1 /* SPDX-License-Identifier: GPL-2.0-only */ !! 1 /* -*- mode: asm -*- 2 /* !! 2 * 3 * Low-level exception handling code !! 3 * linux/arch/m68k/kernel/entry.S >> 4 * >> 5 * Copyright (C) 1991, 1992 Linus Torvalds >> 6 * >> 7 * This file is subject to the terms and conditions of the GNU General Public >> 8 * License. See the file README.legal in the main directory of this archive >> 9 * for more details. >> 10 * >> 11 * Linux/m68k support by Hamish Macdonald >> 12 * >> 13 * 68060 fixes by Jesper Skov 4 * 14 * 5 * Copyright (C) 2012 ARM Ltd. << 6 * Authors: Catalin Marinas <catalin.marina << 7 * Will Deacon <will.deacon@arm.co << 8 */ 15 */ 9 16 10 #include <linux/arm-smccc.h> << 11 #include <linux/init.h> << 12 #include <linux/linkage.h> << 13 << 14 #include <asm/alternative.h> << 15 #include <asm/assembler.h> << 16 #include <asm/asm-offsets.h> << 17 #include <asm/asm_pointer_auth.h> << 18 #include <asm/bug.h> << 19 #include <asm/cpufeature.h> << 20 #include <asm/errno.h> << 21 #include <asm/esr.h> << 22 #include <asm/irq.h> << 23 #include <asm/memory.h> << 24 #include <asm/mmu.h> << 25 #include <asm/processor.h> << 26 #include <asm/ptrace.h> << 27 #include <asm/scs.h> << 28 #include <asm/thread_info.h> << 29 #include <asm/asm-uaccess.h> << 30 #include <asm/unistd.h> << 31 << 32 .macro clear_gp_regs << 33 .irp n,0,1,2,3,4,5,6,7,8,9,10,11,12 << 34 mov x\n, xzr << 35 .endr << 36 .endm << 37 << 38 .macro kernel_ventry, el:req, ht:req, << 39 .align 7 << 40 .Lventry_start\@: << 41 .if \el == 0 << 42 /* << 43 * This must be the first instruction << 44 * skipped by the trampoline vectors, << 45 */ << 46 b .Lskip_tramp_vectors_cleanup\@ << 47 .if \regsize == 64 << 48 mrs x30, tpidrro_el0 << 49 msr tpidrro_el0, xzr << 50 .else << 51 mov x30, xzr << 52 .endif << 53 .Lskip_tramp_vectors_cleanup\@: << 54 .endif << 55 << 56 sub sp, sp, #PT_REGS_SIZE << 57 #ifdef CONFIG_VMAP_STACK << 58 /* << 59 * Test whether the SP has overflowed, << 60 * Task and IRQ stacks are aligned so << 61 * should always be zero. << 62 */ << 63 add sp, sp, x0 << 64 sub x0, sp, x0 << 65 tbnz x0, #THREAD_SHIFT, 0f << 66 sub x0, sp, x0 << 67 sub sp, sp, x0 << 68 b el\el\ht\()_\regsize\()_\label << 69 << 70 0: << 71 /* << 72 * Either we've just detected an overf << 73 * while on the overflow stack. Either << 74 * userspace, and can clobber EL0 regi << 75 */ << 76 << 77 /* Stash the original SP (minus PT_REG << 78 msr tpidr_el0, x0 << 79 << 80 /* Recover the original x0 value and s << 81 sub x0, sp, x0 << 82 msr tpidrro_el0, x0 << 83 << 84 /* Switch to the overflow stack */ << 85 adr_this_cpu sp, overflow_stack + OVER << 86 << 87 /* << 88 * Check whether we were already on th << 89 * after panic() re-enables interrupts << 90 */ << 91 mrs x0, tpidr_el0 << 92 sub x0, sp, x0 << 93 tst x0, #~(OVERFLOW_STACK_SIZE - 1 << 94 b.ne __bad_stack << 95 << 96 /* We were already on the overflow sta << 97 sub sp, sp, x0 << 98 mrs x0, tpidrro_el0 << 99 #endif << 100 b el\el\ht\()_\regsize\()_\label << 101 .org .Lventry_start\@ + 128 // Did we over << 102 .endm << 103 << 104 .macro tramp_alias, dst, sym << 105 .set .Lalias\@, TRAMP_VALIAS + \sym << 106 movz \dst, :abs_g2_s:.Lalias\@ << 107 movk \dst, :abs_g1_nc:.Lalias\@ << 108 movk \dst, :abs_g0_nc:.Lalias\@ << 109 .endm << 110 << 111 /* << 112 * This macro corrupts x0-x3. It is th << 113 * them if required. << 114 */ << 115 .macro apply_ssbd, state, tmp1, tmp2 << 116 alternative_cb ARM64_ALWAYS_SYSTEM, spectre_v << 117 b .L__asm_ssbd_skip\@ << 118 alternative_cb_end << 119 ldr_this_cpu \tmp2, arm64_ssbd_call << 120 cbz \tmp2, .L__asm_ssbd_skip\@ << 121 ldr \tmp2, [tsk, #TSK_TI_FLAGS] << 122 tbnz \tmp2, #TIF_SSBD, .L__asm_ssbd << 123 mov w0, #ARM_SMCCC_ARCH_WORKAROUND << 124 mov w1, #\state << 125 alternative_cb ARM64_ALWAYS_SYSTEM, smccc_pat << 126 nop << 127 alternative_cb_end << 128 .L__asm_ssbd_skip\@: << 129 .endm << 130 << 131 /* Check for MTE asynchronous tag chec << 132 .macro check_mte_async_tcf, tmp, ti_fl << 133 #ifdef CONFIG_ARM64_MTE << 134 .arch_extension lse << 135 alternative_if_not ARM64_MTE << 136 b 1f << 137 alternative_else_nop_endif << 138 /* << 139 * Asynchronous tag check faults are o << 140 * ASYM (3) modes. In each of these mo << 141 * set, so skip the check if it is uns << 142 */ << 143 tbz \thread_sctlr, #(SCTLR_EL1_TCF << 144 mrs_s \tmp, SYS_TFSRE0_EL1 << 145 tbz \tmp, #SYS_TFSR_EL1_TF0_SHIFT, << 146 /* Asynchronous TCF occurred for TTBR0 << 147 mov \tmp, #_TIF_MTE_ASYNC_FAULT << 148 add \ti_flags, tsk, #TSK_TI_FLAGS << 149 stset \tmp, [\ti_flags] << 150 1: << 151 #endif << 152 .endm << 153 << 154 /* Clear the MTE asynchronous tag chec << 155 .macro clear_mte_async_tcf thread_sctl << 156 #ifdef CONFIG_ARM64_MTE << 157 alternative_if ARM64_MTE << 158 /* See comment in check_mte_async_tcf << 159 tbz \thread_sctlr, #(SCTLR_EL1_TCF << 160 dsb ish << 161 msr_s SYS_TFSRE0_EL1, xzr << 162 1: << 163 alternative_else_nop_endif << 164 #endif << 165 .endm << 166 << 167 .macro mte_set_gcr, mte_ctrl, tmp << 168 #ifdef CONFIG_ARM64_MTE << 169 ubfx \tmp, \mte_ctrl, #MTE_CTRL_GCR << 170 orr \tmp, \tmp, #SYS_GCR_EL1_RRND << 171 msr_s SYS_GCR_EL1, \tmp << 172 #endif << 173 .endm << 174 << 175 .macro mte_set_kernel_gcr, tmp, tmp2 << 176 #ifdef CONFIG_KASAN_HW_TAGS << 177 