRT_NONE
737 * vectors there.
738 */
739OPEN_FIXED_SECTION(real_vectors, 0x0100, 0x1900)
740OPEN_FIXED_SECTION(real_trampolines, 0x1900, 0x4000)
741OPEN_FIXED_SECTION(virt_vectors, 0x4000, 0x5900)
742OPEN_FIXED_SECTION(virt_trampolines, 0x5900, 0x7000)
David Brazdil0f672f62019-12-10 10:32:29 +0000743
744#ifdef CONFIG_PPC_POWERNV
745 .globl start_real_trampolines
746 .globl end_real_trampolines
747 .globl start_virt_trampolines
748 .globl end_virt_trampolines
749#endif
750
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000751#if defined(CONFIG_PPC_PSERIES) || defined(CONFIG_PPC_POWERNV)
752/*
753 * Data area reserved for FWNMI option.
754 * This address (0x7000) is fixed by the RPA.
755 * pseries and powernv need to keep the whole page from
756 * 0x7000 to 0x8000 free for use by the firmware
757 */
758ZERO_FIXED_SECTION(fwnmi_page, 0x7000, 0x8000)
759OPEN_TEXT_SECTION(0x8000)
760#else
761OPEN_TEXT_SECTION(0x7000)
762#endif
763
764USE_FIXED_SECTION(real_vectors)
765
766/*
767 * This is the start of the interrupt handlers for pSeries
768 * This code runs with relocation off.
769 * Code from here to __end_interrupts gets copied down to real
770 * address 0x100 when we are running a relocatable kernel.
771 * Therefore any relative branches in this section must only
772 * branch to labels in this section.
773 */
774 .globl __start_interrupts
775__start_interrupts:
776
777/* No virt vectors corresponding with 0x0..0x100 */
778EXC_VIRT_NONE(0x4000, 0x100)
779
780
David Brazdil0f672f62019-12-10 10:32:29 +0000781EXC_REAL_BEGIN(system_reset, 0x100, 0x100)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000782#ifdef CONFIG_PPC_P7_NAP
783 /*
784 * If running native on arch 2.06 or later, check if we are waking up
785 * from nap/sleep/winkle, and branch to idle handler. This tests SRR1
786 * bits 46:47. A non-0 value indicates that we are coming from a power
787 * saving state. The idle wakeup handler initially runs in real mode,
788 * but we branch to the 0xc000... address so we can turn on relocation
David Brazdil0f672f62019-12-10 10:32:29 +0000789 * with mtmsrd later, after SPRs are restored.
790 *
791 * Careful to minimise cost for the fast path (idle wakeup) while
792 * also avoiding clobbering CFAR for the debug path (non-idle).
793 *
794 * For the idle wake case volatile registers can be clobbered, which
795 * is why we use those initially. If it turns out to not be an idle
796 * wake, carefully put everything back the way it was, so we can use
797 * common exception macros to handle it.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000798 */
David Brazdil0f672f62019-12-10 10:32:29 +0000799BEGIN_FTR_SECTION
800 SET_SCRATCH0(r13)
801 GET_PACA(r13)
802 std r3,PACA_EXNMI+0*8(r13)
803 std r4,PACA_EXNMI+1*8(r13)
804 std r5,PACA_EXNMI+2*8(r13)
805 mfspr r3,SPRN_SRR1
806 mfocrf r4,0x80
807 rlwinm. r5,r3,47-31,30,31
808 bne+ system_reset_idle_wake
809 /* Not powersave wakeup. Restore regs for regular interrupt handler. */
810 mtocrf 0x80,r4
811 ld r3,PACA_EXNMI+0*8(r13)
812 ld r4,PACA_EXNMI+1*8(r13)
813 ld r5,PACA_EXNMI+2*8(r13)
814 GET_SCRATCH0(r13)
815END_FTR_SECTION_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000816#endif
817
David Brazdil0f672f62019-12-10 10:32:29 +0000818 INT_HANDLER system_reset, 0x100, area=PACA_EXNMI, ri=0, kvm=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000819 /*
820 * MSR_RI is not enabled, because PACA_EXNMI and nmi stack is
821 * being used, so a nested NMI exception would corrupt it.
David Brazdil0f672f62019-12-10 10:32:29 +0000822 *
823 * In theory, we should not enable relocation here if it was disabled
824 * in SRR1, because the MMU may not be configured to support it (e.g.,
825 * SLB may have been cleared). In practice, there should only be a few
826 * small windows where that's the case, and sreset is considered to
827 * be dangerous anyway.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000828 */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000829EXC_REAL_END(system_reset, 0x100, 0x100)
830EXC_VIRT_NONE(0x4100, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +0000831INT_KVM_HANDLER system_reset 0x100, EXC_STD, PACA_EXNMI, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000832
833#ifdef CONFIG_PPC_P7_NAP
David Brazdil0f672f62019-12-10 10:32:29 +0000834TRAMP_REAL_BEGIN(system_reset_idle_wake)
835 /* We are waking up from idle, so may clobber any volatile register */
836 cmpwi cr1,r5,2
837 bltlr cr1 /* no state loss, return to idle caller with r3=SRR1 */
838 BRANCH_TO_C000(r12, DOTSYM(idle_return_gpr_loss))
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000839#endif
840
David Brazdil0f672f62019-12-10 10:32:29 +0000841#ifdef CONFIG_PPC_PSERIES
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000842/*
David Brazdil0f672f62019-12-10 10:32:29 +0000843 * Vectors for the FWNMI option. Share common code.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000844 */
David Brazdil0f672f62019-12-10 10:32:29 +0000845TRAMP_REAL_BEGIN(system_reset_fwnmi)
846 /* See comment at system_reset exception, don't turn on RI */
847 INT_HANDLER system_reset, 0x100, area=PACA_EXNMI, ri=0
848
849#endif /* CONFIG_PPC_PSERIES */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000850
851EXC_COMMON_BEGIN(system_reset_common)
852 /*
853 * Increment paca->in_nmi then enable MSR_RI. SLB or MCE will be able
854 * to recover, but nested NMI will notice in_nmi and not recover
855 * because of the use of the NMI stack. in_nmi reentrancy is tested in
856 * system_reset_exception.
857 */
858 lhz r10,PACA_IN_NMI(r13)
859 addi r10,r10,1
860 sth r10,PACA_IN_NMI(r13)
861 li r10,MSR_RI
862 mtmsrd r10,1
863
864 mr r10,r1
865 ld r1,PACA_NMI_EMERG_SP(r13)
866 subi r1,r1,INT_FRAME_SIZE
David Brazdil0f672f62019-12-10 10:32:29 +0000867 INT_COMMON 0x100, PACA_EXNMI, 0, 1, 0, 0, 0
868 bl save_nvgprs
869 /*
870 * Set IRQS_ALL_DISABLED unconditionally so arch_irqs_disabled does
871 * the right thing. We do not want to reconcile because that goes
872 * through irq tracing which we don't want in NMI.
873 *
874 * Save PACAIRQHAPPENED because some code will do a hard disable
875 * (e.g., xmon). So we want to restore this back to where it was
876 * when we return. DAR is unused in the stack, so save it there.
877 */
878 li r10,IRQS_ALL_DISABLED
879 stb r10,PACAIRQSOFTMASK(r13)
880 lbz r10,PACAIRQHAPPENED(r13)
881 std r10,_DAR(r1)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000882
David Brazdil0f672f62019-12-10 10:32:29 +0000883 addi r3,r1,STACK_FRAME_OVERHEAD
884 bl system_reset_exception
885
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000886 /* Clear MSR_RI before setting SRR0 and SRR1. */
David Brazdil0f672f62019-12-10 10:32:29 +0000887 li r9,0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000888 mtmsrd r9,1
889
890 /*
891 * MSR_RI is clear, now we can decrement paca->in_nmi.
892 */
893 lhz r10,PACA_IN_NMI(r13)
894 subi r10,r10,1
895 sth r10,PACA_IN_NMI(r13)
896
897 /*
898 * Restore soft mask settings.
899 */
900 ld r10,_DAR(r1)
901 stb r10,PACAIRQHAPPENED(r13)
902 ld r10,SOFTE(r1)
903 stb r10,PACAIRQSOFTMASK(r13)
904
David Brazdil0f672f62019-12-10 10:32:29 +0000905 EXCEPTION_RESTORE_REGS EXC_STD
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000906 RFI_TO_USER_OR_KERNEL
907
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000908
909EXC_REAL_BEGIN(machine_check, 0x200, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +0000910 INT_HANDLER machine_check, 0x200, early=1, area=PACA_EXMC, dar=1, dsisr=1
911 /*
912 * MSR_RI is not enabled, because PACA_EXMC is being used, so a
913 * nested machine check corrupts it. machine_check_common enables
914 * MSR_RI.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000915 */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000916EXC_REAL_END(machine_check, 0x200, 0x100)
917EXC_VIRT_NONE(0x4200, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +0000918
919#ifdef CONFIG_PPC_PSERIES
920TRAMP_REAL_BEGIN(machine_check_fwnmi)
921 /* See comment at machine_check exception, don't turn on RI */
922 INT_HANDLER machine_check, 0x200, early=1, area=PACA_EXMC, dar=1, dsisr=1
923#endif
924
925INT_KVM_HANDLER machine_check 0x200, EXC_STD, PACA_EXMC, 1
926
927#define MACHINE_CHECK_HANDLER_WINDUP \
928 /* Clear MSR_RI before setting SRR0 and SRR1. */\
929 li r9,0; \
930 mtmsrd r9,1; /* Clear MSR_RI */ \
931 /* Decrement paca->in_mce now RI is clear. */ \
932 lhz r12,PACA_IN_MCE(r13); \
933 subi r12,r12,1; \
934 sth r12,PACA_IN_MCE(r13); \
935 EXCEPTION_RESTORE_REGS EXC_STD
936
937EXC_COMMON_BEGIN(machine_check_early_common)
938 mtctr r10 /* Restore ctr */
939 mfspr r11,SPRN_SRR0
940 mfspr r12,SPRN_SRR1
941
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000942 /*
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000943 * Switch to mc_emergency stack and handle re-entrancy (we limit
944 * the nested MCE upto level 4 to avoid stack overflow).
945 * Save MCE registers srr1, srr0, dar and dsisr and then set ME=1
946 *
947 * We use paca->in_mce to check whether this is the first entry or
948 * nested machine check. We increment paca->in_mce to track nested
949 * machine checks.
950 *
951 * If this is the first entry then set stack pointer to
952 * paca->mc_emergency_sp, otherwise r1 is already pointing to
953 * stack frame on mc_emergency stack.
954 *
955 * NOTE: We are here with MSR_ME=0 (off), which means we risk a
956 * checkstop if we get another machine check exception before we do
957 * rfid with MSR_ME=1.
958 *
959 * This interrupt can wake directly from idle. If that is the case,
960 * the machine check is handled then the idle wakeup code is called
961 * to restore state.
