1 /* SPDX-License-Identifier: GPL-2.0-only */ !! 1 /* -*- mode: asm -*- 2 /* !! 2 * 3 * Low-level exception handling code !! 3 * linux/arch/m68k/kernel/entry.S >> 4 * >> 5 * Copyright (C) 1991, 1992 Linus Torvalds >> 6 * >> 7 * This file is subject to the terms and conditions of the GNU General Public >> 8 * License. See the file README.legal in the main directory of this archive >> 9 * for more details. >> 10 * >> 11 * Linux/m68k support by Hamish Macdonald >> 12 * >> 13 * 68060 fixes by Jesper Skov 4 * 14 * 5 * Copyright (C) 2012 ARM Ltd. << 6 * Authors: Catalin Marinas <catalin.marina << 7 * Will Deacon <will.deacon@arm.co << 8 */ 15 */ 9 16 10 #include <linux/arm-smccc.h> << 11 #include <linux/init.h> << 12 #include <linux/linkage.h> << 13 << 14 #include <asm/alternative.h> << 15 #include <asm/assembler.h> << 16 #include <asm/asm-offsets.h> << 17 #include <asm/asm_pointer_auth.h> << 18 #include <asm/bug.h> << 19 #include <asm/cpufeature.h> << 20 #include <asm/errno.h> << 21 #include <asm/esr.h> << 22 #include <asm/irq.h> << 23 #include <asm/memory.h> << 24 #include <asm/mmu.h> << 25 #include <asm/processor.h> << 26 #include <asm/ptrace.h> << 27 #include <asm/scs.h> << 28 #include <asm/thread_info.h> << 29 #include <asm/asm-uaccess.h> << 30 #include <asm/unistd.h> << 31 << 32 .macro clear_gp_regs << 33 .irp n,0,1,2,3,4,5,6,7,8,9,10,11,12 << 34 mov x\n, xzr << 35 .endr << 36 .endm << 37 << 38 .macro kernel_ventry, el:req, ht:req, << 39 .align 7 << 40 .Lventry_start\@: << 41 .if \el == 0 << 42 /* << 43 * This must be the first instruction << 44 * skipped by the trampoline vectors, << 45 */ << 46 b .Lskip_tramp_vectors_cleanup\@ << 47 .if \regsize == 64 << 48 mrs x30, tpidrro_el0 << 49 msr tpidrro_el0, xzr << 50 .else << 51 mov x30, xzr << 52 .endif << 53 .Lskip_tramp_vectors_cleanup\@: << 54 .endif << 55 << 56 sub sp, sp, #PT_REGS_SIZE << 57 #ifdef CONFIG_VMAP_STACK << 58 /* << 59 * Test whether the SP has overflowed, << 60 * Task and IRQ stacks are aligned so << 61 * should always be zero. << 62 */ << 63 add sp, sp, x0 << 64 sub x0, sp, x0 << 65 tbnz x0, #THREAD_SHIFT, 0f << 66 sub x0, sp, x0 << 67 sub sp, sp, x0 << 68 b el\el\ht\()_\regsize\()_\label << 69 << 70 0: << 71 /* << 72 * Either we've just detected an overf << 73 * while on the overflow stack. Either << 74 * userspace, and can clobber EL0 regi << 75 */ << 76 << 77 /* Stash the original SP (minus PT_REG << 78 msr tpidr_el0, x0 << 79 << 80 /* Recover the original x0 value and s << 81 sub x0, sp, x0 << 82 msr tpidrro_el0, x0 << 83 << 84 /* Switch to the overflow stack */ << 85 adr_this_cpu sp, overflow_stack + OVER << 86 << 87 /* << 88 * Check whether we were already on th << 89 * after panic() re-enables interrupts << 90 */ << 91 mrs x0, tpidr_el0 << 92 sub x0, sp, x0 << 93 tst x0, #~(OVERFLOW_STACK_SIZE - 1 << 94 b.ne __bad_stack << 95 << 96 /* We were already on the overflow sta << 97 sub sp, sp, x0 << 98 mrs x0, tpidrro_el0 << 99 #endif << 100 b el\el\ht\()_\regsize\()_\label << 101 .org .Lventry_start\@ + 128 // Did we over << 102 .endm << 103 << 104 .macro tramp_alias, dst, sym << 105 .set .Lalias\@, TRAMP_VALIAS + \sym << 106 movz \dst, :abs_g2_s:.Lalias\@ << 107 movk \dst, :abs_g1_nc:.Lalias\@ << 108 movk \dst, :abs_g0_nc:.Lalias\@ << 109 .endm << 110 << 111 /* << 112 * This macro corrupts x0-x3. It is th << 113 * them if required. << 114 */ << 115 .macro apply_ssbd, state, tmp1, tmp2 << 116 alternative_cb ARM64_ALWAYS_SYSTEM, spectre_v << 117 b .L__asm_ssbd_skip\@ << 118 alternative_cb_end << 119 ldr_this_cpu \tmp2, arm64_ssbd_call << 120 cbz \tmp2, .L__asm_ssbd_skip\@ << 121 ldr \tmp2, [tsk, #TSK_TI_FLAGS] << 122 tbnz \tmp2, #TIF_SSBD, .L__asm_ssbd << 123 mov w0, #ARM_SMCCC_ARCH_WORKAROUND << 124 mov w1, #\state << 125 alternative_cb ARM64_ALWAYS_SYSTEM, smccc_pat << 126 nop << 127 alternative_cb_end << 128 .L__asm_ssbd_skip\@: << 129 .endm << 130 << 131 /* Check for MTE asynchronous tag chec << 132 .macro check_mte_async_tcf, tmp, ti_fl << 133 #ifdef CONFIG_ARM64_MTE << 134 .arch_extension lse << 135 alternative_if_not ARM64_MTE << 136 b 1f << 137 alternative_else_nop_endif << 138 /* << 139 * Asynchronous tag check faults are o << 140 * ASYM (3) modes. In each of these mo << 141 * set, so skip the check if it is uns << 142 */ << 143 tbz \thread_sctlr, #(SCTLR_EL1_TCF << 144 mrs_s \tmp, SYS_TFSRE0_EL1 << 145 tbz \tmp, #SYS_TFSR_EL1_TF0_SHIFT, << 146 /* Asynchronous TCF occurred for TTBR0 << 147 mov \tmp, #_TIF_MTE_ASYNC_FAULT << 148 add \ti_flags, tsk, #TSK_TI_FLAGS << 149 stset \tmp, [\ti_flags] << 150 1: << 151 #endif << 152 .endm << 153 << 154 /* Clear the MTE asynchronous tag chec << 155 .macro clear_mte_async_tcf thread_sctl << 156 #ifdef CONFIG_ARM64_MTE << 157 alternative_if ARM64_MTE << 158 /* See comment in check_mte_async_tcf << 159 tbz \thread_sctlr, #(SCTLR_EL1_TCF << 160 dsb ish << 161 msr_s SYS_TFSRE0_EL1, xzr << 162 1: << 163 alternative_else_nop_endif << 164 #endif << 165 .endm << 166 << 167 .macro mte_set_gcr, mte_ctrl, tmp << 168 #ifdef CONFIG_ARM64_MTE << 169 ubfx \tmp, \mte_ctrl, #MTE_CTRL_GCR << 170 orr \tmp, \tmp, #SYS_GCR_EL1_RRND << 171 msr_s SYS_GCR_EL1, \tmp << 172 #endif << 173 .endm << 174 << 175 .macro mte_set_kernel_gcr, tmp, tmp2 << 176 #ifdef