1/* 2 * Low Level Interrupts/Traps/Exceptions(non-TLB) Handling for ARC 3 * 4 * Copyright (C) 2004, 2007-2010, 2011-2012 Synopsys, Inc. (www.synopsys.com) 5 * 6 * This program is free software; you can redistribute it and/or modify 7 * it under the terms of the GNU General Public License version 2 as 8 * published by the Free Software Foundation. 9 * 10 * vineetg: May 2011 11 * -Userspace unaligned access emulation 12 * 13 * vineetg: Feb 2011 (ptrace low level code fixes) 14 * -traced syscall return code (r0) was not saved into pt_regs for restoring 15 * into user reg-file when traded task rets to user space. 16 * -syscalls needing arch-wrappers (mainly for passing sp as pt_regs) 17 * were not invoking post-syscall trace hook (jumping directly into 18 * ret_from_system_call) 19 * 20 * vineetg: Nov 2010: 21 * -Vector table jumps (@8 bytes) converted into branches (@4 bytes) 22 * -To maintain the slot size of 8 bytes/vector, added nop, which is 23 * not executed at runtime. 24 * 25 * vineetg: Nov 2009 (Everything needed for TIF_RESTORE_SIGMASK) 26 * -do_signal()invoked upon TIF_RESTORE_SIGMASK as well 27 * -Wrappers for sys_{,rt_}sigsuspend() nolonger needed as they don't 28 * need ptregs anymore 29 * 30 * Vineetg: Oct 2009 31 * -In a rare scenario, Process gets a Priv-V exception and gets scheduled 32 * out. Since we don't do FAKE RTIE for Priv-V, CPU excpetion state remains 33 * active (AE bit enabled). This causes a double fault for a subseq valid 34 * exception. Thus FAKE RTIE needed in low level Priv-Violation handler. 35 * Instr Error could also cause similar scenario, so same there as well. 36 * 37 * Vineetg: March 2009 (Supporting 2 levels of Interrupts) 38 * 39 * Vineetg: Aug 28th 2008: Bug #94984 40 * -Zero Overhead Loop Context shd be cleared when entering IRQ/EXcp/Trap 41 * Normally CPU does this automatically, however when doing FAKE rtie, 42 * we need to explicitly do this. The problem in macros 43 * FAKE_RET_FROM_EXCPN and FAKE_RET_FROM_EXCPN_LOCK_IRQ was that this bit 44 * was being "CLEARED" rather then "SET". Since it is Loop INHIBIT Bit, 45 * setting it and not clearing it clears ZOL context 46 * 47 * Vineetg: May 16th, 2008 48 * - r25 now contains the Current Task when in kernel 49 * 50 * Vineetg: Dec 22, 2007 51 * Minor Surgery of Low Level ISR to make it SMP safe 52 * - MMU_SCRATCH0 Reg used for freeing up r9 in Level 1 ISR 53 * - _current_task is made an array of NR_CPUS 54 * - Access of _current_task wrapped inside a macro so that if hardware 55 * team agrees for a dedicated reg, no other code is touched 56 * 57 * Amit Bhor, Rahul Trivedi, Kanika Nema, Sameer Dhavale : Codito Tech 2004 58 */ 59 60/*------------------------------------------------------------------ 61 * Function ABI 62 *------------------------------------------------------------------ 63 * 64 * Arguments r0 - r7 65 * Caller Saved Registers r0 - r12 66 * Callee Saved Registers r13- r25 67 * Global Pointer (gp) r26 68 * Frame Pointer (fp) r27 69 * Stack Pointer (sp) r28 70 * Interrupt link register (ilink1) r29 71 * Interrupt link register (ilink2) r30 72 * Branch link register (blink) r31 73 *------------------------------------------------------------------ 74 */ 75 76 .cpu A7 77 78;############################ Vector Table ################################# 79 80.macro VECTOR lbl 81#if 1 /* Just in case, build breaks */ 82 j \lbl 83#else 84 b \lbl 85 nop 86#endif 87.endm 88 89 .section .vector, "ax",@progbits 90 .align 4 91 92/* Each entry in the vector table must occupy 2 words. Since it is a jump 93 * across sections (.vector to .text) we are gauranteed that 'j somewhere' 94 * will use the 'j limm' form of the intrsuction as long as somewhere is in 95 * a section other than .vector. 