962 */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000963 lhz r10,PACA_IN_MCE(r13)
964 cmpwi r10,0 /* Are we in nested machine check */
David Brazdil0f672f62019-12-10 10:32:29 +0000965 cmpwi cr1,r10,MAX_MCE_DEPTH /* Are we at maximum nesting */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000966 addi r10,r10,1 /* increment paca->in_mce */
967 sth r10,PACA_IN_MCE(r13)
David Brazdil0f672f62019-12-10 10:32:29 +0000968
969 mr r10,r1 /* Save r1 */
970 bne 1f
971 /* First machine check entry */
972 ld r1,PACAMCEMERGSP(r13) /* Use MC emergency stack */
9731: /* Limit nested MCE to level 4 to avoid stack overflow */
974 bgt cr1,unrecoverable_mce /* Check if we hit limit of 4 */
975 subi r1,r1,INT_FRAME_SIZE /* alloc stack frame */
976
977 /* We don't touch AMR here, we never go to virtual mode */
978 INT_COMMON 0x200, PACA_EXMC, 0, 0, 0, 1, 1
979
980BEGIN_FTR_SECTION
981 bl enable_machine_check
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000982END_FTR_SECTION_IFSET(CPU_FTR_HVMODE)
David Brazdil0f672f62019-12-10 10:32:29 +0000983 li r10,MSR_RI
984 mtmsrd r10,1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000985
David Brazdil0f672f62019-12-10 10:32:29 +0000986 bl save_nvgprs
987 addi r3,r1,STACK_FRAME_OVERHEAD
988 bl machine_check_early
989 std r3,RESULT(r1) /* Save result */
990 ld r12,_MSR(r1)
991
992#ifdef CONFIG_PPC_P7_NAP
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000993 /*
David Brazdil0f672f62019-12-10 10:32:29 +0000994 * Check if thread was in power saving mode. We come here when any
995 * of the following is true:
996 * a. thread wasn't in power saving mode
997 * b. thread was in power saving mode with no state loss,
998 * supervisor state loss or hypervisor state loss.
999 *
1000 * Go back to nap/sleep/winkle mode again if (b) is true.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001001 */
David Brazdil0f672f62019-12-10 10:32:29 +00001002BEGIN_FTR_SECTION
1003 rlwinm. r11,r12,47-31,30,31
1004 bne machine_check_idle_common
1005END_FTR_SECTION_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
1006#endif
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001007
David Brazdil0f672f62019-12-10 10:32:29 +00001008#ifdef CONFIG_KVM_BOOK3S_64_HANDLER
1009 /*
1010 * Check if we are coming from guest. If yes, then run the normal
1011 * exception handler which will take the
1012 * machine_check_kvm->kvmppc_interrupt branch to deliver the MC event
1013 * to guest.
1014 */
1015 lbz r11,HSTATE_IN_GUEST(r13)
1016 cmpwi r11,0 /* Check if coming from guest */
1017 bne mce_deliver /* continue if we are. */
1018#endif
1019
1020 /*
1021 * Check if we are coming from userspace. If yes, then run the normal
1022 * exception handler which will deliver the MC event to this kernel.
1023 */
1024 andi. r11,r12,MSR_PR /* See if coming from user. */
1025 bne mce_deliver /* continue in V mode if we are. */
1026
1027 /*
1028 * At this point we are coming from kernel context.
1029 * Queue up the MCE event and return from the interrupt.
1030 * But before that, check if this is an un-recoverable exception.
1031 * If yes, then stay on emergency stack and panic.
1032 */
1033 andi. r11,r12,MSR_RI
1034 beq unrecoverable_mce
1035
1036 /*
1037 * Check if we have successfully handled/recovered from error, if not
1038 * then stay on emergency stack and panic.
1039 */
1040 ld r3,RESULT(r1) /* Load result */
1041 cmpdi r3,0 /* see if we handled MCE successfully */
1042 beq unrecoverable_mce /* if !handled then panic */
1043
1044 /*
1045 * Return from MC interrupt.
1046 * Queue up the MCE event so that we can log it later, while
1047 * returning from kernel or opal call.
1048 */
1049 bl machine_check_queue_event
1050 MACHINE_CHECK_HANDLER_WINDUP
1051 RFI_TO_KERNEL
1052
1053mce_deliver:
1054 /*
1055 * This is a host user or guest MCE. Restore all registers, then
1056 * run the "late" handler. For host user, this will run the
1057 * machine_check_exception handler in virtual mode like a normal
1058 * interrupt handler. For guest, this will trigger the KVM test
1059 * and branch to the KVM interrupt similarly to other interrupts.
1060 */
1061BEGIN_FTR_SECTION
1062 ld r10,ORIG_GPR3(r1)
1063 mtspr SPRN_CFAR,r10
1064END_FTR_SECTION_IFSET(CPU_FTR_CFAR)
1065 MACHINE_CHECK_HANDLER_WINDUP
1066 /* See comment at machine_check exception, don't turn on RI */
1067 INT_HANDLER machine_check, 0x200, area=PACA_EXMC, ri=0, dar=1, dsisr=1, kvm=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001068
1069EXC_COMMON_BEGIN(machine_check_common)
1070 /*
1071 * Machine check is different because we use a different
1072 * save area: PACA_EXMC instead of PACA_EXGEN.
1073 */
David Brazdil0f672f62019-12-10 10:32:29 +00001074 INT_COMMON 0x200, PACA_EXMC, 1, 1, 1, 1, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001075 FINISH_NAP
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001076 /* Enable MSR_RI when finished with PACA_EXMC */
1077 li r10,MSR_RI
1078 mtmsrd r10,1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001079 bl save_nvgprs
1080 addi r3,r1,STACK_FRAME_OVERHEAD
1081 bl machine_check_exception
1082 b ret_from_except
1083
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001084#ifdef CONFIG_PPC_P7_NAP
1085/*
1086 * This is an idle wakeup. Low level machine check has already been
1087 * done. Queue the event then call the idle code to do the wake up.
1088 */
1089EXC_COMMON_BEGIN(machine_check_idle_common)
1090 bl machine_check_queue_event
1091
1092 /*
1093 * We have not used any non-volatile GPRs here, and as a rule
1094 * most exception code including machine check does not.
1095 * Therefore PACA_NAPSTATELOST does not need to be set. Idle
1096 * wakeup will restore volatile registers.
1097 *
1098 * Load the original SRR1 into r3 for pnv_powersave_wakeup_mce.
1099 *
1100 * Then decrement MCE nesting after finishing with the stack.
1101 */
1102 ld r3,_MSR(r1)
David Brazdil0f672f62019-12-10 10:32:29 +00001103 ld r4,_LINK(r1)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001104
1105 lhz r11,PACA_IN_MCE(r13)
1106 subi r11,r11,1
1107 sth r11,PACA_IN_MCE(r13)
1108
David Brazdil0f672f62019-12-10 10:32:29 +00001109 mtlr r4
1110 rlwinm r10,r3,47-31,30,31
1111 cmpwi cr1,r10,2
1112 bltlr cr1 /* no state loss, return to idle caller */
1113 b idle_return_gpr_loss
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001114#endif
1115
David Brazdil0f672f62019-12-10 10:32:29 +00001116EXC_COMMON_BEGIN(unrecoverable_mce)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001117 /*
1118 * We are going down. But there are chances that we might get hit by
1119 * another MCE during panic path and we may run into unstable state
1120 * with no way out. Hence, turn ME bit off while going down, so that
1121 * when another MCE is hit during panic path, system will checkstop
1122 * and hypervisor will get restarted cleanly by SP.
1123 */
David Brazdil0f672f62019-12-10 10:32:29 +00001124BEGIN_FTR_SECTION
1125 li r10,0 /* clear MSR_RI */
1126 mtmsrd r10,1
1127 bl disable_machine_check
1128END_FTR_SECTION_IFSET(CPU_FTR_HVMODE)
1129 ld r10,PACAKMSR(r13)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001130 li r3,MSR_ME
David Brazdil0f672f62019-12-10 10:32:29 +00001131 andc r10,r10,r3
1132 mtmsrd r10
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001133
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001134 /* Invoke machine_check_exception to print MCE event and panic. */
1135 addi r3,r1,STACK_FRAME_OVERHEAD
1136 bl machine_check_exception
David Brazdil0f672f62019-12-10 10:32:29 +00001137
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001138 /*
David Brazdil0f672f62019-12-10 10:32:29 +00001139 * We will not reach here. Even if we did, there is no way out.
1140 * Call unrecoverable_exception and die.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001141 */
David Brazdil0f672f62019-12-10 10:32:29 +00001142 addi r3,r1,STACK_FRAME_OVERHEAD
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001143 bl unrecoverable_exception
David Brazdil0f672f62019-12-10 10:32:29 +00001144 b .
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001145
1146
David Brazdil0f672f62019-12-10 10:32:29 +00001147EXC_REAL_BEGIN(data_access, 0x300, 0x80)
1148 INT_HANDLER data_access, 0x300, ool=1, dar=1, dsisr=1, kvm=1
1149EXC_REAL_END(data_access, 0x300, 0x80)
1150EXC_VIRT_BEGIN(data_access, 0x4300, 0x80)
1151 INT_HANDLER data_access, 0x300, virt=1, dar=1, dsisr=1
1152EXC_VIRT_END(data_access, 0x4300, 0x80)
1153INT_KVM_HANDLER data_access, 0x300, EXC_STD, PACA_EXGEN, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001154EXC_COMMON_BEGIN(data_access_common)
1155 /*
1156 * Here r13 points to the paca, r9 contains the saved CR,
1157 * SRR0 and SRR1 are saved in r11 and r12,
1158 * r9 - r13 are saved in paca->exgen.
