Loading...
1// SPDX-License-Identifier: GPL-2.0-or-later
2
3#include <linux/context_tracking.h>
4#include <linux/err.h>
5#include <linux/compat.h>
6#include <linux/sched/debug.h> /* for show_regs */
7
8#include <asm/kup.h>
9#include <asm/cputime.h>
10#include <asm/hw_irq.h>
11#include <asm/interrupt.h>
12#include <asm/kprobes.h>
13#include <asm/paca.h>
14#include <asm/ptrace.h>
15#include <asm/reg.h>
16#include <asm/signal.h>
17#include <asm/switch_to.h>
18#include <asm/syscall.h>
19#include <asm/time.h>
20#include <asm/tm.h>
21#include <asm/unistd.h>
22
23#if defined(CONFIG_PPC_ADV_DEBUG_REGS) && defined(CONFIG_PPC32)
24unsigned long global_dbcr0[NR_CPUS];
25#endif
26
27#ifdef CONFIG_PPC_BOOK3S_64
28DEFINE_STATIC_KEY_FALSE(interrupt_exit_not_reentrant);
29static inline bool exit_must_hard_disable(void)
30{
31 return static_branch_unlikely(&interrupt_exit_not_reentrant);
32}
33#else
34static inline bool exit_must_hard_disable(void)
35{
36 return true;
37}
38#endif
39
40/*
41 * local irqs must be disabled. Returns false if the caller must re-enable
42 * them, check for new work, and try again.
43 *
44 * This should be called with local irqs disabled, but if they were previously
45 * enabled when the interrupt handler returns (indicating a process-context /
46 * synchronous interrupt) then irqs_enabled should be true.
47 *
48 * restartable is true then EE/RI can be left on because interrupts are handled
49 * with a restart sequence.
50 */
51static notrace __always_inline bool prep_irq_for_enabled_exit(bool restartable)
52{
53 bool must_hard_disable = (exit_must_hard_disable() || !restartable);
54
55 /* This must be done with RI=1 because tracing may touch vmaps */
56 trace_hardirqs_on();
57
58 if (must_hard_disable)
59 __hard_EE_RI_disable();
60
61#ifdef CONFIG_PPC64
62 /* This pattern matches prep_irq_for_idle */
63 if (unlikely(lazy_irq_pending_nocheck())) {
64 if (must_hard_disable) {
65 local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
66 __hard_RI_enable();
67 }
68 trace_hardirqs_off();
69
70 return false;
71 }
72#endif
73 return true;
74}
75
76static notrace void booke_load_dbcr0(void)
77{
78#ifdef CONFIG_PPC_ADV_DEBUG_REGS
79 unsigned long dbcr0 = current->thread.debug.dbcr0;
80
81 if (likely(!(dbcr0 & DBCR0_IDM)))
82 return;
83
84 /*
85 * Check to see if the dbcr0 register is set up to debug.
86 * Use the internal debug mode bit to do this.
87 */
88 mtmsr(mfmsr() & ~MSR_DE);
89 if (IS_ENABLED(CONFIG_PPC32)) {
90 isync();
91 global_dbcr0[smp_processor_id()] = mfspr(SPRN_DBCR0);
92 }
93 mtspr(SPRN_DBCR0, dbcr0);
94 mtspr(SPRN_DBSR, -1);
95#endif
96}
97
98static void check_return_regs_valid(struct pt_regs *regs)
99{
100#ifdef CONFIG_PPC_BOOK3S_64
101 unsigned long trap, srr0, srr1;
102 static bool warned;
103 u8 *validp;
104 char *h;
105
106 if (trap_is_scv(regs))
107 return;
108
109 trap = TRAP(regs);
110 // EE in HV mode sets HSRRs like 0xea0
111 if (cpu_has_feature(CPU_FTR_HVMODE) && trap == INTERRUPT_EXTERNAL)
112 trap = 0xea0;
113
114 switch (trap) {
115 case 0x980:
116 case INTERRUPT_H_DATA_STORAGE:
117 case 0xe20:
118 case 0xe40:
119 case INTERRUPT_HMI:
120 case 0xe80:
121 case 0xea0:
122 case INTERRUPT_H_FAC_UNAVAIL:
123 case 0x1200:
124 case 0x1500:
125 case 0x1600:
126 case 0x1800:
127 validp = &local_paca->hsrr_valid;
128 if (!*validp)
129 return;
130
131 srr0 = mfspr(SPRN_HSRR0);
132 srr1 = mfspr(SPRN_HSRR1);
133 h = "H";
134
135 break;
136 default:
137 validp = &local_paca->srr_valid;
138 if (!*validp)
139 return;
140
141 srr0 = mfspr(SPRN_SRR0);
142 srr1 = mfspr(SPRN_SRR1);
143 h = "";
144 break;
145 }
146
147 if (srr0 == regs->nip && srr1 == regs->msr)
148 return;
149
150 /*
151 * A NMI / soft-NMI interrupt may have come in after we found
152 * srr_valid and before the SRRs are loaded. The interrupt then
153 * comes in and clobbers SRRs and clears srr_valid. Then we load
154 * the SRRs here and test them above and find they don't match.