CONFIG_KASAN_HW_TAGS << 177 alternative_cb ARM64_ALWAYS_SYSTEM, kasan_hw_ << 178 b 1f << 179 alternative_cb_end << 180 mov \tmp, KERNEL_GCR_EL1 << 181 msr_s SYS_GCR_EL1, \tmp << 182 1: << 183 #endif << 184 .endm << 185 << 186 .macro mte_set_user_gcr, tsk, tmp, tmp << 187 #ifdef CONFIG_KASAN_HW_TAGS << 188 alternative_cb ARM64_ALWAYS_SYSTEM, kasan_hw_ << 189 b 1f << 190 alternative_cb_end << 191 ldr \tmp, [\tsk, #THREAD_MTE_CTRL] << 192 << 193 mte_set_gcr \tmp, \tmp2 << 194 1: << 195 #endif << 196 .endm << 197 << 198 .macro kernel_entry, el, regsize = 64 << 199 .if \el == 0 << 200 alternative_insn nop, SET_PSTATE_DIT(1 << 201 .endif << 202 .if \regsize == 32 << 203 mov w0, w0 << 204 .endif << 205 stp x0, x1, [sp, #16 * 0] << 206 stp x2, x3, [sp, #16 * 1] << 207 stp x4, x5, [sp, #16 * 2] << 208 stp x6, x7, [sp, #16 * 3] << 209 stp x8, x9, [sp, #16 * 4] << 210 stp x10, x11, [sp, #16 * 5] << 211 stp x12, x13, [sp, #16 * 6] << 212 stp x14, x15, [sp, #16 * 7] << 213 stp x16, x17, [sp, #16 * 8] << 214 stp x18, x19, [sp, #16 * 9] << 215 stp x20, x21, [sp, #16 * 10] << 216 stp x22, x23, [sp, #16 * 11] << 217 stp x24, x25, [sp, #16 * 12] << 218 stp x26, x27, [sp, #16 * 13] << 219 stp x28, x29, [sp, #16 * 14] << 220 << 221 .if \el == 0 << 222 clear_gp_regs << 223 mrs x21, sp_el0 << 224 ldr_this_cpu tsk, __entry_task, x20 << 225 msr sp_el0, tsk << 226 << 227 /* << 228 * Ensure MDSCR_EL1.SS is clear, since << 229 * when scheduling. << 230 */ << 231 ldr x19, [tsk, #TSK_TI_FLAGS] << 232 disable_step_tsk x19, x20 << 233 << 234 /* Check for asynchronous tag check fa << 235 ldr x0, [tsk, THREAD_SCTLR_USER] << 236 check_mte_async_tcf x22, x23, x0 << 237 << 238 #ifdef CONFIG_ARM64_PTR_AUTH << 239 alternative_if ARM64_HAS_ADDRESS_AUTH << 240 /* << 241 * Enable IA for in-kernel PAC if the << 242 * this could be implemented with an u << 243 * a load, this was measured to be slo << 244 * << 245 * Install the kernel IA key only if I << 246 * was disabled on kernel exit then we << 247 * installed so there is no need to in << 248 */ << 249 tbz x0, SCTLR_ELx_ENIA_SHIFT, 1f << 250 __ptrauth_keys_install_kernel_nosync t << 251 b 2f << 252 1: << 253 mrs x0, sctlr_el1 << 254 orr x0, x0, SCTLR_ELx_ENIA << 255 msr sctlr_el1, x0 << 256 2: << 257 alternative_else_nop_endif << 258 #endif << 259 << 260 apply_ssbd 1, x22, x23 << 261 << 262 mte_set_kernel_gcr x22, x23 << 263 << 264 /* << 265 * Any non-self-synchronizing system r << 266 * kernel entry should be placed befor << 267 */ << 268 alternative_if ARM64_MTE << 269 isb << 270 b 1f << 271 alternative_else_nop_endif << 272 alternative_if ARM64_HAS_ADDRESS_AUTH << 273 isb << 274 alternative_else_nop_endif << 275 1: << 276 << 277 scs_load_current << 278 .else << 279 add x21, sp, #PT_REGS_SIZE << 280 get_current_task tsk << 281 .endif /* \el == 0 */ << 282 mrs x22, elr_el1 << 283 mrs x23, spsr_el1 << 284 stp lr, x21, [sp, #S_LR] << 285 << 286 /* << 287 * For exceptions from EL0, create a f << 288 * For exceptions from EL1, create a s << 289 * interrupted code shows up in the ba << 290 */ << 291 .if \el == 0 << 292 stp xzr, xzr, [sp, #S_STACKFRAME] << 293 .else << 294 stp x29, x22, [sp, #S_STACKFRAME] << 295 .endif << 296 add x29, sp, #S_STACKFRAME << 297 << 298 #ifdef CONFIG_ARM64_SW_TTBR0_PAN << 299 alternative_if_not ARM64_HAS_PAN << 300 bl __swpan_entry_el\el << 301 alternative_else_nop_endif << 302 #endif << 303 << 304 stp x22, x23, [sp, #S_PC] << 305 << 306 /* Not in a syscall by default (el0_sv << 307 .if \el == 0 << 308 mov w21, #NO_SYSCALL << 309 str w21, [sp, #S_SYSCALLNO] << 310 .endif << 311 << 312 #ifdef CONFIG_ARM64_PSEUDO_NMI << 313 alternative_if_not ARM64_HAS_GIC_PRIO_MASKING << 314 b .Lskip_pmr_save\@ << 315 alternative_else_nop_endif << 316 << 317 mrs_s x20, SYS_ICC_PMR_EL1 << 318 str x20, [sp, #S_PMR_SAVE] << 319 mov x20, #GIC_PRIO_IRQON | GIC_PRI << 320 msr_s SYS_ICC_PMR_EL1, x20 << 321 << 322 .Lskip_pmr_save\@: << 323 #endif << 324 << 325 /* << 326 * Registers that may be useful after << 327 * << 328 * x20 - ICC_PMR_EL1 << 329 * x21 - aborted SP << 330 * x22 - aborted PC << 331 * x23 - aborted PSTATE << 332 */ << 333 .endm << 334 << 335 .macro kernel_exit, el << 336 .if \el != 0 << 337 disable_daif << 338 .endif << 339 << 340 #ifdef CONFIG_ARM64_PSEUDO_NMI << 341 alternative_if_not ARM64_HAS_GIC_PRIO_MASKING << 342 b .Lskip_pmr_restore\@ << 343 alternative_else_nop_endif << 344 << 345 ldr x20, [sp, #S_PMR_SAVE] << 346 msr_s SYS_ICC_PMR_EL1, x20 << 347 << 348 /* Ensure priority change is seen by r << 349 alternative_if_not ARM64_HAS_GIC_PRIO_RELAXED_ << 350 dsb sy << 351 alternative_else_nop_endif << 352 << 353 .Lskip_pmr_restore\@: << 354 #endif << 355 << 356 ldp x21, x22, [sp, #S_PC] << 357 << 358 #ifdef CONFIG_ARM64_SW_TTBR0_PAN << 359 alternative_if_not ARM64_HAS_PAN << 360 bl __swpan_exit_el\el << 361 alternative_else_nop_endif << 362 #endif << 363 << 364 .if \el == 0 << 365 ldr x23, [sp, #S_SP] << 366 msr sp_el0, x23 << 367 tst x22, #PSR_MODE32_BIT << 368 b.eq 3f << 369 << 370 #ifdef CONFIG_ARM64_ERRATUM_845719 << 371 alternative_if ARM64_WORKAROUND_845719 << 372 #ifdef CONFIG_PID_IN_CONTEXTIDR << 373 mrs x29, contextidr_el1 << 374 msr contextidr_el1, x29 << 375 #else << 376 msr contextidr_el1, xzr << 377 #endif << 378 alternative_else_nop_endif << 379 #endif << 380 3: << 381 scs_save tsk << 382 << 383 /* Ignore asynchronous tag check fault << 384 ldr x0, [tsk, THREAD_SCTLR_USER] << 385 clear_mte_async_tcf x0 << 386 << 387 #ifdef CONFIG_ARM64_PTR_AUTH << 388 alternative_if ARM64_HAS_ADDRESS_AUTH << 389 /* << 390 * IA was enabled for in-kernel PAC. D << 391 * alternatively install the user's IA << 392 * SCTLR bits were updated on task swi << 393 * << 394 * No kernel C function calls after th << 395 */ << 396 tbz x0, SCTLR_ELx_ENIA_SHIFT, 1f << 397 __ptrauth_keys_install_user tsk, x0, x << 398 b 2f << 399 1: << 400 mrs x0, sctlr_el1 << 401 bic x0, x0, SCTLR_ELx_ENIA << 402 msr sctlr_el1, x0 << 403 2: << 404 alternative_else_nop_endif << 405 #endif << 406 << 407 mte_set_user_gcr tsk, x0, x1 << 408 << 409 apply_ssbd 0, x0, x1 << 410 .endif << 411 << 412 msr elr_el1, x21 << 413 msr spsr_el1, x22 << 414 ldp x0, x1, [sp, #16 * 0] << 415 ldp x2, x3, [sp, #16 * 1] << 416 ldp x4, x5, [sp, #16 * 2] << 417 ldp x6, x7, [sp, #16 * 3] << 418 ldp x8, x9, [sp, #16 * 4] << 419 ldp x10, x11, [sp, #16 * 5] << 420 ldp x12, x13, [sp, #16 * 6] << 421 ldp x14, x15, [sp, #16 * 7] << 422 ldp x16, x17, [sp, #16 * 8] << 423 ldp x18, x19, [sp, #16 * 9] << 424 ldp x20, x21, [sp, #16 * 10] << 425 ldp x22, x23, [sp, #16 * 11] << 426 ldp x24, x25, [sp, #16 * 12] << 427 ldp x26, x27, [sp, #16 * 13] << 428 ldp x28, x29, [sp, #16 * 14] << 429 << 430 .if \el == 0 << 431 #ifdef CONFIG_UNMAP_KERNEL_AT_EL0 << 432 alternative_insn "b .L_skip_tramp_exit << 433 << 434 msr far_el1, x29 << 435 << 436 ldr_this_cpu x30, this_cpu_vector, << 437 tramp_alias x29, tramp_exit << 438 msr vbar_el1, x30 << 439 ldr lr, [sp, #S_LR] << 440 add sp, sp, #PT_REGS_SIZE << 441 br x29 << 442 << 443 .L_skip_tramp_exit_\@: << 444 #endif << 445 .endif << 446 << 447 ldr lr, [sp, #S_LR] << 448 add sp, sp, #PT_REGS_SIZE << 449 << 450 .if \el == 0 << 451 /* This must be after the last explici << 452 alternative_if ARM64_WORKAROUND_SPECULATIVE_UN << 453 tlbi vale1, xzr << 454 dsb nsh << 455 alternative_else_nop_endif << 456 .else << 457 /* Ensure any device/NC reads complete << 458 alternative_insn nop, "dmb sy", ARM64_ << 459 .endif << 460 << 461 eret << 462 sb << 463 .endm << 464 << 465 #ifdef CONFIG_ARM64_SW_TTBR0_PAN << 466 /* << 467 * Set the TTBR0 PAN bit in SPSR. When << 468 * EL0, there is no need to check the << 469 * accesses are always enabled. << 470 * Note that the meaning of this bit d << 471 * feature as all TTBR0_EL1 accesses a << 472 * user mappings. << 473 */ << 474 SYM_CODE_START_LOCAL(__swpan_entry_el1) << 475 mrs x21, ttbr0_el1 << 476 tst x21, #TTBR_ASID_MASK << 477 orr x23, x23, #PSR_PAN_BIT << 478 b.eq 1f << 479 and x23, x23, #~PSR_PAN_BIT << 480 SYM_INNER_LABEL(__swpan_entry_el0, SYM_L_LOCAL << 481 __uaccess_ttbr0_disable x21 << 482 1: ret << 483 SYM_CODE_END(__swpan_entry_el1) << 484 << 485 /* << 486 * Restore access to TTBR0_EL1. If ret << 487 * PAN bit checking. << 488 */ << 489 SYM_CODE_START_LOCAL(__swpan_exit_el1) << 490 tbnz x22, #22, 1f << 491 __uaccess_ttbr0_enable x0, x1 << 492 1: and x22, x22, #~PSR_PAN_BIT << 493 ret << 494 SYM_CODE_END(__swpan_exit_el1) << 495 << 496 SYM_CODE_START_LOCAL(__swpan_exit_el0) << 497 __uaccess_ttbr0_enable x0, x1 << 498 /* << 499 * Enable errata workarounds only if r << 500 * workaround currently required for T << 501 * Cavium erratum 27456 (broadcast TLB << 502 * corruption). << 503 */ << 504 b post_ttbr_update_workaround << 505 SYM_CODE_END(__swpan_exit_el0) << 506 #endif << 507 << 508 /* GPRs used by entry code */ << 509 tsk .req x28 // current thr << 510 << 511 .text << 512 << 513 /* 17 /* 514 * Exception vectors. !! 18 * entry.S contains the system-call and fault low-level handling routines. >> 19 * This also contains the timer-interrupt handler, as well as all interrupts >> 20 * and faults that can result in a task-switch. >> 21 * >> 22 * NOTE: This code handles signal-recognition, which happens every time >> 23 * after a timer-interrupt and after each system call. >> 24 * 515 */ 25 */ 516 .pushsection ".entry.text", "ax" << 517 << 518 .align 11 << 519 SYM_CODE_START(vectors) << 520 kernel_ventry 1, t, 64, sync << 521 kernel_ventry 1, t, 64, irq << 522 kernel_ventry 1, t, 64, fiq << 523 kernel_ventry 1, t, 64, error << 524 << 525 kernel_ventry 1, h, 64, sync << 526 kernel_ventry 1, h, 64, irq << 527 kernel_ventry 1, h, 64, fiq << 528 kernel_ventry 1, h, 64, error << 529 << 530 kernel_ventry 0, t, 64, sync << 531 kernel_ventry 0, t, 64, irq << 532 kernel_ventry 0, t, 64, fiq << 533 kernel_ventry 0, t, 64, error << 534 << 535 kernel_ventry 0, t, 32, sync << 536 kernel_ventry 0, t, 32, irq << 537 kernel_ventry 0, t, 32, fiq << 538 kernel_ventry 0, t, 32, error << 539 SYM_CODE_END(vectors) << 540 << 541 #ifdef CONFIG_VMAP_STACK << 542 SYM_CODE_START_LOCAL(__bad_stack) << 543 /* << 544 * We detected an overflow in kernel_v << 545 * overflow stack. Stash the exception << 546 * handler. << 547 */ << 548 << 549 /* Restore the original x0 value */ << 550 mrs x0, tpidrro_el0 << 551 << 552 /* << 553 * Store the original GPRs to the new << 554 * PT_REGS_SIZE) was stashed in tpidr_ << 555 */ << 556 sub sp, sp, #PT_REGS_SIZE << 557 kernel_entry 1 << 558 mrs x0, tpidr_el0 << 559 add x0, x0, #PT_REGS_SIZE << 560 str x0, [sp, #S_SP] << 561 << 562 /* Stash the regs for handle_bad_stack << 563 mov x0, sp << 564 << 565 /* Time to die */ << 566 bl handle_bad_stack << 567 ASM_BUG() << 568 SYM_CODE_END(__bad_stack) << 569 #endif /* CONFIG_VMAP_STACK */ << 570 << 571 << 572 .macro entry_handler el:req, ht:req, r << 573 SYM_CODE_START_LOCAL(el\el\ht\()_\regsize\()_\ << 574 kernel_entry \el, \regsize << 575 mov x0, sp << 576 bl el\el\ht\()_\regsize\()_\label << 577 .if \el == 0 << 578 b ret_to_user << 579 .else << 580 b ret_to_kernel << 581 .endif << 582 SYM_CODE_END(el\el\ht\()_\regsize\()_\label) << 583 .endm << 584 26 585 /* 27 /* 586 * Early exception handlers !! 