alternative_cb ARM64_ALWAYS_SYSTEM, kasan_hw_ << 178 b 1f << 179 alternative_cb_end << 180 mov \tmp, KERNEL_GCR_EL1 << 181 msr_s SYS_GCR_EL1, \tmp << 182 1: << 183 #endif << 184 .endm << 185 << 186 .macro mte_set_user_gcr, tsk, tmp, tmp << 187 #ifdef CONFIG_KASAN_HW_TAGS << 188 alternative_cb ARM64_ALWAYS_SYSTEM, kasan_hw_ << 189 b 1f << 190 alternative_cb_end << 191 ldr \tmp, [\tsk, #THREAD_MTE_CTRL] << 192 << 193 mte_set_gcr \tmp, \tmp2 << 194 1: << 195 #endif << 196 .endm << 197 << 198 .macro kernel_entry, el, regsize = 64 << 199 .if \el == 0 << 200 alternative_insn nop, SET_PSTATE_DIT(1 << 201 .endif << 202 .if \regsize == 32 << 203 mov w0, w0 << 204 .endif << 205 stp x0, x1, [sp, #16 * 0] << 206 stp x2, x3, [sp, #16 * 1] << 207 stp x4, x5, [sp, #16 * 2] << 208 stp x6, x7, [sp, #16 * 3] << 209 stp x8, x9, [sp, #16 * 4] << 210 stp x10, x11, [sp, #16 * 5] << 211 stp x12, x13, [sp, #16 * 6] << 212 stp x14, x15, [sp, #16 * 7] << 213 stp x16, x17, [sp, #16 * 8] << 214 stp x18, x19, [sp, #16 * 9] << 215 stp x20, x21, [sp, #16 * 10] << 216 stp x22, x23, [sp, #16 * 11] << 217 stp x24, x25, [sp, #16 * 12] << 218 stp x26, x27, [sp, #16 * 13] << 219 stp x28, x29, [sp, #16 * 14] << 220 << 221 .if \el == 0 << 222 clear_gp_regs << 223 mrs x21, sp_el0 << 224 ldr_this_cpu tsk, __entry_task, x20 << 225 msr sp_el0, tsk << 226 << 227 /* << 228 * Ensure MDSCR_EL1.SS is clear, since << 229 * when scheduling. << 230 */ << 231 ldr x19, [tsk, #TSK_TI_FLAGS] << 232 disable_step_tsk x19, x20 << 233 << 234 /* Check for asynchronous tag check fa << 235 ldr x0, [tsk, THREAD_SCTLR_USER] << 236 check_mte_async_tcf x22, x23, x0 << 237 << 238 #ifdef CONFIG_ARM64_PTR_AUTH << 239 alternative_if ARM64_HAS_ADDRESS_AUTH << 240 /* << 241 * Enable IA for in-kernel PAC if the << 242 * this could be implemented with an u << 243 * a load, this was measured to be slo << 244 * << 245 * Install the kernel IA key only if I << 246 * was disabled on kernel exit then we << 247 * installed so there is no need to in << 248 */ << 249 tbz x0, SCTLR_ELx_ENIA_SHIFT, 1f << 250 __ptrauth_keys_install_kernel_nosync t << 251 b 2f << 252 1: << 253 mrs x0, sctlr_el1 << 254 orr x0, x0, SCTLR_ELx_ENIA << 255 msr sctlr_el1, x0 << 256 2: << 257 alternative_else_nop_endif << 258 #endif << 259 << 260 apply_ssbd 1, x22, x23 << 261 << 262 mte_set_kernel_gcr x22, x23 << 263 << 264 /* << 265 * Any non-self-synchronizing system r << 266 * kernel entry should be placed befor << 267 */ << 268 alternative_if ARM64_MTE << 269 isb << 270 b 1f << 271 alternative_else_nop_endif << 272 alternative_if ARM64_HAS_ADDRESS_AUTH << 273 isb << 274 alternative_else_nop_endif << 275 1: << 276 << 277 scs_load_current << 278 .else << 279 add x21, sp, #PT_REGS_SIZE << 280 get_current_task tsk << 281 .endif /* \el == 0 */ << 282 mrs x22, elr_el1 << 283 mrs x23, spsr_el1 << 284 stp lr, x21, [sp, #S_LR] << 285 << 286 /* << 287 * For exceptions from EL0, create a f << 288 * For exceptions from EL1, create a s << 289 * interrupted code shows up in the ba << 290 */ << 291 .if \el == 0 << 292 stp xzr, xzr, [sp, #S_STACKFRAME] << 293 .else << 294 stp x29, x22, [sp, #S_STACKFRAME] << 295 .endif << 296 add x29, sp, #S_STACKFRAME << 297 << 298 #ifdef CONFIG_ARM64_SW_TTBR0_PAN << 299 alternative_if_not ARM64_HAS_PAN << 300 bl __swpan_entry_el\el << 301 alternative_else_nop_endif << 302 #endif << 303 << 304 stp x22, x23, [sp, #S_PC] << 305 << 306 /* Not in a syscall by default (el0_sv << 307 .if \el == 0 << 308 mov w21, #NO_SYSCALL << 309 str w21, [sp, #S_SYSCALLNO] << 310 .endif << 311 << 312 #ifdef CONFIG_ARM64_PSEUDO_NMI << 313 alternative_if_not ARM64_HAS_GIC_PRIO_MASKING << 314 b .Lskip_pmr_save\@ << 315 alternative_else_nop_endif << 316 << 317 mrs_s x20, SYS_ICC_PMR_EL1 << 318 str x20, [sp, #S_PMR_SAVE] << 319 mov x20, #GIC_PRIO_IRQON | GIC_PRI << 320 msr_s SYS_ICC_PMR_EL1, x20 << 321 << 322 .Lskip_pmr_save\@: << 323 #endif << 324 << 325 /* << 326 * Registers that may be useful after << 327 * << 328 * x20 - ICC_PMR_EL1 << 329 * x21 - aborted SP << 330 * x22 - aborted PC << 331 * x23 - aborted PSTATE << 332 */ << 333 .endm << 334 << 335 .macro kernel_exit, el << 336 .if \el != 0 << 337 disable_daif << 338 .endif << 339 << 340 #ifdef CONFIG_ARM64_PSEUDO_NMI << 341 alternative_if_not ARM64_HAS_GIC_PRIO_MASKING << 342 b .Lskip_pmr_restore\@ << 343 alternative_else_nop_endif << 344 << 345 ldr x20, [sp, #S_PMR_SAVE] << 346 msr_s SYS_ICC_PMR_EL1, x20 << 347 << 348 /* Ensure priority change is seen by r << 349 alternative_if_not ARM64_HAS_GIC_PRIO_RELAXED_ << 350 dsb sy << 351 alternative_else_nop_endif << 352 << 353 .Lskip_pmr_restore\@: << 354 #endif << 355 << 356 ldp x21, x22, [sp, #S_PC] << 357 << 358 #ifdef CONFIG_ARM64_SW_TTBR0_PAN << 359 alternative_if_not ARM64_HAS_PAN << 360 bl __swpan_exit_el\el << 361 alternative_else_nop_endif << 362 #endif << 363 << 364 .if \el == 0 << 365 ldr x23, [sp, #S_SP] << 366 msr sp_el0, x23 << 367 tst x22, #PSR_MODE32_BIT << 368 b.eq 3f << 369 << 370 #ifdef CONFIG_ARM64_ERRATUM_845719 << 371 alternative_if ARM64_WORKAROUND_845719 << 372 #ifdef CONFIG_PID_IN_CONTEXTIDR << 373 mrs x29, contextidr_el1 << 374 msr contextidr_el1, x29 << 375 #else << 376 msr contextidr_el1, xzr << 377 #endif << 378 alternative_else_nop_endif << 379 #endif << 380 3: << 381 scs_save tsk << 382 << 383 /* Ignore asynchronous tag check fault << 384 ldr x0, [tsk, THREAD_SCTLR_USER] << 385 clear_mte_async_tcf x0 << 386 << 387 #ifdef CONFIG_ARM64_PTR_AUTH << 388 alternative_if ARM64_HAS_ADDRESS_AUTH << 389 /* << 390 * IA was enabled for in-kernel PAC. D << 391 * alternatively install the user's IA << 392 * SCTLR bits were updated on task swi << 393 * << 394 * No kernel C function calls after th << 395 */ << 396 tbz x0, SCTLR_ELx_ENIA_SHIFT, 1f << 397 __ptrauth_keys_install_user tsk, x0, x << 398 b 2f << 399 1: << 400 mrs x0, sctlr_el1 << 401 bic x0, x0, SCTLR_ELx_ENIA << 402 msr sctlr_el1, x0 << 403 2: << 404 alternative_else_nop_endif << 405 #endif << 406 << 407 mte_set_user_gcr tsk, x0, x1 << 408 << 409 apply_ssbd 0, x0, x1 << 410 .endif << 411 << 412 msr elr_el1, x21 << 413 msr spsr_el1, x22 << 414 ldp x0, x1, [sp, #16 * 0] << 415 ldp x2, x3, [sp, #16 * 1] << 416 ldp x4, x5, [sp, #16 * 2] << 417 ldp x6, x7, [sp, #16 * 3] << 418 ldp x8, x9, [sp, #16 * 4] << 419 ldp x10, x11, [sp, #16 * 5] << 420 ldp x12, x13, [sp, #16 * 6] << 421 ldp x14, x15, [sp, #16 * 7] << 422 ldp x16, x17, [sp, #16 * 8] << 423 ldp x18, x19, [sp, #16 * 9] << 424 ldp x20, x21, [sp, #16 * 10] << 425 ldp x22, x23, [sp, #16 * 11] << 426 ldp x24, x25, [sp, #16 * 12] << 427 ldp x26, x27, [sp, #16 * 13] << 428 ldp x28, x29, [sp, #16 * 14] << 429 << 430 .if \el == 0 << 431 #ifdef CONFIG_UNMAP_KERNEL_AT_EL0 << 432 alternative_insn "b .L_skip_tramp_exit << 433 << 434 msr far_el1, x29 << 435 << 436 ldr_this_cpu x30, this_cpu_vector, << 437 tramp_alias x29, tramp_exit << 438 msr vbar_el1, x30 << 439 ldr lr, [sp, #S_LR] << 440 add sp, sp, #PT_REGS_SIZE << 441 br x29 << 442 << 443 .L_skip_tramp_exit_\@: << 444 #endif << 445 .endif << 446 << 447 ldr lr, [sp, #S_LR] << 448 add sp, sp, #PT_REGS_SIZE << 449 << 450 .if \el == 0 << 451 /* This must be after the last explici << 452 alternative_if ARM64_WORKAROUND_SPECULATIVE_UN << 453 tlbi vale1, xzr << 454 dsb nsh << 455 alternative_else_nop_endif << 456 .else << 457 /* Ensure any device/NC reads complete << 458 alternative_insn nop, "dmb sy", ARM64_ << 459 .endif << 460 << 461 eret << 462 sb << 463 .endm << 464 << 465 #ifdef CONFIG_ARM64_SW_TTBR0_PAN << 466 /* << 467 * Set the TTBR0 PAN bit in SPSR. When << 468 * EL0, there is no need to check the << 469 * accesses are always enabled. << 470 * Note that the meaning of this bit d << 471 * feature as all TTBR0_EL1 accesses a << 472 * user mappings. << 473 */ << 474 SYM_CODE_START_LOCAL(__swpan_entry_el1) << 475 mrs x21, ttbr0_el1 << 476 tst x21, #TTBR_ASID_MASK << 477 orr x23, x23, #PSR_PAN_BIT << 478 b.eq 1f << 479 and x23, x23, #~PSR_PAN_BIT << 480 SYM_INNER_LABEL(__swpan_entry_el0, SYM_L_LOCAL << 481 __uaccess_ttbr0_disable x21 << 482 1: ret << 483 SYM_CODE_END(__swpan_entry_el1) << 484 << 485 /* << 486 * Restore access to TTBR0_EL1. If ret << 487 * PAN bit checking. << 488 */ << 489 SYM_CODE_START_LOCAL(__swpan_exit_el1) << 490 tbnz x22, #22, 1f << 491 __uaccess_ttbr0_enable x0, x1 << 492 1: and x22, x22, #~PSR_PAN_BIT << 493 ret << 494 SYM_CODE_END(__swpan_exit_el1) << 495 << 496 SYM_CODE_START_LOCAL(__swpan_exit_el0) << 497 __uaccess_ttbr0_enable x0, x1 << 498 /* << 499 * Enable errata workarounds only if r << 500 * workaround currently required for T << 501 * Cavium erratum 27456 (broadcast TLB << 502 * corruption). << 503 */ << 504 b post_ttbr_update_workaround << 505 SYM_CODE_END(__swpan_exit_el0) << 506 #endif << 507 << 508 /* GPRs used by entry code */ << 509 tsk .req x28 // current thr << 510 << 511 .text << 512 << 513 /* 17 /* 514 * Exception vectors. !! 18 * entry.S contains the system-call and fault low-level handling routines. >> 19 * This also contains the timer-interrupt handler, as well as all interrupts >> 20 * and faults that can result in a task-switch. >> 21 * >> 22 * NOTE: This code handles signal-recognition, which happens every time >> 23 * after a timer-interrupt and after each system call. >> 24 * 515 */ 25 */ 516 .pushsection ".entry.text", "ax" << 517 << 518 .align 11 << 519 SYM_CODE_START(vectors) << 520 kernel_ventry 1, t, 64, sync << 521 kernel_ventry 1, t, 64, irq << 522 kernel_ventry 1, t, 64, fiq << 523 kernel_ventry 1, t, 64, error << 524 << 525 kernel_ventry 1, h, 64, sync << 526 kernel_ventry 1, h, 64, irq << 527 kernel_ventry 1, h, 64, fiq << 528 kernel_ventry 1, h, 64, error << 529 << 530 kernel_ventry 0, t, 64, sync << 531 kernel_ventry 0, t, 64, irq << 532 kernel_ventry 0, t, 64, fiq << 533 kernel_ventry 0, t, 64, error << 534 << 535 kernel_ventry 0, t, 32, sync << 536 kernel_ventry 0, t, 32, irq << 537 kernel_ventry 0, t, 32, fiq << 538 kernel_ventry 0, t, 32, error << 539 SYM_CODE_END(vectors) << 540 << 541 #ifdef CONFIG_VMAP_STACK << 542 SYM_CODE_START_LOCAL(__bad_stack) << 543 /* << 544 * We detected an overflow in kernel_v << 545 * overflow stack. Stash the exception << 546 * handler. << 547 */ << 548 << 549 /* Restore the original x0 value */ << 550 mrs x0, tpidrro_el0 << 551 << 552 /* << 553 * Store the original GPRs to the new << 554 * PT_REGS_SIZE) was stashed in tpidr_ << 555 */ << 556 sub sp, sp, #PT_REGS_SIZE << 557 kernel_entry 1 << 558 mrs x0, tpidr_el0 << 559 add x0, x0, #PT_REGS_SIZE << 560 str x0, [sp, #S_SP] << 561 << 562 /* Stash the regs for handle_bad_stack << 563 mov x0, sp << 564 << 565 /* Time to die */ << 566 bl handle_bad_stack << 567 ASM_BUG() << 568 SYM_CODE_END(__bad_stack) << 569 #endif /* CONFIG_VMAP_STACK */ << 570 << 571 << 572 .macro entry_handler el:req, ht:req, r << 573 SYM_CODE_START_LOCAL(el\el\ht\()_\regsize\()_\ << 574 kernel_entry \el, \regsize << 575 mov x0, sp << 576 bl el\el\ht\()_\regsize\()_\label << 577 .if \el == 0 << 578 b ret_to_user << 579 .else << 580 b ret_to_kernel << 581 .endif << 582 SYM_CODE_END(el\el\ht\()_\regsize\()_\label) << 583 .endm << 584 26 585 /* 27 /* 586 * Early exception handlers !! 