96 */ 97 98; ********* Critical System Events ********************** 99VECTOR res_service ; 0x0, Restart Vector (0x0) 100VECTOR mem_service ; 0x8, Mem exception (0x1) 101VECTOR instr_service ; 0x10, Instrn Error (0x2) 102 103; ******************** Device ISRs ********************** 104#ifdef CONFIG_ARC_IRQ3_LV2 105VECTOR handle_interrupt_level2 106#else 107VECTOR handle_interrupt_level1 108#endif 109 110VECTOR handle_interrupt_level1 111 112#ifdef CONFIG_ARC_IRQ5_LV2 113VECTOR handle_interrupt_level2 114#else 115VECTOR handle_interrupt_level1 116#endif 117 118#ifdef CONFIG_ARC_IRQ6_LV2 119VECTOR handle_interrupt_level2 120#else 121VECTOR handle_interrupt_level1 122#endif 123 124.rept 25 125VECTOR handle_interrupt_level1 ; Other devices 126.endr 127 128/* FOR ARC600: timer = 0x3, uart = 0x8, emac = 0x10 */ 129 130; ******************** Exceptions ********************** 131VECTOR EV_MachineCheck ; 0x100, Fatal Machine check (0x20) 132VECTOR EV_TLBMissI ; 0x108, Intruction TLB miss (0x21) 133VECTOR EV_TLBMissD ; 0x110, Data TLB miss (0x22) 134VECTOR EV_TLBProtV ; 0x118, Protection Violation (0x23) 135 ; or Misaligned Access 136VECTOR EV_PrivilegeV ; 0x120, Privilege Violation (0x24) 137VECTOR EV_Trap ; 0x128, Trap exception (0x25) 138VECTOR EV_Extension ; 0x130, Extn Intruction Excp (0x26) 139 140.rept 24 141VECTOR reserved ; Reserved Exceptions 142.endr 143 144#include <linux/linkage.h> /* {EXTRY,EXIT} */ 145#include <asm/entry.h> /* SAVE_ALL_{INT1,INT2,SYS...} */ 146#include <asm/errno.h> 147#include <asm/arcregs.h> 148#include <asm/irqflags.h> 149 150;##################### Scratch Mem for IRQ stack switching ############# 151 152ARCFP_DATA int1_saved_reg 153 .align 32 154 .type int1_saved_reg, @object 155 .size int1_saved_reg, 4 156int1_saved_reg: 157 .zero 4 158 159/* Each Interrupt level needs its own scratch */ 160#ifdef CONFIG_ARC_COMPACT_IRQ_LEVELS 161 162ARCFP_DATA int2_saved_reg 163 .type int2_saved_reg, @object 164 .size int2_saved_reg, 4 165int2_saved_reg: 166 .zero 4 167 168#endif 169 170; --------------------------------------------- 171 .section .text, "ax",@progbits 172 173res_service: ; processor restart 174 flag 0x1 ; not implemented 175 nop 176 nop 177 178reserved: ; processor restart 179 rtie ; jump to processor initializations 180 181;##################### Interrupt Handling ############################## 182 183#ifdef CONFIG_ARC_COMPACT_IRQ_LEVELS 184; --------------------------------------------- 185; Level 2 ISR: Can interrupt a Level 1 ISR 186; --------------------------------------------- 187ENTRY(handle_interrupt_level2) 188 189 ; TODO-vineetg for SMP this wont work 190 ; free up r9 as scratchpad 191 st r9, [@int2_saved_reg] 192 193 ;Which mode (user/kernel) was the system in when intr occured 194 lr r9, [status32_l2] 195 196 SWITCH_TO_KERNEL_STK 197 SAVE_ALL_INT2 198 199 ;------------------------------------------------------ 200 ; if