blob: 0c6d664d4a8379512c32c7b52d8fbd0d321cf70e [file] [log] [blame]
Vineet Gupta9d42c842013-01-18 15:12:18 +05301/*
2 * Low Level Interrupts/Traps/Exceptions(non-TLB) Handling for ARC
3 *
4 * Copyright (C) 2004, 2007-2010, 2011-2012 Synopsys, Inc. (www.synopsys.com)
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 as
8 * published by the Free Software Foundation.
9 *
Vineet Gupta2e651ea2013-01-23 16:30:36 +053010 * vineetg: May 2011
11 * -Userspace unaligned access emulation
12 *
Vineet Gupta547f1122013-01-18 15:12:22 +053013 * vineetg: Feb 2011 (ptrace low level code fixes)
14 * -traced syscall return code (r0) was not saved into pt_regs for restoring
15 * into user reg-file when traded task rets to user space.
16 * -syscalls needing arch-wrappers (mainly for passing sp as pt_regs)
17 * were not invoking post-syscall trace hook (jumping directly into
18 * ret_from_system_call)
19 *
Vineet Gupta9d42c842013-01-18 15:12:18 +053020 * vineetg: Nov 2010:
21 * -Vector table jumps (@8 bytes) converted into branches (@4 bytes)
22 * -To maintain the slot size of 8 bytes/vector, added nop, which is
23 * not executed at runtime.
24 *
25 * vineetg: Nov 2009 (Everything needed for TIF_RESTORE_SIGMASK)
26 * -do_signal()invoked upon TIF_RESTORE_SIGMASK as well
27 * -Wrappers for sys_{,rt_}sigsuspend() nolonger needed as they don't
28 * need ptregs anymore
29 *
30 * Vineetg: Oct 2009
31 * -In a rare scenario, Process gets a Priv-V exception and gets scheduled
32 * out. Since we don't do FAKE RTIE for Priv-V, CPU excpetion state remains
33 * active (AE bit enabled). This causes a double fault for a subseq valid
34 * exception. Thus FAKE RTIE needed in low level Priv-Violation handler.
35 * Instr Error could also cause similar scenario, so same there as well.
36 *
Vineet Gupta4788a592013-01-18 15:12:22 +053037 * Vineetg: March 2009 (Supporting 2 levels of Interrupts)
38 *
Vineet Gupta9d42c842013-01-18 15:12:18 +053039 * Vineetg: Aug 28th 2008: Bug #94984
40 * -Zero Overhead Loop Context shd be cleared when entering IRQ/EXcp/Trap
41 * Normally CPU does this automatically, however when doing FAKE rtie,
42 * we need to explicitly do this. The problem in macros
43 * FAKE_RET_FROM_EXCPN and FAKE_RET_FROM_EXCPN_LOCK_IRQ was that this bit
44 * was being "CLEARED" rather then "SET". Since it is Loop INHIBIT Bit,
45 * setting it and not clearing it clears ZOL context
46 *
Vineet Gupta080c3742013-02-11 19:52:57 +053047 * Vineetg: May 16th, 2008
48 * - r25 now contains the Current Task when in kernel
49 *
Vineet Gupta9d42c842013-01-18 15:12:18 +053050 * Vineetg: Dec 22, 2007
51 * Minor Surgery of Low Level ISR to make it SMP safe
52 * - MMU_SCRATCH0 Reg used for freeing up r9 in Level 1 ISR
53 * - _current_task is made an array of NR_CPUS
54 * - Access of _current_task wrapped inside a macro so that if hardware
55 * team agrees for a dedicated reg, no other code is touched
56 *
57 * Amit Bhor, Rahul Trivedi, Kanika Nema, Sameer Dhavale : Codito Tech 2004
58 */
59
60/*------------------------------------------------------------------
61 * Function ABI
62 *------------------------------------------------------------------
63 *
64 * Arguments r0 - r7
65 * Caller Saved Registers r0 - r12
66 * Callee Saved Registers r13- r25
67 * Global Pointer (gp) r26
68 * Frame Pointer (fp) r27
69 * Stack Pointer (sp) r28
70 * Interrupt link register (ilink1) r29
71 * Interrupt link register (ilink2) r30
72 * Branch link register (blink) r31
73 *------------------------------------------------------------------
74 */
75
76 .cpu A7
77
78;############################ Vector Table #################################
79
80.macro VECTOR lbl
81#if 1 /* Just in case, build breaks */
82 j \lbl
83#else
84 b \lbl
85 nop
86#endif
87.endm
88
89 .section .vector, "ax",@progbits
90 .align 4
91
92/* Each entry in the vector table must occupy 2 words. Since it is a jump
93 * across sections (.vector to .text) we are gauranteed that 'j somewhere'
94 * will use the 'j limm' form of the intrsuction as long as somewhere is in
95 * a section other than .vector.
