blob: 88bba0a931d654b0d1c36734e32be0d3cc602afe [file] [log] [blame]
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001/* SPDX-License-Identifier: GPL-2.0 */
2/*
3 * This file contains the 64-bit "server" PowerPC variant
4 * of the low level exception handling including exception
5 * vectors, exception return, part of the slb and stab
6 * handling and other fixed offset specific things.
7 *
8 * This file is meant to be #included from head_64.S due to
9 * position dependent assembly.
10 *
11 * Most of this originates from head_64.S and thus has the same
12 * copyright history.
13 *
14 */
15
16#include <asm/hw_irq.h>
17#include <asm/exception-64s.h>
18#include <asm/ptrace.h>
19#include <asm/cpuidle.h>
20#include <asm/head-64.h>
21#include <asm/feature-fixups.h>
David Brazdil0f672f62019-12-10 10:32:29 +000022#include <asm/kup.h>
23
24/* PACA save area offsets (exgen, exmc, etc) */
25#define EX_R9 0
26#define EX_R10 8
27#define EX_R11 16
28#define EX_R12 24
29#define EX_R13 32
30#define EX_DAR 40
31#define EX_DSISR 48
32#define EX_CCR 52
33#define EX_CFAR 56
34#define EX_PPR 64
35#if defined(CONFIG_RELOCATABLE)
36#define EX_CTR 72
37.if EX_SIZE != 10
38 .error "EX_SIZE is wrong"
39.endif
40#else
41.if EX_SIZE != 9
42 .error "EX_SIZE is wrong"
43.endif
44#endif
45
46/*
47 * Following are fixed section helper macros.
48 *
49 * EXC_REAL_BEGIN/END - real, unrelocated exception vectors
50 * EXC_VIRT_BEGIN/END - virt (AIL), unrelocated exception vectors
51 * TRAMP_REAL_BEGIN - real, unrelocated helpers (virt may call these)
52 * TRAMP_VIRT_BEGIN - virt, unreloc helpers (in practice, real can use)
53 * TRAMP_KVM_BEGIN - KVM handlers, these are put into real, unrelocated
54 * EXC_COMMON - After switching to virtual, relocated mode.
55 */
56
57#define EXC_REAL_BEGIN(name, start, size) \
58 FIXED_SECTION_ENTRY_BEGIN_LOCATION(real_vectors, exc_real_##start##_##name, start, size)
59
60#define EXC_REAL_END(name, start, size) \
61 FIXED_SECTION_ENTRY_END_LOCATION(real_vectors, exc_real_##start##_##name, start, size)
62
63#define EXC_VIRT_BEGIN(name, start, size) \
64 FIXED_SECTION_ENTRY_BEGIN_LOCATION(virt_vectors, exc_virt_##start##_##name, start, size)
65
66#define EXC_VIRT_END(name, start, size) \
67 FIXED_SECTION_ENTRY_END_LOCATION(virt_vectors, exc_virt_##start##_##name, start, size)
68
69#define EXC_COMMON_BEGIN(name) \
70 USE_TEXT_SECTION(); \
71 .balign IFETCH_ALIGN_BYTES; \
72 .global name; \
73 _ASM_NOKPROBE_SYMBOL(name); \
74 DEFINE_FIXED_SYMBOL(name); \
75name:
76
77#define TRAMP_REAL_BEGIN(name) \
78 FIXED_SECTION_ENTRY_BEGIN(real_trampolines, name)
79
80#define TRAMP_VIRT_BEGIN(name) \
81 FIXED_SECTION_ENTRY_BEGIN(virt_trampolines, name)
82
83#ifdef CONFIG_KVM_BOOK3S_64_HANDLER
84#define TRAMP_KVM_BEGIN(name) \
85 TRAMP_VIRT_BEGIN(name)
86#else
87#define TRAMP_KVM_BEGIN(name)
88#endif
89
90#define EXC_REAL_NONE(start, size) \
91 FIXED_SECTION_ENTRY_BEGIN_LOCATION(real_vectors, exc_real_##start##_##unused, start, size); \
92 FIXED_SECTION_ENTRY_END_LOCATION(real_vectors, exc_real_##start##_##unused, start, size)
93
94#define EXC_VIRT_NONE(start, size) \
95 FIXED_SECTION_ENTRY_BEGIN_LOCATION(virt_vectors, exc_virt_##start##_##unused, start, size); \
96 FIXED_SECTION_ENTRY_END_LOCATION(virt_vectors, exc_virt_##start##_##unused, start, size)
97
98/*
99 * We're short on space and time in the exception prolog, so we can't
100 * use the normal LOAD_REG_IMMEDIATE macro to load the address of label.
101 * Instead we get the base of the kernel from paca->kernelbase and or in the low
102 * part of label. This requires that the label be within 64KB of kernelbase, and
103 * that kernelbase be 64K aligned.
104 */
105#define LOAD_HANDLER(reg, label) \
106 ld reg,PACAKBASE(r13); /* get high part of &label */ \
107 ori reg,reg,FIXED_SYMBOL_ABS_ADDR(label)
108
109#define __LOAD_HANDLER(reg, label) \
110 ld reg,PACAKBASE(r13); \
111 ori reg,reg,(ABS_ADDR(label))@l
112
113/*
114 * Branches from unrelocated code (e.g., interrupts) to labels outside
115 * head-y require >64K offsets.
116 */
117#define __LOAD_FAR_HANDLER(reg, label) \
118 ld reg,PACAKBASE(r13); \
119 ori reg,reg,(ABS_ADDR(label))@l; \
120 addis reg,reg,(ABS_ADDR(label))@h
121
122/* Exception register prefixes */
123#define EXC_HV_OR_STD 2 /* depends on HVMODE */
124#define EXC_HV 1
125#define EXC_STD 0
126
127#if defined(CONFIG_RELOCATABLE)
128/*
129 * If we support interrupts with relocation on AND we're a relocatable kernel,
130 * we need to use CTR to get to the 2nd level handler. So, save/restore it
131 * when required.
132 */
133#define SAVE_CTR(reg, area) mfctr reg ; std reg,area+EX_CTR(r13)
134#define GET_CTR(reg, area) ld reg,area+EX_CTR(r13)
135#define RESTORE_CTR(reg, area) ld reg,area+EX_CTR(r13) ; mtctr reg
136#else
137/* ...else CTR is unused and in register. */
138#define SAVE_CTR(reg, area)
139#define GET_CTR(reg, area) mfctr reg
140#define RESTORE_CTR(reg, area)
141#endif
142
143/*
144 * PPR save/restore macros used in exceptions-64s.S
145 * Used for P7 or later processors
146 */
147#define SAVE_PPR(area, ra) \
148BEGIN_FTR_SECTION_NESTED(940) \
149 ld ra,area+EX_PPR(r13); /* Read PPR from paca */ \
150 std ra,_PPR(r1); \
151END_FTR_SECTION_NESTED(CPU_FTR_HAS_PPR,CPU_FTR_HAS_PPR,940)
152
153#define RESTORE_PPR_PACA(area, ra) \
154BEGIN_FTR_SECTION_NESTED(941) \
155 ld ra,area+EX_PPR(r13); \
156 mtspr SPRN_PPR,ra; \
157END_FTR_SECTION_NESTED(CPU_FTR_HAS_PPR,CPU_FTR_HAS_PPR,941)
158
159/*
160 * Get an SPR into a register if the CPU has the given feature
161 */
162#define OPT_GET_SPR(ra, spr, ftr) \
163BEGIN_FTR_SECTION_NESTED(943) \
164 mfspr ra,spr; \
165END_FTR_SECTION_NESTED(ftr,ftr,943)
166
167/*
168 * Set an SPR from a register if the CPU has the given feature
169 */
170#define OPT_SET_SPR(ra, spr, ftr) \
171BEGIN_FTR_SECTION_NESTED(943) \
172 mtspr spr,ra; \
173END_FTR_SECTION_NESTED(ftr,ftr,943)
174
175/*
176 * Save a register to the PACA if the CPU has the given feature
177 */
178#define OPT_SAVE_REG_TO_PACA(offset, ra, ftr) \
179BEGIN_FTR_SECTION_NESTED(943) \
180 std ra,offset(r13); \
181END_FTR_SECTION_NESTED(ftr,ftr,943)
182
183/*
184 * Branch to label using its 0xC000 address. This results in instruction
185 * address suitable for MSR[IR]=0 or 1, which allows relocation to be turned
186 * on using mtmsr rather than rfid.
187 *
188 * This could set the 0xc bits for !RELOCATABLE as an immediate, rather than
189 * load KBASE for a slight optimisation.
190 */
191#define BRANCH_TO_C000(reg, label) \
192 __LOAD_FAR_HANDLER(reg, label); \
193 mtctr reg; \
194 bctr
195
196.macro INT_KVM_HANDLER name, vec, hsrr, area, skip
197 TRAMP_KVM_BEGIN(\name\()_kvm)
198 KVM_HANDLER \vec, \hsrr, \area, \skip
199.endm
200
201#ifdef CONFIG_KVM_BOOK3S_64_HANDLER
202#ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE
203/*
204 * If hv is possible, interrupts come into to the hv version
205 * of the kvmppc_interrupt code, which then jumps to the PR handler,
206 * kvmppc_interrupt_pr, if the guest is a PR guest.
207 */
208#define kvmppc_interrupt kvmppc_interrupt_hv
209#else
210#define kvmppc_interrupt kvmppc_interrupt_pr
211#endif
212
213.macro KVMTEST name, hsrr, n
214 lbz r10,HSTATE_IN_GUEST(r13)
215 cmpwi r10,0
216 bne \name\()_kvm
217.endm
218
219.macro KVM_HANDLER vec, hsrr, area, skip
220 .if \skip
221 cmpwi r10,KVM_GUEST_MODE_SKIP
222 beq 89f
223 .else
224BEGIN_FTR_SECTION_NESTED(947)
225 ld r10,\area+EX_CFAR(r13)
226 std r10,HSTATE_CFAR(r13)
227END_FTR_SECTION_NESTED(CPU_FTR_CFAR,CPU_FTR_CFAR,947)
228 .endif
229
230BEGIN_FTR_SECTION_NESTED(948)
231 ld r10,\area+EX_PPR(r13)
232 std r10,HSTATE_PPR(r13)
233END_FTR_SECTION_NESTED(CPU_FTR_HAS_PPR,CPU_FTR_HAS_PPR,948)
234 ld r10,\area+EX_R10(r13)
235 std r12,HSTATE_SCRATCH0(r13)
236 sldi r12,r9,32
237 /* HSRR variants have the 0x2 bit added to their trap number */
238 .if \hsrr == EXC_HV_OR_STD
239 BEGIN_FTR_SECTION
240 ori r12,r12,(\vec + 0x2)
241 FTR_SECTION_ELSE
242 ori r12,r12,(\vec)
243 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
244 .elseif \hsrr
245 ori r12,r12,(\vec + 0x2)
246 .else
247 ori r12,r12,(\vec)
248 .endif
249
250#ifdef CONFIG_RELOCATABLE
251 /*
252 * KVM requires __LOAD_FAR_HANDLER beause kvmppc_interrupt lives
253 * outside the head section. CONFIG_RELOCATABLE KVM expects CTR
254 * to be saved in HSTATE_SCRATCH1.
255 */
256 mfctr r9
257 std r9,HSTATE_SCRATCH1(r13)
258 __LOAD_FAR_HANDLER(r9, kvmppc_interrupt)
259 mtctr r9
260 ld r9,\area+EX_R9(r13)
261 bctr
262#else
263 ld r9,\area+EX_R9(r13)
264 b kvmppc_interrupt
265#endif
266
267
268 .if \skip
26989: mtocrf 0x80,r9
270 ld r9,\area+EX_R9(r13)
271 ld r10,\area+EX_R10(r13)
272 .if \hsrr == EXC_HV_OR_STD
273 BEGIN_FTR_SECTION
274 b kvmppc_skip_Hinterrupt
275 FTR_SECTION_ELSE
276 b kvmppc_skip_interrupt
277 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
278 .elseif \hsrr
279 b kvmppc_skip_Hinterrupt
280 .else
281 b kvmppc_skip_interrupt
282 .endif
283 .endif
284.endm
285
286#else
287.macro KVMTEST name, hsrr, n
288.endm
289.macro KVM_HANDLER name, vec, hsrr, area, skip
290.endm
291#endif
292
293.macro INT_SAVE_SRR_AND_JUMP label, hsrr, set_ri
294 ld r10,PACAKMSR(r13) /* get MSR value for kernel */
295 .if ! \set_ri
296 xori r10,r10,MSR_RI /* Clear MSR_RI */
297 .endif
298 .if \hsrr == EXC_HV_OR_STD
299 BEGIN_FTR_SECTION
300 mfspr r11,SPRN_HSRR0 /* save HSRR0 */
301 mfspr r12,SPRN_HSRR1 /* and HSRR1 */
302 mtspr SPRN_HSRR1,r10
303 FTR_SECTION_ELSE
304 mfspr r11,SPRN_SRR0 /* save SRR0 */
305 mfspr r12,SPRN_SRR1 /* and SRR1 */
306 mtspr SPRN_SRR1,r10
307 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
308 .elseif \hsrr
309 mfspr r11,SPRN_HSRR0 /* save HSRR0 */
310 mfspr r12,SPRN_HSRR1 /* and HSRR1 */
311 mtspr SPRN_HSRR1,r10
312 .else
313 mfspr r11,SPRN_SRR0 /* save SRR0 */
314 mfspr r12,SPRN_SRR1 /* and SRR1 */
315 mtspr SPRN_SRR1,r10
316 .endif
317 LOAD_HANDLER(r10, \label\())
318 .if \hsrr == EXC_HV_OR_STD
319 BEGIN_FTR_SECTION
320 mtspr SPRN_HSRR0,r10
321 HRFI_TO_KERNEL
322 FTR_SECTION_ELSE
323 mtspr SPRN_SRR0,r10
324 RFI_TO_KERNEL
325 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
326 .elseif \hsrr
327 mtspr SPRN_HSRR0,r10
328 HRFI_TO_KERNEL
329 .else
330 mtspr SPRN_SRR0,r10
331 RFI_TO_KERNEL
332 .endif
333 b . /* prevent speculative execution */
334.endm
335
336/* INT_SAVE_SRR_AND_JUMP works for real or virt, this is faster but virt only */
337.macro INT_VIRT_SAVE_SRR_AND_JUMP label, hsrr
338#ifdef CONFIG_RELOCATABLE
339 .if \hsrr == EXC_HV_OR_STD
340 BEGIN_FTR_SECTION
341 mfspr r11,SPRN_HSRR0 /* save HSRR0 */
342 FTR_SECTION_ELSE
343 mfspr r11,SPRN_SRR0 /* save SRR0 */
344 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
345 .elseif \hsrr
346 mfspr r11,SPRN_HSRR0 /* save HSRR0 */
347 .else
348 mfspr r11,SPRN_SRR0 /* save SRR0 */
349 .endif
350 LOAD_HANDLER(r12, \label\())
351 mtctr r12
352 .if \hsrr == EXC_HV_OR_STD
353 BEGIN_FTR_SECTION
354 mfspr r12,SPRN_HSRR1 /* and HSRR1 */
355 FTR_SECTION_ELSE
356 mfspr r12,SPRN_SRR1 /* and HSRR1 */
357 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
358 .elseif \hsrr
359 mfspr r12,SPRN_HSRR1 /* and HSRR1 */
360 .else
361 mfspr r12,SPRN_SRR1 /* and HSRR1 */
362 .endif
363 li r10,MSR_RI
364 mtmsrd r10,1 /* Set RI (EE=0) */
365 bctr
366#else
367 .if \hsrr == EXC_HV_OR_STD
368 BEGIN_FTR_SECTION
369 mfspr r11,SPRN_HSRR0 /* save HSRR0 */
370 mfspr r12,SPRN_HSRR1 /* and HSRR1 */
371 FTR_SECTION_ELSE
372 mfspr r11,SPRN_SRR0 /* save SRR0 */
373 mfspr r12,SPRN_SRR1 /* and SRR1 */
374 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
375 .elseif \hsrr
376 mfspr r11,SPRN_HSRR0 /* save HSRR0 */
377 mfspr r12,SPRN_HSRR1 /* and HSRR1 */
378 .else
379 mfspr r11,SPRN_SRR0 /* save SRR0 */
380 mfspr r12,SPRN_SRR1 /* and SRR1 */
381 .endif
382 li r10,MSR_RI
383 mtmsrd r10,1 /* Set RI (EE=0) */
384 b \label
385#endif
386.endm
387
388/*
389 * This is the BOOK3S interrupt entry code macro.