David Brazdil0f672f62019-12-10 10:32:29 +00001159 * EX_DAR and EX_DSISR have saved DAR/DSISR
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001160 */
David Brazdil0f672f62019-12-10 10:32:29 +00001161 INT_COMMON 0x300, PACA_EXGEN, 1, 1, 1, 1, 1
1162 ld r4,_DAR(r1)
1163 ld r5,_DSISR(r1)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001164BEGIN_MMU_FTR_SECTION
David Brazdil0f672f62019-12-10 10:32:29 +00001165 ld r6,_MSR(r1)
1166 li r3,0x300
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001167 b do_hash_page /* Try to handle as hpte fault */
1168MMU_FTR_SECTION_ELSE
1169 b handle_page_fault
1170ALT_MMU_FTR_SECTION_END_IFCLR(MMU_FTR_TYPE_RADIX)
1171
1172
1173EXC_REAL_BEGIN(data_access_slb, 0x380, 0x80)
David Brazdil0f672f62019-12-10 10:32:29 +00001174 INT_HANDLER data_access_slb, 0x380, ool=1, area=PACA_EXSLB, dar=1, kvm=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001175EXC_REAL_END(data_access_slb, 0x380, 0x80)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001176EXC_VIRT_BEGIN(data_access_slb, 0x4380, 0x80)
David Brazdil0f672f62019-12-10 10:32:29 +00001177 INT_HANDLER data_access_slb, 0x380, virt=1, area=PACA_EXSLB, dar=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001178EXC_VIRT_END(data_access_slb, 0x4380, 0x80)
David Brazdil0f672f62019-12-10 10:32:29 +00001179INT_KVM_HANDLER data_access_slb, 0x380, EXC_STD, PACA_EXSLB, 1
1180EXC_COMMON_BEGIN(data_access_slb_common)
1181 INT_COMMON 0x380, PACA_EXSLB, 1, 1, 0, 1, 0
1182 ld r4,_DAR(r1)
1183 addi r3,r1,STACK_FRAME_OVERHEAD
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001184BEGIN_MMU_FTR_SECTION
David Brazdil0f672f62019-12-10 10:32:29 +00001185 /* HPT case, do SLB fault */
1186 bl do_slb_fault
1187 cmpdi r3,0
1188 bne- 1f
1189 b fast_exception_return
11901: /* Error case */
1191MMU_FTR_SECTION_ELSE
1192 /* Radix case, access is outside page table range */
1193 li r3,-EFAULT
1194ALT_MMU_FTR_SECTION_END_IFCLR(MMU_FTR_TYPE_RADIX)
1195 std r3,RESULT(r1)
1196 bl save_nvgprs
1197 RECONCILE_IRQ_STATE(r10, r11)
1198 ld r4,_DAR(r1)
1199 ld r5,RESULT(r1)
1200 addi r3,r1,STACK_FRAME_OVERHEAD
1201 bl do_bad_slb_fault
1202 b ret_from_except
1203
1204
1205EXC_REAL_BEGIN(instruction_access, 0x400, 0x80)
1206 INT_HANDLER instruction_access, 0x400, kvm=1
1207EXC_REAL_END(instruction_access, 0x400, 0x80)
1208EXC_VIRT_BEGIN(instruction_access, 0x4400, 0x80)
1209 INT_HANDLER instruction_access, 0x400, virt=1
1210EXC_VIRT_END(instruction_access, 0x4400, 0x80)
1211INT_KVM_HANDLER instruction_access, 0x400, EXC_STD, PACA_EXGEN, 0
1212EXC_COMMON_BEGIN(instruction_access_common)
1213 INT_COMMON 0x400, PACA_EXGEN, 1, 1, 1, 2, 2
1214 ld r4,_DAR(r1)
1215 ld r5,_DSISR(r1)
1216BEGIN_MMU_FTR_SECTION
1217 ld r6,_MSR(r1)
1218 li r3,0x400
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001219 b do_hash_page /* Try to handle as hpte fault */
1220MMU_FTR_SECTION_ELSE
1221 b handle_page_fault
1222ALT_MMU_FTR_SECTION_END_IFCLR(MMU_FTR_TYPE_RADIX)
1223
1224
1225EXC_REAL_BEGIN(instruction_access_slb, 0x480, 0x80)
David Brazdil0f672f62019-12-10 10:32:29 +00001226 INT_HANDLER instruction_access_slb, 0x480, area=PACA_EXSLB, kvm=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001227EXC_REAL_END(instruction_access_slb, 0x480, 0x80)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001228EXC_VIRT_BEGIN(instruction_access_slb, 0x4480, 0x80)
David Brazdil0f672f62019-12-10 10:32:29 +00001229 INT_HANDLER instruction_access_slb, 0x480, virt=1, area=PACA_EXSLB
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001230EXC_VIRT_END(instruction_access_slb, 0x4480, 0x80)
David Brazdil0f672f62019-12-10 10:32:29 +00001231INT_KVM_HANDLER instruction_access_slb, 0x480, EXC_STD, PACA_EXSLB, 0
1232EXC_COMMON_BEGIN(instruction_access_slb_common)
1233 INT_COMMON 0x480, PACA_EXSLB, 1, 1, 0, 2, 0
1234 ld r4,_DAR(r1)
1235 addi r3,r1,STACK_FRAME_OVERHEAD
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001236BEGIN_MMU_FTR_SECTION
David Brazdil0f672f62019-12-10 10:32:29 +00001237 /* HPT case, do SLB fault */
1238 bl do_slb_fault
1239 cmpdi r3,0
1240 bne- 1f
1241 b fast_exception_return
12421: /* Error case */
1243MMU_FTR_SECTION_ELSE
1244 /* Radix case, access is outside page table range */
1245 li r3,-EFAULT
1246ALT_MMU_FTR_SECTION_END_IFCLR(MMU_FTR_TYPE_RADIX)
1247 std r3,RESULT(r1)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001248 bl save_nvgprs
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001249 RECONCILE_IRQ_STATE(r10, r11)
David Brazdil0f672f62019-12-10 10:32:29 +00001250 ld r4,_DAR(r1)
1251 ld r5,RESULT(r1)
1252 addi r3,r1,STACK_FRAME_OVERHEAD
1253 bl do_bad_slb_fault
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001254 b ret_from_except
1255
1256EXC_REAL_BEGIN(hardware_interrupt, 0x500, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001257 INT_HANDLER hardware_interrupt, 0x500, hsrr=EXC_HV_OR_STD, bitmask=IRQS_DISABLED, kvm=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001258EXC_REAL_END(hardware_interrupt, 0x500, 0x100)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001259EXC_VIRT_BEGIN(hardware_interrupt, 0x4500, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001260 INT_HANDLER hardware_interrupt, 0x500, virt=1, hsrr=EXC_HV_OR_STD, bitmask=IRQS_DISABLED, kvm=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001261EXC_VIRT_END(hardware_interrupt, 0x4500, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001262INT_KVM_HANDLER hardware_interrupt, 0x500, EXC_HV_OR_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001263EXC_COMMON_ASYNC(hardware_interrupt_common, 0x500, do_IRQ)
1264
1265
David Brazdil0f672f62019-12-10 10:32:29 +00001266EXC_REAL_BEGIN(alignment, 0x600, 0x100)
1267 INT_HANDLER alignment, 0x600, dar=1, dsisr=1, kvm=1
1268EXC_REAL_END(alignment, 0x600, 0x100)
1269EXC_VIRT_BEGIN(alignment, 0x4600, 0x100)
1270 INT_HANDLER alignment, 0x600, virt=1, dar=1, dsisr=1
1271EXC_VIRT_END(alignment, 0x4600, 0x100)
1272INT_KVM_HANDLER alignment, 0x600, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001273EXC_COMMON_BEGIN(alignment_common)
David Brazdil0f672f62019-12-10 10:32:29 +00001274 INT_COMMON 0x600, PACA_EXGEN, 1, 1, 1, 1, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001275 bl save_nvgprs
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001276 addi r3,r1,STACK_FRAME_OVERHEAD
1277 bl alignment_exception
1278 b ret_from_except
1279
1280
David Brazdil0f672f62019-12-10 10:32:29 +00001281EXC_REAL_BEGIN(program_check, 0x700, 0x100)
1282 INT_HANDLER program_check, 0x700, kvm=1
1283EXC_REAL_END(program_check, 0x700, 0x100)
1284EXC_VIRT_BEGIN(program_check, 0x4700, 0x100)
1285 INT_HANDLER program_check, 0x700, virt=1
1286EXC_VIRT_END(program_check, 0x4700, 0x100)
1287INT_KVM_HANDLER program_check, 0x700, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001288EXC_COMMON_BEGIN(program_check_common)
1289 /*
1290 * It's possible to receive a TM Bad Thing type program check with
1291 * userspace register values (in particular r1), but with SRR1 reporting
1292 * that we came from the kernel. Normally that would confuse the bad
1293 * stack logic, and we would report a bad kernel stack pointer. Instead
1294 * we switch to the emergency stack if we're taking a TM Bad Thing from
1295 * the kernel.
1296 */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001297
David Brazdil0f672f62019-12-10 10:32:29 +00001298 andi. r10,r12,MSR_PR
1299 bne 2f /* If userspace, go normal path */
1300
1301 andis. r10,r12,(SRR1_PROGTM)@h
1302 bne 1f /* If TM, emergency */
1303
1304 cmpdi r1,-INT_FRAME_SIZE /* check if r1 is in userspace */
1305 blt 2f /* normal path if not */
1306
1307 /* Use the emergency stack */
13081: andi. r10,r12,MSR_PR /* Set CR0 correctly for label */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001309 /* 3 in EXCEPTION_PROLOG_COMMON */
1310 mr r10,r1 /* Save r1 */
1311 ld r1,PACAEMERGSP(r13) /* Use emergency stack */
1312 subi r1,r1,INT_FRAME_SIZE /* alloc stack frame */
David Brazdil0f672f62019-12-10 10:32:29 +00001313 INT_COMMON 0x700, PACA_EXGEN, 0, 1, 1, 0, 0
1314 b 3f
13152:
1316 INT_COMMON 0x700, PACA_EXGEN, 1, 1, 1, 0, 0
13173:
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001318 bl save_nvgprs
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001319 addi r3,r1,STACK_FRAME_OVERHEAD
1320 bl program_check_exception
1321 b ret_from_except
1322
1323
David Brazdil0f672f62019-12-10 10:32:29 +00001324EXC_REAL_BEGIN(fp_unavailable, 0x800, 0x100)
1325 INT_HANDLER fp_unavailable, 0x800, kvm=1
1326EXC_REAL_END(fp_unavailable, 0x800, 0x100)
1327EXC_VIRT_BEGIN(fp_unavailable, 0x4800, 0x100)
1328 INT_HANDLER fp_unavailable, 0x800, virt=1
1329EXC_VIRT_END(fp_unavailable, 0x4800, 0x100)
1330INT_KVM_HANDLER fp_unavailable, 0x800, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001331EXC_COMMON_BEGIN(fp_unavailable_common)
David Brazdil0f672f62019-12-10 10:32:29 +00001332 INT_COMMON 0x800, PACA_EXGEN, 1, 1, 0, 0, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001333 bne 1f /* if from user, just load it up */
1334 bl save_nvgprs
1335 RECONCILE_IRQ_STATE(r10, r11)
1336 addi r3,r1,STACK_FRAME_OVERHEAD
1337 bl kernel_fp_unavailable_exception
David Brazdil0f672f62019-12-10 10:32:29 +000013380: trap
1339 EMIT_BUG_ENTRY 0b, __FILE__, __LINE__, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000013401:
1341#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1342BEGIN_FTR_SECTION
1343 /* Test if 2 TM state bits are zero. If non-zero (ie. userspace was in
1344 * transaction), go do TM stuff
1345 */
1346 rldicl. r0, r12, (64-MSR_TS_LG), (64-2)
1347 bne- 2f
1348END_FTR_SECTION_IFSET(CPU_FTR_TM)
1349#endif
1350 bl load_up_fpu
1351 b fast_exception_return
1352#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
13532: /* User process was in a transaction */
1354 bl save_nvgprs
1355 RECONCILE_IRQ_STATE(r10, r11)
1356 addi r3,r1,STACK_FRAME_OVERHEAD
1357 bl fp_unavailable_tm
1358 b ret_from_except
1359#endif
1360
1361
David Brazdil0f672f62019-12-10 10:32:29 +00001362EXC_REAL_BEGIN(decrementer, 0x900, 0x80)
1363 INT_HANDLER decrementer, 0x900, ool=1, bitmask=IRQS_DISABLED, kvm=1
1364EXC_REAL_END(decrementer, 0x900, 0x80)
1365EXC_VIRT_BEGIN(decrementer, 0x4900, 0x80)
1366 INT_HANDLER decrementer, 0x900, virt=1, bitmask=IRQS_DISABLED
1367EXC_VIRT_END(decrementer, 0x4900, 0x80)
1368INT_KVM_HANDLER decrementer, 0x900, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001369EXC_COMMON_ASYNC(decrementer_common, 0x900, timer_interrupt)
1370
1371
David Brazdil0f672f62019-12-10 10:32:29 +00001372EXC_REAL_BEGIN(hdecrementer, 0x980, 0x80)
1373 INT_HANDLER hdecrementer, 0x980, hsrr=EXC_HV, kvm=1
1374EXC_REAL_END(hdecrementer, 0x980, 0x80)
1375EXC_VIRT_BEGIN(hdecrementer, 0x4980, 0x80)
1376 INT_HANDLER hdecrementer, 0x980, virt=1, hsrr=EXC_HV, kvm=1
1377EXC_VIRT_END(hdecrementer, 0x4980, 0x80)
1378INT_KVM_HANDLER hdecrementer, 0x980, EXC_HV, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001379EXC_COMMON(hdecrementer_common, 0x980, hdec_interrupt)
1380
1381
David Brazdil0f672f62019-12-10 10:32:29 +00001382EXC_REAL_BEGIN(doorbell_super, 0xa00, 0x100)
1383 INT_HANDLER doorbell_super, 0xa00, bitmask=IRQS_DISABLED, kvm=1
1384EXC_REAL_END(doorbell_super, 0xa00, 0x100)
1385EXC_VIRT_BEGIN(doorbell_super, 0x4a00, 0x100)
1386 INT_HANDLER doorbell_super, 0xa00, virt=1, bitmask=IRQS_DISABLED
1387EXC_VIRT_END(doorbell_super, 0x4a00, 0x100)
1388INT_KVM_HANDLER doorbell_super, 0xa00, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001389#ifdef CONFIG_PPC_DOORBELL
1390EXC_COMMON_ASYNC(doorbell_super_common, 0xa00, doorbell_exception)
1391#else
1392EXC_COMMON_ASYNC(doorbell_super_common, 0xa00, unknown_exception)
1393#endif
1394
1395
David Brazdil0f672f62019-12-10 10:32:29 +00001396EXC_REAL_NONE(0xb00, 0x100)
1397EXC_VIRT_NONE(0x4b00, 0x100)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001398
1399/*
1400 * system call / hypercall (0xc00, 0x4c00)
1401 *
1402 * The system call exception is invoked with "sc 0" and does not alter HV bit.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001403 *
1404 * The hypercall is invoked with "sc 1" and sets HV=1.