96 */
97
98; ********* Critical System Events **********************
99VECTOR res_service ; 0x0, Restart Vector (0x0)
100VECTOR mem_service ; 0x8, Mem exception (0x1)
101VECTOR instr_service ; 0x10, Instrn Error (0x2)
102
103; ******************** Device ISRs **********************
Vineet Gupta4788a592013-01-18 15:12:22 +0530104#ifdef CONFIG_ARC_IRQ3_LV2
105VECTOR handle_interrupt_level2
106#else
Vineet Gupta9d42c842013-01-18 15:12:18 +0530107VECTOR handle_interrupt_level1
Vineet Gupta4788a592013-01-18 15:12:22 +0530108#endif
Vineet Gupta9d42c842013-01-18 15:12:18 +0530109
110VECTOR handle_interrupt_level1
111
Vineet Gupta4788a592013-01-18 15:12:22 +0530112#ifdef CONFIG_ARC_IRQ5_LV2
113VECTOR handle_interrupt_level2
114#else
Vineet Gupta9d42c842013-01-18 15:12:18 +0530115VECTOR handle_interrupt_level1
Vineet Gupta4788a592013-01-18 15:12:22 +0530116#endif
Vineet Gupta9d42c842013-01-18 15:12:18 +0530117
Vineet Gupta4788a592013-01-18 15:12:22 +0530118#ifdef CONFIG_ARC_IRQ6_LV2
119VECTOR handle_interrupt_level2
120#else
Vineet Gupta9d42c842013-01-18 15:12:18 +0530121VECTOR handle_interrupt_level1
Vineet Gupta4788a592013-01-18 15:12:22 +0530122#endif
Vineet Gupta9d42c842013-01-18 15:12:18 +0530123
124.rept 25
125VECTOR handle_interrupt_level1 ; Other devices
126.endr
127
128/* FOR ARC600: timer = 0x3, uart = 0x8, emac = 0x10 */
129
130; ******************** Exceptions **********************
131VECTOR EV_MachineCheck ; 0x100, Fatal Machine check (0x20)
132VECTOR EV_TLBMissI ; 0x108, Intruction TLB miss (0x21)
133VECTOR EV_TLBMissD ; 0x110, Data TLB miss (0x22)
134VECTOR EV_TLBProtV ; 0x118, Protection Violation (0x23)
135 ; or Misaligned Access
136VECTOR EV_PrivilegeV ; 0x120, Privilege Violation (0x24)
137VECTOR EV_Trap ; 0x128, Trap exception (0x25)
138VECTOR EV_Extension ; 0x130, Extn Intruction Excp (0x26)
139
140.rept 24
141VECTOR reserved ; Reserved Exceptions
142.endr
143
144#include <linux/linkage.h> /* ARC_{EXTRY,EXIT} */
145#include <asm/entry.h> /* SAVE_ALL_{INT1,INT2,TRAP...} */
146#include <asm/errno.h>
147#include <asm/arcregs.h>
148#include <asm/irqflags.h>
149
150;##################### Scratch Mem for IRQ stack switching #############
151
Vineet Gupta8b5850f2013-01-18 15:12:25 +0530152ARCFP_DATA int1_saved_reg
Vineet Gupta9d42c842013-01-18 15:12:18 +0530153 .align 32
154 .type int1_saved_reg, @object
155 .size int1_saved_reg, 4
156int1_saved_reg:
157 .zero 4
158
Vineet Gupta4788a592013-01-18 15:12:22 +0530159/* Each Interrupt level needs it's own scratch */
160#ifdef CONFIG_ARC_COMPACT_IRQ_LEVELS
161
Vineet Gupta8b5850f2013-01-18 15:12:25 +0530162ARCFP_DATA int2_saved_reg
Vineet Gupta4788a592013-01-18 15:12:22 +0530163 .type int2_saved_reg, @object
164 .size int2_saved_reg, 4
165int2_saved_reg:
166 .zero 4
167
168#endif
169
Vineet Gupta9d42c842013-01-18 15:12:18 +0530170; ---------------------------------------------
171 .section .text, "ax",@progbits
172
173res_service: ; processor restart
174 flag 0x1 ; not implemented
175 nop
176 nop
177
178reserved: ; processor restart
179 rtie ; jump to processor initializations
180
181;##################### Interrupt Handling ##############################
182
Vineet Gupta4788a592013-01-18 15:12:22 +0530183#ifdef CONFIG_ARC_COMPACT_IRQ_LEVELS