155 *
156 * Test validity again after that, to catch such false positives.
157 *
158 * This test in general will have some window for false negatives
159 * and may not catch and fix all such cases if an NMI comes in
160 * later and clobbers SRRs without clearing srr_valid, but hopefully
161 * such things will get caught most of the time, statistically
162 * enough to be able to get a warning out.
163 */
164 barrier();
165
166 if (!*validp)
167 return;
168
169 if (!warned) {
170 warned = true;
171 printk("%sSRR0 was: %lx should be: %lx\n", h, srr0, regs->nip);
172 printk("%sSRR1 was: %lx should be: %lx\n", h, srr1, regs->msr);
173 show_regs(regs);
174 }
175
176 *validp = 0; /* fixup */
177#endif
178}
179
180static notrace unsigned long
181interrupt_exit_user_prepare_main(unsigned long ret, struct pt_regs *regs)
182{
183 unsigned long ti_flags;
184
185again:
186 ti_flags = read_thread_flags();
187 while (unlikely(ti_flags & (_TIF_USER_WORK_MASK & ~_TIF_RESTORE_TM))) {
188 local_irq_enable();
189 if (ti_flags & _TIF_NEED_RESCHED) {
190 schedule();
191 } else {
192 /*
193 * SIGPENDING must restore signal handler function
194 * argument GPRs, and some non-volatiles (e.g., r1).
195 * Restore all for now. This could be made lighter.
196 */
197 if (ti_flags & _TIF_SIGPENDING)
198 ret |= _TIF_RESTOREALL;
199 do_notify_resume(regs, ti_flags);
200 }
201 local_irq_disable();
202 ti_flags = read_thread_flags();
203 }
204
205 if (IS_ENABLED(CONFIG_PPC_BOOK3S_64) && IS_ENABLED(CONFIG_PPC_FPU)) {
206 if (IS_ENABLED(CONFIG_PPC_TRANSACTIONAL_MEM) &&
207 unlikely((ti_flags & _TIF_RESTORE_TM))) {
208 restore_tm_state(regs);
209 } else {
210 unsigned long mathflags = MSR_FP;
211
212 if (cpu_has_feature(CPU_FTR_VSX))
213 mathflags |= MSR_VEC | MSR_VSX;
214 else if (cpu_has_feature(CPU_FTR_ALTIVEC))
215 mathflags |= MSR_VEC;
216
217 /*
218 * If userspace MSR has all available FP bits set,
219 * then they are live and no need to restore. If not,
220 * it means the regs were given up and restore_math
221 * may decide to restore them (to avoid taking an FP
222 * fault).
223 */
224 if ((regs->msr & mathflags) != mathflags)
225 restore_math(regs);
226 }
227 }
228
229 check_return_regs_valid(regs);
230
231 user_enter_irqoff();
232 if (!prep_irq_for_enabled_exit(true)) {
233 user_exit_irqoff();
234 local_irq_enable();
235 local_irq_disable();
236 goto again;
237 }
238
239#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
240 local_paca->tm_scratch = regs->msr;
241#endif
242
243 booke_load_dbcr0();
244
245 account_cpu_user_exit();
246
247 /* Restore user access locks last */
248 kuap_user_restore(regs);
249
250 return ret;
251}
252
253/*
254 * This should be called after a syscall returns, with r3 the return value
255 * from the syscall. If this function returns non-zero, the system call
256 * exit assembly should additionally load all GPR registers and CTR and XER
257 * from the interrupt frame.
258 *
259 * The function graph tracer can not trace the return side of this function,
260 * because RI=0 and soft mask state is "unreconciled", so it is marked notrace.