390 *
391 * This can result in one of several things happening:
392 * - Branch to the _common handler, relocated, in virtual mode.
393 * These are normal interrupts (synchronous and asynchronous) handled by
394 * the kernel.
395 * - Branch to KVM, relocated but real mode interrupts remain in real mode.
396 * These occur when HSTATE_IN_GUEST is set. The interrupt may be caused by
397 * / intended for host or guest kernel, but KVM must always be involved
398 * because the machine state is set for guest execution.
399 * - Branch to the masked handler, unrelocated.
400 * These occur when maskable asynchronous interrupts are taken with the
401 * irq_soft_mask set.
402 * - Branch to an "early" handler in real mode but relocated.
403 * This is done if early=1. MCE and HMI use these to handle errors in real
404 * mode.
405 * - Fall through and continue executing in real, unrelocated mode.
406 * This is done if early=2.
407 */
408.macro INT_HANDLER name, vec, ool=0, early=0, virt=0, hsrr=0, area=PACA_EXGEN, ri=1, dar=0, dsisr=0, bitmask=0, kvm=0
409 SET_SCRATCH0(r13) /* save r13 */
410 GET_PACA(r13)
411 std r9,\area\()+EX_R9(r13) /* save r9 */
412 OPT_GET_SPR(r9, SPRN_PPR, CPU_FTR_HAS_PPR)
413 HMT_MEDIUM
414 std r10,\area\()+EX_R10(r13) /* save r10 - r12 */
415 OPT_GET_SPR(r10, SPRN_CFAR, CPU_FTR_CFAR)
416 .if \ool
417 .if !\virt
418 b tramp_real_\name
419 .pushsection .text
420 TRAMP_REAL_BEGIN(tramp_real_\name)
421 .else
422 b tramp_virt_\name
423 .pushsection .text
424 TRAMP_VIRT_BEGIN(tramp_virt_\name)
425 .endif
426 .endif
427
428 OPT_SAVE_REG_TO_PACA(\area\()+EX_PPR, r9, CPU_FTR_HAS_PPR)
429 OPT_SAVE_REG_TO_PACA(\area\()+EX_CFAR, r10, CPU_FTR_CFAR)
430 INTERRUPT_TO_KERNEL
431 SAVE_CTR(r10, \area\())
432 mfcr r9
433 .if \kvm
434 KVMTEST \name \hsrr \vec
435 .endif
436 .if \bitmask
437 lbz r10,PACAIRQSOFTMASK(r13)
438 andi. r10,r10,\bitmask
439 /* Associate vector numbers with bits in paca->irq_happened */
440 .if \vec == 0x500 || \vec == 0xea0
441 li r10,PACA_IRQ_EE
442 .elseif \vec == 0x900
443 li r10,PACA_IRQ_DEC
444 .elseif \vec == 0xa00 || \vec == 0xe80
445 li r10,PACA_IRQ_DBELL
446 .elseif \vec == 0xe60
447 li r10,PACA_IRQ_HMI
448 .elseif \vec == 0xf00
449 li r10,PACA_IRQ_PMI
450 .else
451 .abort "Bad maskable vector"
452 .endif
453
454 .if \hsrr == EXC_HV_OR_STD
455 BEGIN_FTR_SECTION
456 bne masked_Hinterrupt
457 FTR_SECTION_ELSE
458 bne masked_interrupt
459 ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
460 .elseif \hsrr
461 bne masked_Hinterrupt
462 .else
463 bne masked_interrupt
464 .endif
465 .endif
466
467 std r11,\area\()+EX_R11(r13)
468 std r12,\area\()+EX_R12(r13)
469
470 /*
471 * DAR/DSISR, SCRATCH0 must be read before setting MSR[RI],
472 * because a d-side MCE will clobber those registers so is
473 * not recoverable if they are live.
474 */
475 GET_SCRATCH0(r10)
476 std r10,\area\()+EX_R13(r13)
477 .if \dar
478 .if \hsrr
479 mfspr r10,SPRN_HDAR
480 .else
481 mfspr r10,SPRN_DAR
482 .endif
483 std r10,\area\()+EX_DAR(r13)
484 .endif
485 .if \dsisr
486 .if \hsrr
487 mfspr r10,SPRN_HDSISR
488 .else
489 mfspr r10,SPRN_DSISR
490 .endif
491 stw r10,\area\()+EX_DSISR(r13)
492 .endif
493
494 .if \early == 2
495 /* nothing more */
496 .elseif \early
497 mfctr r10 /* save ctr, even for !RELOCATABLE */
498 BRANCH_TO_C000(r11, \name\()_early_common)
499 .elseif !\virt
500 INT_SAVE_SRR_AND_JUMP \name\()_common, \hsrr, \ri
501 .else
502 INT_VIRT_SAVE_SRR_AND_JUMP \name\()_common, \hsrr
503 .endif
504 .if \ool
505 .popsection
506 .endif
507.endm
508
509/*
510 * On entry r13 points to the paca, r9-r13 are saved in the paca,
511 * r9 contains the saved CR, r11 and r12 contain the saved SRR0 and
512 * SRR1, and relocation is on.
513 *
514 * If stack=0, then the stack is already set in r1, and r1 is saved in r10.
515 * PPR save and CPU accounting is not done for the !stack case (XXX why not?)
516 */
517.macro INT_COMMON vec, area, stack, kaup, reconcile, dar, dsisr
518 .if \stack
519 andi. r10,r12,MSR_PR /* See if coming from user */
520 mr r10,r1 /* Save r1 */
521 subi r1,r1,INT_FRAME_SIZE /* alloc frame on kernel stack */
522 beq- 100f
523 ld r1,PACAKSAVE(r13) /* kernel stack to use */
524100: tdgei r1,-INT_FRAME_SIZE /* trap if r1 is in userspace */
525 EMIT_BUG_ENTRY 100b,__FILE__,__LINE__,0
526 .endif
527
528 std r9,_CCR(r1) /* save CR in stackframe */
529 std r11,_NIP(r1) /* save SRR0 in stackframe */
530 std r12,_MSR(r1) /* save SRR1 in stackframe */
531 std r10,0(r1) /* make stack chain pointer */
532 std r0,GPR0(r1) /* save r0 in stackframe */
533 std r10,GPR1(r1) /* save r1 in stackframe */
534
535 .if \stack
536 .if \kaup
537 kuap_save_amr_and_lock r9, r10, cr1, cr0
538 .endif
539 beq 101f /* if from kernel mode */
540 ACCOUNT_CPU_USER_ENTRY(r13, r9, r10)
541 SAVE_PPR(\area, r9)
542101:
543 .else
544 .if \kaup
545 kuap_save_amr_and_lock r9, r10, cr1
546 .endif
547 .endif
548
549 /* Save original regs values from save area to stack frame. */
550 ld r9,\area+EX_R9(r13) /* move r9, r10 to stackframe */
551 ld r10,\area+EX_R10(r13)
552 std r9,GPR9(r1)
553 std r10,GPR10(r1)
554 ld r9,\area+EX_R11(r13) /* move r11 - r13 to stackframe */
555 ld r10,\area+EX_R12(r13)
556 ld r11,\area+EX_R13(r13)
557 std r9,GPR11(r1)
558 std r10,GPR12(r1)
559 std r11,GPR13(r1)
560 .if \dar
561 .if \dar == 2
562 ld r10,_NIP(r1)
563 .else
564 ld r10,\area+EX_DAR(r13)
565 .endif
566 std r10,_DAR(r1)
567 .endif
568 .if \dsisr
569 .if \dsisr == 2
570 ld r10,_MSR(r1)
571 lis r11,DSISR_SRR1_MATCH_64S@h
572 and r10,r10,r11
573 .else
574 lwz r10,\area+EX_DSISR(r13)
575 .endif
576 std r10,_DSISR(r1)
577 .endif
578BEGIN_FTR_SECTION_NESTED(66)
579 ld r10,\area+EX_CFAR(r13)
580 std r10,ORIG_GPR3(r1)
581END_FTR_SECTION_NESTED(CPU_FTR_CFAR, CPU_FTR_CFAR, 66)
582 GET_CTR(r10, \area)
583 std r10,_CTR(r1)
584 std r2,GPR2(r1) /* save r2 in stackframe */
585 SAVE_4GPRS(3, r1) /* save r3 - r6 in stackframe */
586 SAVE_2GPRS(7, r1) /* save r7, r8 in stackframe */
587 mflr r9 /* Get LR, later save to stack */
588 ld r2,PACATOC(r13) /* get kernel TOC into r2 */
589 std r9,_LINK(r1)
590 lbz r10,PACAIRQSOFTMASK(r13)
591 mfspr r11,SPRN_XER /* save XER in stackframe */
592 std r10,SOFTE(r1)
593 std r11,_XER(r1)
594 li r9,(\vec)+1
595 std r9,_TRAP(r1) /* set trap number */
596 li r10,0
597 ld r11,exception_marker@toc(r2)
598 std r10,RESULT(r1) /* clear regs->result */
599 std r11,STACK_FRAME_OVERHEAD-16(r1) /* mark the frame */
600
601 .if \stack
602 ACCOUNT_STOLEN_TIME
603 .endif
604
605 .if \reconcile
606 RECONCILE_IRQ_STATE(r10, r11)
607 .endif
608.endm
609
610/*
611 * Restore all registers including H/SRR0/1 saved in a stack frame of a
612 * standard exception.
613 */
614.macro EXCEPTION_RESTORE_REGS hsrr
615 /* Move original SRR0 and SRR1 into the respective regs */
616 ld r9,_MSR(r1)
617 .if \hsrr == EXC_HV_OR_STD
618 .error "EXC_HV_OR_STD Not implemented for EXCEPTION_RESTORE_REGS"
619 .endif
620 .if \hsrr
621 mtspr SPRN_HSRR1,r9
622 .else
623 mtspr SPRN_SRR1,r9
624 .endif
625 ld r9,_NIP(r1)
626 .if \hsrr
627 mtspr SPRN_HSRR0,r9
628 .else
629 mtspr SPRN_SRR0,r9
630 .endif
631 ld r9,_CTR(r1)
632 mtctr r9
633 ld r9,_XER(r1)
634 mtxer r9
635 ld r9,_LINK(r1)
636 mtlr r9
637 ld r9,_CCR(r1)
638 mtcr r9
639 REST_8GPRS(2, r1)
640 REST_4GPRS(10, r1)
641 REST_GPR(0, r1)
642 /* restore original r1. */
643 ld r1,GPR1(r1)
644.endm
645
646#define RUNLATCH_ON \
647BEGIN_FTR_SECTION \
648 ld r3, PACA_THREAD_INFO(r13); \
649 ld r4,TI_LOCAL_FLAGS(r3); \
650 andi. r0,r4,_TLF_RUNLATCH; \
651 beql ppc64_runlatch_on_trampoline; \
652END_FTR_SECTION_IFSET(CPU_FTR_CTRL)
653
654/*
655 * When the idle code in power4_idle puts the CPU into NAP mode,
656 * it has to do so in a loop, and relies on the external interrupt
657 * and decrementer interrupt entry code to get it out of the loop.
658 * It sets the _TLF_NAPPING bit in current_thread_info()->local_flags
659 * to signal that it is in the loop and needs help to get out.
660 */
661#ifdef CONFIG_PPC_970_NAP
662#define FINISH_NAP \
663BEGIN_FTR_SECTION \
664 ld r11, PACA_THREAD_INFO(r13); \
665 ld r9,TI_LOCAL_FLAGS(r11); \
666 andi. r10,r9,_TLF_NAPPING; \
667 bnel power4_fixup_nap; \
668END_FTR_SECTION_IFSET(CPU_FTR_CAN_NAP)
669#else
670#define FINISH_NAP
671#endif
672
673#define EXC_COMMON(name, realvec, hdlr) \
674 EXC_COMMON_BEGIN(name); \
675 INT_COMMON realvec, PACA_EXGEN, 1, 1, 1, 0, 0 ; \
676 bl save_nvgprs; \
677 addi r3,r1,STACK_FRAME_OVERHEAD; \
678 bl hdlr; \
679 b ret_from_except
680
681/*
682 * Like EXC_COMMON, but for exceptions that can occur in the idle task and
683 * therefore need the special idle handling (finish nap and runlatch)
684 */
685#define EXC_COMMON_ASYNC(name, realvec, hdlr) \
686 EXC_COMMON_BEGIN(name); \
687 INT_COMMON realvec, PACA_EXGEN, 1, 1, 1, 0, 0 ; \
688 FINISH_NAP; \
689 RUNLATCH_ON; \
690 addi r3,r1,STACK_FRAME_OVERHEAD; \
691 bl hdlr; \
692 b ret_from_except_lite
693
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000694
695/*
696 * There are a few constraints to be concerned with.
697 * - Real mode exceptions code/data must be located at their physical location.
698 * - Virtual mode exceptions must be mapped at their 0xc000... location.
699 * - Fixed location code must not call directly beyond the __end_interrupts
700 * area when built with CONFIG_RELOCATABLE. LOAD_HANDLER / bctr sequence
701 * must be used.
702 * - LOAD_HANDLER targets must be within first 64K of physical 0 /
703 * virtual 0xc00...
704 * - Conditional branch targets must be within +/-32K of caller.
705 *
706 * "Virtual exceptions" run with relocation on (MSR_IR=1, MSR_DR=1), and
707 * therefore don't have to run in physically located code or rfid to
708 * virtual mode kernel code. However on relocatable kernels they do have
709 * to branch to KERNELBASE offset because the rest of the kernel (outside
710 * the exception vectors) may be located elsewhere.