L2 IRQ interrupted a L1 ISR, disable preemption 201 ;------------------------------------------------------ 202 203 ld r9, [sp, PT_status32] ; get statu32_l2 (saved in pt_regs) 204 bbit0 r9, STATUS_A1_BIT, 1f ; L1 not active when L2 IRQ, so normal 205 206 ; A1 is set in status32_l2 207 ; bump thread_info->preempt_count (Disable preemption) 208 GET_CURR_THR_INFO_FROM_SP r10 209 ld r9, [r10, THREAD_INFO_PREEMPT_COUNT] 210 add r9, r9, 1 211 st r9, [r10, THREAD_INFO_PREEMPT_COUNT] 212 2131: 214 ;------------------------------------------------------ 215 ; setup params for Linux common ISR and invoke it 216 ;------------------------------------------------------ 217 lr r0, [icause2] 218 and r0, r0, 0x1f 219 220 bl.d @arch_do_IRQ 221 mov r1, sp 222 223 mov r8,0x2 224 sr r8, [AUX_IRQ_LV12] ; clear bit in Sticky Status Reg 225 226 b ret_from_exception 227 228END(handle_interrupt_level2) 229 230#endif 231 232; --------------------------------------------- 233; Level 1 ISR 234; --------------------------------------------- 235ENTRY(handle_interrupt_level1) 236 237 /* free up r9 as scratchpad */ 238#ifdef CONFIG_SMP 239 sr r9, [ARC_REG_SCRATCH_DATA0] 240#else 241 st r9, [@int1_saved_reg] 242#endif 243 244 ;Which mode (user/kernel) was the system in when intr occured 245 lr r9, [status32_l1] 246 247 SWITCH_TO_KERNEL_STK 248 SAVE_ALL_INT1 249 250 lr r0, [icause1] 251 and r0, r0, 0x1f 252 253#ifdef CONFIG_TRACE_IRQFLAGS 254 ; icause1 needs to be read early, before calling tracing, which 255 ; can clobber scratch regs, hence use of stack to stash it 256 push r0 257 TRACE_ASM_IRQ_DISABLE 258 pop r0 259#endif 260 261 bl.d @arch_do_IRQ 262 mov r1, sp 263 264 mov r8,0x1 265 sr r8, [AUX_IRQ_LV12] ; clear bit in Sticky Status Reg 266 267 b ret_from_exception 268END(handle_interrupt_level1) 269 270;################### Non TLB Exception Handling ############################# 271 272; --------------------------------------------- 273; Instruction Error Exception Handler 274; --------------------------------------------- 275 276ENTRY(instr_service) 277 278 EXCEPTION_PROLOGUE 279 280 lr r0, [efa] 281 mov r1, sp 282 283 FAKE_RET_FROM_EXCPN r9 284 285 bl do_insterror_or_kprobe 286 b ret_from_exception 287END(instr_service) 288 289; --------------------------------------------- 290; Memory Error Exception Handler 291; --------------------------------------------- 292 293ENTRY(mem_service) 294 295 EXCEPTION_PROLOGUE 296 297 lr r0, [efa] 298 mov r1, sp 299 300 FAKE_RET_FROM_EXCPN r9 301 302 bl do_memory_error 303 b ret_from_exception 304END(mem_service) 305 306; --------------------------------------------- 307; Machine Check Exception Handler 308; --------------------------------------------- 309 310ENTRY(EV_MachineCheck) 311 312 EXCEPTION_PROLOGUE 313 314 lr r2, [ecr] 315 lr r0, [efa] 316 mov r1, sp 317 318 lsr r3, r2, 8 319 bmsk r3, r3, 7 320 brne r3, ECR_C_MCHK_DUP_TLB, 1f 321 322 bl do_tlb_overlap_fault 323 b ret_from_exception 324 3251: 326 ; DEAD END: can't do much, display Regs and HALT 327 SAVE_CALLEE_SAVED_USER 328 329 GET_CURR_TASK_FIELD_PTR TASK_THREAD, r10 330 st sp, [r10, THREAD_CALLEE_REG] 331 332 j do_machine_check_fault 333 334END(EV_MachineCheck) 335 336; --------------------------------------------- 337; Protection Violation Exception Handler 338; --------------------------------------------- 