184; ---------------------------------------------
185; Level 2 ISR: Can interrupt a Level 1 ISR
186; ---------------------------------------------
187ARC_ENTRY handle_interrupt_level2
188
189 ; TODO-vineetg for SMP this wont work
190 ; free up r9 as scratchpad
191 st r9, [@int2_saved_reg]
192
193 ;Which mode (user/kernel) was the system in when intr occured
194 lr r9, [status32_l2]
195
196 SWITCH_TO_KERNEL_STK
197 SAVE_ALL_INT2
198
199 ;------------------------------------------------------
200 ; if L2 IRQ interrupted a L1 ISR, disable preemption
201 ;------------------------------------------------------
202
203 ld r9, [sp, PT_status32] ; get statu32_l2 (saved in pt_regs)
204 bbit0 r9, STATUS_A1_BIT, 1f ; L1 not active when L2 IRQ, so normal
205
206 ; A1 is set in status32_l2
207 ; bump thread_info->preempt_count (Disable preemption)
208 GET_CURR_THR_INFO_FROM_SP r10
209 ld r9, [r10, THREAD_INFO_PREEMPT_COUNT]
210 add r9, r9, 1
211 st r9, [r10, THREAD_INFO_PREEMPT_COUNT]
212
2131:
214 ;------------------------------------------------------
215 ; setup params for Linux common ISR and invoke it
216 ;------------------------------------------------------
217 lr r0, [icause2]
218 and r0, r0, 0x1f
219
220 bl.d @arch_do_IRQ
221 mov r1, sp
222
223 mov r8,0x2
224 sr r8, [AUX_IRQ_LV12] ; clear bit in Sticky Status Reg
225
226 b ret_from_exception
227
228ARC_EXIT handle_interrupt_level2
229
230#endif
231
Vineet Gupta9d42c842013-01-18 15:12:18 +0530232; ---------------------------------------------
233; Level 1 ISR
234; ---------------------------------------------
235ARC_ENTRY handle_interrupt_level1
236
237 /* free up r9 as scratchpad */
Vineet Gupta41195d22013-01-18 15:12:23 +0530238#ifdef CONFIG_SMP
239 sr r9, [ARC_REG_SCRATCH_DATA0]
240#else
Vineet Gupta9d42c842013-01-18 15:12:18 +0530241 st r9, [@int1_saved_reg]
Vineet Gupta41195d22013-01-18 15:12:23 +0530242#endif
Vineet Gupta9d42c842013-01-18 15:12:18 +0530243
244 ;Which mode (user/kernel) was the system in when intr occured
245 lr r9, [status32_l1]
246
247 SWITCH_TO_KERNEL_STK
248 SAVE_ALL_INT1
249
250 lr r0, [icause1]
251 and r0, r0, 0x1f
252
253 bl.d @arch_do_IRQ
254 mov r1, sp
255
256 mov r8,0x1
257 sr r8, [AUX_IRQ_LV12] ; clear bit in Sticky Status Reg
258
259 b ret_from_exception
260ARC_EXIT handle_interrupt_level1
261
262;################### Non TLB Exception Handling #############################
263
264; ---------------------------------------------
265; Instruction Error Exception Handler
266; ---------------------------------------------
267
268ARC_ENTRY instr_service
269
270 EXCPN_PROLOG_FREEUP_REG r9
271
272 lr r9, [erstatus]
273
274 SWITCH_TO_KERNEL_STK
275 SAVE_ALL_SYS
276
277 lr r0, [ecr]
278 lr r1, [efa]
279
280 mov r2, sp
281
282 FAKE_RET_FROM_EXCPN r9
283
284 bl do_insterror_or_kprobe
285 b ret_from_exception
286ARC_EXIT instr_service
287
288; ---------------------------------------------
289; Memory Error Exception Handler
290; ---------------------------------------------
291
292ARC_ENTRY mem_service
293
294 EXCPN_PROLOG_FREEUP_REG r9
295
296 lr r9, [erstatus]
297
298 SWITCH_TO_KERNEL_STK
299 SAVE_ALL_SYS
300
301 lr r0, [ecr]
302 lr r1, [efa]
303 mov r2, sp
304 bl do_memory_error
305 b ret_from_exception
306ARC_EXIT mem_service
307
308; ---------------------------------------------