1405 *
1406 * In HPT, sc 1 always goes to 0xc00 real mode. In RADIX, sc 1 can go to
1407 * 0x4c00 virtual mode.
1408 *
1409 * Call convention:
1410 *
David Brazdil0f672f62019-12-10 10:32:29 +00001411 * syscall register convention is in Documentation/powerpc/syscall64-abi.rst
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001412 *
1413 * For hypercalls, the register convention is as follows:
1414 * r0 volatile
1415 * r1-2 nonvolatile
1416 * r3 volatile parameter and return value for status
1417 * r4-r10 volatile input and output value
1418 * r11 volatile hypercall number and output value
1419 * r12 volatile input and output value
1420 * r13-r31 nonvolatile
1421 * LR nonvolatile
1422 * CTR volatile
1423 * XER volatile
1424 * CR0-1 CR5-7 volatile
1425 * CR2-4 nonvolatile
1426 * Other registers nonvolatile
1427 *
1428 * The intersection of volatile registers that don't contain possible
1429 * inputs is: cr0, xer, ctr. We may use these as scratch regs upon entry
1430 * without saving, though xer is not a good idea to use, as hardware may
1431 * interpret some bits so it may be costly to change them.
1432 */
David Brazdil0f672f62019-12-10 10:32:29 +00001433.macro SYSTEM_CALL virt
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001434#ifdef CONFIG_KVM_BOOK3S_64_HANDLER
1435 /*
1436 * There is a little bit of juggling to get syscall and hcall
1437 * working well. Save r13 in ctr to avoid using SPRG scratch
1438 * register.
1439 *
1440 * Userspace syscalls have already saved the PPR, hcalls must save
1441 * it before setting HMT_MEDIUM.
1442 */
David Brazdil0f672f62019-12-10 10:32:29 +00001443 mtctr r13
1444 GET_PACA(r13)
1445 std r10,PACA_EXGEN+EX_R10(r13)
1446 INTERRUPT_TO_KERNEL
1447 KVMTEST system_call EXC_STD 0xc00 /* uses r10, branch to system_call_kvm */
1448 mfctr r9
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001449#else
David Brazdil0f672f62019-12-10 10:32:29 +00001450 mr r9,r13
1451 GET_PACA(r13)
1452 INTERRUPT_TO_KERNEL
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001453#endif
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001454
1455#ifdef CONFIG_PPC_FAST_ENDIAN_SWITCH
David Brazdil0f672f62019-12-10 10:32:29 +00001456BEGIN_FTR_SECTION
1457 cmpdi r0,0x1ebe
1458 beq- 1f
1459END_FTR_SECTION_IFSET(CPU_FTR_REAL_LE)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001460#endif
1461
David Brazdil0f672f62019-12-10 10:32:29 +00001462 /* We reach here with PACA in r13, r13 in r9. */
1463 mfspr r11,SPRN_SRR0
1464 mfspr r12,SPRN_SRR1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001465
David Brazdil0f672f62019-12-10 10:32:29 +00001466 HMT_MEDIUM
1467
1468 .if ! \virt
1469 __LOAD_HANDLER(r10, system_call_common)
1470 mtspr SPRN_SRR0,r10
1471 ld r10,PACAKMSR(r13)
1472 mtspr SPRN_SRR1,r10
1473 RFI_TO_KERNEL
1474 b . /* prevent speculative execution */
1475 .else
1476 li r10,MSR_RI
1477 mtmsrd r10,1 /* Set RI (EE=0) */
1478#ifdef CONFIG_RELOCATABLE
1479 __LOAD_HANDLER(r10, system_call_common)
1480 mtctr r10
1481 bctr
1482#else
1483 b system_call_common
1484#endif
1485 .endif
1486
1487#ifdef CONFIG_PPC_FAST_ENDIAN_SWITCH
1488 /* Fast LE/BE switch system call */
14891: mfspr r12,SPRN_SRR1
1490 xori r12,r12,MSR_LE
1491 mtspr SPRN_SRR1,r12
1492 mr r13,r9
1493 RFI_TO_USER /* return to userspace */
1494 b . /* prevent speculative execution */
1495#endif
1496.endm
1497
1498EXC_REAL_BEGIN(system_call, 0xc00, 0x100)
1499 SYSTEM_CALL 0
1500EXC_REAL_END(system_call, 0xc00, 0x100)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001501EXC_VIRT_BEGIN(system_call, 0x4c00, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001502 SYSTEM_CALL 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001503EXC_VIRT_END(system_call, 0x4c00, 0x100)
1504
1505#ifdef CONFIG_KVM_BOOK3S_64_HANDLER
1506 /*
1507 * This is a hcall, so register convention is as above, with these
1508 * differences:
1509 * r13 = PACA
1510 * ctr = orig r13
1511 * orig r10 saved in PACA
1512 */
David Brazdil0f672f62019-12-10 10:32:29 +00001513TRAMP_KVM_BEGIN(system_call_kvm)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001514 /*
1515 * Save the PPR (on systems that support it) before changing to
1516 * HMT_MEDIUM. That allows the KVM code to save that value into the
1517 * guest state (it is the guest's PPR value).
1518 */
1519 OPT_GET_SPR(r10, SPRN_PPR, CPU_FTR_HAS_PPR)
1520 HMT_MEDIUM
1521 OPT_SAVE_REG_TO_PACA(PACA_EXGEN+EX_PPR, r10, CPU_FTR_HAS_PPR)
1522 mfctr r10
1523 SET_SCRATCH0(r10)
1524 std r9,PACA_EXGEN+EX_R9(r13)
1525 mfcr r9
David Brazdil0f672f62019-12-10 10:32:29 +00001526 KVM_HANDLER 0xc00, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001527#endif
1528
1529
David Brazdil0f672f62019-12-10 10:32:29 +00001530EXC_REAL_BEGIN(single_step, 0xd00, 0x100)
1531 INT_HANDLER single_step, 0xd00, kvm=1
1532EXC_REAL_END(single_step, 0xd00, 0x100)
1533EXC_VIRT_BEGIN(single_step, 0x4d00, 0x100)
1534 INT_HANDLER single_step, 0xd00, virt=1
1535EXC_VIRT_END(single_step, 0x4d00, 0x100)
1536INT_KVM_HANDLER single_step, 0xd00, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001537EXC_COMMON(single_step_common, 0xd00, single_step_exception)
1538
David Brazdil0f672f62019-12-10 10:32:29 +00001539
1540EXC_REAL_BEGIN(h_data_storage, 0xe00, 0x20)
1541 INT_HANDLER h_data_storage, 0xe00, ool=1, hsrr=EXC_HV, dar=1, dsisr=1, kvm=1
1542EXC_REAL_END(h_data_storage, 0xe00, 0x20)
1543EXC_VIRT_BEGIN(h_data_storage, 0x4e00, 0x20)
1544 INT_HANDLER h_data_storage, 0xe00, ool=1, virt=1, hsrr=EXC_HV, dar=1, dsisr=1, kvm=1
1545EXC_VIRT_END(h_data_storage, 0x4e00, 0x20)
1546INT_KVM_HANDLER h_data_storage, 0xe00, EXC_HV, PACA_EXGEN, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001547EXC_COMMON_BEGIN(h_data_storage_common)
David Brazdil0f672f62019-12-10 10:32:29 +00001548 INT_COMMON 0xe00, PACA_EXGEN, 1, 1, 1, 1, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001549 bl save_nvgprs
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001550 addi r3,r1,STACK_FRAME_OVERHEAD
David Brazdil0f672f62019-12-10 10:32:29 +00001551BEGIN_MMU_FTR_SECTION
1552 ld r4,_DAR(r1)
1553 li r5,SIGSEGV
1554 bl bad_page_fault
1555MMU_FTR_SECTION_ELSE
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001556 bl unknown_exception
David Brazdil0f672f62019-12-10 10:32:29 +00001557ALT_MMU_FTR_SECTION_END_IFSET(MMU_FTR_TYPE_RADIX)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001558 b ret_from_except
1559
1560
David Brazdil0f672f62019-12-10 10:32:29 +00001561EXC_REAL_BEGIN(h_instr_storage, 0xe20, 0x20)
1562 INT_HANDLER h_instr_storage, 0xe20, ool=1, hsrr=EXC_HV, kvm=1
1563EXC_REAL_END(h_instr_storage, 0xe20, 0x20)
1564EXC_VIRT_BEGIN(h_instr_storage, 0x4e20, 0x20)
1565 INT_HANDLER h_instr_storage, 0xe20, ool=1, virt=1, hsrr=EXC_HV, kvm=1
1566EXC_VIRT_END(h_instr_storage, 0x4e20, 0x20)
1567INT_KVM_HANDLER h_instr_storage, 0xe20, EXC_HV, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001568EXC_COMMON(h_instr_storage_common, 0xe20, unknown_exception)
1569
1570
David Brazdil0f672f62019-12-10 10:32:29 +00001571EXC_REAL_BEGIN(emulation_assist, 0xe40, 0x20)
1572 INT_HANDLER emulation_assist, 0xe40, ool=1, hsrr=EXC_HV, kvm=1
1573EXC_REAL_END(emulation_assist, 0xe40, 0x20)
1574EXC_VIRT_BEGIN(emulation_assist, 0x4e40, 0x20)
1575 INT_HANDLER emulation_assist, 0xe40, ool=1, virt=1, hsrr=EXC_HV, kvm=1
1576EXC_VIRT_END(emulation_assist, 0x4e40, 0x20)
1577INT_KVM_HANDLER emulation_assist, 0xe40, EXC_HV, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001578EXC_COMMON(emulation_assist_common, 0xe40, emulation_assist_interrupt)
1579
1580
1581/*
1582 * hmi_exception trampoline is a special case. It jumps to hmi_exception_early
1583 * first, and then eventaully from there to the trampoline to get into virtual
1584 * mode.