28 * 12/03/96 Jes: Currently we only support m68k single-cpu systems, so >> 29 * all pointers that used to be 'current' are now entry >> 30 * number 0 in the 'current_set' list. >> 31 * >> 32 * 6/05/00 RZ: addedd writeback completion after return from sighandler >> 33 * for 68040 587 */ 34 */ 588 entry_handler 1, t, 64, sync << 589 entry_handler 1, t, 64, irq << 590 entry_handler 1, t, 64, fiq << 591 entry_handler 1, t, 64, error << 592 << 593 entry_handler 1, h, 64, sync << 594 entry_handler 1, h, 64, irq << 595 entry_handler 1, h, 64, fiq << 596 entry_handler 1, h, 64, error << 597 << 598 entry_handler 0, t, 64, sync << 599 entry_handler 0, t, 64, irq << 600 entry_handler 0, t, 64, fiq << 601 entry_handler 0, t, 64, error << 602 << 603 entry_handler 0, t, 32, sync << 604 entry_handler 0, t, 32, irq << 605 entry_handler 0, t, 32, fiq << 606 entry_handler 0, t, 32, error << 607 << 608 SYM_CODE_START_LOCAL(ret_to_kernel) << 609 kernel_exit 1 << 610 SYM_CODE_END(ret_to_kernel) << 611 << 612 SYM_CODE_START_LOCAL(ret_to_user) << 613 ldr x19, [tsk, #TSK_TI_FLAGS] << 614 enable_step_tsk x19, x2 << 615 #ifdef CONFIG_GCC_PLUGIN_STACKLEAK << 616 bl stackleak_erase_on_task_stack << 617 #endif << 618 kernel_exit 0 << 619 SYM_CODE_END(ret_to_user) << 620 35 621 .popsection !! 36 #include <linux/linkage.h> >> 37 #include <asm/errno.h> >> 38 #include <asm/setup.h> >> 39 #include <asm/segment.h> >> 40 #include <asm/traps.h> >> 41 #include <asm/unistd.h> >> 42 #include <asm/asm-offsets.h> >> 43 #include <asm/entry.h> 622 44 623 // Move from tramp_pg_dir to swapper_p !! 45 .globl system_call, buserr, trap, resume 624 .macro tramp_map_kernel, tmp !! 46 .globl sys_call_table 625 mrs \tmp, ttbr1_el1 !! 47 .globl __sys_fork, __sys_clone, __sys_vfork 626 add \tmp, \tmp, #TRAMP_SWAPPER_OFF !! 48 .globl bad_interrupt 627 bic \tmp, \tmp, #USER_ASID_FLAG !! 49 .globl auto_irqhandler_fixup 628 msr ttbr1_el1, \tmp !! 50 .globl user_irqvec_fixup 629 #ifdef CONFIG_QCOM_FALKOR_ERRATUM_1003 !! 51 630 alternative_if ARM64_WORKAROUND_QCOM_FALKOR_E1 !! 52 .text 631 /* ASID already in \tmp[63:48] */ !! 53 ENTRY(__sys_fork) 632 movk \tmp, #:abs_g2_nc:(TRAMP_VALIA !! 54 SAVE_SWITCH_STACK 633 movk \tmp, #:abs_g1_nc:(TRAMP_VALIA !! 55 jbsr sys_fork 634 /* 2MB boundary containing the vectors !! 56 lea %sp@(24),%sp 635 movk \tmp, #:abs_g0_nc:((TRAMP_VALI !! 57 rts 636 isb !! 58 637 tlbi vae1, \tmp !! 59 ENTRY(__sys_clone) 638 dsb nsh !! 60 SAVE_SWITCH_STACK 639 alternative_else_nop_endif !! 61 pea %sp@(SWITCH_STACK_SIZE) 640 #endif /* CONFIG_QCOM_FALKOR_ERRATUM_1003 */ !! 62 jbsr m68k_clone 641 .endm !! 63 lea %sp@(28),%sp 642 !! 64 rts 643 // Move from swapper_pg_dir to tramp_p !! 65 644 .macro tramp_unmap_kernel, tmp !! 66 ENTRY(__sys_vfork) 645 mrs \tmp, ttbr1_el1 !! 67 SAVE_SWITCH_STACK 646 sub \tmp, \tmp, #TRAMP_SWAPPER_OFF !! 68 jbsr sys_vfork 647 orr \tmp, \tmp, #USER_ASID_FLAG !! 69 lea %sp@(24),%sp 648 msr ttbr1_el1, \tmp !! 70 rts 649 /* !! 71 650 * We avoid running the post_ttbr_upda !! 72 ENTRY(sys_sigreturn) 651 * it's only needed by Cavium ThunderX !! 73 SAVE_SWITCH_STACK 652 * disabled. !! 74 movel %sp,%sp@- | switch_stack pointer 653 */ !! 75 pea %sp@(SWITCH_STACK_SIZE+4) | pt_regs pointer 654 .endm !! 76 jbsr do_sigreturn >> 77 addql #8,%sp >> 78 RESTORE_SWITCH_STACK >> 79 rts >> 80 >> 81 ENTRY(sys_rt_sigreturn) >> 82 SAVE_SWITCH_STACK >> 83 movel %sp,%sp@- | switch_stack pointer >> 84 pea %sp@(SWITCH_STACK_SIZE+4) | pt_regs pointer >> 85 jbsr do_rt_sigreturn >> 86 addql #8,%sp >> 87 RESTORE_SWITCH_STACK >> 88 rts >> 89 >> 90 ENTRY(buserr) >> 91 SAVE_ALL_INT >> 92 GET_CURRENT(%d0) >> 93 movel %sp,%sp@- | stack frame pointer argument >> 94 jbsr buserr_c >> 95 addql #4,%sp >> 96 jra ret_from_exception >> 97 >> 98 ENTRY(trap) >> 99 SAVE_ALL_INT >> 100 GET_CURRENT(%d0) >> 101 movel %sp,%sp@- | stack frame pointer argument >> 102 jbsr trap_c >> 103 addql #4,%sp >> 104 jra ret_from_exception >> 105 >> 106 | After a fork we jump here directly from resume, >> 107 | so that %d1 contains the previous task >> 108 | schedule_tail now used regardless of CONFIG_SMP >> 109 ENTRY(ret_from_fork) >> 110 movel %d1,%sp@- >> 111 jsr schedule_tail >> 112 addql #4,%sp >> 113 jra ret_from_exception >> 114 >> 115 ENTRY(ret_from_kernel_thread) >> 116 | a3 contains the kernel thread payload, d7 - its argument >> 117 movel %d1,%sp@- >> 118 jsr schedule_tail >> 119 movel %d7,(%sp) >> 120 jsr %a3@ >> 121 addql #4,%sp >> 122 jra ret_from_exception >> 123 >> 124 #if