309; Machine Check Exception Handler
310; ---------------------------------------------
311
312ARC_ENTRY EV_MachineCheck
313
314 EXCPN_PROLOG_FREEUP_REG r9
315 lr r9, [erstatus]
316
317 SWITCH_TO_KERNEL_STK
318 SAVE_ALL_SYS
319
320 lr r0, [ecr]
321 lr r1, [efa]
322 mov r2, sp
323
324 brne r0, 0x200100, 1f
325 bl do_tlb_overlap_fault
326 b ret_from_exception
327
3281:
329 ; DEAD END: can't do much, display Regs and HALT
330 SAVE_CALLEE_SAVED_USER
331
332 GET_CURR_TASK_FIELD_PTR TASK_THREAD, r10
333 st sp, [r10, THREAD_CALLEE_REG]
334
335 j do_machine_check_fault
336
337ARC_EXIT EV_MachineCheck
338
339; ---------------------------------------------
340; Protection Violation Exception Handler
341; ---------------------------------------------
342
343ARC_ENTRY EV_TLBProtV
344
345 EXCPN_PROLOG_FREEUP_REG r9
346
347 ;Which mode (user/kernel) was the system in when Exception occured
348 lr r9, [erstatus]
349
350 SWITCH_TO_KERNEL_STK
351 SAVE_ALL_SYS
352
353 ;---------(3) Save some more regs-----------------
354 ; vineetg: Mar 6th: Random Seg Fault issue #1
355 ; ecr and efa were not saved in case an Intr sneaks in
356 ; after fake rtie
357 ;
358 lr r3, [ecr]
359 lr r4, [efa]
360
361 ; --------(4) Return from CPU Exception Mode ---------
362 ; Fake a rtie, but rtie to next label
363 ; That way, subsequently, do_page_fault ( ) executes in pure kernel
364 ; mode with further Exceptions enabled
365
366 FAKE_RET_FROM_EXCPN r9
367
368 ;------ (5) Type of Protection Violation? ----------
369 ;
370 ; ProtV Hardware Exception is triggered for Access Faults of 2 types
371 ; -Access Violaton (WRITE to READ ONLY Page) - for linux COW
372 ; -Unaligned Access (READ/WRITE on odd boundary)
373 ;
374 cmp r3, 0x230400 ; Misaligned data access ?
375 beq 4f
376
377 ;========= (6a) Access Violation Processing ========
378 cmp r3, 0x230100
379 mov r1, 0x0 ; if LD exception ? write = 0
380 mov.ne r1, 0x1 ; else write = 1
381
382 mov r2, r4 ; faulting address
383 mov r0, sp ; pt_regs
384 bl do_page_fault
385 b ret_from_exception
386
387 ;========== (6b) Non aligned access ============
3884:
389 mov r0, r3 ; cause code
390 mov r1, r4 ; faulting address
391 mov r2, sp ; pt_regs
392
Vineet Gupta2e651ea2013-01-23 16:30:36 +0530393#ifdef CONFIG_ARC_MISALIGN_ACCESS
394 SAVE_CALLEE_SAVED_USER
395 mov r3, sp ; callee_regs
Vineet Gupta2e651ea2013-01-23 16:30:36 +0530396
Vineet Gupta9d42c842013-01-18 15:12:18 +0530397 bl do_misaligned_access
Vineet Gupta2e651ea2013-01-23 16:30:36 +0530398
Vineet Guptace147c72013-04-06 17:11:58 +0530399 ; TBD: optimize - do this only if a callee reg was involved
400 ; either a dst of emulated LD/ST or src with address-writeback
401 RESTORE_CALLEE_SAVED_USER
Vineet Guptac723ea42013-04-04 14:37:52 +0530402#else
403 bl do_misaligned_error
Vineet Gupta2e651ea2013-01-23 16:30:36 +0530404#endif
405
Vineet Gupta9d42c842013-01-18 15:12:18 +0530406 b ret_from_exception
407
408ARC_EXIT EV_TLBProtV
409
410; ---------------------------------------------
411; Privilege Violation Exception Handler
412; ---------------------------------------------
413ARC_ENTRY EV_PrivilegeV
414
415 EXCPN_PROLOG_FREEUP_REG r9
416
417 lr r9, [erstatus]
418
419 SWITCH_TO_KERNEL_STK
420 SAVE_ALL_SYS
421
422 lr r0, [ecr]
423 lr r1, [efa]
424 mov r2, sp