261 */
262notrace unsigned long syscall_exit_prepare(unsigned long r3,
263 struct pt_regs *regs,
264 long scv)
265{
266 unsigned long ti_flags;
267 unsigned long ret = 0;
268 bool is_not_scv = !IS_ENABLED(CONFIG_PPC_BOOK3S_64) || !scv;
269
270 CT_WARN_ON(ct_state() == CONTEXT_USER);
271
272 kuap_assert_locked();
273
274 regs->result = r3;
275
276 /* Check whether the syscall is issued inside a restartable sequence */
277 rseq_syscall(regs);
278
279 ti_flags = read_thread_flags();
280
281 if (unlikely(r3 >= (unsigned long)-MAX_ERRNO) && is_not_scv) {
282 if (likely(!(ti_flags & (_TIF_NOERROR | _TIF_RESTOREALL)))) {
283 r3 = -r3;
284 regs->ccr |= 0x10000000; /* Set SO bit in CR */
285 }
286 }
287
288 if (unlikely(ti_flags & _TIF_PERSYSCALL_MASK)) {
289 if (ti_flags & _TIF_RESTOREALL)
290 ret = _TIF_RESTOREALL;
291 else
292 regs->gpr[3] = r3;
293 clear_bits(_TIF_PERSYSCALL_MASK, ¤t_thread_info()->flags);
294 } else {
295 regs->gpr[3] = r3;
296 }
297
298 if (unlikely(ti_flags & _TIF_SYSCALL_DOTRACE)) {
299 do_syscall_trace_leave(regs);
300 ret |= _TIF_RESTOREALL;
301 }
302
303 local_irq_disable();
304 ret = interrupt_exit_user_prepare_main(ret, regs);
305
306#ifdef CONFIG_PPC64
307 regs->exit_result = ret;
308#endif
309
310 return ret;
311}
312
313#ifdef CONFIG_PPC64
314notrace unsigned long syscall_exit_restart(unsigned long r3, struct pt_regs *regs)
315{
316 /*
317 * This is called when detecting a soft-pending interrupt as well as
318 * an alternate-return interrupt. So we can't just have the alternate
319 * return path clear SRR1[MSR] and set PACA_IRQ_HARD_DIS (unless
320 * the soft-pending case were to fix things up as well). RI might be
321 * disabled, in which case it gets re-enabled by __hard_irq_disable().
322 */
323 __hard_irq_disable();
324 local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
325
326#ifdef CONFIG_PPC_BOOK3S_64
327 set_kuap(AMR_KUAP_BLOCKED);
328#endif
329
330 trace_hardirqs_off();
331 user_exit_irqoff();
332 account_cpu_user_entry();
333
334 BUG_ON(!user_mode(regs));
335
336 regs->exit_result = interrupt_exit_user_prepare_main(regs->exit_result, regs);
337
338 return regs->exit_result;
339}
340#endif
341
342notrace unsigned long interrupt_exit_user_prepare(struct pt_regs *regs)
343{
344 unsigned long ret;
345
346 BUG_ON(regs_is_unrecoverable(regs));
347 BUG_ON(arch_irq_disabled_regs(regs));
348 CT_WARN_ON(ct_state() == CONTEXT_USER);
349
350 /*
351 * We don't need to restore AMR on the way back to userspace for KUAP.
352 * AMR can only have been unlocked if we interrupted the kernel.
353 */
354 kuap_assert_locked();
355
356 local_irq_disable();
357
358 ret = interrupt_exit_user_prepare_main(0, regs);
359
360#ifdef CONFIG_PPC64
361 regs->exit_result = ret;
362#endif
363
364 return ret;
365}
366
367void preempt_schedule_irq(void);
368
369notrace unsigned long interrupt_exit_kernel_prepare(struct pt_regs *regs)
370{
371 unsigned long flags;
372 unsigned long ret = 0;
373 unsigned long kuap;
374 bool stack_store = read_thread_flags() & _TIF_EMULATE_STACK_STORE;
375
376 if (regs_is_unrecoverable(regs))
377 unrecoverable_exception(regs);
378 /*
379 * CT_WARN_ON comes here via program_check_exception, so avoid
380 * recursion.