28 * 12/03/96 Jes: Currently we only support m68k single-cpu systems, so >> 29 * all pointers that used to be 'current' are now entry >> 30 * number 0 in the 'current_set' list. >> 31 * >> 32 * 6/05/00 RZ: addedd writeback completion after return from sighandler >> 33 * for 68040 587 */ 34 */ 588 entry_handler 1, t, 64, sync << 589 entry_handler 1, t, 64, irq << 590 entry_handler 1, t, 64, fiq << 591 entry_handler 1, t, 64, error << 592 << 593 entry_handler 1, h, 64, sync << 594 entry_handler 1, h, 64, irq << 595 entry_handler 1, h, 64, fiq << 596 entry_handler 1, h, 64, error << 597 << 598 entry_handler 0, t, 64, sync << 599 entry_handler 0, t, 64, irq << 600 entry_handler 0, t, 64, fiq << 601 entry_handler 0, t, 64, error << 602 << 603 entry_handler 0, t, 32, sync << 604 entry_handler 0, t, 32, irq << 605 entry_handler 0, t, 32, fiq << 606 entry_handler 0, t, 32, error << 607 << 608 SYM_CODE_START_LOCAL(ret_to_kernel) << 609 kernel_exit 1 << 610 SYM_CODE_END(ret_to_kernel) << 611 << 612 SYM_CODE_START_LOCAL(ret_to_user) << 613 ldr x19, [tsk, #TSK_TI_FLAGS] << 614 enable_step_tsk x19, x2 << 615 #ifdef CONFIG_GCC_PLUGIN_STACKLEAK << 616 bl stackleak_erase_on_task_stack << 617 #endif << 618 kernel_exit 0 << 619 SYM_CODE_END(ret_to_user) << 620 35 621 .popsection !! 36 #include <linux/linkage.h> >> 37 #include <asm/errno.h> >> 38 #include <asm/setup.h> >> 39 #include <asm/segment.h> >> 40 #include <asm/traps.h> >> 41 #include <asm/unistd.h> >> 42 #include <asm/asm-offsets.h> >> 43 #include <asm/entry.h> 622 44 623 // Move from tramp_pg_dir to swapper_p !! 45 .globl system_call, buserr, trap, resume 624 .macro tramp_map_kernel, tmp !! 46 .globl sys_call_table 625 mrs \tmp, ttbr1_el1 !! 47 .globl __sys_fork, __sys_clone, __sys_vfork 626 add \tmp, \tmp, #TRAMP_SWAPPER_OFF !! 48 .globl bad_interrupt 627 bic \tmp, \tmp, #USER_ASID_FLAG !! 49 .globl auto_irqhandler_fixup 628 msr ttbr1_el1, \tmp !! 50 .globl user_irqvec_fixup 629 #ifdef CONFIG_QCOM_FALKOR_ERRATUM_1003 !! 51 630 alternative_if ARM64_WORKAROUND_QCOM_FALKOR_E1 !! 52 .text 631 /* ASID already in \tmp[63:48] */ !! 53 ENTRY(__sys_fork) 632 movk \tmp, #:abs_g2_nc:(TRAMP_VALIA !! 54 SAVE_SWITCH_STACK 633 movk \tmp, #:abs_g1_nc:(TRAMP_VALIA !! 55 jbsr sys_fork 634 /* 2MB boundary containing the vectors !! 56 lea %sp@(24),%sp 635 movk \tmp, #:abs_g0_nc:((TRAMP_VALI !! 57 rts 636 isb !! 58 637 tlbi vae1, \tmp !! 59 ENTRY(__sys_clone) 638 dsb nsh !! 60 SAVE_SWITCH_STACK 639 alternative_else_nop_endif !! 61 pea %sp@(SWITCH_STACK_SIZE) 640 #endif /* CONFIG_QCOM_FALKOR_ERRATUM_1003 */ !! 62 jbsr m68k_clone 641 .endm !! 63 lea %sp@(28),%sp 642 !! 64 rts 643 // Move from swapper_pg_dir to tramp_p !! 65 644 .macro tramp_unmap_kernel, tmp !! 66 ENTRY(__sys_vfork) 645 mrs \tmp, ttbr1_el1 !! 67 SAVE_SWITCH_STACK 646 sub \tmp, \tmp, #TRAMP_SWAPPER_OFF !! 68 jbsr sys_vfork 647 orr \tmp, \tmp, #USER_ASID_FLAG !! 69 lea %sp@(24),%sp 648 msr ttbr1_el1, \tmp !! 70 rts 649 /* !! 71 650 * We avoid running the post_ttbr_upda !! 72 ENTRY(__sys_clone3) 651 * it's only needed by Cavium ThunderX !! 73 SAVE_SWITCH_STACK 652 * disabled. !! 74 pea %sp@(SWITCH_STACK_SIZE) 653 */ !! 75 jbsr m68k_clone3 654 .endm !! 76 lea %sp@(28),%sp >> 77 rts >> 78 >> 79 ENTRY(sys_sigreturn) >> 80 SAVE_SWITCH_STACK >> 81 movel %sp,%sp@- | switch_stack pointer >> 82 pea %sp@(SWITCH_STACK_SIZE+4) | pt_regs pointer >> 83 jbsr do_sigreturn >> 84 addql #8,%sp >> 85 RESTORE_SWITCH_STACK >> 86 rts >> 87 >> 88 ENTRY(sys_rt_sigreturn) >> 89 SAVE_SWITCH_STACK >> 90 movel %sp,%sp@- | switch_stack pointer >> 91 pea %sp@(SWITCH_STACK_SIZE+4) | pt_regs pointer >> 92 jbsr do_rt_sigreturn >> 93 addql #8,%sp >> 94 RESTORE_SWITCH_STACK >> 95 rts >> 96 >> 97 ENTRY(buserr) >> 98 SAVE_ALL_INT >> 99 GET_CURRENT(%d0) >> 100 movel %sp,%sp@- | stack frame pointer argument >> 101 jbsr buserr_c >> 102 addql #4,%sp >> 103 jra ret_from_exception >> 104 >> 105 ENTRY(trap) >> 106 SAVE_ALL_INT >> 107 GET_CURRENT(%d0) >> 108 movel %sp,%sp@- | stack frame pointer argument >> 109 jbsr trap_c >> 110 addql #4,%sp >> 111 jra ret_from_exception >> 112 >> 113 | After a fork we jump here directly from resume, >> 114 | so that %d1 contains the previous task >> 115 | schedule_tail now used regardless of CONFIG_SMP >> 116 ENTRY(ret_from_fork) >> 117 movel %d1,%sp@- >> 118 jsr schedule_tail >> 119 addql #4,%sp >> 120 jra ret_from_exception >> 121 >> 122 ENTRY(ret_from_kernel_thread) >> 123 | a3 contains the kernel thread payload, d7 - its argument >> 124 movel %d1,%sp@- >> 125 jsr schedule_tail >> 126 movel %d7,(%sp) >> 127 jsr %a3@ >> 128 addql #4,%sp >> 129 jra ret_from_exception >> 130 >> 