425
426 FAKE_RET_FROM_EXCPN r9
427
428 bl do_privilege_fault
429 b ret_from_exception
430ARC_EXIT EV_PrivilegeV
431
432; ---------------------------------------------
433; Extension Instruction Exception Handler
434; ---------------------------------------------
435ARC_ENTRY EV_Extension
436
437 EXCPN_PROLOG_FREEUP_REG r9
438 lr r9, [erstatus]
439
440 SWITCH_TO_KERNEL_STK
441 SAVE_ALL_SYS
442
443 lr r0, [ecr]
444 lr r1, [efa]
445 mov r2, sp
446 bl do_extension_fault
447 b ret_from_exception
448ARC_EXIT EV_Extension
449
Vineet Gupta547f1122013-01-18 15:12:22 +0530450;######################### System Call Tracing #########################
451
452tracesys:
453 ; save EFA in case tracer wants the PC of traced task
454 ; using ERET won't work since next-PC has already committed
455 lr r12, [efa]
456 GET_CURR_TASK_FIELD_PTR TASK_THREAD, r11
Vineet Gupta367f3fc2013-03-20 16:53:14 +0530457 st r12, [r11, THREAD_FAULT_ADDR] ; thread.fault_address
Vineet Gupta547f1122013-01-18 15:12:22 +0530458
459 ; PRE Sys Call Ptrace hook
460 mov r0, sp ; pt_regs needed
461 bl @syscall_trace_entry
462
463 ; Tracing code now returns the syscall num (orig or modif)
464 mov r8, r0
465
466 ; Do the Sys Call as we normally would.
467 ; Validate the Sys Call number
468 cmp r8, NR_syscalls
469 mov.hi r0, -ENOSYS
470 bhi tracesys_exit
471
472 ; Restore the sys-call args. Mere invocation of the hook abv could have
473 ; clobbered them (since they are in scratch regs). The tracer could also
474 ; have deliberately changed the syscall args: r0-r7
475 ld r0, [sp, PT_r0]
476 ld r1, [sp, PT_r1]
477 ld r2, [sp, PT_r2]
478 ld r3, [sp, PT_r3]
479 ld r4, [sp, PT_r4]
480 ld r5, [sp, PT_r5]
481 ld r6, [sp, PT_r6]
482 ld r7, [sp, PT_r7]
483 ld.as r9, [sys_call_table, r8]
484 jl [r9] ; Entry into Sys Call Handler
485
486tracesys_exit:
487 st r0, [sp, PT_r0] ; sys call return value in pt_regs
488
489 ;POST Sys Call Ptrace Hook
490 bl @syscall_trace_exit
491 b ret_from_exception ; NOT ret_from_system_call at is saves r0 which
492 ; we'd done before calling post hook above
493
Vineet Gupta9d42c842013-01-18 15:12:18 +0530494;################### Break Point TRAP ##########################
495
496 ; ======= (5b) Trap is due to Break-Point =========
497
498trap_with_param:
499
Vineet Gupta5c39c0a2013-02-11 20:01:24 +0530500 ; stop_pc info by gdb needs this info
Vineet Gupta3eb3e7d2013-02-11 14:40:55 +0530501 stw orig_r8_IS_BRKPT, [sp, PT_orig_r8]
Vineet Gupta9d42c842013-01-18 15:12:18 +0530502
503 mov r0, r12
504 lr r1, [efa]
505 mov r2, sp
506
507 ; Now that we have read EFA, its safe to do "fake" rtie
508 ; and get out of CPU exception mode
509 FAKE_RET_FROM_EXCPN r11
510
511 ; Save callee regs in case gdb wants to have a look
512 ; SP will grow up by size of CALLEE Reg-File
513 ; NOTE: clobbers r12
514 SAVE_CALLEE_SAVED_USER
515
516 ; save location of saved Callee Regs @ thread_struct->pc
517 GET_CURR_TASK_FIELD_PTR TASK_THREAD, r10
518 st sp, [r10, THREAD_CALLEE_REG]
519
520 ; Call the trap handler
521 bl do_non_swi_trap
522
523 ; unwind stack to discard Callee saved Regs
524 DISCARD_CALLEE_SAVED_USER
525
526 b ret_from_exception
527
528;##################### Trap Handling ##############################
529;
530; EV_Trap caused by TRAP_S and TRAP0 instructions.