defined(CONFIG_COLDFIRE) || !defined(CONFIG_MMU) >> 125 >> 126 #ifdef TRAP_DBG_INTERRUPT >> 127 >> 128 .globl dbginterrupt >> 129 ENTRY(dbginterrupt) >> 130 SAVE_ALL_INT >> 131 GET_CURRENT(%d0) >> 132 movel %sp,%sp@- /* stack frame pointer argument */ >> 133 jsr dbginterrupt_c >> 134 addql #4,%sp >> 135 jra ret_from_exception >> 136 #endif >> 137 >> 138 ENTRY(reschedule) >> 139 /* save top of frame */ >> 140 pea %sp@ >> 141 jbsr set_esp0 >> 142 addql #4,%sp >> 143 pea ret_from_exception >> 144 jmp schedule >> 145 >> 146 ENTRY(ret_from_user_signal) >> 147 moveq #__NR_sigreturn,%d0 >> 148 trap #0 >> 149 >> 150 ENTRY(ret_from_user_rt_signal) >> 151 movel #__NR_rt_sigreturn,%d0 >> 152 trap #0 655 153 656 .macro tramp_data_read_var << 657 #ifdef CONFIG_RELOCATABLE << 658 ldr \dst, .L__tramp_data_\ << 659 .ifndef .L__tramp_data_\var << 660 .pushsection ".entry.tramp.rodata", << 661 .align 3 << 662 .L__tramp_data_\var: << 663 .quad \var << 664 .popsection << 665 .endif << 666 #else 154 #else 667 /* << 668 * As !RELOCATABLE implies !RANDOMIZE_ << 669 * compile time constant (and hence no << 670 * << 671 * As statically allocated kernel code << 672 * 47 bits of the address space we can << 673 * instruction to load the upper 16 bi << 674 */ << 675 movz \dst, :abs_g2_s:\var << 676 movk \dst, :abs_g1_nc:\var << 677 movk \dst, :abs_g0_nc:\var << 678 #endif << 679 .endm << 680 << 681 #define BHB_MITIGATION_NONE 0 << 682 #define BHB_MITIGATION_LOOP 1 << 683 #define BHB_MITIGATION_FW 2 << 684 #define BHB_MITIGATION_INSN 3 << 685 155 686 .macro tramp_ventry, vector_start, reg !! 156 do_trace_entry: 687 .align 7 !! 157 movel #-ENOSYS,%sp@(PT_OFF_D0)| needed for strace >> 158 subql #4,%sp >> 159 SAVE_SWITCH_STACK >> 160 jbsr syscall_trace >> 161 RESTORE_SWITCH_STACK >> 162 addql #4,%sp >> 163 movel %sp@(PT_OFF_ORIG_D0),%d0 >> 164 cmpl #NR_syscalls,%d0 >> 165 jcs syscall >> 166 badsys: >> 167 movel #-ENOSYS,%sp@(PT_OFF_D0) >> 168 jra ret_from_syscall >> 169 >> 170 do_trace_exit: >> 171 subql #4,%sp >> 172 SAVE_SWITCH_STACK >> 173 jbsr syscall_trace >> 174 RESTORE_SWITCH_STACK >> 175 addql #4,%sp >> 176 jra .Lret_from_exception >> 177 >> 178 ENTRY(ret_from_signal) >> 179 movel %curptr@(TASK_STACK),%a1 >> 180 tstb %a1@(TINFO_FLAGS+2) >> 181 jge 1f >> 182 jbsr syscall_trace >> 183 1: RESTORE_SWITCH_STACK >> 184 addql #4,%sp >> 185 /* on 68040 complete pending writebacks if any */ >> 186 #ifdef CONFIG_M68040 >> 187 bfextu %sp@(PT_OFF_FORMATVEC){#0,#4},%d0 >> 188 subql #7,%d0 | bus error frame ? >> 189 jbne 1f >> 190 movel %sp,%sp@- >> 191 jbsr berr_040cleanup >> 192 addql #4,%sp 688 1: 193 1: 689 .if \regsize == 64 << 690 msr tpidrro_el0, x30 // Res << 691 .endif << 692 << 693 .if \bhb == BHB_MITIGATION_LOOP << 694 /* << 695 * This sequence must appear before th << 696 * ret out of tramp_ventry. It appears << 697 */ << 698 __mitigate_spectre_bhb_loop x30 << 699 .endif // \bhb == BHB_MITIGATION_LOOP << 700 << 701 .if \bhb == BHB_MITIGATION_INSN << 702 clearbhb << 703 isb << 704 .endif // \bhb == BHB_MITIGATION_INSN << 705 << 706 .if \kpti == 1 << 707 /* << 708 * Defend against branch aliasing atta << 709 * entry onto the return stack and usi << 710 * enter the full-fat kernel vectors. << 711 */ << 712 bl 2f << 713 b . << 714 2: << 715 tramp_map_kernel x30 << 716 alternative_insn isb, nop, ARM64_WORKAROUND_QC << 717 tramp_data_read_var x30, vectors << 718 alternative_if_not ARM64_WORKAROUND_CAVIUM_TX2 << 719 prfm plil1strm, [x30, #(1b - \vecto << 720 alternative_else_nop_endif << 721 << 722 msr vbar_el1, x30 << 723 isb << 724 .else << 725 adr_l x30, vectors << 726 .endif // \kpti == 1 << 727 << 728 .if \bhb == BHB_MITIGATION_FW << 729 /* << 730 * The firmware sequence must appear b << 731 * i.e. the ret out of tramp_ventry. B << 732 * mapped to save/restore the register << 733 */ << 734 __mitigate_spectre_bhb_fw << 735 .endif // \bhb == BHB_MITIGATION_FW << 736 << 737 add x30, x30, #(1b - \vector_start << 738 ret << 739 .org 1b + 128 // Did we overflow the ventry << 740 .endm << 741 << 742 .macro generate_tramp_vector, kpti, << 743 .Lvector_start\@: << 744 .space 0x400 << 745 << 746 .rept 4 << 747 tramp_ventry .Lvector_start\@, 64, << 748 .endr << 749 .rept 4 << 750 tramp_ventry .Lvector_start\@, 32, << 751 .endr << 752 .endm << 753 << 754 #ifdef CONFIG_UNMAP_KERNEL_AT_EL0 << 755 /* << 756 * Exception vectors trampoline. << 757 * The order must match __bp_harden_el1_vector << 758 * arm64_bp_harden_el1_vectors enum. << 759 */ << 760 .pushsection ".entry.tramp.text", "ax" << 761 .align 11 << 762 SYM_CODE_START_LOCAL_NOALIGN(tramp_vectors) << 763 #ifdef CONFIG_MITIGATE_SPECTRE_BRANCH_HISTORY << 764 generate_tramp_vector kpti=1, bhb=BH << 765 generate_tramp_vector kpti=1, bhb=BH << 766 generate_tramp_vector kpti=1, bhb=BH << 767 #endif /* CONFIG_MITIGATE_SPECTRE_BRANCH_HISTO << 768 generate_tramp_vector kpti=1, bhb=BH << 769 SYM_CODE_END(tramp_vectors) << 770 << 771 SYM_CODE_START_LOCAL(tramp_exit) << 772 tramp_unmap_kernel x29 << 773 mrs x29, far_el1 << 774 eret << 775 sb << 776 SYM_CODE_END(tramp_exit) << 777 .popsection << 778 #endif /* CONFIG_UNMAP_KERNEL_AT_EL0 */ << 779 << 780 /* << 781 * Exception vectors for spectre mitigations o << 782 * kpti is not in use. << 783 */ << 784 .macro