711 *
712 * Virtual exceptions correspond with physical, except their entry points
713 * are offset by 0xc000000000000000 and also tend to get an added 0x4000
714 * offset applied. Virtual exceptions are enabled with the Alternate
715 * Interrupt Location (AIL) bit set in the LPCR. However this does not
716 * guarantee they will be delivered virtually. Some conditions (see the ISA)
717 * cause exceptions to be delivered in real mode.
718 *
719 * It's impossible to receive interrupts below 0x300 via AIL.
720 *
721 * KVM: None of the virtual exceptions are from the guest. Anything that
722 * escalated to HV=1 from HV=0 is delivered via real mode handlers.
723 *
724 *
725 * We layout physical memory as follows:
726 * 0x0000 - 0x00ff : Secondary processor spin code
727 * 0x0100 - 0x18ff : Real mode pSeries interrupt vectors
728 * 0x1900 - 0x3fff : Real mode trampolines
729 * 0x4000 - 0x58ff : Relon (IR=1,DR=1) mode pSeries interrupt vectors
730 * 0x5900 - 0x6fff : Relon mode trampolines
731 * 0x7000 - 0x7fff : FWNMI data area
732 * 0x8000 - .... : Common interrupt handlers, remaining early
733 * setup code, rest of kernel.
734 *
735 * We could reclaim 0x4000-0x42ff for real mode trampolines if the space
736 * is necessary. Until then it's more consistent to explicitly put VIRT_NONE
737 * vectors there.
738 */
739OPEN_FIXED_SECTION(real_vectors, 0x0100, 0x1900)
740OPEN_FIXED_SECTION(real_trampolines, 0x1900, 0x4000)
741OPEN_FIXED_SECTION(virt_vectors, 0x4000, 0x5900)
742OPEN_FIXED_SECTION(virt_trampolines, 0x5900, 0x7000)
David Brazdil0f672f62019-12-10 10:32:29 +0000743
744#ifdef CONFIG_PPC_POWERNV
745 .globl start_real_trampolines
746 .globl end_real_trampolines
747 .globl start_virt_trampolines
748 .globl end_virt_trampolines
749#endif
750
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000751#if defined(CONFIG_PPC_PSERIES) || defined(CONFIG_PPC_POWERNV)
752/*
753 * Data area reserved for FWNMI option.
754 * This address (0x7000) is fixed by the RPA.
755 * pseries and powernv need to keep the whole page from
756 * 0x7000 to 0x8000 free for use by the firmware
757 */
758ZERO_FIXED_SECTION(fwnmi_page, 0x7000, 0x8000)
759OPEN_TEXT_SECTION(0x8000)
760#else
761OPEN_TEXT_SECTION(0x7000)
762#endif
763
764USE_FIXED_SECTION(real_vectors)
765
766/*
767 * This is the start of the interrupt handlers for pSeries
768 * This code runs with relocation off.
769 * Code from here to __end_interrupts gets copied down to real
770 * address 0x100 when we are running a relocatable kernel.
771 * Therefore any relative branches in this section must only
772 * branch to labels in this section.
773 */
774 .globl __start_interrupts
775__start_interrupts:
776
777/* No virt vectors corresponding with 0x0..0x100 */
778EXC_VIRT_NONE(0x4000, 0x100)
779
780
David Brazdil0f672f62019-12-10 10:32:29 +0000781EXC_REAL_BEGIN(system_reset, 0x100, 0x100)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000782#ifdef CONFIG_PPC_P7_NAP
783 /*
784 * If running native on arch 2.06 or later, check if we are waking up
785 * from nap/sleep/winkle, and branch to idle handler. This tests SRR1
786 * bits 46:47. A non-0 value indicates that we are coming from a power
787 * saving state. The idle wakeup handler initially runs in real mode,
788 * but we branch to the 0xc000... address so we can turn on relocation
David Brazdil0f672f62019-12-10 10:32:29 +0000789 * with mtmsrd later, after SPRs are restored.
790 *
791 * Careful to minimise cost for the fast path (idle wakeup) while
792 * also avoiding clobbering CFAR for the debug path (non-idle).
793 *
794 * For the idle wake case volatile registers can be clobbered, which
795 * is why we use those initially. If it turns out to not be an idle
796 * wake, carefully put everything back the way it was, so we can use
797 * common exception macros to handle it.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000798 */
David Brazdil0f672f62019-12-10 10:32:29 +0000799BEGIN_FTR_SECTION
800 SET_SCRATCH0(r13)
801 GET_PACA(r13)
802 std r3,PACA_EXNMI+0*8(r13)
803 std r4,PACA_EXNMI+1*8(r13)
804 std r5,PACA_EXNMI+2*8(r13)
805 mfspr r3,SPRN_SRR1
806 mfocrf r4,0x80
807 rlwinm. r5,r3,47-31,30,31
808 bne+ system_reset_idle_wake
809 /* Not powersave wakeup. Restore regs for regular interrupt handler. */
810 mtocrf 0x80,r4
811 ld r3,PACA_EXNMI+0*8(r13)
812 ld r4,PACA_EXNMI+1*8(r13)
813 ld r5,PACA_EXNMI+2*8(r13)
814 GET_SCRATCH0(r13)
815END_FTR_SECTION_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000816#endif
817
David Brazdil0f672f62019-12-10 10:32:29 +0000818 INT_HANDLER system_reset, 0x100, area=PACA_EXNMI, ri=0, kvm=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000819 /*
820 * MSR_RI is not enabled, because PACA_EXNMI and nmi stack is
821 * being used, so a nested NMI exception would corrupt it.
David Brazdil0f672f62019-12-10 10:32:29 +0000822 *
823 * In theory, we should not enable relocation here if it was disabled
824 * in SRR1, because the MMU may not be configured to support it (e.g.,
825 * SLB may have been cleared). In practice, there should only be a few
826 * small windows where that's the case, and sreset is considered to
827 * be dangerous anyway.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000828 */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000829EXC_REAL_END(system_reset, 0x100, 0x100)
830EXC_VIRT_NONE(0x4100, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +0000831INT_KVM_HANDLER system_reset 0x100, EXC_STD, PACA_EXNMI, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000832
833#ifdef CONFIG_PPC_P7_NAP
David Brazdil0f672f62019-12-10 10:32:29 +0000834TRAMP_REAL_BEGIN(system_reset_idle_wake)
835 /* We are waking up from idle, so may clobber any volatile register */
836 cmpwi cr1,r5,2
837 bltlr cr1 /* no state loss, return to idle caller with r3=SRR1 */
838 BRANCH_TO_C000(r12, DOTSYM(idle_return_gpr_loss))
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000839#endif
840
David Brazdil0f672f62019-12-10 10:32:29 +0000841#ifdef CONFIG_PPC_PSERIES
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000842/*
David Brazdil0f672f62019-12-10 10:32:29 +0000843 * Vectors for the FWNMI option. Share common code.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000844 */
David Brazdil0f672f62019-12-10 10:32:29 +0000845TRAMP_REAL_BEGIN(system_reset_fwnmi)
846 /* See comment at system_reset exception, don't turn on RI */
847 INT_HANDLER system_reset, 0x100, area=PACA_EXNMI, ri=0
848
849#endif /* CONFIG_PPC_PSERIES */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000850
851EXC_COMMON_BEGIN(system_reset_common)
852 /*
853 * Increment paca->in_nmi then enable MSR_RI. SLB or MCE will be able
854 * to recover, but nested NMI will notice in_nmi and not recover
855 * because of the use of the NMI stack. in_nmi reentrancy is tested in
856 * system_reset_exception.
857 */
858 lhz r10,PACA_IN_NMI(r13)
859 addi r10,r10,1
860 sth r10,PACA_IN_NMI(r13)
861 li r10,MSR_RI
862 mtmsrd r10,1
863
864 mr r10,r1
865 ld r1,PACA_NMI_EMERG_SP(r13)
866 subi r1,r1,INT_FRAME_SIZE
David Brazdil0f672f62019-12-10 10:32:29 +0000867 INT_COMMON 0x100, PACA_EXNMI, 0, 1, 0, 0, 0
868 bl save_nvgprs
869 /*
870 * Set IRQS_ALL_DISABLED unconditionally so arch_irqs_disabled does
871 * the right thing. We do not want to reconcile because that goes
872 * through irq tracing which we don't want in NMI.
873 *
874 * Save PACAIRQHAPPENED because some code will do a hard disable
875 * (e.g., xmon). So we want to restore this back to where it was
876 * when we return. DAR is unused in the stack, so save it there.
877 */
878 li r10,IRQS_ALL_DISABLED
879 stb r10,PACAIRQSOFTMASK(r13)
880 lbz r10,PACAIRQHAPPENED(r13)
881 std r10,_DAR(r1)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000882
David Brazdil0f672f62019-12-10 10:32:29 +0000883 addi r3,r1,STACK_FRAME_OVERHEAD
884 bl system_reset_exception
885
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000886 /* Clear MSR_RI before setting SRR0 and SRR1. */
David Brazdil0f672f62019-12-10 10:32:29 +0000887 li r9,0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000888 mtmsrd r9,1
889
890 /*
891 * MSR_RI is clear, now we can decrement paca->in_nmi.
892 */
893 lhz r10,PACA_IN_NMI(r13)
894 subi r10,r10,1
895 sth r10,PACA_IN_NMI(r13)
896
897 /*
898 * Restore soft mask settings.
899 */
900 ld r10,_DAR(r1)
901 stb r10,PACAIRQHAPPENED(r13)
902 ld r10,SOFTE(r1)
903 stb r10,PACAIRQSOFTMASK(r13)
904
David Brazdil0f672f62019-12-10 10:32:29 +0000905 EXCEPTION_RESTORE_REGS EXC_STD
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000906 RFI_TO_USER_OR_KERNEL
907
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000908
909EXC_REAL_BEGIN(machine_check, 0x200, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +0000910 INT_HANDLER machine_check, 0x200, early=1, area=PACA_EXMC, dar=1, dsisr=1
911 /*
912 * MSR_RI is not enabled, because PACA_EXMC is being used, so a
913 * nested machine check corrupts it. machine_check_common enables
914 * MSR_RI.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000915 */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000916EXC_REAL_END(machine_check, 0x200, 0x100)
917EXC_VIRT_NONE(0x4200, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +0000918
919#ifdef CONFIG_PPC_PSERIES
920TRAMP_REAL_BEGIN(machine_check_fwnmi)
921 /* See comment at machine_check exception, don't turn on RI */
922 INT_HANDLER machine_check, 0x200, early=1, area=PACA_EXMC, dar=1, dsisr=1
923#endif
924
925INT_KVM_HANDLER machine_check 0x200, EXC_STD, PACA_EXMC, 1
926
927#define MACHINE_CHECK_HANDLER_WINDUP \
928 /* Clear MSR_RI before setting SRR0 and SRR1. */\
929 li r9,0; \
930 mtmsrd r9,1; /* Clear MSR_RI */ \
931 /* Decrement paca->in_mce now RI is clear. */ \
932 lhz r12,PACA_IN_MCE(r13); \
933 subi r12,r12,1; \
934 sth r12,PACA_IN_MCE(r13); \
935 EXCEPTION_RESTORE_REGS EXC_STD
936
937EXC_COMMON_BEGIN(machine_check_early_common)
938 mtctr r10 /* Restore ctr */
939 mfspr r11,SPRN_SRR0
940 mfspr r12,SPRN_SRR1
941
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000942 /*
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000943 * Switch to mc_emergency stack and handle re-entrancy (we limit
944 * the nested MCE upto level 4 to avoid stack overflow).
945 * Save MCE registers srr1, srr0, dar and dsisr and then set ME=1
946 *
947 * We use paca->in_mce to check whether this is the first entry or
948 * nested machine check. We increment paca->in_mce to track nested
949 * machine checks.
950 *
951 * If this is the first entry then set stack pointer to
952 * paca->mc_emergency_sp, otherwise r1 is already pointing to
953 * stack frame on mc_emergency stack.
954 *
955 * NOTE: We are here with MSR_ME=0 (off), which means we risk a
956 * checkstop if we get another machine check exception before we do
957 * rfid with MSR_ME=1.
958 *
959 * This interrupt can wake directly from idle. If that is the case,
960 * the machine check is handled then the idle wakeup code is called
961 * to restore state.
962 */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000963 lhz r10,PACA_IN_MCE(r13)
964 cmpwi r10,0 /* Are we in nested machine check */
David Brazdil0f672f62019-12-10 10:32:29 +0000965 cmpwi cr1,r10,MAX_MCE_DEPTH /* Are we at maximum nesting */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000966 addi r10,r10,1 /* increment paca->in_mce */
967 sth r10,PACA_IN_MCE(r13)
David Brazdil0f672f62019-12-10 10:32:29 +0000968
969 mr r10,r1 /* Save r1 */
970 bne 1f
971 /* First machine check entry */
972 ld r1,PACAMCEMERGSP(r13) /* Use MC emergency stack */
9731: /* Limit nested MCE to level 4 to avoid stack overflow */
974 bgt cr1,unrecoverable_mce /* Check if we hit limit of 4 */
975 subi r1,r1,INT_FRAME_SIZE /* alloc stack frame */
976
977 /* We don't touch AMR here, we never go to virtual mode */
978 INT_COMMON 0x200, PACA_EXMC, 0, 0, 0, 1, 1
979
980BEGIN_FTR_SECTION
981 bl enable_machine_check
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000982END_FTR_SECTION_IFSET(CPU_FTR_HVMODE)
David Brazdil0f672f62019-12-10 10:32:29 +0000983 li r10,MSR_RI
984 mtmsrd r10,1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000985
David Brazdil0f672f62019-12-10 10:32:29 +0000986 bl save_nvgprs
987 addi r3,r1,STACK_FRAME_OVERHEAD
988 bl machine_check_early
989 std r3,RESULT(r1) /* Save result */
990 ld r12,_MSR(r1)
991
992#ifdef CONFIG_PPC_P7_NAP
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000993 /*
David Brazdil0f672f62019-12-10 10:32:29 +0000994 * Check if thread was in power saving mode. We come here when any
995 * of the following is true:
996 * a. thread wasn't in power saving mode
997 * b. thread was in power saving mode with no state loss,
998 * supervisor state loss or hypervisor state loss.
999 *
1000 * Go back to nap/sleep/winkle mode again if (b) is true.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001001 */
David Brazdil0f672f62019-12-10 10:32:29 +00001002BEGIN_FTR_SECTION
1003 rlwinm. r11,r12,47-31,30,31
1004 bne machine_check_idle_common
1005END_FTR_SECTION_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_206)
1006#endif
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001007
David Brazdil0f672f62019-12-10 10:32:29 +00001008#ifdef CONFIG_KVM_BOOK3S_64_HANDLER
1009 /*
1010 * Check if we are coming from guest. If yes, then run the normal
1011 * exception handler which will take the
1012 * machine_check_kvm->kvmppc_interrupt branch to deliver the MC event
1013 * to guest.
1014 */
1015 lbz r11,HSTATE_IN_GUEST(r13)
1016 cmpwi r11,0 /* Check if coming from guest */
1017 bne mce_deliver /* continue if we are. */
1018#endif
1019
1020 /*
1021 * Check if we are coming from userspace. If yes, then run the normal
1022 * exception handler which will deliver the MC event to this kernel.