339 340ENTRY(EV_TLBProtV) 341 342 EXCEPTION_PROLOGUE 343 344 ;---------(3) Save some more regs----------------- 345 ; vineetg: Mar 6th: Random Seg Fault issue #1 346 ; ecr and efa were not saved in case an Intr sneaks in 347 ; after fake rtie 348 349 lr r2, [ecr] 350 lr r0, [efa] ; Faulting Data address 351 352 ; --------(4) Return from CPU Exception Mode --------- 353 ; Fake a rtie, but rtie to next label 354 ; That way, subsequently, do_page_fault ( ) executes in pure kernel 355 ; mode with further Exceptions enabled 356 357 FAKE_RET_FROM_EXCPN r9 358 359 mov r1, sp 360 361 ;------ (5) Type of Protection Violation? ---------- 362 ; 363 ; ProtV Hardware Exception is triggered for Access Faults of 2 types 364 ; -Access Violaton : 00_23_(00|01|02|03)_00 365 ; x r w r+w 366 ; -Unaligned Access : 00_23_04_00 367 ; 368 bbit1 r2, ECR_C_BIT_PROTV_MISALIG_DATA, 4f 369 370 ;========= (6a) Access Violation Processing ======== 371 bl do_page_fault 372 b ret_from_exception 373 374 ;========== (6b) Non aligned access ============ 3754: 376 377 SAVE_CALLEE_SAVED_USER 378 mov r2, sp ; callee_regs 379 380 bl do_misaligned_access 381 382 ; TBD: optimize - do this only if a callee reg was involved 383 ; either a dst of emulated LD/ST or src with address-writeback 384 RESTORE_CALLEE_SAVED_USER 385 386 b ret_from_exception 387 388END(EV_TLBProtV) 389 390; --------------------------------------------- 391; Privilege Violation Exception Handler 392; --------------------------------------------- 393ENTRY(EV_PrivilegeV) 394 395 EXCEPTION_PROLOGUE 396 397 lr r0, [efa] 398 mov r1, sp 399 400 FAKE_RET_FROM_EXCPN r9 401 402 bl do_privilege_fault 403 b ret_from_exception 404END(EV_PrivilegeV) 405 406; --------------------------------------------- 407; Extension Instruction Exception Handler 408; --------------------------------------------- 409ENTRY(EV_Extension) 410 411 EXCEPTION_PROLOGUE 412 413 lr r0, [efa] 414 mov r1, sp 415 416 FAKE_RET_FROM_EXCPN r9 417 418 bl do_extension_fault 419 b ret_from_exception 420END(EV_Extension) 421 422;######################### System Call Tracing ######################### 423 424tracesys: 425 ; save EFA in case tracer wants the PC of traced task 426 ; using ERET won't work since next-PC has already committed 427 lr r12, [efa] 428 GET_CURR_TASK_FIELD_PTR TASK_THREAD, r11 429 st r12, [r11, THREAD_FAULT_ADDR] ; thread.fault_address 430 431 ; PRE Sys Call Ptrace hook 432 mov r0, sp ; pt_regs needed 433 bl @syscall_trace_entry 434 435 ; Tracing code now returns the syscall num (orig or modif) 436 mov r8, r0 437 438 ; Do the Sys Call as we normally would. 439 ; Validate the Sys Call number 440 cmp r8, NR_syscalls 441 mov.hi r0, -ENOSYS 442 bhi tracesys_exit 443 444 ; Restore the sys-call args. Mere invocation of the hook abv could have 445 ; clobbered them (since they are in scratch regs). The tracer could also 446 ; have deliberately changed the syscall args: r0-r7 447 ld r0, [sp, PT_r0] 448 ld r1, [sp, PT_r1] 449 ld r2, [sp, PT_r2] 450 ld r3, [sp, PT_r3] 451 ld r4, [sp, PT_r4] 452 ld r5, [sp, PT_r5] 453 ld r6, [sp, PT_r6] 454 ld r7, [sp, PT_r7] 455 ld.as r9, [sys_call_table, r8] 456 jl [r9] ; Entry into Sys Call Handler 457 458tracesys_exit: 459 st r0, [sp, PT_r0] ; sys call return value in pt_regs 460 461 ;POST Sys Call Ptrace Hook 462 bl @syscall_trace_exit 463 b ret_from_exception ; NOT ret_from_system_call at is saves r0 which 464 ; we'd done before calling post hook above 465 466;################### Break Point TRAP ########################## 467 468 ; ======= (5b) Trap is due to Break-Point ========= 469 470trap_with_param: 471 472 ; stop_pc info by gdb needs this info 473 lr r0, [efa] 474 mov r1, sp 475 476 ; Now that we have read EFA, it is safe to do "fake" rtie 477 ; and get out of CPU exception mode 478 FAKE_RET_FROM_EXCPN r11 479 480 ; Save callee regs in case gdb wants to have a look 481 ; SP will grow up by size of CALLEE Reg-File 482 ; NOTE: clobbers r12 483 SAVE_CALLEE_SAVED_USER 484 485 ; save location of saved Callee Regs @ thread_struct->pc 486 GET_CURR_TASK_FIELD_PTR TASK_THREAD, r10 487 st sp, [r10, THREAD_CALLEE_REG] 488 489 ; Call the trap handler 490 bl do_non_swi_trap 491 492 ; unwind stack to discard Callee saved Regs 493 DISCARD_CALLEE_SAVED_USER 494 495 b ret_from_exception 496 497;##################### Trap Handling ############################## 498; 499; EV_Trap caused by TRAP_S and TRAP0 instructions. 500;------------------------------------------------------------------ 501; (1) System Calls 502; :parameters in r0-r7. 503; :r8 has the system call number 504; (2) Break Points 505;------------------------------------------------------------------ 506 507ENTRY(EV_Trap) 508 509 EXCEPTION_PROLOGUE 510 511 ;------- (4) What caused the Trap -------------- 512 lr r12, [ecr] 513 bmsk.f 0, r12, 7 514 bnz trap_with_param 515 516 ; ======= (5a) Trap is due to System Call ======== 517 518 ; Before doing anything, return from CPU Exception Mode 519 FAKE_RET_FROM_EXCPN r11 520 521 ; If syscall tracing ongoing, invoke pre-pos-hooks 522 GET_CURR_THR_INFO_FLAGS r10 523 btst r10, TIF_SYSCALL_TRACE 524 bnz tracesys ; this never comes back 525 526 ;============ This is normal System Call case ========== 527 ; Sys-call num shd not exceed the total system calls avail 528 cmp r8, NR_syscalls 529 mov.hi r0, -ENOSYS 530 bhi ret_from_system_call 531 532 ; Offset into the syscall_table and call handler 533 ld.as r9,[sys_call_table, r8] 534 jl [r9] ; Entry into Sys Call Handler 535 536 ; fall through to ret_from_system_call 537END(EV_Trap) 538 539ENTRY(ret_from_system_call) 540 541 st r0, [sp, PT_r0] ; sys call return value in pt_regs 542 543 ; fall through yet again to ret_from_exception 544 545;############# Return from Intr/Excp/Trap (Linux Specifics) ############## 546; 547; If ret to user mode do we need to handle signals, schedule() et al. 548 549ENTRY(ret_from_exception) 550 551 ; Pre-{IRQ,Trap,Exception} K/U mode from pt_regs->status32 552 ld r8, [sp, PT_status32] ; returning to User/Kernel Mode 553 554 bbit0 r8, STATUS_U_BIT, resume_kernel_mode 555 556 ; Before returning to User mode check-for-and-complete any pending work 557 ; such as rescheduling/signal-delivery etc. 558resume_user_mode_begin: 559 560 ; Disable IRQs to ensures that chk for pending work itself is atomic 561 ; (and we don't end up missing a NEED_RESCHED/SIGPENDING due to an 562 ; interim IRQ). 