531;------------------------------------------------------------------
532; (1) System Calls
533; :parameters in r0-r7.
534; :r8 has the system call number
535; (2) Break Points
536;------------------------------------------------------------------
537
538ARC_ENTRY EV_Trap
539
540 ; Need at least 1 reg to code the early exception prolog
541 EXCPN_PROLOG_FREEUP_REG r9
542
543 ;Which mode (user/kernel) was the system in when intr occured
544 lr r9, [erstatus]
545
546 SWITCH_TO_KERNEL_STK
547 SAVE_ALL_TRAP
548
549 ;------- (4) What caused the Trap --------------
550 lr r12, [ecr]
551 and.f 0, r12, ECR_PARAM_MASK
552 bnz trap_with_param
553
554 ; ======= (5a) Trap is due to System Call ========
555
556 ; Before doing anything, return from CPU Exception Mode
557 FAKE_RET_FROM_EXCPN r11
558
Vineet Gupta547f1122013-01-18 15:12:22 +0530559 ; If syscall tracing ongoing, invoke pre-pos-hooks
560 GET_CURR_THR_INFO_FLAGS r10
561 btst r10, TIF_SYSCALL_TRACE
562 bnz tracesys ; this never comes back
563
Vineet Gupta9d42c842013-01-18 15:12:18 +0530564 ;============ This is normal System Call case ==========
565 ; Sys-call num shd not exceed the total system calls avail
566 cmp r8, NR_syscalls
567 mov.hi r0, -ENOSYS
568 bhi ret_from_system_call
569
570 ; Offset into the syscall_table and call handler
571 ld.as r9,[sys_call_table, r8]
572 jl [r9] ; Entry into Sys Call Handler
573
574 ; fall through to ret_from_system_call
575ARC_EXIT EV_Trap
576
577ARC_ENTRY ret_from_system_call
578
579 st r0, [sp, PT_r0] ; sys call return value in pt_regs
580
581 ; fall through yet again to ret_from_exception
582
583;############# Return from Intr/Excp/Trap (Linux Specifics) ##############
584;
585; If ret to user mode do we need to handle signals, schedule() et al.
586
587ARC_ENTRY ret_from_exception
588
589 ; Pre-{IRQ,Trap,Exception} K/U mode from pt_regs->status32
590 ld r8, [sp, PT_status32] ; returning to User/Kernel Mode
591
592#ifdef CONFIG_PREEMPT
593 bbit0 r8, STATUS_U_BIT, resume_kernel_mode
594#else
595 bbit0 r8, STATUS_U_BIT, restore_regs
596#endif
597
598 ; Before returning to User mode check-for-and-complete any pending work
599 ; such as rescheduling/signal-delivery etc.
600resume_user_mode_begin:
601
602 ; Disable IRQs to ensures that chk for pending work itself is atomic
603 ; (and we don't end up missing a NEED_RESCHED/SIGPENDING due to an
604 ; interim IRQ).
605 IRQ_DISABLE r10
606
607 ; Fast Path return to user mode if no pending work
608 GET_CURR_THR_INFO_FLAGS r9
609 and.f 0, r9, _TIF_WORK_MASK
610 bz restore_regs
611
612 ; --- (Slow Path #1) task preemption ---
613 bbit0 r9, TIF_NEED_RESCHED, .Lchk_pend_signals
614 mov blink, resume_user_mode_begin ; tail-call to U mode ret chks
615 b @schedule ; BTST+Bnz causes relo error in link
616
617.Lchk_pend_signals:
618 IRQ_ENABLE r10
619
620 ; --- (Slow Path #2) pending signal ---
621 mov r0, sp ; pt_regs for arg to do_signal()/do_notify_resume()
622
623 bbit0 r9, TIF_SIGPENDING, .Lchk_notify_resume
624
Vineet Guptac3581032013-01-18 15:12:19 +0530625 ; Normal Trap/IRQ entry only saves Scratch (caller-saved) regs
626 ; in pt_reg since the "C" ABI (kernel code) will automatically
627 ; save/restore callee-saved regs.