381 *
382 * Skip the assertion on PMIs on 64e to work around a problem caused
383 * by NMI PMIs incorrectly taking this interrupt return path, it's
384 * possible for this to hit after interrupt exit to user switches
385 * context to user. See also the comment in the performance monitor
386 * handler in exceptions-64e.S
387 */
388 if (!IS_ENABLED(CONFIG_PPC_BOOK3E_64) &&
389 TRAP(regs) != INTERRUPT_PROGRAM &&
390 TRAP(regs) != INTERRUPT_PERFMON)
391 CT_WARN_ON(ct_state() == CONTEXT_USER);
392
393 kuap = kuap_get_and_assert_locked();
394
395 local_irq_save(flags);
396
397 if (!arch_irq_disabled_regs(regs)) {
398 /* Returning to a kernel context with local irqs enabled. */
399 WARN_ON_ONCE(!(regs->msr & MSR_EE));
400again:
401 if (IS_ENABLED(CONFIG_PREEMPT)) {
402 /* Return to preemptible kernel context */
403 if (unlikely(read_thread_flags() & _TIF_NEED_RESCHED)) {
404 if (preempt_count() == 0)
405 preempt_schedule_irq();
406 }
407 }
408
409 check_return_regs_valid(regs);
410
411 /*
412 * Stack store exit can't be restarted because the interrupt
413 * stack frame might have been clobbered.
414 */
415 if (!prep_irq_for_enabled_exit(unlikely(stack_store))) {
416 /*
417 * Replay pending soft-masked interrupts now. Don't
418 * just local_irq_enabe(); local_irq_disable(); because
419 * if we are returning from an asynchronous interrupt
420 * here, another one might hit after irqs are enabled,
421 * and it would exit via this same path allowing
422 * another to fire, and so on unbounded.
423 */
424 hard_irq_disable();
425 replay_soft_interrupts();
426 /* Took an interrupt, may have more exit work to do. */
427 goto again;
428 }
429#ifdef CONFIG_PPC64
430 /*
431 * An interrupt may clear MSR[EE] and set this concurrently,
432 * but it will be marked pending and the exit will be retried.
433 * This leaves a racy window where MSR[EE]=0 and HARD_DIS is
434 * clear, until interrupt_exit_kernel_restart() calls
435 * hard_irq_disable(), which will set HARD_DIS again.
436 */
437 local_paca->irq_happened &= ~PACA_IRQ_HARD_DIS;
438
439 } else {
440 check_return_regs_valid(regs);
441
442 if (unlikely(stack_store))
443 __hard_EE_RI_disable();
444#endif /* CONFIG_PPC64 */
445 }
446
447 if (unlikely(stack_store)) {
448 clear_bits(_TIF_EMULATE_STACK_STORE, ¤t_thread_info()->flags);
449 ret = 1;
450 }
451
452#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
453 local_paca->tm_scratch = regs->msr;
454#endif
455
456 /*
457 * 64s does not want to mfspr(SPRN_AMR) here, because this comes after
458 * mtmsr, which would cause Read-After-Write stalls. Hence, take the
459 * AMR value from the check above.
460 */
461 kuap_kernel_restore(regs, kuap);
462
463 return ret;
464}
465
466#ifdef CONFIG_PPC64
467notrace unsigned long interrupt_exit_user_restart(struct pt_regs *regs)
468{
469 __hard_irq_disable();
470 local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
471
472#ifdef CONFIG_PPC_BOOK3S_64
473 set_kuap(AMR_KUAP_BLOCKED);
474#endif
475
476 trace_hardirqs_off();
477 user_exit_irqoff();
478 account_cpu_user_entry();
479
480 BUG_ON(!user_mode(regs));
481
482 regs->exit_result |= interrupt_exit_user_prepare(regs);
483
484 return regs->exit_result;
485}
486
487/*
488 * No real need to return a value here because the stack store case does not
489 * get restarted.