563 IRQ_DISABLE r10 564 565 ; Fast Path return to user mode if no pending work 566 GET_CURR_THR_INFO_FLAGS r9 567 and.f 0, r9, _TIF_WORK_MASK 568 bz restore_regs 569 570 ; --- (Slow Path #1) task preemption --- 571 bbit0 r9, TIF_NEED_RESCHED, .Lchk_pend_signals 572 mov blink, resume_user_mode_begin ; tail-call to U mode ret chks 573 b @schedule ; BTST+Bnz causes relo error in link 574 575.Lchk_pend_signals: 576 IRQ_ENABLE r10 577 578 ; --- (Slow Path #2) pending signal --- 579 mov r0, sp ; pt_regs for arg to do_signal()/do_notify_resume() 580 581 GET_CURR_THR_INFO_FLAGS r9 582 bbit0 r9, TIF_SIGPENDING, .Lchk_notify_resume 583 584 ; Normal Trap/IRQ entry only saves Scratch (caller-saved) regs 585 ; in pt_reg since the "C" ABI (kernel code) will automatically 586 ; save/restore callee-saved regs. 587 ; 588 ; However, here we need to explicitly save callee regs because 589 ; (i) If this signal causes coredump - full regfile needed 590 ; (ii) If signal is SIGTRAP/SIGSTOP, task is being traced thus 591 ; tracer might call PEEKUSR(CALLEE reg) 592 ; 593 ; NOTE: SP will grow up by size of CALLEE Reg-File 594 SAVE_CALLEE_SAVED_USER ; clobbers r12 595 596 ; save location of saved Callee Regs @ thread_struct->callee 597 GET_CURR_TASK_FIELD_PTR TASK_THREAD, r10 598 st sp, [r10, THREAD_CALLEE_REG] 599 600 bl @do_signal 601 602 ; Ideally we want to discard the Callee reg above, however if this was 603 ; a tracing signal, tracer could have done a POKEUSR(CALLEE reg) 604 RESTORE_CALLEE_SAVED_USER 605 606 b resume_user_mode_begin ; loop back to start of U mode ret 607 608 ; --- (Slow Path #3) notify_resume --- 609.Lchk_notify_resume: 610 btst r9, TIF_NOTIFY_RESUME 611 blnz @do_notify_resume 612 b resume_user_mode_begin ; unconditionally back to U mode ret chks 613 ; for single exit point from this block 614 615resume_kernel_mode: 616 617 ; Disable Interrupts from this point on 618 ; CONFIG_PREEMPT: This is a must for preempt_schedule_irq() 619 ; !CONFIG_PREEMPT: To ensure restore_regs is intr safe 620 IRQ_DISABLE r9 621 622#ifdef CONFIG_PREEMPT 623 624 ; Can't preempt if preemption disabled 625 GET_CURR_THR_INFO_FROM_SP r10 626 ld r8, [r10, THREAD_INFO_PREEMPT_COUNT] 627 brne r8, 0, restore_regs 628 629 ; check if this task's NEED_RESCHED flag set 630 ld r9, [r10, THREAD_INFO_FLAGS] 631 bbit0 r9, TIF_NEED_RESCHED, restore_regs 632 633 ; Invoke PREEMPTION 634 bl preempt_schedule_irq 635 636 ; preempt_schedule_irq() always returns with IRQ disabled 637#endif 638 639 ; fall through 640 641;############# Return from Intr/Excp/Trap (ARC Specifics) ############## 642; 643; Restore the saved sys context (common exit-path for EXCPN/IRQ/Trap) 644; IRQ shd definitely not happen between now and rtie 645; All 2 entry points to here already disable interrupts 646 647restore_regs : 648 649 TRACE_ASM_IRQ_ENABLE 650 651 lr r10, [status32] 652 653 ; Restore REG File. In case multiple Events outstanding, 654 ; use the same priorty as rtie: EXCPN, L2 IRQ, L1 IRQ, None 655 ; Note that we use realtime STATUS32 (not pt_regs->status32) to 656 ; decide that. 657 658 ; if Returning from Exception 659 bbit0 r10, STATUS_AE_BIT, not_exception 660 RESTORE_ALL_SYS 661 rtie 662 663 ; Not Exception so maybe Interrupts (Level 1 or 2) 664 665not_exception: 666 667#ifdef CONFIG_ARC_COMPACT_IRQ_LEVELS 668 669 ; Level 2 interrupt return Path - from hardware standpoint 670 bbit0 r10, STATUS_A2_BIT, not_level2_interrupt 671 672 ;------------------------------------------------------------------ 673 ; However the context returning might not have taken L2 