131 #if defined(CONFIG_COLDFIRE) || !defined(CONFIG_MMU) >> 132 >> 133 #ifdef TRAP_DBG_INTERRUPT >> 134 >> 135 .globl dbginterrupt >> 136 ENTRY(dbginterrupt) >> 137 SAVE_ALL_INT >> 138 GET_CURRENT(%d0) >> 139 movel %sp,%sp@- /* stack frame pointer argument */ >> 140 jsr dbginterrupt_c >> 141 addql #4,%sp >> 142 jra ret_from_exception >> 143 #endif >> 144 >> 145 ENTRY(reschedule) >> 146 /* save top of frame */ >> 147 pea %sp@ >> 148 jbsr set_esp0 >> 149 addql #4,%sp >> 150 pea ret_from_exception >> 151 jmp schedule >> 152 >> 153 ENTRY(ret_from_user_signal) >> 154 moveq #__NR_sigreturn,%d0 >> 155 trap #0 >> 156 >> 157 ENTRY(ret_from_user_rt_signal) >> 158 movel #__NR_rt_sigreturn,%d0 >> 159 trap #0 655 160 656 .macro tramp_data_read_var << 657 #ifdef CONFIG_RELOCATABLE << 658 ldr \dst, .L__tramp_data_\ << 659 .ifndef .L__tramp_data_\var << 660 .pushsection ".entry.tramp.rodata", << 661 .align 3 << 662 .L__tramp_data_\var: << 663 .quad \var << 664 .popsection << 665 .endif << 666 #else 161 #else 667 /* << 668 * As !RELOCATABLE implies !RANDOMIZE_ << 669 * compile time constant (and hence no << 670 * << 671 * As statically allocated kernel code << 672 * 47 bits of the address space we can << 673 * instruction to load the upper 16 bi << 674 */ << 675 movz \dst, :abs_g2_s:\var << 676 movk \dst, :abs_g1_nc:\var << 677 movk \dst, :abs_g0_nc:\var << 678 #endif << 679 .endm << 680 << 681 #define BHB_MITIGATION_NONE 0 << 682 #define BHB_MITIGATION_LOOP 1 << 683 #define BHB_MITIGATION_FW 2 << 684 #define BHB_MITIGATION_INSN 3 << 685 162 686 .macro tramp_ventry, vector_start, reg !! 163 do_trace_entry: 687 .align 7 !! 164 movel #-ENOSYS,%sp@(PT_OFF_D0)| needed for strace >> 165 subql #4,%sp >> 166 SAVE_SWITCH_STACK >> 167 jbsr syscall_trace >> 168 RESTORE_SWITCH_STACK >> 169 addql #4,%sp >> 170 movel %sp@(PT_OFF_ORIG_D0),%d0 >> 171 cmpl #NR_syscalls,%d0 >> 172 jcs syscall >> 173 badsys: >> 174 movel #-ENOSYS,%sp@(PT_OFF_D0) >> 175 jra ret_from_syscall >> 176 >> 177 do_trace_exit: >> 178 subql #4,%sp >> 179 SAVE_SWITCH_STACK >> 180 jbsr syscall_trace >> 181 RESTORE_SWITCH_STACK >> 182 addql #4,%sp >> 183 jra .Lret_from_exception >> 184 >> 185 ENTRY(ret_from_signal) >> 186 movel %curptr@(TASK_STACK),%a1 >> 187 tstb %a1@(TINFO_FLAGS+2) >> 188 jge 1f >> 189 lea %sp@(SWITCH_STACK_SIZE),%a1 >> 190 movel %a1,%curptr@(TASK_THREAD+THREAD_ESP0) >> 191 jbsr syscall_trace >> 192 1: RESTORE_SWITCH_STACK >> 193 addql #4,%sp >> 194 /* on 68040 complete pending writebacks if any */ >> 195 #ifdef CONFIG_M68040 >> 196 bfextu %sp@(PT_OFF_FORMATVEC){#0,#4},%d0 >> 197 subql #7,%d0 | bus error frame ? >> 198 jbne 1f >> 199 movel %sp,%sp@- >> 200 jbsr berr_040cleanup >> 201 addql #4,%sp 688 1: 202 1: 689 .if \regsize == 64 << 690 msr tpidrro_el0, x30 // Res << 691 .endif << 692 << 693 .if \bhb == BHB_MITIGATION_LOOP << 694 /* << 695 * This sequence must appear before th << 696 * ret out of tramp_ventry. It appears << 697 */ << 698 __mitigate_spectre_bhb_loop x30 << 699 .endif // \bhb == BHB_MITIGATION_LOOP << 700 << 701 .if \bhb == BHB_MITIGATION_INSN << 702 clearbhb << 703 isb << 704 .endif // \bhb == BHB_MITIGATION_INSN << 705 << 706 .if \kpti == 1 << 707 /* << 708 * Defend against branch aliasing atta << 709 * entry onto the return stack and usi << 710 * enter the full-fat kernel vectors. << 711 */ << 712 bl 2f << 713 b . << 714 2: << 715 tramp_map_kernel x30 << 716 alternative_insn isb, nop, ARM64_WORKAROUND_QC << 717 tramp_data_read_var x30, vectors << 718 alternative_if_not ARM64_WORKAROUND_CAVIUM_TX2 << 719 prfm plil1strm, [x30, #(1b - \vecto << 720 alternative_else_nop_endif << 721 << 722 msr vbar_el1, x30 << 723 isb << 724 .else << 725 adr_l x30, vectors << 726 .endif // \kpti == 1 << 727 << 728 .if \bhb == BHB_MITIGATION_FW << 729 /* << 730 * The firmware sequence must appear b << 731 * i.e. the ret out of tramp_ventry. B << 732 * mapped to save/restore the register << 733 */ << 734 __mitigate_spectre_bhb_fw << 735 .endif // \bhb == BHB_MITIGATION_FW << 736 << 737 add x30, x30, #(1b - \vector_start << 738 ret << 739 .org 1b + 128 // Did we overflow the ventry << 740 .endm << 741 << 742 .macro generate_tramp_vector, kpti, << 743 .Lvector_start\@: << 744 .space 0x400 << 745 << 746 .rept 4 << 747 tramp_ventry .Lvector_start\@, 64, << 748 .endr << 749 .rept 4 << 750 tramp_ventry .Lvector_start\@, 32, << 751 .endr << 752 .endm << 753 << 754 #ifdef CONFIG_UNMAP_KERNEL_AT_EL0 << 755 /* << 756 * Exception vectors trampoline. << 757 * The order must match __bp_harden_el1_vector << 758 * arm64_bp_harden_el1_vectors enum. << 759 */ << 760 .pushsection ".entry.tramp.text", "ax" << 761 .align 11 << 762 SYM_CODE_START_LOCAL_NOALIGN(tramp_vectors) << 763 #ifdef CONFIG_MITIGATE_SPECTRE_BRANCH_HISTORY << 764 generate_tramp_vector kpti=1, bhb=BH << 765 generate_tramp_vector kpti=1, bhb=BH << 766 generate_tramp_vector kpti=1, bhb=BH << 767 #endif /* CONFIG_MITIGATE_SPECTRE_BRANCH_HISTO << 768 generate_tramp_vector kpti=1, bhb=BH << 769 SYM_CODE_END(tramp_vectors) << 770 << 771 SYM_CODE_START_LOCAL(tramp_exit) << 772 tramp_unmap_kernel x29 << 773 mrs x29, far_el1 << 774 eret << 775 sb << 776 SYM_CODE_END(tramp_exit) << 777 .popsection << 778 #endif /* CONFIG_UNMAP_KERNEL_AT_EL0 */ << 779 << 780 /* << 781 * Exception