1023 */
1024 andi. r11,r12,MSR_PR /* See if coming from user. */
1025 bne mce_deliver /* continue in V mode if we are. */
1026
1027 /*
1028 * At this point we are coming from kernel context.
1029 * Queue up the MCE event and return from the interrupt.
1030 * But before that, check if this is an un-recoverable exception.
1031 * If yes, then stay on emergency stack and panic.
1032 */
1033 andi. r11,r12,MSR_RI
1034 beq unrecoverable_mce
1035
1036 /*
1037 * Check if we have successfully handled/recovered from error, if not
1038 * then stay on emergency stack and panic.
1039 */
1040 ld r3,RESULT(r1) /* Load result */
1041 cmpdi r3,0 /* see if we handled MCE successfully */
1042 beq unrecoverable_mce /* if !handled then panic */
1043
1044 /*
1045 * Return from MC interrupt.
1046 * Queue up the MCE event so that we can log it later, while
1047 * returning from kernel or opal call.
1048 */
1049 bl machine_check_queue_event
1050 MACHINE_CHECK_HANDLER_WINDUP
1051 RFI_TO_KERNEL
1052
1053mce_deliver:
1054 /*
1055 * This is a host user or guest MCE. Restore all registers, then
1056 * run the "late" handler. For host user, this will run the
1057 * machine_check_exception handler in virtual mode like a normal
1058 * interrupt handler. For guest, this will trigger the KVM test
1059 * and branch to the KVM interrupt similarly to other interrupts.
1060 */
1061BEGIN_FTR_SECTION
1062 ld r10,ORIG_GPR3(r1)
1063 mtspr SPRN_CFAR,r10
1064END_FTR_SECTION_IFSET(CPU_FTR_CFAR)
1065 MACHINE_CHECK_HANDLER_WINDUP
1066 /* See comment at machine_check exception, don't turn on RI */
1067 INT_HANDLER machine_check, 0x200, area=PACA_EXMC, ri=0, dar=1, dsisr=1, kvm=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001068
1069EXC_COMMON_BEGIN(machine_check_common)
1070 /*
1071 * Machine check is different because we use a different
1072 * save area: PACA_EXMC instead of PACA_EXGEN.
1073 */
David Brazdil0f672f62019-12-10 10:32:29 +00001074 INT_COMMON 0x200, PACA_EXMC, 1, 1, 1, 1, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001075 FINISH_NAP
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001076 /* Enable MSR_RI when finished with PACA_EXMC */
1077 li r10,MSR_RI
1078 mtmsrd r10,1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001079 bl save_nvgprs
1080 addi r3,r1,STACK_FRAME_OVERHEAD
1081 bl machine_check_exception
1082 b ret_from_except
1083
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001084#ifdef CONFIG_PPC_P7_NAP
1085/*
1086 * This is an idle wakeup. Low level machine check has already been
1087 * done. Queue the event then call the idle code to do the wake up.
1088 */
1089EXC_COMMON_BEGIN(machine_check_idle_common)
1090 bl machine_check_queue_event
1091
1092 /*
Olivier Deprez0e641232021-09-23 10:07:05 +02001093 * GPR-loss wakeups are relatively straightforward, because the
1094 * idle sleep code has saved all non-volatile registers on its
1095 * own stack, and r1 in PACAR1.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001096 *
Olivier Deprez0e641232021-09-23 10:07:05 +02001097 * For no-loss wakeups the r1 and lr registers used by the
1098 * early machine check handler have to be restored first. r2 is
1099 * the kernel TOC, so no need to restore it.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001100 *
1101 * Then decrement MCE nesting after finishing with the stack.
1102 */
1103 ld r3,_MSR(r1)
David Brazdil0f672f62019-12-10 10:32:29 +00001104 ld r4,_LINK(r1)
Olivier Deprez0e641232021-09-23 10:07:05 +02001105 ld r1,GPR1(r1)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001106
1107 lhz r11,PACA_IN_MCE(r13)
1108 subi r11,r11,1
1109 sth r11,PACA_IN_MCE(r13)
1110
David Brazdil0f672f62019-12-10 10:32:29 +00001111 mtlr r4
1112 rlwinm r10,r3,47-31,30,31
1113 cmpwi cr1,r10,2
Olivier Deprez0e641232021-09-23 10:07:05 +02001114 bltlr cr1 /* no state loss, return to idle caller with r3=SRR1 */
David Brazdil0f672f62019-12-10 10:32:29 +00001115 b idle_return_gpr_loss
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001116#endif
1117
David Brazdil0f672f62019-12-10 10:32:29 +00001118EXC_COMMON_BEGIN(unrecoverable_mce)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001119 /*
1120 * We are going down. But there are chances that we might get hit by
1121 * another MCE during panic path and we may run into unstable state
1122 * with no way out. Hence, turn ME bit off while going down, so that
1123 * when another MCE is hit during panic path, system will checkstop
1124 * and hypervisor will get restarted cleanly by SP.
1125 */
David Brazdil0f672f62019-12-10 10:32:29 +00001126BEGIN_FTR_SECTION
1127 li r10,0 /* clear MSR_RI */
1128 mtmsrd r10,1
1129 bl disable_machine_check
1130END_FTR_SECTION_IFSET(CPU_FTR_HVMODE)
1131 ld r10,PACAKMSR(r13)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001132 li r3,MSR_ME
David Brazdil0f672f62019-12-10 10:32:29 +00001133 andc r10,r10,r3
1134 mtmsrd r10
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001135
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001136 /* Invoke machine_check_exception to print MCE event and panic. */
1137 addi r3,r1,STACK_FRAME_OVERHEAD
1138 bl machine_check_exception
David Brazdil0f672f62019-12-10 10:32:29 +00001139
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001140 /*
David Brazdil0f672f62019-12-10 10:32:29 +00001141 * We will not reach here. Even if we did, there is no way out.
1142 * Call unrecoverable_exception and die.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001143 */
David Brazdil0f672f62019-12-10 10:32:29 +00001144 addi r3,r1,STACK_FRAME_OVERHEAD
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001145 bl unrecoverable_exception
David Brazdil0f672f62019-12-10 10:32:29 +00001146 b .
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001147
1148
David Brazdil0f672f62019-12-10 10:32:29 +00001149EXC_REAL_BEGIN(data_access, 0x300, 0x80)
1150 INT_HANDLER data_access, 0x300, ool=1, dar=1, dsisr=1, kvm=1
1151EXC_REAL_END(data_access, 0x300, 0x80)
1152EXC_VIRT_BEGIN(data_access, 0x4300, 0x80)
Olivier Deprez0e641232021-09-23 10:07:05 +02001153 INT_HANDLER data_access, 0x300, ool=1, virt=1, dar=1, dsisr=1
David Brazdil0f672f62019-12-10 10:32:29 +00001154EXC_VIRT_END(data_access, 0x4300, 0x80)
1155INT_KVM_HANDLER data_access, 0x300, EXC_STD, PACA_EXGEN, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001156EXC_COMMON_BEGIN(data_access_common)
1157 /*
1158 * Here r13 points to the paca, r9 contains the saved CR,
1159 * SRR0 and SRR1 are saved in r11 and r12,
1160 * r9 - r13 are saved in paca->exgen.
David Brazdil0f672f62019-12-10 10:32:29 +00001161 * EX_DAR and EX_DSISR have saved DAR/DSISR
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001162 */
David Brazdil0f672f62019-12-10 10:32:29 +00001163 INT_COMMON 0x300, PACA_EXGEN, 1, 1, 1, 1, 1
1164 ld r4,_DAR(r1)
1165 ld r5,_DSISR(r1)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001166BEGIN_MMU_FTR_SECTION
David Brazdil0f672f62019-12-10 10:32:29 +00001167 ld r6,_MSR(r1)
1168 li r3,0x300
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001169 b do_hash_page /* Try to handle as hpte fault */
1170MMU_FTR_SECTION_ELSE
1171 b handle_page_fault
1172ALT_MMU_FTR_SECTION_END_IFCLR(MMU_FTR_TYPE_RADIX)
1173
1174
1175EXC_REAL_BEGIN(data_access_slb, 0x380, 0x80)
David Brazdil0f672f62019-12-10 10:32:29 +00001176 INT_HANDLER data_access_slb, 0x380, ool=1, area=PACA_EXSLB, dar=1, kvm=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001177EXC_REAL_END(data_access_slb, 0x380, 0x80)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001178EXC_VIRT_BEGIN(data_access_slb, 0x4380, 0x80)
David Brazdil0f672f62019-12-10 10:32:29 +00001179 INT_HANDLER data_access_slb, 0x380, virt=1, area=PACA_EXSLB, dar=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001180EXC_VIRT_END(data_access_slb, 0x4380, 0x80)
David Brazdil0f672f62019-12-10 10:32:29 +00001181INT_KVM_HANDLER data_access_slb, 0x380, EXC_STD, PACA_EXSLB, 1
1182EXC_COMMON_BEGIN(data_access_slb_common)
1183 INT_COMMON 0x380, PACA_EXSLB, 1, 1, 0, 1, 0
1184 ld r4,_DAR(r1)
1185 addi r3,r1,STACK_FRAME_OVERHEAD
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001186BEGIN_MMU_FTR_SECTION
David Brazdil0f672f62019-12-10 10:32:29 +00001187 /* HPT case, do SLB fault */
1188 bl do_slb_fault
1189 cmpdi r3,0
1190 bne- 1f
1191 b fast_exception_return
11921: /* Error case */
1193MMU_FTR_SECTION_ELSE
1194 /* Radix case, access is outside page table range */
1195 li r3,-EFAULT
1196ALT_MMU_FTR_SECTION_END_IFCLR(MMU_FTR_TYPE_RADIX)
1197 std r3,RESULT(r1)
1198 bl save_nvgprs
1199 RECONCILE_IRQ_STATE(r10, r11)
1200 ld r4,_DAR(r1)
1201 ld r5,RESULT(r1)
1202 addi r3,r1,STACK_FRAME_OVERHEAD
1203 bl do_bad_slb_fault
1204 b ret_from_except
1205
1206
1207EXC_REAL_BEGIN(instruction_access, 0x400, 0x80)
Olivier Deprez0e641232021-09-23 10:07:05 +02001208 INT_HANDLER instruction_access, 0x400, ool=1, kvm=1
David Brazdil0f672f62019-12-10 10:32:29 +00001209EXC_REAL_END(instruction_access, 0x400, 0x80)
1210EXC_VIRT_BEGIN(instruction_access, 0x4400, 0x80)
1211 INT_HANDLER instruction_access, 0x400, virt=1
1212EXC_VIRT_END(instruction_access, 0x4400, 0x80)
1213INT_KVM_HANDLER instruction_access, 0x400, EXC_STD, PACA_EXGEN, 0
1214EXC_COMMON_BEGIN(instruction_access_common)
1215 INT_COMMON 0x400, PACA_EXGEN, 1, 1, 1, 2, 2
1216 ld r4,_DAR(r1)
1217 ld r5,_DSISR(r1)
1218BEGIN_MMU_FTR_SECTION
1219 ld r6,_MSR(r1)
1220 li r3,0x400
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001221 b do_hash_page /* Try to handle as hpte fault */
1222MMU_FTR_SECTION_ELSE
1223 b handle_page_fault
1224ALT_MMU_FTR_SECTION_END_IFCLR(MMU_FTR_TYPE_RADIX)
1225
1226
1227EXC_REAL_BEGIN(instruction_access_slb, 0x480, 0x80)
Olivier Deprez0e641232021-09-23 10:07:05 +02001228 INT_HANDLER instruction_access_slb, 0x480, ool=1, area=PACA_EXSLB, kvm=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001229EXC_REAL_END(instruction_access_slb, 0x480, 0x80)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001230EXC_VIRT_BEGIN(instruction_access_slb, 0x4480, 0x80)
David Brazdil0f672f62019-12-10 10:32:29 +00001231 INT_HANDLER instruction_access_slb, 0x480, virt=1, area=PACA_EXSLB
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001232EXC_VIRT_END(instruction_access_slb, 0x4480, 0x80)
David Brazdil0f672f62019-12-10 10:32:29 +00001233INT_KVM_HANDLER instruction_access_slb, 0x480, EXC_STD, PACA_EXSLB, 0
1234EXC_COMMON_BEGIN(instruction_access_slb_common)
1235 INT_COMMON 0x480, PACA_EXSLB, 1, 1, 0, 2, 0
1236 ld r4,_DAR(r1)
1237 addi r3,r1,STACK_FRAME_OVERHEAD
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001238BEGIN_MMU_FTR_SECTION
David Brazdil0f672f62019-12-10 10:32:29 +00001239 /* HPT case, do SLB fault */
1240 bl do_slb_fault
1241 cmpdi r3,0
1242 bne- 1f
1243 b fast_exception_return
12441: /* Error case */
1245MMU_FTR_SECTION_ELSE
1246 /* Radix case, access is outside page table range */
1247 li r3,-EFAULT
1248ALT_MMU_FTR_SECTION_END_IFCLR(MMU_FTR_TYPE_RADIX)
1249 std r3,RESULT(r1)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001250 bl save_nvgprs
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001251 RECONCILE_IRQ_STATE(r10, r11)
David Brazdil0f672f62019-12-10 10:32:29 +00001252 ld r4,_DAR(r1)
1253 ld r5,RESULT(r1)
1254 addi r3,r1,STACK_FRAME_OVERHEAD
1255 bl do_bad_slb_fault
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001256 b ret_from_except
1257
1258EXC_REAL_BEGIN(hardware_interrupt, 0x500, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001259 INT_HANDLER hardware_interrupt, 0x500, hsrr=EXC_HV_OR_STD, bitmask=IRQS_DISABLED, kvm=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001260EXC_REAL_END(hardware_interrupt, 0x500, 0x100)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001261EXC_VIRT_BEGIN(hardware_interrupt, 0x4500, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001262 INT_HANDLER hardware_interrupt, 0x500, virt=1, hsrr=EXC_HV_OR_STD, bitmask=IRQS_DISABLED, kvm=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001263EXC_VIRT_END(hardware_interrupt, 0x4500, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001264INT_KVM_HANDLER hardware_interrupt, 0x500, EXC_HV_OR_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001265EXC_COMMON_ASYNC(hardware_interrupt_common, 0x500, do_IRQ)
1266
1267
David Brazdil0f672f62019-12-10 10:32:29 +00001268EXC_REAL_BEGIN(alignment, 0x600, 0x100)
1269 INT_HANDLER alignment, 0x600, dar=1, dsisr=1, kvm=1
1270EXC_REAL_END(alignment, 0x600, 0x100)
1271EXC_VIRT_BEGIN(alignment, 0x4600, 0x100)
1272 INT_HANDLER alignment, 0x600, virt=1, dar=1, dsisr=1
1273EXC_VIRT_END(alignment, 0x4600, 0x100)
1274INT_KVM_HANDLER alignment, 0x600, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001275EXC_COMMON_BEGIN(alignment_common)
David Brazdil0f672f62019-12-10 10:32:29 +00001276 INT_COMMON 0x600, PACA_EXGEN, 1, 1, 1, 1, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001277 bl save_nvgprs
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001278 addi r3,r1,STACK_FRAME_OVERHEAD
1279 bl alignment_exception
1280 b ret_from_except
1281
1282
David Brazdil0f672f62019-12-10 10:32:29 +00001283EXC_REAL_BEGIN(program_check, 0x700, 0x100)
1284 INT_HANDLER program_check, 0x700, kvm=1
1285EXC_REAL_END(program_check, 0x700, 0x100)
1286EXC_VIRT_BEGIN(program_check, 0x4700, 0x100)
1287 INT_HANDLER program_check, 0x700, virt=1
1288EXC_VIRT_END(program_check, 0x4700, 0x100)
1289INT_KVM_HANDLER program_check, 0x700, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001290EXC_COMMON_BEGIN(program_check_common)
1291 /*
1292 * It's possible to receive a TM Bad Thing type program check with
1293 * userspace register values (in particular r1), but with SRR1 reporting
1294 * that we came from the kernel. Normally that would confuse the bad
1295 * stack logic, and we would report a bad kernel stack pointer. Instead
1296 * we switch to the emergency stack if we're taking a TM Bad Thing from
1297 * the kernel.