generate_el1_vector, bhb << 785 .Lvector_start\@: << 786 kernel_ventry 1, t, 64, sync << 787 kernel_ventry 1, t, 64, irq << 788 kernel_ventry 1, t, 64, fiq << 789 kernel_ventry 1, t, 64, error << 790 << 791 kernel_ventry 1, h, 64, sync << 792 kernel_ventry 1, h, 64, irq << 793 kernel_ventry 1, h, 64, fiq << 794 kernel_ventry 1, h, 64, error << 795 << 796 .rept 4 << 797 tramp_ventry .Lvector_start\@, 64, << 798 .endr << 799 .rept 4 << 800 tramp_ventry .Lvector_start\@, 32, << 801 .endr << 802 .endm << 803 << 804 /* The order must match tramp_vecs and the arm << 805 .pushsection ".entry.text", "ax" << 806 .align 11 << 807 SYM_CODE_START(__bp_harden_el1_vectors) << 808 #ifdef CONFIG_MITIGATE_SPECTRE_BRANCH_HISTORY << 809 generate_el1_vector bhb=BHB_MITIGA << 810 generate_el1_vector bhb=BHB_MITIGA << 811 generate_el1_vector bhb=BHB_MITIGA << 812 #endif /* CONFIG_MITIGATE_SPECTRE_BRANCH_HISTO << 813 SYM_CODE_END(__bp_harden_el1_vectors) << 814 .popsection << 815 << 816 << 817 /* << 818 * Register switch for AArch64. The callee-sav << 819 * and restored. On entry: << 820 * x0 = previous task_struct (must be preser << 821 * x1 = next task_struct << 822 * Previous and next are guaranteed not to be << 823 * << 824 */ << 825 SYM_FUNC_START(cpu_switch_to) << 826 mov x10, #THREAD_CPU_CONTEXT << 827 add x8, x0, x10 << 828 mov x9, sp << 829 stp x19, x20, [x8], #16 << 830 stp x21, x22, [x8], #16 << 831 stp x23, x24, [x8], #16 << 832 stp x25, x26, [x8], #16 << 833 stp x27, x28, [x8], #16 << 834 stp x29, x9, [x8], #16 << 835 str lr, [x8] << 836 add x8, x1, x10 << 837 ldp x19, x20, [x8], #16 << 838 ldp x21, x22, [x8], #16 << 839 ldp x23, x24, [x8], #16 << 840 ldp x25, x26, [x8], #16 << 841 ldp x27, x28, [x8], #16 << 842 ldp x29, x9, [x8], #16 << 843 ldr lr, [x8] << 844 mov sp, x9 << 845 msr sp_el0, x1 << 846 ptrauth_keys_install_kernel x1, x8, x9 << 847 scs_save x0 << 848 scs_load_current << 849 ret << 850 SYM_FUNC_END(cpu_switch_to) << 851 NOKPROBE(cpu_switch_to) << 852 << 853 /* << 854 * This is how we return from a fork. << 855 */ << 856 SYM_CODE_START(ret_from_fork) << 857 bl schedule_tail << 858 cbz x19, 1f << 859 mov x0, x20 << 860 blr x19 << 861 1: get_current_task tsk << 862 mov x0, sp << 863 bl asm_exit_to_user_mode << 864 b ret_to_user << 865 SYM_CODE_END(ret_from_fork) << 866 NOKPROBE(ret_from_fork) << 867 << 868 /* << 869 * void call_on_irq_stack(struct pt_regs *regs << 870 * void (*func)(struct << 871 * << 872 * Calls func(regs) using this CPU's irq stack << 873 */ << 874 SYM_FUNC_START(call_on_irq_stack) << 875 #ifdef CONFIG_SHADOW_CALL_STACK << 876 get_current_task x16 << 877 scs_save x16 << 878 ldr_this_cpu scs_sp, irq_shadow_call_s << 879 #endif 194 #endif >> 195 jra .Lret_from_exception 880 196 881 /* Create a frame record to save our L !! 197 ENTRY(system_call) 882 stp x29, x30, [sp, #-16]! !! 198 SAVE_ALL_SYS 883 mov x29, sp << 884 << 885 ldr_this_cpu x16, irq_stack_ptr, x17 << 886 << 887 /* Move to the new stack and call the << 888 add sp, x16, #IRQ_STACK_SIZE << 889 blr x1 << 890 199 891 /* !! 200 GET_CURRENT(%d1) 892 * Restore the SP from the FP, and res !! 201 movel %d1,%a1 893 * record. << 894 */ << 895 mov sp, x29 << 896 ldp x29, x30, [sp], #16 << 897 scs_load_current << 898 ret << 899 SYM_FUNC_END(call_on_irq_stack) << 900 NOKPROBE(call_on_irq_stack) << 901 << 902 #ifdef CONFIG_ARM_SDE_INTERFACE << 903 << 904 #include <asm/sdei.h> << 905 #include <uapi/linux/arm_sdei.h> << 906 << 907 .macro sdei_handler_exit exit_mode << 908 /* On success, this call never returns << 909 cmp \exit_mode, #SDEI_EXIT_SMC << 910 b.ne 99f << 911 smc #0 << 912 b . << 913 99: hvc #0 << 914 b . << 915 .endm << 916 202 917 #ifdef CONFIG_UNMAP_KERNEL_AT_EL0 !! 203 | save top of frame 918 /* !! 204 movel %sp,%curptr@(TASK_THREAD+THREAD_ESP0) 919 * The regular SDEI entry point may have been !! 205 920 * the kernel. This trampoline restores the ke !! 206 | syscall trace? 921 * argument accessible. !! 207 tstb %a1@(TINFO_FLAGS+2) 922 * !! 208 jmi do_trace_entry 923 * This clobbers x4, __sdei_handler() will res !! 209 cmpl #NR_syscalls,%d0 924 * copy. !! 210 jcc badsys 925 */ !! 211 syscall: 926 .pushsection ".entry.tramp.text", "ax" !! 212 jbsr @(sys_call_table,%d0:l:4)@(0) 927 SYM_CODE_START(__sdei_asm_entry_trampoline) !! 213 movel %d0,%sp@(PT_OFF_D0) | save the return value 928 mrs x4, ttbr1_el1 !! 214 ret_from_syscall: 929 tbz x4, #USER_ASID_BIT, 1f !! 215 |oriw #0x0700,%sr 930 !! 216 movel %curptr@(TASK_STACK),%a1 931 tramp_map_kernel tmp=x4 !! 217 movew %a1@(TINFO_FLAGS+2),%d0 932 isb !! 218 jne syscall_exit_work 933 mov x4, xzr !! 