1585 */
David Brazdil0f672f62019-12-10 10:32:29 +00001586EXC_REAL_BEGIN(hmi_exception, 0xe60, 0x20)
1587 INT_HANDLER hmi_exception, 0xe60, ool=1, early=1, hsrr=EXC_HV, ri=0, kvm=1
1588EXC_REAL_END(hmi_exception, 0xe60, 0x20)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001589EXC_VIRT_NONE(0x4e60, 0x20)
David Brazdil0f672f62019-12-10 10:32:29 +00001590INT_KVM_HANDLER hmi_exception, 0xe60, EXC_HV, PACA_EXGEN, 0
1591EXC_COMMON_BEGIN(hmi_exception_early_common)
1592 mtctr r10 /* Restore ctr */
1593 mfspr r11,SPRN_HSRR0 /* Save HSRR0 */
1594 mfspr r12,SPRN_HSRR1 /* Save HSRR1 */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001595 mr r10,r1 /* Save r1 */
1596 ld r1,PACAEMERGSP(r13) /* Use emergency stack for realmode */
1597 subi r1,r1,INT_FRAME_SIZE /* alloc stack frame */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001598
David Brazdil0f672f62019-12-10 10:32:29 +00001599 /* We don't touch AMR here, we never go to virtual mode */
1600 INT_COMMON 0xe60, PACA_EXGEN, 0, 0, 0, 0, 0
1601
1602 addi r3,r1,STACK_FRAME_OVERHEAD
1603 bl hmi_exception_realmode
1604 cmpdi cr0,r3,0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001605 bne 1f
David Brazdil0f672f62019-12-10 10:32:29 +00001606
1607 EXCEPTION_RESTORE_REGS EXC_HV
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001608 HRFI_TO_USER_OR_KERNEL
1609
David Brazdil0f672f62019-12-10 10:32:29 +000016101:
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001611 /*
1612 * Go to virtual mode and pull the HMI event information from
1613 * firmware.
1614 */
David Brazdil0f672f62019-12-10 10:32:29 +00001615 EXCEPTION_RESTORE_REGS EXC_HV
1616 INT_HANDLER hmi_exception, 0xe60, hsrr=EXC_HV, bitmask=IRQS_DISABLED, kvm=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001617
1618EXC_COMMON_BEGIN(hmi_exception_common)
David Brazdil0f672f62019-12-10 10:32:29 +00001619 INT_COMMON 0xe60, PACA_EXGEN, 1, 1, 1, 0, 0
1620 FINISH_NAP
1621 RUNLATCH_ON
1622 bl save_nvgprs
1623 addi r3,r1,STACK_FRAME_OVERHEAD
1624 bl handle_hmi_exception
1625 b ret_from_except
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001626
David Brazdil0f672f62019-12-10 10:32:29 +00001627
1628EXC_REAL_BEGIN(h_doorbell, 0xe80, 0x20)
1629 INT_HANDLER h_doorbell, 0xe80, ool=1, hsrr=EXC_HV, bitmask=IRQS_DISABLED, kvm=1
1630EXC_REAL_END(h_doorbell, 0xe80, 0x20)
1631EXC_VIRT_BEGIN(h_doorbell, 0x4e80, 0x20)
1632 INT_HANDLER h_doorbell, 0xe80, ool=1, virt=1, hsrr=EXC_HV, bitmask=IRQS_DISABLED, kvm=1
1633EXC_VIRT_END(h_doorbell, 0x4e80, 0x20)
1634INT_KVM_HANDLER h_doorbell, 0xe80, EXC_HV, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001635#ifdef CONFIG_PPC_DOORBELL
1636EXC_COMMON_ASYNC(h_doorbell_common, 0xe80, doorbell_exception)
1637#else
1638EXC_COMMON_ASYNC(h_doorbell_common, 0xe80, unknown_exception)
1639#endif
1640
1641
David Brazdil0f672f62019-12-10 10:32:29 +00001642EXC_REAL_BEGIN(h_virt_irq, 0xea0, 0x20)
1643 INT_HANDLER h_virt_irq, 0xea0, ool=1, hsrr=EXC_HV, bitmask=IRQS_DISABLED, kvm=1
1644EXC_REAL_END(h_virt_irq, 0xea0, 0x20)
1645EXC_VIRT_BEGIN(h_virt_irq, 0x4ea0, 0x20)
1646 INT_HANDLER h_virt_irq, 0xea0, ool=1, virt=1, hsrr=EXC_HV, bitmask=IRQS_DISABLED, kvm=1
1647EXC_VIRT_END(h_virt_irq, 0x4ea0, 0x20)
1648INT_KVM_HANDLER h_virt_irq, 0xea0, EXC_HV, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001649EXC_COMMON_ASYNC(h_virt_irq_common, 0xea0, do_IRQ)
1650
1651
1652EXC_REAL_NONE(0xec0, 0x20)
1653EXC_VIRT_NONE(0x4ec0, 0x20)
1654EXC_REAL_NONE(0xee0, 0x20)
1655EXC_VIRT_NONE(0x4ee0, 0x20)
1656
1657
David Brazdil0f672f62019-12-10 10:32:29 +00001658EXC_REAL_BEGIN(performance_monitor, 0xf00, 0x20)
1659 INT_HANDLER performance_monitor, 0xf00, ool=1, bitmask=IRQS_PMI_DISABLED, kvm=1
1660EXC_REAL_END(performance_monitor, 0xf00, 0x20)
1661EXC_VIRT_BEGIN(performance_monitor, 0x4f00, 0x20)
1662 INT_HANDLER performance_monitor, 0xf00, ool=1, virt=1, bitmask=IRQS_PMI_DISABLED
1663EXC_VIRT_END(performance_monitor, 0x4f00, 0x20)
1664INT_KVM_HANDLER performance_monitor, 0xf00, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001665EXC_COMMON_ASYNC(performance_monitor_common, 0xf00, performance_monitor_exception)
1666
1667
David Brazdil0f672f62019-12-10 10:32:29 +00001668EXC_REAL_BEGIN(altivec_unavailable, 0xf20, 0x20)
1669 INT_HANDLER altivec_unavailable, 0xf20, ool=1, kvm=1
1670EXC_REAL_END(altivec_unavailable, 0xf20, 0x20)
1671EXC_VIRT_BEGIN(altivec_unavailable, 0x4f20, 0x20)
1672 INT_HANDLER altivec_unavailable, 0xf20, ool=1, virt=1
1673EXC_VIRT_END(altivec_unavailable, 0x4f20, 0x20)
1674INT_KVM_HANDLER altivec_unavailable, 0xf20, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001675EXC_COMMON_BEGIN(altivec_unavailable_common)
David Brazdil0f672f62019-12-10 10:32:29 +00001676 INT_COMMON 0xf20, PACA_EXGEN, 1, 1, 0, 0, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001677#ifdef CONFIG_ALTIVEC
1678BEGIN_FTR_SECTION
1679 beq 1f
1680#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1681 BEGIN_FTR_SECTION_NESTED(69)
1682 /* Test if 2 TM state bits are zero. If non-zero (ie. userspace was in
1683 * transaction), go do TM stuff
1684 */
1685 rldicl. r0, r12, (64-MSR_TS_LG), (64-2)
1686 bne- 2f
1687 END_FTR_SECTION_NESTED(CPU_FTR_TM, CPU_FTR_TM, 69)
1688#endif
1689 bl load_up_altivec
1690 b fast_exception_return
1691#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
16922: /* User process was in a transaction */
1693 bl save_nvgprs
1694 RECONCILE_IRQ_STATE(r10, r11)
1695 addi r3,r1,STACK_FRAME_OVERHEAD
1696 bl altivec_unavailable_tm
1697 b ret_from_except
1698#endif
16991:
1700END_FTR_SECTION_IFSET(CPU_FTR_ALTIVEC)
1701#endif
1702 bl save_nvgprs
1703 RECONCILE_IRQ_STATE(r10, r11)
1704 addi r3,r1,STACK_FRAME_OVERHEAD
1705 bl altivec_unavailable_exception
1706 b ret_from_except
1707
1708
David Brazdil0f672f62019-12-10 10:32:29 +00001709EXC_REAL_BEGIN(vsx_unavailable, 0xf40, 0x20)
1710 INT_HANDLER vsx_unavailable, 0xf40, ool=1, kvm=1
1711EXC_REAL_END(vsx_unavailable, 0xf40, 0x20)
1712EXC_VIRT_BEGIN(vsx_unavailable, 0x4f40, 0x20)
1713 INT_HANDLER vsx_unavailable, 0xf40, ool=1, virt=1
1714EXC_VIRT_END(vsx_unavailable, 0x4f40, 0x20)
1715INT_KVM_HANDLER vsx_unavailable, 0xf40, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001716EXC_COMMON_BEGIN(vsx_unavailable_common)
David Brazdil0f672f62019-12-10 10:32:29 +00001717 INT_COMMON 0xf40, PACA_EXGEN, 1, 1, 0, 0, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001718#ifdef CONFIG_VSX
1719BEGIN_FTR_SECTION
1720 beq 1f
1721#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1722 BEGIN_FTR_SECTION_NESTED(69)
1723 /* Test if 2 TM state bits are zero. If non-zero (ie. userspace was in
1724 * transaction), go do TM stuff
1725 */
1726 rldicl. r0, r12, (64-MSR_TS_LG), (64-2)
1727 bne- 2f
1728 END_FTR_SECTION_NESTED(CPU_FTR_TM, CPU_FTR_TM, 69)
1729#endif