1298 */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001299
David Brazdil0f672f62019-12-10 10:32:29 +00001300 andi. r10,r12,MSR_PR
1301 bne 2f /* If userspace, go normal path */
1302
1303 andis. r10,r12,(SRR1_PROGTM)@h
1304 bne 1f /* If TM, emergency */
1305
1306 cmpdi r1,-INT_FRAME_SIZE /* check if r1 is in userspace */
1307 blt 2f /* normal path if not */
1308
1309 /* Use the emergency stack */
13101: andi. r10,r12,MSR_PR /* Set CR0 correctly for label */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001311 /* 3 in EXCEPTION_PROLOG_COMMON */
1312 mr r10,r1 /* Save r1 */
1313 ld r1,PACAEMERGSP(r13) /* Use emergency stack */
1314 subi r1,r1,INT_FRAME_SIZE /* alloc stack frame */
David Brazdil0f672f62019-12-10 10:32:29 +00001315 INT_COMMON 0x700, PACA_EXGEN, 0, 1, 1, 0, 0
1316 b 3f
13172:
1318 INT_COMMON 0x700, PACA_EXGEN, 1, 1, 1, 0, 0
13193:
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001320 bl save_nvgprs
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001321 addi r3,r1,STACK_FRAME_OVERHEAD
1322 bl program_check_exception
1323 b ret_from_except
1324
1325
David Brazdil0f672f62019-12-10 10:32:29 +00001326EXC_REAL_BEGIN(fp_unavailable, 0x800, 0x100)
1327 INT_HANDLER fp_unavailable, 0x800, kvm=1
1328EXC_REAL_END(fp_unavailable, 0x800, 0x100)
1329EXC_VIRT_BEGIN(fp_unavailable, 0x4800, 0x100)
1330 INT_HANDLER fp_unavailable, 0x800, virt=1
1331EXC_VIRT_END(fp_unavailable, 0x4800, 0x100)
1332INT_KVM_HANDLER fp_unavailable, 0x800, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001333EXC_COMMON_BEGIN(fp_unavailable_common)
David Brazdil0f672f62019-12-10 10:32:29 +00001334 INT_COMMON 0x800, PACA_EXGEN, 1, 1, 0, 0, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001335 bne 1f /* if from user, just load it up */
1336 bl save_nvgprs
1337 RECONCILE_IRQ_STATE(r10, r11)
1338 addi r3,r1,STACK_FRAME_OVERHEAD
1339 bl kernel_fp_unavailable_exception
David Brazdil0f672f62019-12-10 10:32:29 +000013400: trap
1341 EMIT_BUG_ENTRY 0b, __FILE__, __LINE__, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000013421:
1343#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1344BEGIN_FTR_SECTION
1345 /* Test if 2 TM state bits are zero. If non-zero (ie. userspace was in
1346 * transaction), go do TM stuff
1347 */
1348 rldicl. r0, r12, (64-MSR_TS_LG), (64-2)
1349 bne- 2f
1350END_FTR_SECTION_IFSET(CPU_FTR_TM)
1351#endif
1352 bl load_up_fpu
1353 b fast_exception_return
1354#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
13552: /* User process was in a transaction */
1356 bl save_nvgprs
1357 RECONCILE_IRQ_STATE(r10, r11)
1358 addi r3,r1,STACK_FRAME_OVERHEAD
1359 bl fp_unavailable_tm
1360 b ret_from_except
1361#endif
1362
1363
David Brazdil0f672f62019-12-10 10:32:29 +00001364EXC_REAL_BEGIN(decrementer, 0x900, 0x80)
1365 INT_HANDLER decrementer, 0x900, ool=1, bitmask=IRQS_DISABLED, kvm=1
1366EXC_REAL_END(decrementer, 0x900, 0x80)
1367EXC_VIRT_BEGIN(decrementer, 0x4900, 0x80)
Olivier Deprez0e641232021-09-23 10:07:05 +02001368 INT_HANDLER decrementer, 0x900, ool=1, virt=1, bitmask=IRQS_DISABLED
David Brazdil0f672f62019-12-10 10:32:29 +00001369EXC_VIRT_END(decrementer, 0x4900, 0x80)
1370INT_KVM_HANDLER decrementer, 0x900, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001371EXC_COMMON_ASYNC(decrementer_common, 0x900, timer_interrupt)
1372
1373
David Brazdil0f672f62019-12-10 10:32:29 +00001374EXC_REAL_BEGIN(hdecrementer, 0x980, 0x80)
Olivier Deprez0e641232021-09-23 10:07:05 +02001375 INT_HANDLER hdecrementer, 0x980, ool=1, hsrr=EXC_HV, kvm=1
David Brazdil0f672f62019-12-10 10:32:29 +00001376EXC_REAL_END(hdecrementer, 0x980, 0x80)
1377EXC_VIRT_BEGIN(hdecrementer, 0x4980, 0x80)
Olivier Deprez0e641232021-09-23 10:07:05 +02001378 INT_HANDLER hdecrementer, 0x980, ool=1, virt=1, hsrr=EXC_HV, kvm=1
David Brazdil0f672f62019-12-10 10:32:29 +00001379EXC_VIRT_END(hdecrementer, 0x4980, 0x80)
1380INT_KVM_HANDLER hdecrementer, 0x980, EXC_HV, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001381EXC_COMMON(hdecrementer_common, 0x980, hdec_interrupt)
1382
1383
David Brazdil0f672f62019-12-10 10:32:29 +00001384EXC_REAL_BEGIN(doorbell_super, 0xa00, 0x100)
1385 INT_HANDLER doorbell_super, 0xa00, bitmask=IRQS_DISABLED, kvm=1
1386EXC_REAL_END(doorbell_super, 0xa00, 0x100)
1387EXC_VIRT_BEGIN(doorbell_super, 0x4a00, 0x100)
1388 INT_HANDLER doorbell_super, 0xa00, virt=1, bitmask=IRQS_DISABLED
1389EXC_VIRT_END(doorbell_super, 0x4a00, 0x100)
1390INT_KVM_HANDLER doorbell_super, 0xa00, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001391#ifdef CONFIG_PPC_DOORBELL
1392EXC_COMMON_ASYNC(doorbell_super_common, 0xa00, doorbell_exception)
1393#else
1394EXC_COMMON_ASYNC(doorbell_super_common, 0xa00, unknown_exception)
1395#endif
1396
1397
David Brazdil0f672f62019-12-10 10:32:29 +00001398EXC_REAL_NONE(0xb00, 0x100)
1399EXC_VIRT_NONE(0x4b00, 0x100)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001400
1401/*
1402 * system call / hypercall (0xc00, 0x4c00)
1403 *
1404 * The system call exception is invoked with "sc 0" and does not alter HV bit.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001405 *
1406 * The hypercall is invoked with "sc 1" and sets HV=1.
1407 *
1408 * In HPT, sc 1 always goes to 0xc00 real mode. In RADIX, sc 1 can go to
1409 * 0x4c00 virtual mode.
1410 *
1411 * Call convention:
1412 *
David Brazdil0f672f62019-12-10 10:32:29 +00001413 * syscall register convention is in Documentation/powerpc/syscall64-abi.rst
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001414 *
1415 * For hypercalls, the register convention is as follows:
1416 * r0 volatile
1417 * r1-2 nonvolatile
1418 * r3 volatile parameter and return value for status
1419 * r4-r10 volatile input and output value
1420 * r11 volatile hypercall number and output value
1421 * r12 volatile input and output value
1422 * r13-r31 nonvolatile
1423 * LR nonvolatile
1424 * CTR volatile
1425 * XER volatile
1426 * CR0-1 CR5-7 volatile
1427 * CR2-4 nonvolatile
1428 * Other registers nonvolatile
1429 *
1430 * The intersection of volatile registers that don't contain possible
1431 * inputs is: cr0, xer, ctr. We may use these as scratch regs upon entry
1432 * without saving, though xer is not a good idea to use, as hardware may
1433 * interpret some bits so it may be costly to change them.
1434 */
David Brazdil0f672f62019-12-10 10:32:29 +00001435.macro SYSTEM_CALL virt
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001436#ifdef CONFIG_KVM_BOOK3S_64_HANDLER
1437 /*
1438 * There is a little bit of juggling to get syscall and hcall
1439 * working well. Save r13 in ctr to avoid using SPRG scratch
1440 * register.
1441 *
1442 * Userspace syscalls have already saved the PPR, hcalls must save
1443 * it before setting HMT_MEDIUM.
1444 */
David Brazdil0f672f62019-12-10 10:32:29 +00001445 mtctr r13
1446 GET_PACA(r13)
1447 std r10,PACA_EXGEN+EX_R10(r13)
1448 INTERRUPT_TO_KERNEL
1449 KVMTEST system_call EXC_STD 0xc00 /* uses r10, branch to system_call_kvm */
1450 mfctr r9
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001451#else
David Brazdil0f672f62019-12-10 10:32:29 +00001452 mr r9,r13
1453 GET_PACA(r13)
1454 INTERRUPT_TO_KERNEL
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001455#endif
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001456
1457#ifdef CONFIG_PPC_FAST_ENDIAN_SWITCH
David Brazdil0f672f62019-12-10 10:32:29 +00001458BEGIN_FTR_SECTION
1459 cmpdi r0,0x1ebe
1460 beq- 1f
1461END_FTR_SECTION_IFSET(CPU_FTR_REAL_LE)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001462#endif
1463
David Brazdil0f672f62019-12-10 10:32:29 +00001464 /* We reach here with PACA in r13, r13 in r9. */
1465 mfspr r11,SPRN_SRR0
1466 mfspr r12,SPRN_SRR1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001467
David Brazdil0f672f62019-12-10 10:32:29 +00001468 HMT_MEDIUM
1469
1470 .if ! \virt
1471 __LOAD_HANDLER(r10, system_call_common)
1472 mtspr SPRN_SRR0,r10
1473 ld r10,PACAKMSR(r13)
1474 mtspr SPRN_SRR1,r10
1475 RFI_TO_KERNEL
1476 b . /* prevent speculative execution */
1477 .else
1478 li r10,MSR_RI
1479 mtmsrd r10,1 /* Set RI (EE=0) */
1480#ifdef CONFIG_RELOCATABLE
1481 __LOAD_HANDLER(r10, system_call_common)
1482 mtctr r10
1483 bctr
1484#else
1485 b system_call_common
1486#endif
1487 .endif
1488
1489#ifdef CONFIG_PPC_FAST_ENDIAN_SWITCH
1490 /* Fast LE/BE switch system call */
14911: mfspr r12,SPRN_SRR1
1492 xori r12,r12,MSR_LE
1493 mtspr SPRN_SRR1,r12
1494 mr r13,r9
1495 RFI_TO_USER /* return to userspace */
1496 b . /* prevent speculative execution */
1497#endif
1498.endm
1499
1500EXC_REAL_BEGIN(system_call, 0xc00, 0x100)
1501 SYSTEM_CALL 0
1502EXC_REAL_END(system_call, 0xc00, 0x100)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001503EXC_VIRT_BEGIN(system_call, 0x4c00, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001504 SYSTEM_CALL 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001505EXC_VIRT_END(system_call, 0x4c00, 0x100)
1506
1507#ifdef CONFIG_KVM_BOOK3S_64_HANDLER
1508 /*
1509 * This is a hcall, so register convention is as above, with these
1510 * differences:
1511 * r13 = PACA
1512 * ctr = orig r13
1513 * orig r10 saved in PACA
1514 */
David Brazdil0f672f62019-12-10 10:32:29 +00001515TRAMP_KVM_BEGIN(system_call_kvm)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001516 /*
1517 * Save the PPR (on systems that support it) before changing to
1518 * HMT_MEDIUM. That allows the KVM code to save that value into the
1519 * guest state (it is the guest's PPR value).
1520 */
1521 OPT_GET_SPR(r10, SPRN_PPR, CPU_FTR_HAS_PPR)
1522 HMT_MEDIUM
1523 OPT_SAVE_REG_TO_PACA(PACA_EXGEN+EX_PPR, r10, CPU_FTR_HAS_PPR)
1524 mfctr r10
1525 SET_SCRATCH0(r10)
1526 std r9,PACA_EXGEN+EX_R9(r13)
1527 mfcr r9
David Brazdil0f672f62019-12-10 10:32:29 +00001528 KVM_HANDLER 0xc00, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001529#endif
1530
1531
David Brazdil0f672f62019-12-10 10:32:29 +00001532EXC_REAL_BEGIN(single_step, 0xd00, 0x100)
1533 INT_HANDLER single_step, 0xd00, kvm=1
1534EXC_REAL_END(single_step, 0xd00, 0x100)
1535EXC_VIRT_BEGIN(single_step, 0x4d00, 0x100)
1536 INT_HANDLER single_step, 0xd00, virt=1
1537EXC_VIRT_END(single_step, 0x4d00, 0x100)
1538INT_KVM_HANDLER single_step, 0xd00, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001539EXC_COMMON(single_step_common, 0xd00, single_step_exception)
1540
David Brazdil0f672f62019-12-10 10:32:29 +00001541
1542EXC_REAL_BEGIN(h_data_storage, 0xe00, 0x20)
1543 INT_HANDLER h_data_storage, 0xe00, ool=1, hsrr=EXC_HV, dar=1, dsisr=1, kvm=1
1544EXC_REAL_END(h_data_storage, 0xe00, 0x20)
1545EXC_VIRT_BEGIN(h_data_storage, 0x4e00, 0x20)
1546 INT_HANDLER h_data_storage, 0xe00, ool=1, virt=1, hsrr=EXC_HV, dar=1, dsisr=1, kvm=1
1547EXC_VIRT_END(h_data_storage, 0x4e00, 0x20)
1548INT_KVM_HANDLER h_data_storage, 0xe00, EXC_HV, PACA_EXGEN, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001549EXC_COMMON_BEGIN(h_data_storage_common)
David Brazdil0f672f62019-12-10 10:32:29 +00001550 INT_COMMON 0xe00, PACA_EXGEN, 1, 1, 1, 1, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001551 bl save_nvgprs
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001552 addi r3,r1,STACK_FRAME_OVERHEAD
David Brazdil0f672f62019-12-10 10:32:29 +00001553BEGIN_MMU_FTR_SECTION
1554 ld r4,_DAR(r1)
1555 li r5,SIGSEGV
1556 bl bad_page_fault
1557MMU_FTR_SECTION_ELSE
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001558 bl unknown_exception
David Brazdil0f672f62019-12-10 10:32:29 +00001559ALT_MMU_FTR_SECTION_END_IFSET(MMU_FTR_TYPE_RADIX)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001560 b ret_from_except
1561
1562
David Brazdil0f672f62019-12-10 10:32:29 +00001563EXC_REAL_BEGIN(h_instr_storage, 0xe20, 0x20)
1564 INT_HANDLER h_instr_storage, 0xe20, ool=1, hsrr=EXC_HV, kvm=1
1565EXC_REAL_END(h_instr_storage, 0xe20, 0x20)
1566EXC_VIRT_BEGIN(h_instr_storage, 0x4e20, 0x20)
1567 INT_HANDLER h_instr_storage, 0xe20, ool=1, virt=1, hsrr=EXC_HV, kvm=1
1568EXC_VIRT_END(h_instr_storage, 0x4e20, 0x20)
1569INT_KVM_HANDLER h_instr_storage, 0xe20, EXC_HV, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001570EXC_COMMON(h_instr_storage_common, 0xe20, unknown_exception)
1571
1572
David Brazdil0f672f62019-12-10 10:32:29 +00001573EXC_REAL_BEGIN(emulation_assist, 0xe40, 0x20)
1574 INT_HANDLER emulation_assist, 0xe40, ool=1, hsrr=EXC_HV, kvm=1
1575EXC_REAL_END(emulation_assist, 0xe40, 0x20)
1576EXC_VIRT_BEGIN(emulation_assist, 0x4e40, 0x20)
1577 INT_HANDLER emulation_assist, 0xe40, ool=1, virt=1, hsrr=EXC_HV, kvm=1
1578EXC_VIRT_END(emulation_assist, 0x4e40, 0x20)
1579INT_KVM_HANDLER emulation_assist, 0xe40, EXC_HV, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001580EXC_COMMON(emulation_assist_common, 0xe40, emulation_assist_interrupt)
1581
1582
1583/*
1584 * hmi_exception trampoline is a special case. It jumps to hmi_exception_early
1585 * first, and then eventaully from there to the trampoline to get into virtual
1586 * mode.