intr itself 674 ; e.g. Task'A' user-code -> L2 intr -> schedule -> 'B' user-code ret 675 ; Special considerations needed for the context which took L2 intr 676 677 ld r9, [sp, PT_event] ; Ensure this is L2 intr context 678 brne r9, event_IRQ2, 149f 679 680 ;------------------------------------------------------------------ 681 ; if L2 IRQ interrupted an L1 ISR, we'd disabled preemption earlier 682 ; so that sched doesn't move to new task, causing L1 to be delayed 683 ; undeterministically. Now that we've achieved that, let's reset 684 ; things to what they were, before returning from L2 context 685 ;---------------------------------------------------------------- 686 687 ld r9, [sp, PT_status32] ; get statu32_l2 (saved in pt_regs) 688 bbit0 r9, STATUS_A1_BIT, 149f ; L1 not active when L2 IRQ, so normal 689 690 ; decrement thread_info->preempt_count (re-enable preemption) 691 GET_CURR_THR_INFO_FROM_SP r10 692 ld r9, [r10, THREAD_INFO_PREEMPT_COUNT] 693 694 ; paranoid check, given A1 was active when A2 happened, preempt count 695 ; must not be 0 because we would have incremented it. 696 ; If this does happen we simply HALT as it means a BUG !!! 697 cmp r9, 0 698 bnz 2f 699 flag 1 700 7012: 702 sub r9, r9, 1 703 st r9, [r10, THREAD_INFO_PREEMPT_COUNT] 704 705149: 706 ;return from level 2 707 RESTORE_ALL_INT2 708debug_marker_l2: 709 rtie 710 711not_level2_interrupt: 712 713#endif 714 715 bbit0 r10, STATUS_A1_BIT, not_level1_interrupt 716 717 ;return from level 1 718 719 RESTORE_ALL_INT1 720debug_marker_l1: 721 rtie 722 723not_level1_interrupt: 724 725 ;this case is for syscalls or Exceptions (with fake rtie) 726 727 RESTORE_ALL_SYS 728debug_marker_syscall: 729 rtie 730 731END(ret_from_exception) 732 733ENTRY(ret_from_fork) 734 ; when the forked child comes here from the __switch_to function 735 ; r0 has the last task pointer. 736 ; put last task in scheduler queue 737 bl @schedule_tail 738 739 ld r9, [sp, PT_status32] 740 brne r9, 0, 1f 741 742 jl.d [r14] ; kernel thread entry point 743 mov r0, r13 ; (see PF_KTHREAD block in copy_thread) 744 7451: 746 ; Return to user space 747 ; 1. Any forked task (Reach here via BRne above) 748 ; 2. First ever init task (Reach here via return from JL above) 749 ; This is the historic "kernel_execve" use-case, to return to init 750 ; user mode, in a round about way since that is always done from 751 ; a kernel thread which is executed via JL above but always returns 752 ; out whenever kernel_execve (now inline do_fork()) is involved 753 b ret_from_exception 754END(ret_from_fork) 755 756;################### Special Sys Call Wrappers ########################## 757 758ENTRY(sys_clone_wrapper) 759 SAVE_CALLEE_SAVED_USER 760 bl @sys_clone 761 DISCARD_CALLEE_SAVED_USER 762 763 GET_CURR_THR_INFO_FLAGS r10 764 btst r10, TIF_SYSCALL_TRACE 765 bnz tracesys_exit 766 767 b ret_from_system_call 768END(sys_clone_wrapper) 769 770#ifdef CONFIG_ARC_DW2_UNWIND 771; Workaround for bug 94179 (STAR ): 772; Despite -fasynchronous-unwind-tables, linker is not making dwarf2 unwinder 773; section (.debug_frame) as loadable. So we force it here. 774; This also fixes STAR 9000487933 where the prev-workaround (objcopy --setflag) 775; would not work after a clean build due to kernel build system dependencies. 776.section .debug_frame, "wa",@progbits 777#endif 778