490 */
491notrace unsigned long interrupt_exit_kernel_restart(struct pt_regs *regs)
492{
493 __hard_irq_disable();
494 local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
495
496#ifdef CONFIG_PPC_BOOK3S_64
497 set_kuap(AMR_KUAP_BLOCKED);
498#endif
499
500 if (regs->softe == IRQS_ENABLED)
501 trace_hardirqs_off();
502
503 BUG_ON(user_mode(regs));
504
505 return interrupt_exit_kernel_prepare(regs);
506}
507#endif
1// SPDX-License-Identifier: GPL-2.0-or-later
2
3#include <linux/context_tracking.h>
4#include <linux/err.h>
5#include <linux/compat.h>
6#include <linux/rseq.h>
7#include <linux/sched/debug.h> /* for show_regs */
8
9#include <asm/kup.h>
10#include <asm/cputime.h>
11#include <asm/hw_irq.h>
12#include <asm/interrupt.h>
13#include <asm/kprobes.h>
14#include <asm/paca.h>
15#include <asm/ptrace.h>
16#include <asm/reg.h>
17#include <asm/signal.h>
18#include <asm/switch_to.h>
19#include <asm/syscall.h>
20#include <asm/time.h>
21#include <asm/tm.h>
22#include <asm/unistd.h>
23
24#if defined(CONFIG_PPC_ADV_DEBUG_REGS) && defined(CONFIG_PPC32)
25unsigned long global_dbcr0[NR_CPUS];
26#endif
27
28#ifdef CONFIG_PPC_BOOK3S_64
29DEFINE_STATIC_KEY_FALSE(interrupt_exit_not_reentrant);
30static inline bool exit_must_hard_disable(void)
31{
32 return static_branch_unlikely(&interrupt_exit_not_reentrant);
33}
34#else
35static inline bool exit_must_hard_disable(void)
36{
37 return true;
38}
39#endif
40
41/*
42 * local irqs must be disabled. Returns false if the caller must re-enable
43 * them, check for new work, and try again.
44 *
45 * This should be called with local irqs disabled, but if they were previously
46 * enabled when the interrupt handler returns (indicating a process-context /
47 * synchronous interrupt) then irqs_enabled should be true.
48 *
49 * restartable is true then EE/RI can be left on because interrupts are handled
50 * with a restart sequence.
51 */
52static notrace __always_inline bool prep_irq_for_enabled_exit(bool restartable)
53{
54 bool must_hard_disable = (exit_must_hard_disable() || !restartable);
55
56 /* This must be done with RI=1 because tracing may touch vmaps */
57 trace_hardirqs_on();
58
59 if (must_hard_disable)
60 __hard_EE_RI_disable();
61
62#ifdef CONFIG_PPC64
63 /* This pattern matches prep_irq_for_idle */
64 if (unlikely(lazy_irq_pending_nocheck())) {
65 if (must_hard_disable) {
66 local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
67 __hard_RI_enable();
68 }
69 trace_hardirqs_off();
70
71 return false;
72 }
73#endif
74 return true;
75}
76
77static notrace void booke_load_dbcr0(void)
78{
79#ifdef CONFIG_PPC_ADV_DEBUG_REGS
80 unsigned long dbcr0 = current->thread.debug.dbcr0;
81
82 if (likely(!(dbcr0 & DBCR0_IDM)))
83 return;
84
85 /*
86 * Check to see if the dbcr0 register is set up to debug.
87 * Use the internal debug mode bit to do this.
88 */
89 mtmsr(mfmsr() & ~MSR_DE);
90 if (IS_ENABLED(CONFIG_PPC32)) {
91 isync();
92 global_dbcr0[smp_processor_id()] = mfspr(SPRN_DBCR0);
93 }
94 mtspr(SPRN_DBCR0, dbcr0);
95 mtspr(SPRN_DBSR, -1);
96#endif
97}
98
99static notrace void check_return_regs_valid(struct pt_regs *regs)
100{
101#ifdef CONFIG_PPC_BOOK3S_64
102 unsigned long trap, srr0, srr1;
103 static bool warned;
104 u8 *validp;
105 char *h;
106
107 if (trap_is_scv(regs))
108 return;
109
110 trap = TRAP(regs);
111 // EE in HV mode sets HSRRs like 0xea0
112 if (cpu_has_feature(CPU_FTR_HVMODE) && trap == INTERRUPT_EXTERNAL)
113 trap = 0xea0;
114
115 switch (trap) {
116 case 0x980:
117 case INTERRUPT_H_DATA_STORAGE:
118 case 0xe20:
119 case 0xe40:
120 case INTERRUPT_HMI:
121 case 0xe80:
122 case 0xea0:
123 case INTERRUPT_H_FAC_UNAVAIL:
124 case 0x1200:
125 case 0x1500:
126 case 0x1600:
127 case 0x1800:
128 validp = &local_paca->hsrr_valid;
129 if (!READ_ONCE(*validp))
130 return;
131
132 srr0 = mfspr(SPRN_HSRR0);
133 srr1 = mfspr(SPRN_HSRR1);
134 h = "H";
135
136 break;
137 default:
138 validp = &local_paca->srr_valid;
139 if (!READ_ONCE(*validp))
140 return;
141
142 srr0 = mfspr(SPRN_SRR0);
143 srr1 = mfspr(SPRN_SRR1);
144 h = "";
145 break;
146 }
147
148 if (srr0 == regs->nip && srr1 == regs->msr)
149 return;
150
151 /*
152 * A NMI / soft-NMI interrupt may have come in after we found
153 * srr_valid and before the SRRs are loaded. The interrupt then
154 * comes in and clobbers SRRs and clears srr_valid. Then we load
155 * the SRRs here and test them above and find they don't match.