1587 */
David Brazdil0f672f62019-12-10 10:32:29 +00001588EXC_REAL_BEGIN(hmi_exception, 0xe60, 0x20)
1589 INT_HANDLER hmi_exception, 0xe60, ool=1, early=1, hsrr=EXC_HV, ri=0, kvm=1
1590EXC_REAL_END(hmi_exception, 0xe60, 0x20)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001591EXC_VIRT_NONE(0x4e60, 0x20)
David Brazdil0f672f62019-12-10 10:32:29 +00001592INT_KVM_HANDLER hmi_exception, 0xe60, EXC_HV, PACA_EXGEN, 0
1593EXC_COMMON_BEGIN(hmi_exception_early_common)
1594 mtctr r10 /* Restore ctr */
1595 mfspr r11,SPRN_HSRR0 /* Save HSRR0 */
1596 mfspr r12,SPRN_HSRR1 /* Save HSRR1 */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001597 mr r10,r1 /* Save r1 */
1598 ld r1,PACAEMERGSP(r13) /* Use emergency stack for realmode */
1599 subi r1,r1,INT_FRAME_SIZE /* alloc stack frame */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001600
David Brazdil0f672f62019-12-10 10:32:29 +00001601 /* We don't touch AMR here, we never go to virtual mode */
1602 INT_COMMON 0xe60, PACA_EXGEN, 0, 0, 0, 0, 0
1603
1604 addi r3,r1,STACK_FRAME_OVERHEAD
1605 bl hmi_exception_realmode
1606 cmpdi cr0,r3,0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001607 bne 1f
David Brazdil0f672f62019-12-10 10:32:29 +00001608
1609 EXCEPTION_RESTORE_REGS EXC_HV
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001610 HRFI_TO_USER_OR_KERNEL
1611
David Brazdil0f672f62019-12-10 10:32:29 +000016121:
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001613 /*
1614 * Go to virtual mode and pull the HMI event information from
1615 * firmware.
1616 */
David Brazdil0f672f62019-12-10 10:32:29 +00001617 EXCEPTION_RESTORE_REGS EXC_HV
1618 INT_HANDLER hmi_exception, 0xe60, hsrr=EXC_HV, bitmask=IRQS_DISABLED, kvm=1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001619
1620EXC_COMMON_BEGIN(hmi_exception_common)
David Brazdil0f672f62019-12-10 10:32:29 +00001621 INT_COMMON 0xe60, PACA_EXGEN, 1, 1, 1, 0, 0
1622 FINISH_NAP
1623 RUNLATCH_ON
1624 bl save_nvgprs
1625 addi r3,r1,STACK_FRAME_OVERHEAD
1626 bl handle_hmi_exception
1627 b ret_from_except
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001628
David Brazdil0f672f62019-12-10 10:32:29 +00001629
1630EXC_REAL_BEGIN(h_doorbell, 0xe80, 0x20)
1631 INT_HANDLER h_doorbell, 0xe80, ool=1, hsrr=EXC_HV, bitmask=IRQS_DISABLED, kvm=1
1632EXC_REAL_END(h_doorbell, 0xe80, 0x20)
1633EXC_VIRT_BEGIN(h_doorbell, 0x4e80, 0x20)
1634 INT_HANDLER h_doorbell, 0xe80, ool=1, virt=1, hsrr=EXC_HV, bitmask=IRQS_DISABLED, kvm=1
1635EXC_VIRT_END(h_doorbell, 0x4e80, 0x20)
1636INT_KVM_HANDLER h_doorbell, 0xe80, EXC_HV, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001637#ifdef CONFIG_PPC_DOORBELL
1638EXC_COMMON_ASYNC(h_doorbell_common, 0xe80, doorbell_exception)
1639#else
1640EXC_COMMON_ASYNC(h_doorbell_common, 0xe80, unknown_exception)
1641#endif
1642
1643
David Brazdil0f672f62019-12-10 10:32:29 +00001644EXC_REAL_BEGIN(h_virt_irq, 0xea0, 0x20)
1645 INT_HANDLER h_virt_irq, 0xea0, ool=1, hsrr=EXC_HV, bitmask=IRQS_DISABLED, kvm=1
1646EXC_REAL_END(h_virt_irq, 0xea0, 0x20)
1647EXC_VIRT_BEGIN(h_virt_irq, 0x4ea0, 0x20)
1648 INT_HANDLER h_virt_irq, 0xea0, ool=1, virt=1, hsrr=EXC_HV, bitmask=IRQS_DISABLED, kvm=1
1649EXC_VIRT_END(h_virt_irq, 0x4ea0, 0x20)
1650INT_KVM_HANDLER h_virt_irq, 0xea0, EXC_HV, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001651EXC_COMMON_ASYNC(h_virt_irq_common, 0xea0, do_IRQ)
1652
1653
1654EXC_REAL_NONE(0xec0, 0x20)
1655EXC_VIRT_NONE(0x4ec0, 0x20)
1656EXC_REAL_NONE(0xee0, 0x20)
1657EXC_VIRT_NONE(0x4ee0, 0x20)
1658
1659
David Brazdil0f672f62019-12-10 10:32:29 +00001660EXC_REAL_BEGIN(performance_monitor, 0xf00, 0x20)
1661 INT_HANDLER performance_monitor, 0xf00, ool=1, bitmask=IRQS_PMI_DISABLED, kvm=1
1662EXC_REAL_END(performance_monitor, 0xf00, 0x20)
1663EXC_VIRT_BEGIN(performance_monitor, 0x4f00, 0x20)
1664 INT_HANDLER performance_monitor, 0xf00, ool=1, virt=1, bitmask=IRQS_PMI_DISABLED
1665EXC_VIRT_END(performance_monitor, 0x4f00, 0x20)
1666INT_KVM_HANDLER performance_monitor, 0xf00, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001667EXC_COMMON_ASYNC(performance_monitor_common, 0xf00, performance_monitor_exception)
1668
1669
David Brazdil0f672f62019-12-10 10:32:29 +00001670EXC_REAL_BEGIN(altivec_unavailable, 0xf20, 0x20)
1671 INT_HANDLER altivec_unavailable, 0xf20, ool=1, kvm=1
1672EXC_REAL_END(altivec_unavailable, 0xf20, 0x20)
1673EXC_VIRT_BEGIN(altivec_unavailable, 0x4f20, 0x20)
1674 INT_HANDLER altivec_unavailable, 0xf20, ool=1, virt=1
1675EXC_VIRT_END(altivec_unavailable, 0x4f20, 0x20)
1676INT_KVM_HANDLER altivec_unavailable, 0xf20, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001677EXC_COMMON_BEGIN(altivec_unavailable_common)
David Brazdil0f672f62019-12-10 10:32:29 +00001678 INT_COMMON 0xf20, PACA_EXGEN, 1, 1, 0, 0, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001679#ifdef CONFIG_ALTIVEC
1680BEGIN_FTR_SECTION
1681 beq 1f
1682#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1683 BEGIN_FTR_SECTION_NESTED(69)
1684 /* Test if 2 TM state bits are zero. If non-zero (ie. userspace was in
1685 * transaction), go do TM stuff
1686 */
1687 rldicl. r0, r12, (64-MSR_TS_LG), (64-2)
1688 bne- 2f
1689 END_FTR_SECTION_NESTED(CPU_FTR_TM, CPU_FTR_TM, 69)
1690#endif
1691 bl load_up_altivec
1692 b fast_exception_return
1693#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
16942: /* User process was in a transaction */
1695 bl save_nvgprs
1696 RECONCILE_IRQ_STATE(r10, r11)
1697 addi r3,r1,STACK_FRAME_OVERHEAD
1698 bl altivec_unavailable_tm
1699 b ret_from_except
1700#endif
17011:
1702END_FTR_SECTION_IFSET(CPU_FTR_ALTIVEC)
1703#endif
1704 bl save_nvgprs
1705 RECONCILE_IRQ_STATE(r10, r11)
1706 addi r3,r1,STACK_FRAME_OVERHEAD
1707 bl altivec_unavailable_exception
1708 b ret_from_except
1709
1710
David Brazdil0f672f62019-12-10 10:32:29 +00001711EXC_REAL_BEGIN(vsx_unavailable, 0xf40, 0x20)
1712 INT_HANDLER vsx_unavailable, 0xf40, ool=1, kvm=1
1713EXC_REAL_END(vsx_unavailable, 0xf40, 0x20)
1714EXC_VIRT_BEGIN(vsx_unavailable, 0x4f40, 0x20)
1715 INT_HANDLER vsx_unavailable, 0xf40, ool=1, virt=1
1716EXC_VIRT_END(vsx_unavailable, 0x4f40, 0x20)
1717INT_KVM_HANDLER vsx_unavailable, 0xf40, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001718EXC_COMMON_BEGIN(vsx_unavailable_common)
David Brazdil0f672f62019-12-10 10:32:29 +00001719 INT_COMMON 0xf40, PACA_EXGEN, 1, 1, 0, 0, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001720#ifdef CONFIG_VSX
1721BEGIN_FTR_SECTION
1722 beq 1f
1723#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1724 BEGIN_FTR_SECTION_NESTED(69)
1725 /* Test if 2 TM state bits are zero. If non-zero (ie. userspace was in
1726 * transaction), go do TM stuff
1727 */
1728 rldicl. r0, r12, (64-MSR_TS_LG), (64-2)
1729 bne- 2f
1730 END_FTR_SECTION_NESTED(CPU_FTR_TM, CPU_FTR_TM, 69)
1731#endif
1732 b load_up_vsx
1733#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
17342: /* User process was in a transaction */
1735 bl save_nvgprs
1736 RECONCILE_IRQ_STATE(r10, r11)
1737 addi r3,r1,STACK_FRAME_OVERHEAD
1738 bl vsx_unavailable_tm
1739 b ret_from_except
1740#endif
17411:
1742END_FTR_SECTION_IFSET(CPU_FTR_VSX)
1743#endif
1744 bl save_nvgprs
1745 RECONCILE_IRQ_STATE(r10, r11)
1746 addi r3,r1,STACK_FRAME_OVERHEAD
1747 bl vsx_unavailable_exception
1748 b ret_from_except
1749
1750
David Brazdil0f672f62019-12-10 10:32:29 +00001751EXC_REAL_BEGIN(facility_unavailable, 0xf60, 0x20)
1752 INT_HANDLER facility_unavailable, 0xf60, ool=1, kvm=1
1753EXC_REAL_END(facility_unavailable, 0xf60, 0x20)
1754EXC_VIRT_BEGIN(facility_unavailable, 0x4f60, 0x20)
1755 INT_HANDLER facility_unavailable, 0xf60, ool=1, virt=1
1756EXC_VIRT_END(facility_unavailable, 0x4f60, 0x20)
1757INT_KVM_HANDLER facility_unavailable, 0xf60, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001758EXC_COMMON(facility_unavailable_common, 0xf60, facility_unavailable_exception)
1759
1760
David Brazdil0f672f62019-12-10 10:32:29 +00001761EXC_REAL_BEGIN(h_facility_unavailable, 0xf80, 0x20)
1762 INT_HANDLER h_facility_unavailable, 0xf80, ool=1, hsrr=EXC_HV, kvm=1
1763EXC_REAL_END(h_facility_unavailable, 0xf80, 0x20)
1764EXC_VIRT_BEGIN(h_facility_unavailable, 0x4f80, 0x20)
1765 INT_HANDLER h_facility_unavailable, 0xf80, ool=1, virt=1, hsrr=EXC_HV, kvm=1
1766EXC_VIRT_END(h_facility_unavailable, 0x4f80, 0x20)
1767INT_KVM_HANDLER h_facility_unavailable, 0xf80, EXC_HV, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001768EXC_COMMON(h_facility_unavailable_common, 0xf80, facility_unavailable_exception)
1769
1770
1771EXC_REAL_NONE(0xfa0, 0x20)
1772EXC_VIRT_NONE(0x4fa0, 0x20)
1773EXC_REAL_NONE(0xfc0, 0x20)
1774EXC_VIRT_NONE(0x4fc0, 0x20)
1775EXC_REAL_NONE(0xfe0, 0x20)
1776EXC_VIRT_NONE(0x4fe0, 0x20)
1777
1778EXC_REAL_NONE(0x1000, 0x100)
1779EXC_VIRT_NONE(0x5000, 0x100)
1780EXC_REAL_NONE(0x1100, 0x100)
1781EXC_VIRT_NONE(0x5100, 0x100)
1782
1783#ifdef CONFIG_CBE_RAS
David Brazdil0f672f62019-12-10 10:32:29 +00001784EXC_REAL_BEGIN(cbe_system_error, 0x1200, 0x100)
1785 INT_HANDLER cbe_system_error, 0x1200, ool=1, hsrr=EXC_HV, kvm=1
1786EXC_REAL_END(cbe_system_error, 0x1200, 0x100)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001787EXC_VIRT_NONE(0x5200, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001788INT_KVM_HANDLER cbe_system_error, 0x1200, EXC_HV, PACA_EXGEN, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001789EXC_COMMON(cbe_system_error_common, 0x1200, cbe_system_error_exception)
1790#else /* CONFIG_CBE_RAS */
1791EXC_REAL_NONE(0x1200, 0x100)
1792EXC_VIRT_NONE(0x5200, 0x100)
1793#endif
1794
1795
David Brazdil0f672f62019-12-10 10:32:29 +00001796EXC_REAL_BEGIN(instruction_breakpoint, 0x1300, 0x100)
1797 INT_HANDLER instruction_breakpoint, 0x1300, kvm=1
1798EXC_REAL_END(instruction_breakpoint, 0x1300, 0x100)
1799EXC_VIRT_BEGIN(instruction_breakpoint, 0x5300, 0x100)
1800 INT_HANDLER instruction_breakpoint, 0x1300, virt=1
1801EXC_VIRT_END(instruction_breakpoint, 0x5300, 0x100)
1802INT_KVM_HANDLER instruction_breakpoint, 0x1300, EXC_STD, PACA_EXGEN, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001803EXC_COMMON(instruction_breakpoint_common, 0x1300, instruction_breakpoint_exception)
1804
David Brazdil0f672f62019-12-10 10:32:29 +00001805
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001806EXC_REAL_NONE(0x1400, 0x100)
1807EXC_VIRT_NONE(0x5400, 0x100)
1808
1809EXC_REAL_BEGIN(denorm_exception_hv, 0x1500, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001810 INT_HANDLER denorm_exception_hv, 0x1500, early=2, hsrr=EXC_HV
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001811#ifdef CONFIG_PPC_DENORMALISATION
1812 mfspr r10,SPRN_HSRR1
1813 andis. r10,r10,(HSRR1_DENORM)@h /* denorm? */
1814 bne+ denorm_assist
1815#endif
David Brazdil0f672f62019-12-10 10:32:29 +00001816 KVMTEST denorm_exception_hv, EXC_HV 0x1500
1817 INT_SAVE_SRR_AND_JUMP denorm_common, EXC_HV, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001818EXC_REAL_END(denorm_exception_hv, 0x1500, 0x100)
1819
1820#ifdef CONFIG_PPC_DENORMALISATION
1821EXC_VIRT_BEGIN(denorm_exception, 0x5500, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001822 INT_HANDLER denorm_exception, 0x1500, 0, 2, 1, EXC_HV, PACA_EXGEN, 1, 0, 0, 0, 0
1823 mfspr r10,SPRN_HSRR1
1824 andis. r10,r10,(HSRR1_DENORM)@h /* denorm? */
1825 bne+ denorm_assist
1826 INT_VIRT_SAVE_SRR_AND_JUMP denorm_common, EXC_HV
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001827EXC_VIRT_END(denorm_exception, 0x5500, 0x100)
1828#else
1829EXC_VIRT_NONE(0x5500, 0x100)
1830#endif
1831
David Brazdil0f672f62019-12-10 10:32:29 +00001832INT_KVM_HANDLER denorm_exception_hv, 0x1500, EXC_HV, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001833
1834#ifdef CONFIG_PPC_DENORMALISATION
1835TRAMP_REAL_BEGIN(denorm_assist)
1836BEGIN_FTR_SECTION
1837/*
1838 * To denormalise we need to move a copy of the register to itself.