628 ;
629 ; However, here we need to explicitly save callee regs because
Vineet Gupta9d42c842013-01-18 15:12:18 +0530630 ; (i) If this signal causes coredump - full regfile needed
631 ; (ii) If signal is SIGTRAP/SIGSTOP, task is being traced thus
632 ; tracer might call PEEKUSR(CALLEE reg)
633 ;
634 ; NOTE: SP will grow up by size of CALLEE Reg-File
635 SAVE_CALLEE_SAVED_USER ; clobbers r12
636
637 ; save location of saved Callee Regs @ thread_struct->callee
638 GET_CURR_TASK_FIELD_PTR TASK_THREAD, r10
639 st sp, [r10, THREAD_CALLEE_REG]
640
641 bl @do_signal
642
Vineet Guptac3581032013-01-18 15:12:19 +0530643 ; Ideally we want to discard the Callee reg above, however if this was
644 ; a tracing signal, tracer could have done a POKEUSR(CALLEE reg)
645 RESTORE_CALLEE_SAVED_USER
Vineet Gupta9d42c842013-01-18 15:12:18 +0530646
647 b resume_user_mode_begin ; loop back to start of U mode ret
648
649 ; --- (Slow Path #3) notify_resume ---
650.Lchk_notify_resume:
651 btst r9, TIF_NOTIFY_RESUME
652 blnz @do_notify_resume
653 b resume_user_mode_begin ; unconditionally back to U mode ret chks
654 ; for single exit point from this block
655
656#ifdef CONFIG_PREEMPT
657
658resume_kernel_mode:
659
660 ; Can't preempt if preemption disabled
661 GET_CURR_THR_INFO_FROM_SP r10
662 ld r8, [r10, THREAD_INFO_PREEMPT_COUNT]
663 brne r8, 0, restore_regs
664
665 ; check if this task's NEED_RESCHED flag set
666 ld r9, [r10, THREAD_INFO_FLAGS]
667 bbit0 r9, TIF_NEED_RESCHED, restore_regs
668
669 IRQ_DISABLE r9
670
671 ; Invoke PREEMPTION
672 bl preempt_schedule_irq
673
674 ; preempt_schedule_irq() always returns with IRQ disabled
675#endif
676
677 ; fall through
678
679;############# Return from Intr/Excp/Trap (ARC Specifics) ##############
680;
681; Restore the saved sys context (common exit-path for EXCPN/IRQ/Trap)
682; IRQ shd definitely not happen between now and rtie
683
684restore_regs :
685
686 ; Disable Interrupts while restoring reg-file back
687 ; XXX can this be optimised out
688 IRQ_DISABLE_SAVE r9, r10 ;@r10 has prisitine (pre-disable) copy
689
Vineet Gupta080c3742013-02-11 19:52:57 +0530690#ifdef CONFIG_ARC_CURR_IN_REG
691 ; Restore User R25
692 ; Earlier this used to be only for returning to user mode
693 ; However with 2 levels of IRQ this can also happen even if
694 ; in kernel mode
695 ld r9, [sp, PT_sp]
696 brhs r9, VMALLOC_START, 8f
697 RESTORE_USER_R25
6988:
699#endif
700
Vineet Gupta9d42c842013-01-18 15:12:18 +0530701 ; Restore REG File. In case multiple Events outstanding,
702 ; use the same priorty as rtie: EXCPN, L2 IRQ, L1 IRQ, None
703 ; Note that we use realtime STATUS32 (not pt_regs->status32) to
704 ; decide that.