156 *
157 * Test validity again after that, to catch such false positives.
158 *
159 * This test in general will have some window for false negatives
160 * and may not catch and fix all such cases if an NMI comes in
161 * later and clobbers SRRs without clearing srr_valid, but hopefully
162 * such things will get caught most of the time, statistically
163 * enough to be able to get a warning out.
164 */
165 if (!READ_ONCE(*validp))
166 return;
167
168 if (!data_race(warned)) {
169 data_race(warned = true);
170 printk("%sSRR0 was: %lx should be: %lx\n", h, srr0, regs->nip);
171 printk("%sSRR1 was: %lx should be: %lx\n", h, srr1, regs->msr);
172 show_regs(regs);
173 }
174
175 WRITE_ONCE(*validp, 0); /* fixup */
176#endif
177}
178
179static notrace unsigned long
180interrupt_exit_user_prepare_main(unsigned long ret, struct pt_regs *regs)
181{
182 unsigned long ti_flags;
183
184again:
185 ti_flags = read_thread_flags();
186 while (unlikely(ti_flags & (_TIF_USER_WORK_MASK & ~_TIF_RESTORE_TM))) {
187 local_irq_enable();
188 if (ti_flags & _TIF_NEED_RESCHED) {
189 schedule();
190 } else {
191 /*
192 * SIGPENDING must restore signal handler function
193 * argument GPRs, and some non-volatiles (e.g., r1).
194 * Restore all for now. This could be made lighter.
195 */
196 if (ti_flags & _TIF_SIGPENDING)
197 ret |= _TIF_RESTOREALL;
198 do_notify_resume(regs, ti_flags);
199 }
200 local_irq_disable();
201 ti_flags = read_thread_flags();
202 }
203
204 if (IS_ENABLED(CONFIG_PPC_BOOK3S_64) && IS_ENABLED(CONFIG_PPC_FPU)) {
205 if (IS_ENABLED(CONFIG_PPC_TRANSACTIONAL_MEM) &&
206 unlikely((ti_flags & _TIF_RESTORE_TM))) {
207 restore_tm_state(regs);
208 } else {
209 unsigned long mathflags = MSR_FP;
210
211 if (cpu_has_feature(CPU_FTR_VSX))
212 mathflags |= MSR_VEC | MSR_VSX;
213 else if (cpu_has_feature(CPU_FTR_ALTIVEC))
214 mathflags |= MSR_VEC;
215
216 /*
217 * If userspace MSR has all available FP bits set,
218 * then they are live and no need to restore. If not,
219 * it means the regs were given up and restore_math
220 * may decide to restore them (to avoid taking an FP
221 * fault).
222 */
223 if ((regs->msr & mathflags) != mathflags)
224 restore_math(regs);
225 }
226 }
227
228 check_return_regs_valid(regs);
229
230 user_enter_irqoff();
231 if (!prep_irq_for_enabled_exit(true)) {
232 user_exit_irqoff();
233 local_irq_enable();
234 local_irq_disable();
235 goto again;
236 }
237
238#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
239 local_paca->tm_scratch = regs->msr;
240#endif
241
242 booke_load_dbcr0();
243
244 account_cpu_user_exit();
245
246 /* Restore user access locks last */
247 kuap_user_restore(regs);
248
249 return ret;
250}
251
252/*
253 * This should be called after a syscall returns, with r3 the return value
254 * from the syscall. If this function returns non-zero, the system call
255 * exit assembly should additionally load all GPR registers and CTR and XER
256 * from the interrupt frame.