1839 * For POWER6 do that here for all FP regs.
1840 */
1841 mfmsr r10
1842 ori r10,r10,(MSR_FP|MSR_FE0|MSR_FE1)
1843 xori r10,r10,(MSR_FE0|MSR_FE1)
1844 mtmsrd r10
1845 sync
1846
David Brazdil0f672f62019-12-10 10:32:29 +00001847 .Lreg=0
1848 .rept 32
1849 fmr .Lreg,.Lreg
1850 .Lreg=.Lreg+1
1851 .endr
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001852
1853FTR_SECTION_ELSE
1854/*
1855 * To denormalise we need to move a copy of the register to itself.
1856 * For POWER7 do that here for the first 32 VSX registers only.
1857 */
1858 mfmsr r10
1859 oris r10,r10,MSR_VSX@h
1860 mtmsrd r10
1861 sync
1862
David Brazdil0f672f62019-12-10 10:32:29 +00001863 .Lreg=0
1864 .rept 32
1865 XVCPSGNDP(.Lreg,.Lreg,.Lreg)
1866 .Lreg=.Lreg+1
1867 .endr
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001868
1869ALT_FTR_SECTION_END_IFCLR(CPU_FTR_ARCH_206)
1870
1871BEGIN_FTR_SECTION
1872 b denorm_done
1873END_FTR_SECTION_IFCLR(CPU_FTR_ARCH_207S)
1874/*
1875 * To denormalise we need to move a copy of the register to itself.
1876 * For POWER8 we need to do that for all 64 VSX registers
1877 */
David Brazdil0f672f62019-12-10 10:32:29 +00001878 .Lreg=32
1879 .rept 32
1880 XVCPSGNDP(.Lreg,.Lreg,.Lreg)
1881 .Lreg=.Lreg+1
1882 .endr
1883
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001884denorm_done:
1885 mfspr r11,SPRN_HSRR0
1886 subi r11,r11,4
1887 mtspr SPRN_HSRR0,r11
1888 mtcrf 0x80,r9
1889 ld r9,PACA_EXGEN+EX_R9(r13)
1890 RESTORE_PPR_PACA(PACA_EXGEN, r10)
1891BEGIN_FTR_SECTION
1892 ld r10,PACA_EXGEN+EX_CFAR(r13)
1893 mtspr SPRN_CFAR,r10
1894END_FTR_SECTION_IFSET(CPU_FTR_CFAR)
1895 ld r10,PACA_EXGEN+EX_R10(r13)
1896 ld r11,PACA_EXGEN+EX_R11(r13)
1897 ld r12,PACA_EXGEN+EX_R12(r13)
1898 ld r13,PACA_EXGEN+EX_R13(r13)
1899 HRFI_TO_UNKNOWN
1900 b .
1901#endif
1902
1903EXC_COMMON(denorm_common, 0x1500, unknown_exception)
1904
1905
1906#ifdef CONFIG_CBE_RAS
David Brazdil0f672f62019-12-10 10:32:29 +00001907EXC_REAL_BEGIN(cbe_maintenance, 0x1600, 0x100)
1908 INT_HANDLER cbe_maintenance, 0x1600, ool=1, hsrr=EXC_HV, kvm=1
1909EXC_REAL_END(cbe_maintenance, 0x1600, 0x100)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001910EXC_VIRT_NONE(0x5600, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001911INT_KVM_HANDLER cbe_maintenance, 0x1600, EXC_HV, PACA_EXGEN, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001912EXC_COMMON(cbe_maintenance_common, 0x1600, cbe_maintenance_exception)
1913#else /* CONFIG_CBE_RAS */
1914EXC_REAL_NONE(0x1600, 0x100)
1915EXC_VIRT_NONE(0x5600, 0x100)
1916#endif
1917
1918
David Brazdil0f672f62019-12-10 10:32:29 +00001919EXC_REAL_BEGIN(altivec_assist, 0x1700, 0x100)
1920 INT_HANDLER altivec_assist, 0x1700, kvm=1
1921EXC_REAL_END(altivec_assist, 0x1700, 0x100)
1922EXC_VIRT_BEGIN(altivec_assist, 0x5700, 0x100)
1923 INT_HANDLER altivec_assist, 0x1700, virt=1
1924EXC_VIRT_END(altivec_assist, 0x5700, 0x100)
1925INT_KVM_HANDLER altivec_assist, 0x1700, EXC_STD, PACA_EXGEN, 0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001926#ifdef CONFIG_ALTIVEC
1927EXC_COMMON(altivec_assist_common, 0x1700, altivec_assist_exception)
1928#else
1929EXC_COMMON(altivec_assist_common, 0x1700, unknown_exception)
1930#endif
1931
1932
1933#ifdef CONFIG_CBE_RAS
David Brazdil0f672f62019-12-10 10:32:29 +00001934EXC_REAL_BEGIN(cbe_thermal, 0x1800, 0x100)
1935 INT_HANDLER cbe_thermal, 0x1800, ool=1, hsrr=EXC_HV, kvm=1
1936EXC_REAL_END(cbe_thermal, 0x1800, 0x100)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001937EXC_VIRT_NONE(0x5800, 0x100)
David Brazdil0f672f62019-12-10 10:32:29 +00001938INT_KVM_HANDLER cbe_thermal, 0x1800, EXC_HV, PACA_EXGEN, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001939EXC_COMMON(cbe_thermal_common, 0x1800, cbe_thermal_exception)
1940#else /* CONFIG_CBE_RAS */
1941EXC_REAL_NONE(0x1800, 0x100)
1942EXC_VIRT_NONE(0x5800, 0x100)
1943#endif
1944
David Brazdil0f672f62019-12-10 10:32:29 +00001945
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001946#ifdef CONFIG_PPC_WATCHDOG
1947
1948#define MASKED_DEC_HANDLER_LABEL 3f
1949
1950#define MASKED_DEC_HANDLER(_H) \
19513: /* soft-nmi */ \
1952 std r12,PACA_EXGEN+EX_R12(r13); \
1953 GET_SCRATCH0(r10); \
1954 std r10,PACA_EXGEN+EX_R13(r13); \
David Brazdil0f672f62019-12-10 10:32:29 +00001955 INT_SAVE_SRR_AND_JUMP soft_nmi_common, _H, 1
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001956
1957/*
1958 * Branch to soft_nmi_interrupt using the emergency stack. The emergency
1959 * stack is one that is usable by maskable interrupts so long as MSR_EE
1960 * remains off. It is used for recovery when something has corrupted the
1961 * normal kernel stack, for example. The "soft NMI" must not use the process
1962 * stack because we want irq disabled sections to avoid touching the stack
1963 * at all (other than PMU interrupts), so use the emergency stack for this,
1964 * and run it entirely with interrupts hard disabled.
1965 */
1966EXC_COMMON_BEGIN(soft_nmi_common)
1967 mr r10,r1
1968 ld r1,PACAEMERGSP(r13)
1969 subi r1,r1,INT_FRAME_SIZE
David Brazdil0f672f62019-12-10 10:32:29 +00001970 INT_COMMON 0x900, PACA_EXGEN, 0, 1, 1, 0, 0
1971 bl save_nvgprs
1972 addi r3,r1,STACK_FRAME_OVERHEAD
1973 bl soft_nmi_interrupt
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001974 b ret_from_except
1975
1976#else /* CONFIG_PPC_WATCHDOG */
1977#define MASKED_DEC_HANDLER_LABEL 2f /* normal return */
1978#define MASKED_DEC_HANDLER(_H)
1979#endif /* CONFIG_PPC_WATCHDOG */
1980
1981/*
1982 * An interrupt came in while soft-disabled. We set paca->irq_happened, then:
1983 * - If it was a decrementer interrupt, we bump the dec to max and and return.
1984 * - If it was a doorbell we return immediately since doorbells are edge
1985 * triggered and won't automatically refire.
1986 * - If it was a HMI we return immediately since we handled it in realmode
1987 * and it won't refire.
1988 * - Else it is one of PACA_IRQ_MUST_HARD_MASK, so hard disable and return.
1989 * This is called with r10 containing the value to OR to the paca field.
1990 */
David Brazdil0f672f62019-12-10 10:32:29 +00001991.macro MASKED_INTERRUPT hsrr
1992 .if \hsrr
1993masked_Hinterrupt:
1994 .else
1995masked_interrupt:
1996 .endif
1997 std r11,PACA_EXGEN+EX_R11(r13)
1998 lbz r11,PACAIRQHAPPENED(r13)
1999 or r11,r11,r10
2000 stb r11,PACAIRQHAPPENED(r13)
2001 cmpwi r10,PACA_IRQ_DEC
2002 bne 1f
2003 lis r10,0x7fff
2004 ori r10,r10,0xffff
2005 mtspr SPRN_DEC,r10
2006 b MASKED_DEC_HANDLER_LABEL
20071: andi. r10,r10,PACA_IRQ_MUST_HARD_MASK
2008 beq 2f
2009 .if \hsrr
2010 mfspr r10,SPRN_HSRR1
2011 xori r10,r10,MSR_EE /* clear MSR_EE */
2012 mtspr SPRN_HSRR1,r10
2013 .else
2014 mfspr r10,SPRN_SRR1
2015 xori r10,r10,MSR_EE /* clear MSR_EE */
2016 mtspr SPRN_SRR1,r10
2017 .endif
2018 ori r11,r11,PACA_IRQ_HARD_DIS
2019 stb r11,PACAIRQHAPPENED(r13)
20202: /* done */
2021 mtcrf 0x80,r9
2022 std r1,PACAR1(r13)
2023 ld r9,PACA_EXGEN+EX_R9(r13)
2024 ld r10,PACA_EXGEN+EX_R10(r13)
2025 ld r11,PACA_EXGEN+EX_R11(r13)
2026 /* returns to kernel where r13 must be set up, so don't restore it */
2027 .if \hsrr
2028 HRFI_TO_KERNEL
2029 .else
2030 RFI_TO_KERNEL
2031 .endif
2032 b .
2033 MASKED_DEC_HANDLER(\hsrr\())
2034.endm
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002035
2036TRAMP_REAL_BEGIN(stf_barrier_fallback)
2037 std r9,PACA_EXRFI+EX_R9(r13)
2038 std r10,PACA_EXRFI+EX_R10(r13)
2039 sync
2040 ld r9,PACA_EXRFI+EX_R9(r13)
2041 ld r10,PACA_EXRFI+EX_R10(r13)
2042 ori 31,31,0
2043 .rept 14
2044 b 1f
20451:
2046 .endr
2047 blr
2048
Olivier Deprez0e641232021-09-23 10:07:05 +02002049/* Clobbers r10, r11, ctr */
2050.macro L1D_DISPLACEMENT_FLUSH
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002051 ld r10,PACA_RFI_FLUSH_FALLBACK_AREA(r13)
2052 ld r11,PACA_L1D_FLUSH_SIZE(r13)
2053 srdi r11,r11,(7 + 3) /* 128 byte lines, unrolled 8x */
2054 mtctr r11
2055 DCBT_BOOK3S_STOP_ALL_STREAM_IDS(r11) /* Stop prefetch streams */
2056
2057 /* order ld/st prior to dcbt stop all streams with flushing */
2058 sync
2059
2060 /*
Olivier Deprez0e641232021-09-23 10:07:05 +02002061 * The load addresses are at staggered offsets within cachelines,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002062 * which suits some pipelines better (on others it should not
2063 * hurt).