1730 b load_up_vsx
1731#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
17322: /* User process was in a transaction */
1733 bl save_nvgprs
1734 RECONCILE_IRQ_STATE(r10, r11)
1735 addi r3,r1,STACK_FRAME_OVERHEAD
1736 bl vsx_unavailable_tm
1737 b ret_from_except
1738#endif
17391:
1740END_FTR_SECTION_IFSET(CPU_FTR_VSX)
1741#endif
1742 bl save_nvgprs
1743 RECONCILE_IRQ_STATE(r10, r11)
1744 addi r3,r1,STACK_FRAME_OVERHEAD
1745 bl vsx_unavailable_exception
1746 b ret_from_except
1747
1748
David Brazdil0f672f62019-12-10 10:32:29 +00001749EXC_REAL_BEGIN(facility_unavailable, 0xf60, 0x20)
1750 INT_HANDLER facility_unavailable, 0xf60, ool=1, kvm=1
1751EXC_REAL_END(facility_unavailable, 0xf60, 0x20)
1752EXC_VIRT_BEGIN(facility_unavailable, 0x4f60, 0x20)
1753 INT_HANDLER facility_unavailable, 0xf60, ool=1, virt=1
1754EXC_VIRT_END(facility_unavailable, 0x4f60, 0x20)
1755INT_KVM_HANDLER facility_unavailable, 0xf60, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001756EXC_COMMON(facility_unavailable_common, 0xf60, facility_unavailable_exception)
1757
1758
David Brazdil0f672f62019-12-10 10:32:29 +00001759EXC_REAL_BEGIN(h_facility_unavailable, 0xf80, 0x20)
1760 INT_HANDLER h_facility_unavailable, 0xf80, ool=1, hsrr=EXC_HV, kvm=1
1761EXC_REAL_END(h_facility_unavailable, 0xf80, 0x20)
1762EXC_VIRT_BEGIN(h_facility_unavailable, 0x4f80, 0x20)
1763 INT_HANDLER h_facility_unavailable, 0xf80, ool=1, virt=1, hsrr=EXC_HV, kvm=1
1764EXC_VIRT_END(h_facility_unavailable, 0x4f80, 0x20)
1765INT_KVM_HANDLER h_facility_unavailable, 0xf80, EXC_HV, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001766EXC_COMMON(h_facility_unavailable_common, 0xf80, facility_unavailable_exception)
1767
1768
1769EXC_REAL_NONE(0xfa0, 0x20)
1770EXC_VIRT_NONE(0x4fa0, 0x20)
1771EXC_REAL_NONE(0xfc0, 0x20)
1772EXC_VIRT_NONE(0x4fc0, 0x20)
1773EXC_REAL_NONE(0xfe0, 0x20)
1774EXC_VIRT_NONE(0x4fe0, 0x20)
1775
1776EXC_REAL_NONE(0x1000, 0x100)
1777EXC_VIRT_NONE(0x5000, 0x100)
1778EXC_REAL_NONE(0x1100, 0x100)
1779EXC_VIRT_NONE(0x5100, 0x100)
1780
1781#ifdef CONFIG_CBE_RAS
David Brazdil0f672f62019-12-10 10:32:29 +00001782EXC_REAL_BEGIN(cbe_system_error, 0x1200, 0x100)
1783 INT_HANDLER cbe_system_error, 0x1200, ool=1, hsrr=EXC_HV, kvm=1
1784EXC_REAL_END(cbe_system_error, 0x1200, 0x100)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001785EXC_VIRT_NONE(0x5200, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001786INT_KVM_HANDLER cbe_system_error, 0x1200, EXC_HV, PACA_EXGEN, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001787EXC_COMMON(cbe_system_error_common, 0x1200, cbe_system_error_exception)
1788#else /* CONFIG_CBE_RAS */
1789EXC_REAL_NONE(0x1200, 0x100)
1790EXC_VIRT_NONE(0x5200, 0x100)
1791#endif
1792
1793
David Brazdil0f672f62019-12-10 10:32:29 +00001794EXC_REAL_BEGIN(instruction_breakpoint, 0x1300, 0x100)
1795 INT_HANDLER instruction_breakpoint, 0x1300, kvm=1
1796EXC_REAL_END(instruction_breakpoint, 0x1300, 0x100)
1797EXC_VIRT_BEGIN(instruction_breakpoint, 0x5300, 0x100)
1798 INT_HANDLER instruction_breakpoint, 0x1300, virt=1
1799EXC_VIRT_END(instruction_breakpoint, 0x5300, 0x100)
1800INT_KVM_HANDLER instruction_breakpoint, 0x1300, EXC_STD, PACA_EXGEN, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001801EXC_COMMON(instruction_breakpoint_common, 0x1300, instruction_breakpoint_exception)
1802
David Brazdil0f672f62019-12-10 10:32:29 +00001803
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001804EXC_REAL_NONE(0x1400, 0x100)
1805EXC_VIRT_NONE(0x5400, 0x100)
1806
1807EXC_REAL_BEGIN(denorm_exception_hv, 0x1500, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001808 INT_HANDLER denorm_exception_hv, 0x1500, early=2, hsrr=EXC_HV
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001809#ifdef CONFIG_PPC_DENORMALISATION
1810 mfspr r10,SPRN_HSRR1
1811 andis. r10,r10,(HSRR1_DENORM)@h /* denorm? */
1812 bne+ denorm_assist
1813#endif
David Brazdil0f672f62019-12-10 10:32:29 +00001814 KVMTEST denorm_exception_hv, EXC_HV 0x1500
1815 INT_SAVE_SRR_AND_JUMP denorm_common, EXC_HV, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001816EXC_REAL_END(denorm_exception_hv, 0x1500, 0x100)
1817
1818#ifdef CONFIG_PPC_DENORMALISATION
1819EXC_VIRT_BEGIN(denorm_exception, 0x5500, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001820 INT_HANDLER denorm_exception, 0x1500, 0, 2, 1, EXC_HV, PACA_EXGEN, 1, 0, 0, 0, 0
1821 mfspr r10,SPRN_HSRR1
1822 andis. r10,r10,(HSRR1_DENORM)@h /* denorm? */
1823 bne+ denorm_assist
1824 INT_VIRT_SAVE_SRR_AND_JUMP denorm_common, EXC_HV
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001825EXC_VIRT_END(denorm_exception, 0x5500, 0x100)
1826#else
1827EXC_VIRT_NONE(0x5500, 0x100)
1828#endif
1829
David Brazdil0f672f62019-12-10 10:32:29 +00001830INT_KVM_HANDLER denorm_exception_hv, 0x1500, EXC_HV, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001831
1832#ifdef CONFIG_PPC_DENORMALISATION
1833TRAMP_REAL_BEGIN(denorm_assist)
1834BEGIN_FTR_SECTION
1835/*
1836 * To denormalise we need to move a copy of the register to itself.
1837 * For POWER6 do that here for all FP regs.
1838 */
1839 mfmsr r10
1840 ori r10,r10,(MSR_FP|MSR_FE0|MSR_FE1)
1841 xori r10,r10,(MSR_FE0|MSR_FE1)
1842 mtmsrd r10
1843 sync
1844
David Brazdil0f672f62019-12-10 10:32:29 +00001845 .Lreg=0
1846 .rept 32
1847 fmr .Lreg,.Lreg
1848 .Lreg=.Lreg+1
1849 .endr
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001850
1851FTR_SECTION_ELSE
1852/*
1853 * To denormalise we need to move a copy of the register to itself.
1854 * For POWER7 do that here for the first 32 VSX registers only.
1855 */
1856 mfmsr r10
1857 oris r10,r10,MSR_VSX@h
1858 mtmsrd r10
1859 sync
1860
David Brazdil0f672f62019-12-10 10:32:29 +00001861 .Lreg=0
1862 .rept 32
1863 XVCPSGNDP(.Lreg,.Lreg,.Lreg)
1864 .Lreg=.Lreg+1
1865 .endr
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001866
1867ALT_FTR_SECTION_END_IFCLR(CPU_FTR_ARCH_206)
1868
1869BEGIN_FTR_SECTION
1870 b denorm_done
1871END_FTR_SECTION_IFCLR(CPU_FTR_ARCH_207S)
1872/*
1873 * To denormalise we need to move a copy of the register to itself.
1874 * For POWER8 we need to do that for all 64 VSX registers
1875 */
David Brazdil0f672f62019-12-10 10:32:29 +00001876 .Lreg=32
1877 .rept 32
1878 XVCPSGNDP(.Lreg,.Lreg,.Lreg)
1879 .Lreg=.Lreg+1
1880 .endr
1881
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001882denorm_done:
1883 mfspr r11,SPRN_HSRR0
1884 subi r11,r11,4
1885 mtspr SPRN_HSRR0,r11
1886 mtcrf 0x80,r9
1887 ld r9,PACA_EXGEN+EX_R9(r13)
1888 RESTORE_PPR_PACA(PACA_EXGEN, r10)
1889BEGIN_FTR_SECTION
1890 ld r10,PACA_EXGEN+EX_CFAR(r13)
1891 mtspr SPRN_CFAR,r10
1892END_FTR_SECTION_IFSET(CPU_FTR_CFAR)
1893 ld r10,PACA_EXGEN+EX_R10(r13)
1894 ld r11,PACA_EXGEN+EX_R11(r13)
1895 ld r12,PACA_EXGEN+EX_R12(r13)
1896 ld r13,PACA_EXGEN+EX_R13(r13)
1897 HRFI_TO_UNKNOWN
1898 b .