vectors for spectre mitigations o << 782 * kpti is not in use. << 783 */ << 784 .macro generate_el1_vector, bhb << 785 .Lvector_start\@: << 786 kernel_ventry 1, t, 64, sync << 787 kernel_ventry 1, t, 64, irq << 788 kernel_ventry 1, t, 64, fiq << 789 kernel_ventry 1, t, 64, error << 790 << 791 kernel_ventry 1, h, 64, sync << 792 kernel_ventry 1, h, 64, irq << 793 kernel_ventry 1, h, 64, fiq << 794 kernel_ventry 1, h, 64, error << 795 << 796 .rept 4 << 797 tramp_ventry .Lvector_start\@, 64, << 798 .endr << 799 .rept 4 << 800 tramp_ventry .Lvector_start\@, 32, << 801 .endr << 802 .endm << 803 << 804 /* The order must match tramp_vecs and the arm << 805 .pushsection ".entry.text", "ax" << 806 .align 11 << 807 SYM_CODE_START(__bp_harden_el1_vectors) << 808 #ifdef CONFIG_MITIGATE_SPECTRE_BRANCH_HISTORY << 809 generate_el1_vector bhb=BHB_MITIGA << 810 generate_el1_vector bhb=BHB_MITIGA << 811 generate_el1_vector bhb=BHB_MITIGA << 812 #endif /* CONFIG_MITIGATE_SPECTRE_BRANCH_HISTO << 813 SYM_CODE_END(__bp_harden_el1_vectors) << 814 .popsection << 815 << 816 << 817 /* << 818 * Register switch for AArch64. The callee-sav << 819 * and restored. On entry: << 820 * x0 = previous task_struct (must be preser << 821 * x1 = next task_struct << 822 * Previous and next are guaranteed not to be << 823 * << 824 */ << 825 SYM_FUNC_START(cpu_switch_to) << 826 mov x10, #THREAD_CPU_CONTEXT << 827 add x8, x0, x10 << 828 mov x9, sp << 829 stp x19, x20, [x8], #16 << 830 stp x21, x22, [x8], #16 << 831 stp x23, x24, [x8], #16 << 832 stp x25, x26, [x8], #16 << 833 stp x27, x28, [x8], #16 << 834 stp x29, x9, [x8], #16 << 835 str lr, [x8] << 836 add x8, x1, x10 << 837 ldp x19, x20, [x8], #16 << 838 ldp x21, x22, [x8], #16 << 839 ldp x23, x24, [x8], #16 << 840 ldp x25, x26, [x8], #16 << 841 ldp x27, x28, [x8], #16 << 842 ldp x29, x9, [x8], #16 << 843 ldr lr, [x8] << 844 mov sp, x9 << 845 msr sp_el0, x1 << 846 ptrauth_keys_install_kernel x1, x8, x9 << 847 scs_save x0 << 848 scs_load_current << 849 ret << 850 SYM_FUNC_END(cpu_switch_to) << 851 NOKPROBE(cpu_switch_to) << 852 << 853 /* << 854 * This is how we return from a fork. << 855 */ << 856 SYM_CODE_START(ret_from_fork) << 857 bl schedule_tail << 858 cbz x19, 1f << 859 mov x0, x20 << 860 blr x19 << 861 1: get_current_task tsk << 862 mov x0, sp << 863 bl asm_exit_to_user_mode << 864 b ret_to_user << 865 SYM_CODE_END(ret_from_fork) << 866 NOKPROBE(ret_from_fork) << 867 << 868 /* << 869 * void call_on_irq_stack(struct pt_regs *regs << 870 * void (*func)(struct << 871 * << 872 * Calls func(regs) using this CPU's irq stack << 873 */ << 874 SYM_FUNC_START(call_on_irq_stack) << 875 #ifdef CONFIG_SHADOW_CALL_STACK << 876 get_current_task x16 << 877 scs_save x16 << 878 ldr_this_cpu scs_sp, irq_shadow_call_s << 879 #endif 203 #endif >> 204 jra .Lret_from_exception 880 205 881 /* Create a frame record to save our L !! 206 ENTRY(system_call) 882 stp x29, x30, [sp, #-16]! !! 207 SAVE_ALL_SYS 883 mov x29, sp << 884 << 885 ldr_this_cpu x16, irq_stack_ptr, x17 << 886 << 887 /* Move to the new stack and call the << 888 add sp, x16, #IRQ_STACK_SIZE << 889 blr x1 << 890 208 891 /* !! 209 GET_CURRENT(%d1) 892 * Restore the SP from the FP, and res !! 210 movel %d1,%a1 893 * record. << 894 */ << 895 mov sp, x29 << 896 ldp x29, x30, [sp], #16 << 897 scs_load_current << 898 ret << 899 SYM_FUNC_END(call_on_irq_stack) << 900 NOKPROBE(call_on_irq_stack) << 901 << 902 #ifdef CONFIG_ARM_SDE_INTERFACE << 903 << 904 #include <asm/sdei.h> << 905 #include <uapi/linux/arm_sdei.h> << 906 << 907 .macro sdei_handler_exit exit_mode << 908 /* On success, this call never returns << 909 cmp \exit_mode, #SDEI_EXIT_SMC << 910 b.ne 99f << 911 smc #0 << 912 b . << 913 99: hvc #0 << 914 b . << 915 .endm << 916 211 917 #ifdef CONFIG_UNMAP_KERNEL_AT_EL0 !! 212 | save top of frame 918 /* !! 213 movel %sp,%curptr@(TASK_THREAD+THREAD_ESP0) 919 * The regular SDEI entry point may have been !! 214 920 * the kernel. This trampoline restores the ke !! 215 | syscall trace? 921 * argument accessible. !! 216 tstb %a1@(TINFO_FLAGS+2) 922 * !! 217 jmi do_trace_entry 923 * This clobbers x4, __sdei_handler() will res !! 218 cmpl #NR_syscalls,%d0 924 * copy. !! 219 jcc badsys 925 */ !! 220 syscall: 926 .pushsection ".entry.tramp.text", "ax" !! 221 jbsr @(sys_call_table,%d0:l:4)@(0) 927 SYM_CODE_START(__sdei_asm_entry_trampoline) !! 222 movel %d0,%sp@(PT_OFF_D0) | save the return value 928 mrs x4, ttbr1_el1 !! 223 ret_from_syscall: 929 tbz x4, #USER_ASID_BIT, 1f !! 224 |oriw #0x0700,%sr 930 !! 225 movel %curptr@(TASK_STACK),%a1 931 tramp_map_kernel tmp=x4 !! 226 movew %a1@(TINFO_FLAGS+2),%d0 932 isb !! 227 jne syscall_exit_work 933 mov x4, xzr !! 