219 1: RESTORE_ALL >> 220 >> 221 syscall_exit_work: >> 222 btst #5,%sp@(PT_OFF_SR) | check if returning to kernel >> 223 bnes 1b | if so, skip resched, signals >> 224 lslw #1,%d0 >> 225 jcs do_trace_exit >> 226 jmi do_delayed_trace >> 227 lslw #8,%d0 >> 228 jne do_signal_return >> 229 pea resume_userspace >> 230 jra schedule >> 231 >> 232 >> 233 ENTRY(ret_from_exception) >> 234 .Lret_from_exception: >> 235 btst #5,%sp@(PT_OFF_SR) | check if returning to kernel >> 236 bnes 1f | if so, skip resched, signals >> 237 | only allow interrupts when we are really the last one on the >> 238 | kernel stack, otherwise stack overflow can occur during >> 239 | heavy interrupt load >> 240 andw #ALLOWINT,%sr >> 241 >> 242 resume_userspace: >> 243 movel %curptr@(TASK_STACK),%a1 >> 244 moveb %a1@(TINFO_FLAGS+3),%d0 >> 245 jne exit_work >> 246 1: RESTORE_ALL >> 247 >> 248 exit_work: >> 249 | save top of frame >> 250 movel %sp,%curptr@(TASK_THREAD+THREAD_ESP0) >> 251 lslb #1,%d0 >> 252 jne do_signal_return >> 253 pea resume_userspace >> 254 jra schedule >> 255 >> 256 >> 257 do_signal_return: >> 258 |andw #ALLOWINT,%sr >> 259 subql #4,%sp | dummy return address >> 260 SAVE_SWITCH_STACK >> 261 pea %sp@(SWITCH_STACK_SIZE) >> 262 bsrl do_notify_resume >> 263 addql #4,%sp >> 264 RESTORE_SWITCH_STACK >> 265 addql #4,%sp >> 266 jbra resume_userspace >> 267 >> 268 do_delayed_trace: >> 269 bclr #7,%sp@(PT_OFF_SR) | clear trace bit in SR >> 270 pea 1 | send SIGTRAP >> 271 movel %curptr,%sp@- >> 272 pea LSIGTRAP >> 273 jbsr send_sig >> 274 addql #8,%sp >> 275 addql #4,%sp >> 276 jbra resume_userspace >> 277 >> 278 >> 279 /* This is the main interrupt handler for autovector interrupts */ >> 280 >> 281 ENTRY(auto_inthandler) >> 282 SAVE_ALL_INT >> 283 GET_CURRENT(%d0) >> 284 | put exception # in d0 >> 285 bfextu %sp@(PT_OFF_FORMATVEC){#4,#10},%d0 >> 286 subw #VEC_SPUR,%d0 >> 287 >> 288 movel %sp,%sp@- >> 289 movel %d0,%sp@- | put vector # on stack >> 290 auto_irqhandler_fixup = . + 2 >> 291 jsr do_IRQ | process the IRQ >> 292 addql #8,%sp | pop parameters off stack >> 293 jra ret_from_exception >> 294 >> 295 /* Handler for user defined interrupt vectors */ >> 296 >> 297 ENTRY(user_inthandler) >> 298 SAVE_ALL_INT >> 299 GET_CURRENT(%d0) >> 300 | put exception # in d0 >> 301 bfextu %sp@(PT_OFF_FORMATVEC){#4,#10},%d0 >> 302 user_irqvec_fixup = . + 2 >> 303 subw #VEC_USER,%d0 >> 304 >> 305 movel %sp,%sp@- >> 306 movel %d0,%sp@- | put vector # on stack >> 307 jsr do_IRQ | process the IRQ >> 308 addql #8,%sp | pop parameters off stack >> 309 jra ret_from_exception >> 310 >> 311 /* Handler for uninitialized and spurious interrupts */ >> 312 >> 313 ENTRY(bad_inthandler) >> 314 SAVE_ALL_INT >> 315 GET_CURRENT(%d0) >> 316 >> 317 movel %sp,%sp@- >> 318 jsr handle_badint >> 319 addql #4,%sp >> 320 jra ret_from_exception >> 321 >> 322 resume: >> 323 /* >> 324 * Beware - when entering resume, prev (the current task) is >> 325 * in a0, next (the new task) is in a1,so don't change these >> 326 * registers until their contents are no longer needed. >> 327 */ >> 328 >> 329 /* save sr */ >> 330 movew %sr,%a0@(TASK_THREAD+THREAD_SR) >> 331 >> 332 /* save fs (sfc,%dfc) (may be pointing to kernel memory) */ >> 333 movec %sfc,%d0 >> 334 movew %d0,%a0@(TASK_THREAD+THREAD_FS) >> 335 >> 336 /* save usp */ >> 337 /* it is better to use a movel here instead of a movew 8*) */ >> 338 movec %usp,%d0 >> 339 movel %d0,%a0@(TASK_THREAD+THREAD_USP) >> 340 >> 341 /* save non-scratch registers on stack */ >> 342 SAVE_SWITCH_STACK >> 343 >> 344 /* save current kernel stack pointer */ >> 345 movel %sp,%a0@(TASK_THREAD+THREAD_KSP) >> 346 >> 347 /* save floating point context */ >> 348 #ifndef CONFIG_M68KFPU_EMU_ONLY >> 349 #ifdef CONFIG_M68KFPU_EMU >> 350 tstl m68k_fputype >> 351 jeq 3f >> 352 #endif >> 353 fsave %a0@(TASK_THREAD+THREAD_FPSTATE) >> 354 >> 355 #if defined(CONFIG_M68060) >> 356 #if !defined(CPU_M68060_ONLY) >> 357 btst #3,m68k_cputype+3 >> 358 beqs 1f >> 359 #endif >> 360 /* The 060 FPU keeps status in bits 15-8 of the first longword */ >> 361 tstb %a0@(TASK_THREAD+THREAD_FPSTATE+2) >> 362 jeq 3f >> 363 #if !defined(CPU_M68060_ONLY) >> 364 jra 2f >> 365 #endif >> 366 #endif /* CONFIG_M68060 */ >> 367 #if !defined(CPU_M68060_ONLY) >> 368 1: tstb %a0@(TASK_THREAD+THREAD_FPSTATE) >> 369 jeq 3f >> 370 #endif >> 371 2: fmovemx %fp0-%fp7,%a0@(TASK_THREAD+THREAD_FPREG) >> 372 fmoveml %fpcr/%fpsr/%fpiar,%a0@(TASK_THREAD+THREAD_FPCNTL) >> 373 3: >> 374 #endif /* CONFIG_M68KFPU_EMU_ONLY */ >> 375 /* Return previous task in %d1 */ >> 376 movel %curptr,%d1 >> 377 >> 378 /* switch to new task (a1 contains new task) */ >> 379 movel %a1,%curptr >> 380 >> 381 /* restore floating point context */ >> 382 #ifndef CONFIG_M68KFPU_EMU_ONLY >> 383 #ifdef CONFIG_M68KFPU_EMU >> 384 tstl m68k_fputype >> 385 jeq 4f >> 386 #endif >> 387 #if defined(CONFIG_M68060) >> 388 #if !defined(CPU_M68060_ONLY) >> 389 btst #3,m68k_cputype+3 >> 390 beqs 1f >> 391 #endif >> 392 /* The 060 FPU keeps status in bits 15-8 of the first longword */ >> 393 tstb %a1@(TASK_THREAD+THREAD_FPSTATE+2) >> 394 jeq 3f >> 395 #if !defined(CPU_M68060_ONLY) >> 396 jra 2f >> 397 #endif >> 398 #endif /* CONFIG_M68060 */ >> 399 #if !defined(CPU_M68060_ONLY) >> 400 1: tstb %a1@(TASK_THREAD+THREAD_FPSTATE) >> 401 jeq 3f >> 402 #endif >> 403 2: fmovemx %a1@(TASK_THREAD+THREAD_FPREG),%fp0-%fp7 >> 404 fmoveml %a1@(TASK_THREAD+THREAD_FPCNTL),%fpcr/%fpsr/%fpiar >> 405 3: frestore %a1@(TASK_THREAD+THREAD_FPSTATE) >> 406 4: >> 407 #endif /* CONFIG_M68KFPU_EMU_ONLY */ 934 408 935 /* !! 409 /* restore the kernel stack pointer */ 936 * Remember whether to unmap the kerne !! 410 movel %a1@(TASK_THREAD+THREAD_KSP),%sp 937 */ << 938 1: str x4, [x1, #(SDEI_EVENT_INTREGS << 939 tramp_data_read_var x4, __sdei_asm << 940 br x4 << 941 SYM_CODE_END(__sdei_asm_entry_trampoline) << 942 NOKPROBE(__sdei_asm_entry_trampoline) << 943 411 944 /* !! 