705
706 ; if Returning from Exception
707 bbit0 r10, STATUS_AE_BIT, not_exception
708 RESTORE_ALL_SYS
709 rtie
710
711 ; Not Exception so maybe Interrupts (Level 1 or 2)
712
713not_exception:
714
Vineet Gupta4788a592013-01-18 15:12:22 +0530715#ifdef CONFIG_ARC_COMPACT_IRQ_LEVELS
716
717 bbit0 r10, STATUS_A2_BIT, not_level2_interrupt
718
719 ;------------------------------------------------------------------
720 ; if L2 IRQ interrupted a L1 ISR, we'd disbaled preemption earlier
721 ; so that sched doesnt move to new task, causing L1 to be delayed
722 ; undeterministically. Now that we've achieved that, lets reset
723 ; things to what they were, before returning from L2 context
724 ;----------------------------------------------------------------
725
Vineet Gupta3eb3e7d2013-02-11 14:40:55 +0530726 ldw r9, [sp, PT_orig_r8] ; get orig_r8 to make sure it is
Vineet Gupta4788a592013-01-18 15:12:22 +0530727 brne r9, orig_r8_IS_IRQ2, 149f ; infact a L2 ISR ret path
728
729 ld r9, [sp, PT_status32] ; get statu32_l2 (saved in pt_regs)
730 bbit0 r9, STATUS_A1_BIT, 149f ; L1 not active when L2 IRQ, so normal
731
732 ; A1 is set in status32_l2
733 ; decrement thread_info->preempt_count (re-enable preemption)
734 GET_CURR_THR_INFO_FROM_SP r10
735 ld r9, [r10, THREAD_INFO_PREEMPT_COUNT]
736
737 ; paranoid check, given A1 was active when A2 happened, preempt count
738 ; must not be 0 beccause we would have incremented it.
739 ; If this does happen we simply HALT as it means a BUG !!!
740 cmp r9, 0
741 bnz 2f
742 flag 1
743
7442:
745 sub r9, r9, 1
746 st r9, [r10, THREAD_INFO_PREEMPT_COUNT]
747
748149:
749 ;return from level 2
750 RESTORE_ALL_INT2
751debug_marker_l2:
752 rtie
753
754not_level2_interrupt:
755
756#endif
757
Vineet Gupta9d42c842013-01-18 15:12:18 +0530758 bbit0 r10, STATUS_A1_BIT, not_level1_interrupt
759
760 ;return from level 1
761
762 RESTORE_ALL_INT1
763debug_marker_l1:
764 rtie
765
766not_level1_interrupt:
767
768 ;this case is for syscalls or Exceptions (with fake rtie)
769
770 RESTORE_ALL_SYS
771debug_marker_syscall:
772 rtie
773
774ARC_EXIT ret_from_exception
775
776ARC_ENTRY ret_from_fork
777 ; when the forked child comes here from the __switch_to function
778 ; r0 has the last task pointer.
779 ; put last task in scheduler queue
Vineet Guptabf90e1e2013-01-18 15:12:18 +0530780 bl @schedule_tail
781
782 ; If kernel thread, jump to it's entry-point
783 ld r9, [sp, PT_status32]
784 brne r9, 0, 1f
785
786 jl.d [r14]
787 mov r0, r13 ; arg to payload
788
7891:
790 ; special case of kernel_thread entry point returning back due to
791 ; kernel_execve() - pretend return from syscall to ret to userland
792 b ret_from_exception
Vineet Gupta9d42c842013-01-18 15:12:18 +0530793ARC_EXIT ret_from_fork
Vineet Gupta4adeefe2013-01-18 15:12:18 +0530794
795;################### Special Sys Call Wrappers ##########################
796
Vineet Gupta4adeefe2013-01-18 15:12:18 +0530797ARC_ENTRY sys_clone_wrapper
798 SAVE_CALLEE_SAVED_USER
799 bl @sys_clone
800 DISCARD_CALLEE_SAVED_USER
801
Vineet Gupta547f1122013-01-18 15:12:22 +0530802 GET_CURR_THR_INFO_FLAGS r10
803 btst r10, TIF_SYSCALL_TRACE
804 bnz tracesys_exit
805
Vineet Gupta4adeefe2013-01-18 15:12:18 +0530806 b ret_from_system_call
807ARC_EXIT sys_clone_wrapper
Vineet Gupta854a0d92013-01-22 17:03:19 +0530808
809#ifdef CONFIG_ARC_DW2_UNWIND
810; Workaround for bug 94179 (STAR ):
811; Despite -fasynchronous-unwind-tables, linker is not making dwarf2 unwinder
812; section (.debug_frame) as loadable. So we force it here.
813; This also fixes STAR 9000487933 where the prev-workaround (objcopy --setflag)
814; would not work after a clean build due to kernel build system dependencies.
815.section .debug_frame, "wa",@progbits
816#endif