228 1: RESTORE_ALL >> 229 >> 230 syscall_exit_work: >> 231 btst #5,%sp@(PT_OFF_SR) | check if returning to kernel >> 232 bnes 1b | if so, skip resched, signals >> 233 lslw #1,%d0 >> 234 jcs do_trace_exit >> 235 jmi do_delayed_trace >> 236 lslw #8,%d0 >> 237 jne do_signal_return >> 238 pea resume_userspace >> 239 jra schedule >> 240 >> 241 >> 242 ENTRY(ret_from_exception) >> 243 .Lret_from_exception: >> 244 btst #5,%sp@(PT_OFF_SR) | check if returning to kernel >> 245 bnes 1f | if so, skip resched, signals >> 246 | only allow interrupts when we are really the last one on the >> 247 | kernel stack, otherwise stack overflow can occur during >> 248 | heavy interrupt load >> 249 andw #ALLOWINT,%sr >> 250 >> 251 resume_userspace: >> 252 movel %curptr@(TASK_STACK),%a1 >> 253 moveb %a1@(TINFO_FLAGS+3),%d0 >> 254 jne exit_work >> 255 1: RESTORE_ALL >> 256 >> 257 exit_work: >> 258 | save top of frame >> 259 movel %sp,%curptr@(TASK_THREAD+THREAD_ESP0) >> 260 lslb #1,%d0 >> 261 jne do_signal_return >> 262 pea resume_userspace >> 263 jra schedule >> 264 >> 265 >> 266 do_signal_return: >> 267 |andw #ALLOWINT,%sr >> 268 subql #4,%sp | dummy return address >> 269 SAVE_SWITCH_STACK >> 270 pea %sp@(SWITCH_STACK_SIZE) >> 271 bsrl do_notify_resume >> 272 addql #4,%sp >> 273 RESTORE_SWITCH_STACK >> 274 addql #4,%sp >> 275 jbra resume_userspace >> 276 >> 277 do_delayed_trace: >> 278 bclr #7,%sp@(PT_OFF_SR) | clear trace bit in SR >> 279 pea 1 | send SIGTRAP >> 280 movel %curptr,%sp@- >> 281 pea LSIGTRAP >> 282 jbsr send_sig >> 283 addql #8,%sp >> 284 addql #4,%sp >> 285 jbra resume_userspace >> 286 >> 287 >> 288 /* This is the main interrupt handler for autovector interrupts */ >> 289 >> 290 ENTRY(auto_inthandler) >> 291 SAVE_ALL_INT >> 292 GET_CURRENT(%d0) >> 293 | put exception # in d0 >> 294 bfextu %sp@(PT_OFF_FORMATVEC){#4,#10},%d0 >> 295 subw #VEC_SPUR,%d0 >> 296 >> 297 movel %sp,%sp@- >> 298 movel %d0,%sp@- | put vector # on stack >> 299 auto_irqhandler_fixup = . + 2 >> 300 jsr do_IRQ | process the IRQ >> 301 addql #8,%sp | pop parameters off stack >> 302 jra ret_from_exception >> 303 >> 304 /* Handler for user defined interrupt vectors */ >> 305 >> 306 ENTRY(user_inthandler) >> 307 SAVE_ALL_INT >> 308 GET_CURRENT(%d0) >> 309 | put exception # in d0 >> 310 bfextu %sp@(PT_OFF_FORMATVEC){#4,#10},%d0 >> 311 user_irqvec_fixup = . + 2 >> 312 subw #VEC_USER,%d0 >> 313 >> 314 movel %sp,%sp@- >> 315 movel %d0,%sp@- | put vector # on stack >> 316 jsr do_IRQ | process the IRQ >> 317 addql #8,%sp | pop parameters off stack >> 318 jra ret_from_exception >> 319 >> 320 /* Handler for uninitialized and spurious interrupts */ >> 321 >> 322 ENTRY(bad_inthandler) >> 323 SAVE_ALL_INT >> 324 GET_CURRENT(%d0) >> 325 >> 326 movel %sp,%sp@- >> 327 jsr handle_badint >> 328 addql #4,%sp >> 329 jra ret_from_exception >> 330 >> 331 resume: >> 332 /* >> 333 * Beware - when entering resume, prev (the current task) is >> 334 * in a0, next (the new task) is in a1,so don't change these >> 335 * registers until their contents are no longer needed. >> 336 */ >> 337 >> 338 /* save sr */ >> 339 movew %sr,%a0@(TASK_THREAD+THREAD_SR) >> 340 >> 341 /* save fs (sfc,%dfc) (may be pointing to kernel memory) */ >> 342 movec %sfc,%d0 >> 343 movew %d0,%a0@(TASK_THREAD+THREAD_FS) >> 344 >> 345 /* save usp */ >> 346 /* it is better to use a movel here instead of a movew 8*) */ >> 347 movec %usp,%d0 >> 348 movel %d0,%a0@(TASK_THREAD+THREAD_USP) >> 349 >> 350 /* save non-scratch registers on stack */ >> 351 SAVE_SWITCH_STACK >> 352 >> 353 /* save current kernel stack pointer */ >> 354 movel %sp,%a0@(TASK_THREAD+THREAD_KSP) >> 355 >> 356 /* save floating point context */ >> 357 #ifndef CONFIG_M68KFPU_EMU_ONLY >> 358 #ifdef CONFIG_M68KFPU_EMU >> 359 tstl m68k_fputype >> 360 jeq 3f >> 361 #endif >> 362 fsave %a0@(TASK_THREAD+THREAD_FPSTATE) >> 363 >> 364 #if defined(CONFIG_M68060) >> 365 #if !defined(CPU_M68060_ONLY) >> 366 btst #3,m68k_cputype+3 >> 367 beqs 1f >> 368 #endif >> 369 /* The 060 FPU keeps status in bits 15-8 of the first longword */ >> 370 tstb %a0@(TASK_THREAD+THREAD_FPSTATE+2) >> 371 jeq 3f >> 372 #if !defined(CPU_M68060_ONLY) >> 373 jra 2f >> 374 #endif >> 375 #endif /* CONFIG_M68060 */ >> 376 #if !defined(CPU_M68060_ONLY) >> 377 1: tstb %a0@(TASK_THREAD+THREAD_FPSTATE) >> 378 jeq 3f >> 379 #endif >> 380 2: fmovemx %fp0-%fp7,%a0@(TASK_THREAD+THREAD_FPREG) >> 381 fmoveml %fpcr/%fpsr/%fpiar,%a0@(TASK_THREAD+THREAD_FPCNTL) >> 382 3: >> 383 #endif /* CONFIG_M68KFPU_EMU_ONLY */ >> 384 /* Return previous task in %d1 */ >> 385 movel %curptr,%d1 >> 386 >> 387 /* switch to new task (a1 contains new task) */ >> 388 movel %a1,%curptr >> 389 >> 390 /* restore floating point context */ >> 391 #ifndef CONFIG_M68KFPU_EMU_ONLY >> 392 #ifdef CONFIG_M68KFPU_EMU >> 393 tstl m68k_fputype >> 394 jeq 4f >> 395 #endif >> 396 #if defined(CONFIG_M68060) >> 397 #if !defined(CPU_M68060_ONLY) >> 398 btst #3,m68k_cputype+3 >> 399 beqs 1f >> 400 #endif >> 401 /* The 060 FPU keeps status in bits 15-8 of the first longword */ >> 402 tstb %a1@(TASK_THREAD+THREAD_FPSTATE+2) >> 403 jeq 3f >> 404 #if !defined(CPU_M68060_ONLY) >> 405 jra 2f >> 406 #endif >> 407 #endif /* CONFIG_M68060 */ >> 408 #if !defined(CPU_M68060_ONLY) >> 409 1: tstb %a1@(TASK_THREAD+THREAD_FPSTATE) >> 410 jeq 3f >> 411 #endif >> 412 2: fmovemx %a1@(TASK_THREAD+THREAD_FPREG),%fp0-%fp7 >> 413 fmoveml %a1@(TASK_THREAD+THREAD_FPCNTL),%fpcr/%fpsr/%fpiar >> 414 3: frestore %a1@(TASK_THREAD+THREAD_FPSTATE) >> 415 4: >> 416 #endif /* CONFIG_M68KFPU_EMU_ONLY */ 934 417 935 /* !! 418 /* restore the kernel stack pointer */ 936 * Remember whether to unmap the kerne !! 419 movel %a1@(TASK_THREAD+THREAD_KSP),%sp 937 */ << 938 1: str x4, [x1, #(SDEI_EVENT_INTREGS << 939 tramp_data_read_var x4, __sdei_asm << 940 br x4 << 941 SYM_CODE_END(__sdei_asm_entry_trampoline) << 942 NOKPROBE(__sdei_asm_entry_trampoline) << 943 420 944 /* !! 