412 /* restore non-scratch registers */ 945 * Make the exit call and restore the original !! 413 RESTORE_SWITCH_STACK 946 * << 947 * x0 & x1: setup for the exit API call << 948 * x2: exit_mode << 949 * x4: struct sdei_registered_event argument f << 950 */ << 951 SYM_CODE_START(__sdei_asm_exit_trampoline) << 952 ldr x4, [x4, #(SDEI_EVENT_INTREGS << 953 cbnz x4, 1f << 954 << 955 tramp_unmap_kernel tmp=x4 << 956 << 957 1: sdei_handler_exit exit_mode=x2 << 958 SYM_CODE_END(__sdei_asm_exit_trampoline) << 959 NOKPROBE(__sdei_asm_exit_trampoline) << 960 .popsection // .entry.tramp.text << 961 #endif /* CONFIG_UNMAP_KERNEL_AT_EL0 */ << 962 414 963 /* !! 415 /* restore user stack pointer */ 964 * Software Delegated Exception entry point. !! 416 movel %a1@(TASK_THREAD+THREAD_USP),%a0 965 * !! 417 movel %a0,%usp 966 * x0: Event number << 967 * x1: struct sdei_registered_event argument f << 968 * x2: interrupted PC << 969 * x3: interrupted PSTATE << 970 * x4: maybe clobbered by the trampoline << 971 * << 972 * Firmware has preserved x0->x17 for us, we m << 973 * follow SMC-CC. We save (or retrieve) all th << 974 * want them. << 975 */ << 976 SYM_CODE_START(__sdei_asm_handler) << 977 stp x2, x3, [x1, #SDEI_EVENT_INTRE << 978 stp x4, x5, [x1, #SDEI_EVENT_INTRE << 979 stp x6, x7, [x1, #SDEI_EVENT_INTRE << 980 stp x8, x9, [x1, #SDEI_EVENT_INTRE << 981 stp x10, x11, [x1, #SDEI_EVENT_INT << 982 stp x12, x13, [x1, #SDEI_EVENT_INT << 983 stp x14, x15, [x1, #SDEI_EVENT_INT << 984 stp x16, x17, [x1, #SDEI_EVENT_INT << 985 stp x18, x19, [x1, #SDEI_EVENT_INT << 986 stp x20, x21, [x1, #SDEI_EVENT_INT << 987 stp x22, x23, [x1, #SDEI_EVENT_INT << 988 stp x24, x25, [x1, #SDEI_EVENT_INT << 989 stp x26, x27, [x1, #SDEI_EVENT_INT << 990 stp x28, x29, [x1, #SDEI_EVENT_INT << 991 mov x4, sp << 992 stp lr, x4, [x1, #SDEI_EVENT_INTRE << 993 << 994 mov x19, x1 << 995 << 996 /* Store the registered-event for cras << 997 ldrb w4, [x19, #SDEI_EVENT_PRIORITY << 998 cbnz w4, 1f << 999 adr_this_cpu dst=x5, sym=sdei_active_n << 1000 b 2f << 1001 1: adr_this_cpu dst=x5, sym=sdei_active_ << 1002 2: str x19, [x5] << 1003 418 1004 #ifdef CONFIG_VMAP_STACK !! 419 /* restore fs (sfc,%dfc) */ 1005 /* !! 420 movew %a1@(TASK_THREAD+THREAD_FS),%a0 1006 * entry.S may have been using sp as !! 421 movec %a0,%sfc 1007 * this is a normal or critical event !! 422 movec %a0,%dfc 1008 * stack for this CPU. << 1009 */ << 1010 cbnz w4, 1f << 1011 ldr_this_cpu dst=x5, sym=sdei_stack_n << 1012 b 2f << 1013 1: ldr_this_cpu dst=x5, sym=sdei_stack_c << 1014 2: mov x6, #SDEI_STACK_SIZE << 1015 add x5, x5, x6 << 1016 mov sp, x5 << 1017 #endif << 1018 423 1019 #ifdef CONFIG_SHADOW_CALL_STACK !! 424 /* restore status register */ 1020 /* Use a separate shadow call stack f !! 425 movew %a1@(TASK_THREAD+THREAD_SR),%sr 1021 cbnz w4, 3f << 1022 ldr_this_cpu dst=scs_sp, sym=sdei_sha << 1023 b 4f << 1024 3: ldr_this_cpu dst=scs_sp, sym=sdei_sha << 1025 4: << 1026 #endif << 1027 426 1028 /* !! 427 rts 1029 * We may have interrupted userspace, << 1030 * return-to either of these. We can' << 1031 */ << 1032 mrs x28, sp_el0 << 1033 ldr_this_cpu dst=x0, sym=__entry_t << 1034 msr sp_el0, x0 << 1035 << 1036 /* If we interrupted the kernel point << 1037 and x0, x3, #0xc << 1038 mrs x1, CurrentEL << 1039 cmp x0, x1 << 1040 csel x29, x29, xzr, eq // fp << 1041 csel x4, x2, xzr, eq // el << 1042 << 1043 stp x29, x4, [sp, #-16]! << 1044 mov x29, sp << 1045 << 1046 add x0, x19, #SDEI_EVENT_INTREGS << 1047 mov x1, x19 << 1048 bl __sdei_handler << 1049 << 1050 msr sp_el0, x28 << 1051 /* restore regs >x17 that we clobbere << 1052 mov x4, x19 // keep x4 fo << 1053 ldp x28, x29, [x4, #SDEI_EVENT_IN << 1054 ldp x18, x19, [x4, #SDEI_EVENT_IN << 1055 ldp lr, x1, [x4, #SDEI_EVENT_INTR << 1056 mov sp, x1 << 1057 << 1058 mov x1, x0 // ad << 1059 /* x0 = (x0 <= SDEI_EV_FAILED) ? << 1060 * EVENT_COMPLETE:EVENT_COMPLETE_AND_ << 1061 */ << 1062 cmp x0, #SDEI_EV_FAILED << 1063 mov_q x2, SDEI_1_0_FN_SDEI_EVENT_CO << 1064 mov_q x3, SDEI_1_0_FN_SDEI_EVENT_CO << 1065 csel x0, x2, x3, ls << 1066 << 1067 ldr_l x2, sdei_exit_mode << 1068 << 1069 /* Clear the registered-event seen by << 1070 ldrb w3, [x4, #SDEI_EVENT_PRIORITY << 1071 cbnz w3, 1f << 1072 adr_this_cpu dst=x5, sym=sdei_active_ << 1073 b 2f << 1074 1: adr_this_cpu dst=x5, sym=sdei_active_ << 1075 2: str xzr, [x5] << 1076 << 1077 alternative_if_not ARM64_UNMAP_KERNEL_AT_EL0 << 1078 sdei_handler_exit exit_mode=x2 << 1079 alternative_else_nop_endif << 1080 << 1081 #ifdef CONFIG_UNMAP_KERNEL_AT_EL0 << 1082 tramp_alias dst=x5, sym=__sdei_as << 1083 br x5 << 1084 #endif << 1085 SYM_CODE_END(__sdei_asm_handler) << 1086 NOKPROBE(__sdei_asm_handler) << 1087 428 1088 SYM_CODE_START(__sdei_handler_abort) !! 429 #endif /* CONFIG_MMU && !CONFIG_COLDFIRE */ 1089 mov_q x0, SDEI_1_0_FN_SDEI_EVENT_CO << 1090 adr x1, 1f << 1091 ldr_l x2, sdei_exit_mode << 1092 sdei_handler_exit exit_mode=x2 << 1093 // exit the handler and jump to the n << 1094 // Exit will stomp x0-x17, PSTATE, EL << 1095 1: ret << 1096 SYM_CODE_END(__sdei_handler_abort) << 1097 NOKPROBE(__sdei_handler_abort) << 1098 #endif /* CONFIG_ARM_SDE_INTERFACE */ <<
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.