2064 */
20651:
2066 ld r11,(0x80 + 8)*0(r10)
2067 ld r11,(0x80 + 8)*1(r10)
2068 ld r11,(0x80 + 8)*2(r10)
2069 ld r11,(0x80 + 8)*3(r10)
2070 ld r11,(0x80 + 8)*4(r10)
2071 ld r11,(0x80 + 8)*5(r10)
2072 ld r11,(0x80 + 8)*6(r10)
2073 ld r11,(0x80 + 8)*7(r10)
2074 addi r10,r10,0x80*8
2075 bdnz 1b
Olivier Deprez0e641232021-09-23 10:07:05 +02002076.endm
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002077
Olivier Deprez0e641232021-09-23 10:07:05 +02002078TRAMP_REAL_BEGIN(entry_flush_fallback)
2079 std r9,PACA_EXRFI+EX_R9(r13)
2080 std r10,PACA_EXRFI+EX_R10(r13)
2081 std r11,PACA_EXRFI+EX_R11(r13)
2082 mfctr r9
2083 L1D_DISPLACEMENT_FLUSH
2084 mtctr r9
2085 ld r9,PACA_EXRFI+EX_R9(r13)
2086 ld r10,PACA_EXRFI+EX_R10(r13)
2087 ld r11,PACA_EXRFI+EX_R11(r13)
2088 blr
2089
2090TRAMP_REAL_BEGIN(rfi_flush_fallback)
2091 SET_SCRATCH0(r13);
2092 GET_PACA(r13);
2093 std r1,PACA_EXRFI+EX_R12(r13)
2094 ld r1,PACAKSAVE(r13)
2095 std r9,PACA_EXRFI+EX_R9(r13)
2096 std r10,PACA_EXRFI+EX_R10(r13)
2097 std r11,PACA_EXRFI+EX_R11(r13)
2098 mfctr r9
2099 L1D_DISPLACEMENT_FLUSH
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002100 mtctr r9
2101 ld r9,PACA_EXRFI+EX_R9(r13)
2102 ld r10,PACA_EXRFI+EX_R10(r13)
2103 ld r11,PACA_EXRFI+EX_R11(r13)
2104 ld r1,PACA_EXRFI+EX_R12(r13)
2105 GET_SCRATCH0(r13);
2106 rfid
2107
2108TRAMP_REAL_BEGIN(hrfi_flush_fallback)
2109 SET_SCRATCH0(r13);
2110 GET_PACA(r13);
2111 std r1,PACA_EXRFI+EX_R12(r13)
2112 ld r1,PACAKSAVE(r13)
2113 std r9,PACA_EXRFI+EX_R9(r13)
2114 std r10,PACA_EXRFI+EX_R10(r13)
2115 std r11,PACA_EXRFI+EX_R11(r13)
2116 mfctr r9
Olivier Deprez0e641232021-09-23 10:07:05 +02002117 L1D_DISPLACEMENT_FLUSH
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002118 mtctr r9
2119 ld r9,PACA_EXRFI+EX_R9(r13)
2120 ld r10,PACA_EXRFI+EX_R10(r13)
2121 ld r11,PACA_EXRFI+EX_R11(r13)
2122 ld r1,PACA_EXRFI+EX_R12(r13)
2123 GET_SCRATCH0(r13);
2124 hrfid
2125
Olivier Deprez0e641232021-09-23 10:07:05 +02002126USE_TEXT_SECTION()
2127
2128_GLOBAL(do_uaccess_flush)
2129 UACCESS_FLUSH_FIXUP_SECTION
2130 nop
2131 nop
2132 nop
2133 blr
2134 L1D_DISPLACEMENT_FLUSH
2135 blr
2136_ASM_NOKPROBE_SYMBOL(do_uaccess_flush)
2137EXPORT_SYMBOL(do_uaccess_flush)
2138
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002139/*
2140 * Real mode exceptions actually use this too, but alternate
2141 * instruction code patches (which end up in the common .text area)
2142 * cannot reach these if they are put there.
2143 */
2144USE_FIXED_SECTION(virt_trampolines)
David Brazdil0f672f62019-12-10 10:32:29 +00002145 MASKED_INTERRUPT EXC_STD
2146 MASKED_INTERRUPT EXC_HV
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002147
2148#ifdef CONFIG_KVM_BOOK3S_64_HANDLER
2149TRAMP_REAL_BEGIN(kvmppc_skip_interrupt)
2150 /*
2151 * Here all GPRs are unchanged from when the interrupt happened
2152 * except for r13, which is saved in SPRG_SCRATCH0.
2153 */
2154 mfspr r13, SPRN_SRR0
2155 addi r13, r13, 4
2156 mtspr SPRN_SRR0, r13
2157 GET_SCRATCH0(r13)
2158 RFI_TO_KERNEL
2159 b .
2160
2161TRAMP_REAL_BEGIN(kvmppc_skip_Hinterrupt)
2162 /*
2163 * Here all GPRs are unchanged from when the interrupt happened
2164 * except for r13, which is saved in SPRG_SCRATCH0.
2165 */
2166 mfspr r13, SPRN_HSRR0
2167 addi r13, r13, 4
2168 mtspr SPRN_HSRR0, r13
2169 GET_SCRATCH0(r13)
2170 HRFI_TO_KERNEL
2171 b .
2172#endif
2173
2174/*
2175 * Ensure that any handlers that get invoked from the exception prologs
2176 * above are below the first 64KB (0x10000) of the kernel image because
2177 * the prologs assemble the addresses of these handlers using the
2178 * LOAD_HANDLER macro, which uses an ori instruction.
2179 */
2180
2181/*** Common interrupt handlers ***/
2182
2183
2184 /*
2185 * Relocation-on interrupts: A subset of the interrupts can be delivered
2186 * with IR=1/DR=1, if AIL==2 and MSR.HV won't be changed by delivering
2187 * it. Addresses are the same as the original interrupt addresses, but
2188 * offset by 0xc000000000004000.
2189 * It's impossible to receive interrupts below 0x300 via this mechanism.
2190 * KVM: None of these traps are from the guest ; anything that escalated
2191 * to HV=1 from HV=0 is delivered via real mode handlers.
2192 */
2193
2194 /*
2195 * This uses the standard macro, since the original 0x300 vector
2196 * only has extra guff for STAB-based processors -- which never
2197 * come here.
2198 */
2199
2200EXC_COMMON_BEGIN(ppc64_runlatch_on_trampoline)
2201 b __ppc64_runlatch_on
2202
2203USE_FIXED_SECTION(virt_trampolines)
2204 /*
2205 * The __end_interrupts marker must be past the out-of-line (OOL)
2206 * handlers, so that they are copied to real address 0x100 when running
2207 * a relocatable kernel. This ensures they can be reached from the short
2208 * trampoline handlers (like 0x4f00, 0x4f20, etc.) which branch
2209 * directly, without using LOAD_HANDLER().
2210 */
2211 .align 7
2212 .globl __end_interrupts
2213__end_interrupts:
2214DEFINE_FIXED_SYMBOL(__end_interrupts)
2215
2216#ifdef CONFIG_PPC_970_NAP
2217EXC_COMMON_BEGIN(power4_fixup_nap)
2218 andc r9,r9,r10
2219 std r9,TI_LOCAL_FLAGS(r11)
2220 ld r10,_LINK(r1) /* make idle task do the */
2221 std r10,_NIP(r1) /* equivalent of a blr */
2222 blr
2223#endif
2224
2225CLOSE_FIXED_SECTION(real_vectors);
2226CLOSE_FIXED_SECTION(real_trampolines);
2227CLOSE_FIXED_SECTION(virt_vectors);
2228CLOSE_FIXED_SECTION(virt_trampolines);
2229
2230USE_TEXT_SECTION()
2231
David Brazdil0f672f62019-12-10 10:32:29 +00002232/* MSR[RI] should be clear because this uses SRR[01] */
2233enable_machine_check:
2234 mflr r0
2235 bcl 20,31,$+4
22360: mflr r3
2237 addi r3,r3,(1f - 0b)
2238 mtspr SPRN_SRR0,r3
2239 mfmsr r3
2240 ori r3,r3,MSR_ME
2241 mtspr SPRN_SRR1,r3
2242 RFI_TO_KERNEL
22431: mtlr r0
2244 blr
2245
2246/* MSR[RI] should be clear because this uses SRR[01] */
2247disable_machine_check:
2248 mflr r0
2249 bcl 20,31,$+4
22500: mflr r3
2251 addi r3,r3,(1f - 0b)
2252 mtspr SPRN_SRR0,r3
2253 mfmsr r3
2254 li r4,MSR_ME
2255 andc r3,r3,r4
2256 mtspr SPRN_SRR1,r3
2257 RFI_TO_KERNEL
22581: mtlr r0
2259 blr
2260
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002261/*
2262 * Hash table stuff
2263 */
2264 .balign IFETCH_ALIGN_BYTES
2265do_hash_page:
2266#ifdef CONFIG_PPC_BOOK3S_64
2267 lis r0,(DSISR_BAD_FAULT_64S | DSISR_DABRMATCH | DSISR_KEYFAULT)@h
2268 ori r0,r0,DSISR_BAD_FAULT_64S@l
David Brazdil0f672f62019-12-10 10:32:29 +00002269 and. r0,r5,r0 /* weird error? */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002270 bne- handle_page_fault /* if not, try to insert a HPTE */
David Brazdil0f672f62019-12-10 10:32:29 +00002271 ld r11, PACA_THREAD_INFO(r13)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002272 lwz r0,TI_PREEMPT(r11) /* If we're in an "NMI" */
2273 andis. r0,r0,NMI_MASK@h /* (i.e. an irq when soft-disabled) */
2274 bne 77f /* then don't call hash_page now */
2275
2276 /*
David Brazdil0f672f62019-12-10 10:32:29 +00002277 * r3 contains the trap number
2278 * r4 contains the faulting address
2279 * r5 contains dsisr
2280 * r6 msr
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002281 *
2282 * at return r3 = 0 for success, 1 for page fault, negative for error
2283 */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002284 bl __hash_page /* build HPTE if possible */
2285 cmpdi r3,0 /* see if __hash_page succeeded */
2286
2287 /* Success */
2288 beq fast_exc_return_irq /* Return from exception on success */
2289
2290 /* Error */
2291 blt- 13f
2292
David Brazdil0f672f62019-12-10 10:32:29 +00002293 /* Reload DAR/DSISR into r4/r5 for the DABR check below */
2294 ld r4,_DAR(r1)
2295 ld r5,_DSISR(r1)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002296#endif /* CONFIG_PPC_BOOK3S_64 */
2297
2298/* Here we have a page fault that hash_page can't handle. */
2299handle_page_fault:
David Brazdil0f672f62019-12-10 10:32:29 +0000230011: andis. r0,r5,DSISR_DABRMATCH@h
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002301 bne- handle_dabr_fault
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002302 addi r3,r1,STACK_FRAME_OVERHEAD
2303 bl do_page_fault
2304 cmpdi r3,0
David Brazdil0f672f62019-12-10 10:32:29 +00002305 beq+ ret_from_except_lite
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002306 bl save_nvgprs
2307 mr r5,r3
2308 addi r3,r1,STACK_FRAME_OVERHEAD
David Brazdil0f672f62019-12-10 10:32:29 +00002309 ld r4,_DAR(r1)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002310 bl bad_page_fault
2311 b ret_from_except
2312
2313/* We have a data breakpoint exception - handle it */
2314handle_dabr_fault:
2315 bl save_nvgprs
2316 ld r4,_DAR(r1)
2317 ld r5,_DSISR(r1)
2318 addi r3,r1,STACK_FRAME_OVERHEAD
2319 bl do_break
David Brazdil0f672f62019-12-10 10:32:29 +00002320 /*
2321 * do_break() may have changed the NV GPRS while handling a breakpoint.
2322 * If so, we need to restore them with their updated values. Don't use
2323 * ret_from_except_lite here.
2324 */
2325 b ret_from_except
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002326
2327
2328#ifdef CONFIG_PPC_BOOK3S_64
2329/* We have a page fault that hash_page could handle but HV refused
2330 * the PTE insertion
2331 */
233213: bl save_nvgprs
2333 mr r5,r3
2334 addi r3,r1,STACK_FRAME_OVERHEAD
2335 ld r4,_DAR(r1)
2336 bl low_hash_fault
2337 b ret_from_except
2338#endif
2339
2340/*
2341 * We come here as a result of a DSI at a point where we don't want
2342 * to call hash_page, such as when we are accessing memory (possibly
2343 * user memory) inside a PMU interrupt that occurred while interrupts
2344 * were soft-disabled. We want to invoke the exception handler for
2345 * the access, or panic if there isn't a handler.
2346 */
234777: bl save_nvgprs
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002348 addi r3,r1,STACK_FRAME_OVERHEAD
2349 li r5,SIGSEGV
2350 bl bad_page_fault
2351 b ret_from_except
2352
2353/*
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002354 * When doorbell is triggered from system reset wakeup, the message is
2355 * not cleared, so it would fire again when EE is enabled.
2356 *
2357 * When coming from local_irq_enable, there may be the same problem if
2358 * we were hard disabled.
2359 *
2360 * Execute msgclr to clear pending exceptions before handling it.
2361 */
2362h_doorbell_common_msgclr:
2363 LOAD_REG_IMMEDIATE(r3, PPC_DBELL_MSGTYPE << (63-36))
2364 PPC_MSGCLR(3)
2365 b h_doorbell_common
2366
2367doorbell_super_common_msgclr:
2368 LOAD_REG_IMMEDIATE(r3, PPC_DBELL_MSGTYPE << (63-36))
2369 PPC_MSGCLRP(3)
2370 b doorbell_super_common
2371
2372/*
2373 * Called from arch_local_irq_enable when an interrupt needs
2374 * to be resent. r3 contains 0x500, 0x900, 0xa00 or 0xe80 to indicate
2375 * which kind of interrupt. MSR:EE is already off. We generate a
2376 * stackframe like if a real interrupt had happened.
2377 *
2378 * Note: While MSR:EE is off, we need to make sure that _MSR
2379 * in the generated frame has EE set to 1 or the exception
2380 * handler will not properly re-enable them.
2381 *
2382 * Note that we don't specify LR as the NIP (return address) for
2383 * the interrupt because that would unbalance the return branch
2384 * predictor.
2385 */
2386_GLOBAL(__replay_interrupt)
2387 /* We are going to jump to the exception common code which
2388 * will retrieve various register values from the PACA which
2389 * we don't give a damn about, so we don't bother storing them.
2390 */
2391 mfmsr r12
2392 LOAD_REG_ADDR(r11, replay_interrupt_return)
2393 mfcr r9
2394 ori r12,r12,MSR_EE
2395 cmpwi r3,0x900
2396 beq decrementer_common
2397 cmpwi r3,0x500
2398BEGIN_FTR_SECTION
2399 beq h_virt_irq_common
2400FTR_SECTION_ELSE
2401 beq hardware_interrupt_common
2402ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE | CPU_FTR_ARCH_300)
2403 cmpwi r3,0xf00
2404 beq performance_monitor_common
2405BEGIN_FTR_SECTION
2406 cmpwi r3,0xa00
2407 beq h_doorbell_common_msgclr
2408 cmpwi r3,0xe60
2409 beq hmi_exception_common
2410FTR_SECTION_ELSE
2411 cmpwi r3,0xa00
2412 beq doorbell_super_common_msgclr
2413ALT_FTR_SECTION_END_IFSET(CPU_FTR_HVMODE)
2414replay_interrupt_return:
2415 blr
2416
2417_ASM_NOKPROBE_SYMBOL(__replay_interrupt)