1899#endif
1900
1901EXC_COMMON(denorm_common, 0x1500, unknown_exception)
1902
1903
1904#ifdef CONFIG_CBE_RAS
David Brazdil0f672f62019-12-10 10:32:29 +00001905EXC_REAL_BEGIN(cbe_maintenance, 0x1600, 0x100)
1906 INT_HANDLER cbe_maintenance, 0x1600, ool=1, hsrr=EXC_HV, kvm=1
1907EXC_REAL_END(cbe_maintenance, 0x1600, 0x100)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001908EXC_VIRT_NONE(0x5600, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001909INT_KVM_HANDLER cbe_maintenance, 0x1600, EXC_HV, PACA_EXGEN, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001910EXC_COMMON(cbe_maintenance_common, 0x1600, cbe_maintenance_exception)
1911#else /* CONFIG_CBE_RAS */
1912EXC_REAL_NONE(0x1600, 0x100)
1913EXC_VIRT_NONE(0x5600, 0x100)
1914#endif
1915
1916
David Brazdil0f672f62019-12-10 10:32:29 +00001917EXC_REAL_BEGIN(altivec_assist, 0x1700, 0x100)
1918 INT_HANDLER altivec_assist, 0x1700, kvm=1
1919EXC_REAL_END(altivec_assist, 0x1700, 0x100)
1920EXC_VIRT_BEGIN(altivec_assist, 0x5700, 0x100)
1921 INT_HANDLER altivec_assist, 0x1700, virt=1
1922EXC_VIRT_END(altivec_assist, 0x5700, 0x100)
1923INT_KVM_HANDLER altivec_assist, 0x1700, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001924#ifdef CONFIG_ALTIVEC
1925EXC_COMMON(altivec_assist_common, 0x1700, altivec_assist_exception)
1926#else
1927EXC_COMMON(altivec_assist_common, 0x1700, unknown_exception)
1928#endif
1929
1930
1931#ifdef CONFIG_CBE_RAS
David Brazdil0f672f62019-12-10 10:32:29 +00001932EXC_REAL_BEGIN(cbe_thermal, 0x1800, 0x100)
1933 INT_HANDLER cbe_thermal, 0x1800, ool=1, hsrr=EXC_HV, kvm=1
1934EXC_REAL_END(cbe_thermal, 0x1800, 0x100)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001935EXC_VIRT_NONE(0x5800, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001936INT_KVM_HANDLER cbe_thermal, 0x1800, EXC_HV, PACA_EXGEN, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001937EXC_COMMON(cbe_thermal_common, 0x1800, cbe_thermal_exception)
1938#else /* CONFIG_CBE_RAS */
1939EXC_REAL_NONE(0x1800, 0x100)
1940EXC_VIRT_NONE(0x5800, 0x100)
1941#endif
1942
David Brazdil0f672f62019-12-10 10:32:29 +00001943
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001944#ifdef CONFIG_PPC_WATCHDOG
1945
1946#define MASKED_DEC_HANDLER_LABEL 3f
1947
1948#define MASKED_DEC_HANDLER(_H) \
19493: /* soft-nmi */ \
1950 std r12,PACA_EXGEN+EX_R12(r13); \
1951 GET_SCRATCH0(r10); \
1952 std r10,PACA_EXGEN+EX_R13(r13); \
David Brazdil0f672f62019-12-10 10:32:29 +00001953 INT_SAVE_SRR_AND_JUMP soft_nmi_common, _H, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001954
1955/*
1956 * Branch to soft_nmi_interrupt using the emergency stack. The emergency
1957 * stack is one that is usable by maskable interrupts so long as MSR_EE
1958 * remains off. It is used for recovery when something has corrupted the
1959 * normal kernel stack, for example. The "soft NMI" must not use the process
1960 * stack because we want irq disabled sections to avoid touching the stack
1961 * at all (other than PMU interrupts), so use the emergency stack for this,
1962 * and run it entirely with interrupts hard disabled.
1963 */
1964EXC_COMMON_BEGIN(soft_nmi_common)
1965 mr r10,r1
1966 ld r1,PACAEMERGSP(r13)
1967 subi r1,r1,INT_FRAME_SIZE
David Brazdil0f672f62019-12-10 10:32:29 +00001968 INT_COMMON 0x900, PACA_EXGEN, 0, 1, 1, 0, 0
1969 bl save_nvgprs
1970 addi r3,r1,STACK_FRAME_OVERHEAD
1971 bl soft_nmi_interrupt
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001972 b ret_from_except
1973
1974#else /* CONFIG_PPC_WATCHDOG */
1975#define MASKED_DEC_HANDLER_LABEL 2f /* normal return */
1976#define MASKED_DEC_HANDLER(_H)
1977#endif /* CONFIG_PPC_WATCHDOG */
1978
1979/*
1980 * An interrupt came in while soft-disabled. We set paca->irq_happened, then:
1981 * - If it was a decrementer interrupt, we bump the dec to max and and return.
1982 * - If it was a doorbell we return immediately since doorbells are edge
1983 * triggered and won't automatically refire.
1984 * - If it was a HMI we return immediately since we handled it in realmode
1985 * and it won't refire.
1986 * - Else it is one of PACA_IRQ_MUST_HARD_MASK, so hard disable and return.
1987 * This is called with r10 containing the value to OR to the paca field.
1988 */
David Brazdil0f672f62019-12-10 10:32:29 +00001989.macro MASKED_INTERRUPT hsrr
1990 .if \hsrr
1991masked_Hinterrupt:
1992 .else
1993masked_interrupt:
1994 .endif
1995 std r11,PACA_EXGEN+EX_R11(r13)
1996 lbz r11,PACAIRQHAPPENED(r13)
1997 or r11,r11,r10
1998 stb r11,PACAIRQHAPPENED(r13)
1999 cmpwi r10,PACA_IRQ_DEC
2000 bne 1f
2001 lis r10,0x7fff
2002 ori r10,r10,0xffff
2003 mtspr SPRN_DEC,r10
2004 b MASKED_DEC_HANDLER_LABEL
20051: andi. r10,r10,PACA_IRQ_MUST_HARD_MASK
2006 beq 2f
2007 .if \hsrr
2008 mfspr r10,SPRN_HSRR1
2009 xori r10,r10,MSR_EE /* clear MSR_EE */
2010 mtspr SPRN_HSRR1,r10
2011 .else
2012 mfspr r10,SPRN_SRR1
2013 xori r10,r10,MSR_EE /* clear MSR_EE */
2014 mtspr SPRN_SRR1,r10
2015 .endif
2016 ori r11,r11,PACA_IRQ_HARD_DIS
2017 stb r11,PACAIRQHAPPENED(r13)
20182: /* done */
2019 mtcrf 0x80,r9
2020 std r1,PACAR1(r13)
2021 ld r9,PACA_EXGEN+EX_R9(r13)
2022 ld r10,PACA_EXGEN+EX_R10(r13)
2023 ld r11,PACA_EXGEN+EX_R11(r13)
2024 /* returns to kernel where r13 must be set up, so don't restore it */
2025 .if \hsrr
2026 HRFI_TO_KERNEL
2027 .else
2028 RFI_TO_KERNEL
2029 .endif
2030 b .
2031 MASKED_DEC_HANDLER(\hsrr\())
2032.endm
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002033
2034TRAMP_REAL_BEGIN(stf_barrier_fallback)
2035 std r9,PACA_EXRFI+EX_R9(r13)
2036 std r10,PACA_EXRFI+EX_R10(r13)
2037 sync
2038 ld r9,PACA_EXRFI+EX_R9(r13)
2039 ld r10,PACA_EXRFI+EX_R10(r13)
2040 ori 31,31,0
2041 .rept 14
2042 b 1f
20431:
2044 .endr
2045 blr
2046
2047TRAMP_REAL_BEGIN(rfi_flush_fallback)
2048 SET_SCRATCH0(r13);
2049 GET_PACA(r13);
2050 std r1,PACA_EXRFI+EX_R12(r13)
2051 ld r1,PACAKSAVE(r13)
2052 std r9,PACA_EXRFI+EX_R9(r13)
2053 std r10,PACA_EXRFI+EX_R10(r13)
2054 std r11,PACA_EXRFI+EX_R11(r13)
2055 mfctr r9
2056 ld r10,PACA_RFI_FLUSH_FALLBACK_AREA(r13)
2057 ld r11,PACA_L1D_FLUSH_SIZE(r13)
2058 srdi r11,r11,(7 + 3) /* 128 byte lines, unrolled 8x */
2059 mtctr r11
2060 DCBT_BOOK3S_STOP_ALL_STREAM_IDS(r11) /* Stop prefetch streams */
2061
2062 /* order ld/st prior to dcbt stop all streams with flushing */
2063 sync
2064
2065 /*
2066 * The load adresses are at staggered offsets within cachelines,
2067 * which suits some pipelines better (on others it should not
2068 * hurt).
2069 */
20701:
2071 ld r11,(0x80 + 8)*0(r10)
2072 ld r11,(0x80 + 8)*1(r10)
2073 ld r11,(0x80 + 8)*2(r10)
2074 ld r11,(0x80 + 8)*3(r10)
2075 ld r11,(0x80 + 8)*4(r10)
2076 ld r11,(0x80 + 8)*5(r10)
2077 ld r11,(0x80 + 8)*6(r10)
2078 ld r11,(0x80 + 8)*7(r10)
2079 addi r10,r10,0x80*8
2080 bdnz 1b
2081
2082 mtctr r9
2083 ld r9,PACA_EXRFI+EX_R9(r13)
2084 ld r10,PACA_EXRFI+EX_R10(r13)
2085 ld r11,PACA_EXRFI+EX_R11(r13)
2086 ld r1,PACA_EXRFI+EX_R12(r13)
2087 GET_SCRATCH0(r13);
2088 rfid
2089
2090TRAMP_REAL_BEGIN(hrfi_flush_fallback)
2091 SET_SCRATCH0(r13);
2092 GET_PACA(r13);
2093 std r1,PACA_EXRFI+EX_R12(r13)
2094 ld r1,PACAKSAVE(r13)
2095 std r9,PACA_EXRFI+EX_R9(r13)
2096 std r10,PACA_EXRFI+EX_R10(r13)
2097 std r11,PACA_EXRFI+EX_R11(r13)
2098 mfctr r9
2099 ld r10,PACA_RFI_FLUSH_FALLBACK_AREA(r13)
2100 ld r11,PACA_L1D_FLUSH_SIZE(r13)
2101 srdi r11,r11,(7 + 3) /* 128 byte lines, unrolled 8x */
2102 mtctr r11
2103 DCBT_BOOK3S_STOP_ALL_STREAM_IDS(r11) /* Stop prefetch streams */
2104
2105 /* order ld/st prior to dcbt stop all streams with flushing */
2106 sync
2107
2108 /*
2109 * The load adresses are at staggered offsets within cachelines,
2110 * which suits some pipelines better (on others it should not
2111 * hurt).
2112 */
21131:
2114 ld r11,(0x80 + 8)*0(r10)
2115 ld r11,(0x80 + 8)*1(r10)
2116 ld r11,(0x80 + 8)*2(r10)
2117 ld r11,(0x80 + 8)*3(r10)
2118 ld r11,(0x80 + 8)*4(r10)
2119 ld r11,(0x80 + 8)*5(r10)
2120 ld r11,(0x80 + 8)*6(r10)
2121 ld r11,(0x80 + 8)*7(r10)
2122 addi r10,r10,0x80*8
2123 bdnz 1b
2124
2125 mtctr r9
2126 ld r9,PACA_EXRFI+EX_R9(r13)
2127 ld r10,PACA_EXRFI+EX_R10(r13)
2128 ld r11,PACA_EXRFI+EX_R11(r13)
2129 ld r1,PACA_EXRFI+EX_R12(r13)
2130 GET_SCRATCH0(r13);
2131 hrfid
2132
2133/*
2134 * Real mode exceptions actually use this too, but alternate
2135 * instruction code patches (which end up in the common .text area)
2136 * cannot reach these if they are put there.
2137 */
2138USE_FIXED_SECTION(virt_trampolines)
David Brazdil0f672f62019-12-10 10:32:29 +00002139 MASKED_INTERRUPT EXC_STD
2140 MASKED_INTERRUPT EXC_HV
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002141
2142#ifdef CONFIG_KVM_BOOK3S_64_HANDLER
2143TRAMP_REAL_BEGIN(kvmppc_skip_interrupt)
2144 /*
2145 * Here all GPRs are unchanged from when the interrupt happened
2146 * except for r13, which is saved in SPRG_SCRATCH0.