257 *
258 * The function graph tracer can not trace the return side of this function,
259 * because RI=0 and soft mask state is "unreconciled", so it is marked notrace.
260 */
261notrace unsigned long syscall_exit_prepare(unsigned long r3,
262 struct pt_regs *regs,
263 long scv)
264{
265 unsigned long ti_flags;
266 unsigned long ret = 0;
267 bool is_not_scv = !IS_ENABLED(CONFIG_PPC_BOOK3S_64) || !scv;
268
269 CT_WARN_ON(ct_state() == CONTEXT_USER);
270
271 kuap_assert_locked();
272
273 regs->result = r3;
274
275 /* Check whether the syscall is issued inside a restartable sequence */
276 rseq_syscall(regs);
277
278 ti_flags = read_thread_flags();
279
280 if (unlikely(r3 >= (unsigned long)-MAX_ERRNO) && is_not_scv) {
281 if (likely(!(ti_flags & (_TIF_NOERROR | _TIF_RESTOREALL)))) {
282 r3 = -r3;
283 regs->ccr |= 0x10000000; /* Set SO bit in CR */
284 }
285 }
286
287 if (unlikely(ti_flags & _TIF_PERSYSCALL_MASK)) {
288 if (ti_flags & _TIF_RESTOREALL)
289 ret = _TIF_RESTOREALL;
290 else
291 regs->gpr[3] = r3;
292 clear_bits(_TIF_PERSYSCALL_MASK, ¤t_thread_info()->flags);
293 } else {
294 regs->gpr[3] = r3;
295 }
296
297 if (unlikely(ti_flags & _TIF_SYSCALL_DOTRACE)) {
298 do_syscall_trace_leave(regs);
299 ret |= _TIF_RESTOREALL;
300 }
301
302 local_irq_disable();
303 ret = interrupt_exit_user_prepare_main(ret, regs);
304
305#ifdef CONFIG_PPC64
306 regs->exit_result = ret;
307#endif
308
309 return ret;
310}
311
312#ifdef CONFIG_PPC64
313notrace unsigned long syscall_exit_restart(unsigned long r3, struct pt_regs *regs)
314{
315 /*
316 * This is called when detecting a soft-pending interrupt as well as
317 * an alternate-return interrupt. So we can't just have the alternate
318 * return path clear SRR1[MSR] and set PACA_IRQ_HARD_DIS (unless
319 * the soft-pending case were to fix things up as well). RI might be
320 * disabled, in which case it gets re-enabled by __hard_irq_disable().
321 */
322 __hard_irq_disable();
323 local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
324
325#ifdef CONFIG_PPC_BOOK3S_64
326 set_kuap(AMR_KUAP_BLOCKED);
327#endif
328
329 trace_hardirqs_off();
330 user_exit_irqoff();
331 account_cpu_user_entry();
332
333 BUG_ON(!user_mode(regs));
334
335 regs->exit_result = interrupt_exit_user_prepare_main(regs->exit_result, regs);
336
337 return regs->exit_result;
338}
339#endif
340
341notrace unsigned long interrupt_exit_user_prepare(struct pt_regs *regs)
342{
343 unsigned long ret;
344
345 BUG_ON(regs_is_unrecoverable(regs));
346 BUG_ON(arch_irq_disabled_regs(regs));
347 CT_WARN_ON(ct_state() == CONTEXT_USER);
348
349 /*
350 * We don't need to restore AMR on the way back to userspace for KUAP.
351 * AMR can only have been unlocked if we interrupted the kernel.
352 */
353 kuap_assert_locked();
354
355 local_irq_disable();
356
357 ret = interrupt_exit_user_prepare_main(0, regs);
358
359#ifdef CONFIG_PPC64
360 regs->exit_result = ret;
361#endif
362
363 return ret;
364}
365
366void preempt_schedule_irq(void);
367
368notrace unsigned long interrupt_exit_kernel_prepare(struct pt_regs *regs)
369{
370 unsigned long ret = 0;
371 unsigned long kuap;
372 bool stack_store = read_thread_flags() & _TIF_EMULATE_STACK_STORE;
373
374 if (regs_is_unrecoverable(regs))
375 unrecoverable_exception(regs);
376 /*
377 * CT_WARN_ON comes here via program_check_exception, so avoid
378 * recursion.