421 /* restore non-scratch registers */ 945 * Make the exit call and restore the original !! 422 RESTORE_SWITCH_STACK 946 * << 947 * x0 & x1: setup for the exit API call << 948 * x2: exit_mode << 949 * x4: struct sdei_registered_event argument f << 950 */ << 951 SYM_CODE_START(__sdei_asm_exit_trampoline) << 952 ldr x4, [x4, #(SDEI_EVENT_INTREGS << 953 cbnz x4, 1f << 954 << 955 tramp_unmap_kernel tmp=x4 << 956 << 957 1: sdei_handler_exit exit_mode=x2 << 958 SYM_CODE_END(__sdei_asm_exit_trampoline) << 959 NOKPROBE(__sdei_asm_exit_trampoline) << 960 .popsection // .entry.tramp.text << 961 #endif /* CONFIG_UNMAP_KERNEL_AT_EL0 */ << 962 423 963 /* !! 424 /* restore user stack pointer */ 964 * Software Delegated Exception entry point. !! 425 movel %a1@(TASK_THREAD+THREAD_USP),%a0 965 * !! 426 movel %a0,%usp 966 * x0: Event number << 967 * x1: struct sdei_registered_event argument f << 968 * x2: interrupted PC << 969 * x3: interrupted PSTATE << 970 * x4: maybe clobbered by the trampoline << 971 * << 972 * Firmware has preserved x0->x17 for us, we m << 973 * follow SMC-CC. We save (or retrieve) all th << 974 * want them. << 975 */ << 976 SYM_CODE_START(__sdei_asm_handler) << 977 stp x2, x3, [x1, #SDEI_EVENT_INTRE << 978 stp x4, x5, [x1, #SDEI_EVENT_INTRE << 979 stp x6, x7, [x1, #SDEI_EVENT_INTRE << 980 stp x8, x9, [x1, #SDEI_EVENT_INTRE << 981 stp x10, x11, [x1, #SDEI_EVENT_INT << 982 stp x12, x13, [x1, #SDEI_EVENT_INT << 983 stp x14, x15, [x1, #SDEI_EVENT_INT << 984 stp x16, x17, [x1, #SDEI_EVENT_INT << 985 stp x18, x19, [x1, #SDEI_EVENT_INT << 986 stp x20, x21, [x1, #SDEI_EVENT_INT << 987 stp x22, x23, [x1, #SDEI_EVENT_INT << 988 stp x24, x25, [x1, #SDEI_EVENT_INT << 989 stp x26, x27, [x1, #SDEI_EVENT_INT << 990 stp x28, x29, [x1, #SDEI_EVENT_INT << 991 mov x4, sp << 992 stp lr, x4, [x1, #SDEI_EVENT_INTRE << 993 << 994 mov x19, x1 << 995 << 996 /* Store the registered-event for cras << 997 ldrb w4, [x19, #SDEI_EVENT_PRIORITY << 998 cbnz w4, 1f << 999 adr_this_cpu dst=x5, sym=sdei_active_n << 1000 b 2f << 1001 1: adr_this_cpu dst=x5, sym=sdei_active_ << 1002 2: str x19, [x5] << 1003 427 1004 #ifdef CONFIG_VMAP_STACK !! 428 /* restore fs (sfc,%dfc) */ 1005 /* !! 429 movew %a1@(TASK_THREAD+THREAD_FS),%a0 1006 * entry.S may have been using sp as !! 430 movec %a0,%sfc 1007 * this is a normal or critical event !! 431 movec %a0,%dfc 1008 * stack for this CPU. << 1009 */ << 1010 cbnz w4, 1f << 1011 ldr_this_cpu dst=x5, sym=sdei_stack_n << 1012 b 2f << 1013 1: ldr_this_cpu dst=x5, sym=sdei_stack_c << 1014 2: mov x6, #SDEI_STACK_SIZE << 1015 add x5, x5, x6 << 1016 mov sp, x5 << 1017 #endif << 1018 432 1019 #ifdef CONFIG_SHADOW_CALL_STACK !! 433 /* restore status register */ 1020 /* Use a separate shadow call stack f !! 434 movew %a1@(TASK_THREAD+THREAD_SR),%sr 1021 cbnz w4, 3f << 1022 ldr_this_cpu dst=scs_sp, sym=sdei_sha << 1023 b 4f << 1024 3: ldr_this_cpu dst=scs_sp, sym=sdei_sha << 1025 4: << 1026 #endif << 1027 435 1028 /* !! 436 rts 1029 * We may have interrupted userspace, << 1030 * return-to either of these. We can' << 1031 */ << 1032 mrs x28, sp_el0 << 1033 ldr_this_cpu dst=x0, sym=__entry_t << 1034 msr sp_el0, x0 << 1035 << 1036 /* If we interrupted the kernel point << 1037 and x0, x3, #0xc << 1038 mrs x1, CurrentEL << 1039 cmp x0, x1 << 1040 csel x29, x29, xzr, eq // fp << 1041 csel x4, x2, xzr, eq // el << 1042 << 1043 stp x29, x4, [sp, #-16]! << 1044 mov x29, sp << 1045 << 1046 add x0, x19, #SDEI_EVENT_INTREGS << 1047 mov x1, x19 << 1048 bl __sdei_handler << 1049 << 1050 msr sp_el0, x28 << 1051 /* restore regs >x17 that we clobbere << 1052 mov x4, x19 // keep x4 fo << 1053 ldp x28, x29, [x4, #SDEI_EVENT_IN << 1054 ldp x18, x19, [x4, #SDEI_EVENT_IN << 1055 ldp lr, x1, [x4, #SDEI_EVENT_INTR << 1056 mov sp, x1 << 1057 << 1058 mov x1, x0 // ad << 1059 /* x0 = (x0 <= SDEI_EV_FAILED) ? << 1060 * EVENT_COMPLETE:EVENT_COMPLETE_AND_ << 1061 */ << 1062 cmp x0, #SDEI_EV_FAILED << 1063 mov_q x2, SDEI_1_0_FN_SDEI_EVENT_CO << 1064 mov_q x3, SDEI_1_0_FN_SDEI_EVENT_CO << 1065 csel x0, x2, x3, ls << 1066 << 1067 ldr_l x2, sdei_exit_mode << 1068 << 1069 /* Clear the registered-event seen by << 1070 ldrb w3, [x4, #SDEI_EVENT_PRIORITY << 1071 cbnz w3, 1f << 1072 adr_this_cpu dst=x5, sym=sdei_active_ << 1073 b 2f << 1074 1: adr_this_cpu dst=x5, sym=sdei_active_ << 1075 2: str xzr, [x5] << 1076 << 1077 alternative_if_not ARM64_UNMAP_KERNEL_AT_EL0 << 1078 sdei_handler_exit exit_mode=x2 << 1079 alternative_else_nop_endif << 1080 << 1081 #ifdef CONFIG_UNMAP_KERNEL_AT_EL0 << 1082 tramp_alias dst=x5, sym=__sdei_as << 1083 br x5 << 1084 #endif << 1085 SYM_CODE_END(__sdei_asm_handler) << 1086 NOKPROBE(__sdei_asm_handler) << 1087 437 1088 SYM_CODE_START(__sdei_handler_abort) !! 438 #endif /* CONFIG_MMU && !CONFIG_COLDFIRE */ 1089 mov_q x0, SDEI_1_0_FN_SDEI_EVENT_CO << 1090 adr x1, 1f << 1091 ldr_l x2, sdei_exit_mode << 1092 sdei_handler_exit exit_mode=x2 << 1093 // exit the handler and jump to the n << 1094 // Exit will stomp x0-x17, PSTATE, EL << 1095 1: ret << 1096 SYM_CODE_END(__sdei_handler_abort) << 1097 NOKPROBE(__sdei_handler_abort) << 1098 #endif /* CONFIG_ARM_SDE_INTERFACE */ <<
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.