2147 */
2148 mfspr r13, SPRN_SRR0
2149 addi r13, r13, 4
2150 mtspr SPRN_SRR0, r13
2151 GET_SCRATCH0(r13)
2152 RFI_TO_KERNEL
2153 b .
2154
2155TRAMP_REAL_BEGIN(kvmppc_skip_Hinterrupt)
2156 /*
2157 * Here all GPRs are unchanged from when the interrupt happened
2158 * except for r13, which is saved in SPRG_SCRATCH0.
2159 */
2160 mfspr r13, SPRN_HSRR0
2161 addi r13, r13, 4
2162 mtspr SPRN_HSRR0, r13
2163 GET_SCRATCH0(r13)
2164 HRFI_TO_KERNEL
2165 b .
2166#endif
2167
2168/*
2169 * Ensure that any handlers that get invoked from the exception prologs
2170 * above are below the first 64KB (0x10000) of the kernel image because
2171 * the prologs assemble the addresses of these handlers using the
2172 * LOAD_HANDLER macro, which uses an ori instruction.
2173 */
2174
2175/*** Common interrupt handlers ***/
2176
2177
2178 /*
2179 * Relocation-on interrupts: A subset of the interrupts can be delivered
2180 * with IR=1/DR=1, if AIL==2 and MSR.HV won't be changed by delivering
2181 * it. Addresses are the same as the original interrupt addresses, but
2182 * offset by 0xc000000000004000.
2183 * It's impossible to receive interrupts below 0x300 via this mechanism.
2184 * KVM: None of these traps are from the guest ; anything that escalated
2185 * to HV=1 from HV=0 is delivered via real mode handlers.
2186 */
2187
2188 /*
2189 * This uses the standard macro, since the original 0x300 vector
2190 * only has extra guff for STAB-based processors -- which never
2191 * come here.
2192 */
2193
2194EXC_COMMON_BEGIN(ppc64_runlatch_on_trampoline)
2195 b __ppc64_runlatch_on
2196
2197USE_FIXED_SECTION(virt_trampolines)
2198 /*
2199 * The __end_interrupts marker must be past the out-of-line (OOL)
2200 * handlers, so that they are copied to real address 0x100 when running
2201 * a relocatable kernel. This ensures they can be reached from the short
2202 * trampoline handlers (like 0x4f00, 0x4f20, etc.) which branch
2203 * directly, without using LOAD_HANDLER().
2204 */
2205 .align 7
2206 .globl __end_interrupts
2207__end_interrupts:
2208DEFINE_FIXED_SYMBOL(__end_interrupts)
2209
2210#ifdef CONFIG_PPC_970_NAP
2211EXC_COMMON_BEGIN(power4_fixup_nap)
2212 andc r9,r9,r10
2213 std r9,TI_LOCAL_FLAGS(r11)
2214 ld r10,_LINK(r1) /* make idle task do the */
2215 std r10,_NIP(r1) /* equivalent of a blr */
2216 blr
2217#endif
2218
2219CLOSE_FIXED_SECTION(real_vectors);
2220CLOSE_FIXED_SECTION(real_trampolines);
2221CLOSE_FIXED_SECTION(virt_vectors);
2222CLOSE_FIXED_SECTION(virt_trampolines);
2223
2224USE_TEXT_SECTION()
2225
David Brazdil0f672f62019-12-10 10:32:29 +00002226/* MSR[RI] should be clear because this uses SRR[01] */
2227enable_machine_check:
2228 mflr r0
2229 bcl 20,31,$+4
22300: mflr r3
2231 addi r3,r3,(1f - 0b)
2232 mtspr SPRN_SRR0,r3
2233 mfmsr r3
2234 ori r3,r3,MSR_ME
2235 mtspr SPRN_SRR1,r3
2236 RFI_TO_KERNEL
22371: mtlr r0
2238 blr
2239
2240/* MSR[RI] should be clear because this uses SRR[01] */
2241disable_machine_check:
2242 mflr r0
2243 bcl 20,31,$+4
22440: mflr r3
2245 addi r3,r3,(1f - 0b)
2246 mtspr SPRN_SRR0,r3
2247 mfmsr r3
2248 li r4,MSR_ME
2249 andc r3,r3,r4
2250 mtspr SPRN_SRR1,r3
2251 RFI_TO_KERNEL
22521: mtlr r0
2253 blr
2254
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002255/*
2256 * Hash table stuff
2257 */
2258 .balign IFETCH_ALIGN_BYTES
2259do_hash_page:
2260#ifdef CONFIG_PPC_BOOK3S_64
2261 lis r0,(DSISR_BAD_FAULT_64S | DSISR_DABRMATCH | DSISR_KEYFAULT)@h
2262 ori r0,r0,DSISR_BAD_FAULT_64S@l
David Brazdil0f672f62019-12-10 10:32:29 +00002263 and. r0,r5,r0 /* weird error? */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002264 bne- handle_page_fault /* if not, try to insert a HPTE */
David Brazdil0f672f62019-12-10 10:32:29 +00002265 ld r11, PACA_THREAD_INFO(r13)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002266 lwz r0,TI_PREEMPT(r11) /* If we're in an "NMI" */
2267 andis. r0,r0,NMI_MASK@h /* (i.e. an irq when soft-disabled) */
2268 bne 77f /* then don't call hash_page now */
2269
2270 /*
David Brazdil0f672f62019-12-10 10:32:29 +00002271 * r3 contains the trap number
2272 * r4 contains the faulting address
2273 * r5 contains dsisr
2274 * r6 msr
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002275 *
2276 * at return r3 = 0 for success, 1 for page fault, negative for error
2277 */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002278 bl __hash_page /* build HPTE if possible */
2279 cmpdi r3,0 /* see if __hash_page succeeded */
2280
2281 /* Success */
2282 beq fast_exc_return_irq /* Return from exception on success */
2283
2284 /* Error */
2285 blt- 13f
2286
David Brazdil0f672f62019-12-10 10:32:29 +00002287 /* Reload DAR/DSISR into r4/r5 for the DABR check below */
2288 ld r4,_DAR(r1)
2289 ld r5,_DSISR(r1)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002290#endif /* CONFIG_PPC_BOOK3S_64 */
2291
2292/* Here we have a page fault that hash_page can't handle. */
2293handle_page_fault:
David Brazdil0f672f62019-12-10 10:32:29 +0000229411: andis. r0,r5,DSISR_DABRMATCH@h
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002295 bne- handle_dabr_fault
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002296 addi r3,r1,STACK_FRAME_OVERHEAD
2297 bl do_page_fault
2298 cmpdi r3,0
David Brazdil0f672f62019-12-10 10:32:29 +00002299 beq+ ret_from_except_lite
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002300 bl save_nvgprs
2301 mr r5,r3
2302 addi r3,r1,STACK_FRAME_OVERHEAD
David Brazdil0f672f62019-12-10 10:32:29 +00002303 ld r4,_DAR(r1)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002304 bl bad_page_fault
2305 b ret_from_except
2306
2307/* We have a data breakpoint exception - handle it */
2308handle_dabr_fault:
2309 bl save_nvgprs
2310 ld r4,_DAR(r1)
2311 ld r5,_DSISR(r1)
2312 addi r3,r1,STACK_FRAME_OVERHEAD
2313 bl do_break
David Brazdil0f672f62019-12-10 10:32:29 +00002314 /*
2315 * do_break() may have changed the NV GPRS while handling a breakpoint.
2316 * If so, we need to restore them with their updated values. Don't use
2317 * ret_from_except_lite here.
2318 */
2319 b ret_from_except
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002320
2321
2322#ifdef CONFIG_PPC_BOOK3S_64
2323/* We have a page fault that hash_page could handle but HV refused
2324 * the PTE insertion
2325 */
232613: bl save_nvgprs
2327 mr r5,r3
2328 addi r3,r1,STACK_FRAME_OVERHEAD
2329 ld r4,_DAR(r1)
2330 bl low_hash_fault
2331 b ret_from_except
2332#endif
2333
2334/*
2335 * We come here as a result of a DSI at a point where we don't want
2336 * to call hash_page, such as when we are accessing memory (possibly
2337 * user memory) inside a PMU interrupt that occurred while interrupts
2338 * were soft-disabled. We want to invoke the exception handler for
2339 * the access, or panic if there isn't a handler.
2340 */
234177: bl save_nvgprs
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002342 addi r3,r1,STACK_FRAME_OVERHEAD
2343 li r5,SIGSEGV
2344 bl bad_page_fault
2345 b ret_from_except
2346
2347/*
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002348 * When doorbell is triggered from system reset wakeup, the message is
2349 * not cleared, so it would fire again when EE is enabled.
2350 *
2351 * When coming from local_irq_enable, there may be the same problem if
2352 * we were hard disabled.
2353 *
2354 * Execute msgclr to clear pending exceptions before handling it.
2355 */
2356h_doorbell_common_msgclr:
2357 LOAD_REG_IMMEDIATE(r3, PPC_DBELL_MSGTYPE << (63-36))
2358 PPC_MSGCLR(3)
2359 b h_doorbell_common
2360
2361doorbell_super_common_msgclr:
2362 LOAD_REG_IMMEDIATE(r3, PPC_DBELL_MSGTYPE << (63-36))
2363 PPC_MSGCLRP(3)
2364 b doorbell_super_common
2365
2366/*
2367 * Called from arch_local_irq_enable when an interrupt needs
2368 * to be resent. r3 contains 0x500, 0x900, 0xa00 or 0xe80 to indicate
2369 * which kind of interrupt. MSR:EE is already off. We generate a
2370 * stackframe like if a real interrupt had happened.
2371 *
2372 * Note: While MSR:EE is off, we need to make sure that _MSR
2373 * in the generated frame has EE set to 1 or the exception
2374 * handler will not properly re-enable them.
2375 *
2376 * Note that we don't specify LR as the NIP (return address) for
2377 * the interrupt because that would unbalance the return branch
2378 * predictor.
2379 */
2380_GLOBAL(__replay_interrupt)
2381 /* We are going to jump to the exception common code which
2382 * will retrieve various register values from the PACA which
2383 * we don't give a damn about, so we don't bother storing them.
2384 */
2385 mfmsr r12
2386 LOAD_REG_ADDR(r11, replay_interrupt_return)
2387 mfcr r9
2388 ori r12,r12,MSR_EE
2389 cmpwi r3,0x900
2390 beq decrementer_common
2391 cmpwi r3,0x500
2392BEGIN_FTR_SECTION
2393 beq h_virt_irq_common
2394FTR_SECTION_ELSE
2395 beq hardware_interrupt_common
2396ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_300)
2397 cmpwi r3,0xf00
2398 beq performance_monitor_common
2399BEGIN_FTR_SECTION
2400 cmpwi r3,0xa00
2401 beq h_doorbell_common_msgclr
2402 cmpwi r3,0xe60
2403 beq hmi_exception_common
2404FTR_SECTION_ELSE
2405 cmpwi r3,0xa00
2406 beq doorbell_super_common_msgclr
2407ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE)
2408replay_interrupt_return:
2409 blr
2410
2411_ASM_NOKPROBE_SYMBOL(__replay_interrupt)