379 *
380 * Skip the assertion on PMIs on 64e to work around a problem caused
381 * by NMI PMIs incorrectly taking this interrupt return path, it's
382 * possible for this to hit after interrupt exit to user switches
383 * context to user. See also the comment in the performance monitor
384 * handler in exceptions-64e.S
385 */
386 if (!IS_ENABLED(CONFIG_PPC_BOOK3E_64) &&
387 TRAP(regs) != INTERRUPT_PROGRAM &&
388 TRAP(regs) != INTERRUPT_PERFMON)
389 CT_WARN_ON(ct_state() == CONTEXT_USER);
390
391 kuap = kuap_get_and_assert_locked();
392
393 local_irq_disable();
394
395 if (!arch_irq_disabled_regs(regs)) {
396 /* Returning to a kernel context with local irqs enabled. */
397 WARN_ON_ONCE(!(regs->msr & MSR_EE));
398again:
399 if (IS_ENABLED(CONFIG_PREEMPT)) {
400 /* Return to preemptible kernel context */
401 if (unlikely(read_thread_flags() & _TIF_NEED_RESCHED)) {
402 if (preempt_count() == 0)
403 preempt_schedule_irq();
404 }
405 }
406
407 check_return_regs_valid(regs);
408
409 /*
410 * Stack store exit can't be restarted because the interrupt
411 * stack frame might have been clobbered.
412 */
413 if (!prep_irq_for_enabled_exit(unlikely(stack_store))) {
414 /*
415 * Replay pending soft-masked interrupts now. Don't
416 * just local_irq_enabe(); local_irq_disable(); because
417 * if we are returning from an asynchronous interrupt
418 * here, another one might hit after irqs are enabled,
419 * and it would exit via this same path allowing
420 * another to fire, and so on unbounded.
421 */
422 hard_irq_disable();
423 replay_soft_interrupts();
424 /* Took an interrupt, may have more exit work to do. */
425 goto again;
426 }
427#ifdef CONFIG_PPC64
428 /*
429 * An interrupt may clear MSR[EE] and set this concurrently,
430 * but it will be marked pending and the exit will be retried.
431 * This leaves a racy window where MSR[EE]=0 and HARD_DIS is
432 * clear, until interrupt_exit_kernel_restart() calls
433 * hard_irq_disable(), which will set HARD_DIS again.
434 */
435 local_paca->irq_happened &= ~PACA_IRQ_HARD_DIS;
436
437 } else {
438 check_return_regs_valid(regs);
439
440 if (unlikely(stack_store))
441 __hard_EE_RI_disable();
442#endif /* CONFIG_PPC64 */
443 }
444
445 if (unlikely(stack_store)) {
446 clear_bits(_TIF_EMULATE_STACK_STORE, ¤t_thread_info()->flags);
447 ret = 1;
448 }
449
450#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
451 local_paca->tm_scratch = regs->msr;
452#endif
453
454 /*
455 * 64s does not want to mfspr(SPRN_AMR) here, because this comes after
456 * mtmsr, which would cause Read-After-Write stalls. Hence, take the
457 * AMR value from the check above.
458 */
459 kuap_kernel_restore(regs, kuap);
460
461 return ret;
462}
463
464#ifdef CONFIG_PPC64
465notrace unsigned long interrupt_exit_user_restart(struct pt_regs *regs)
466{
467 __hard_irq_disable();
468 local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
469
470#ifdef CONFIG_PPC_BOOK3S_64
471 set_kuap(AMR_KUAP_BLOCKED);
472#endif
473
474 trace_hardirqs_off();
475 user_exit_irqoff();
476 account_cpu_user_entry();
477
478 BUG_ON(!user_mode(regs));
479
480 regs->exit_result |= interrupt_exit_user_prepare(regs);
481
482 return regs->exit_result;
483}
484
485/*
486 * No real need to return a value here because the stack store case does not
487 * get restarted.
488 */
489notrace unsigned long interrupt_exit_kernel_restart(struct pt_regs *regs)
490{
491 __hard_irq_disable();
492 local_paca->irq_happened |= PACA_IRQ_HARD_DIS;
493
494#ifdef CONFIG_PPC_BOOK3S_64
495 set_kuap(AMR_KUAP_BLOCKED);
496#endif
497
498 if (regs->softe == IRQS_ENABLED)
499 trace_hardirqs_off();
500
501 BUG_ON(user_mode(regs));
502
503 return interrupt_exit_kernel_prepare(regs);
504}
505#endif