cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

entry-compact.S (12205B)


      1/* SPDX-License-Identifier: GPL-2.0-only */
      2/*
      3 * Low Level Interrupts/Traps/Exceptions(non-TLB) Handling for ARCompact ISA
      4 *
      5 * Copyright (C) 2014-15 Synopsys, Inc. (www.synopsys.com)
      6 * Copyright (C) 2004, 2007-2010, 2011-2012 Synopsys, Inc. (www.synopsys.com)
      7 *
      8 * vineetg: May 2011
      9 *  -Userspace unaligned access emulation
     10 *
     11 * vineetg: Feb 2011 (ptrace low level code fixes)
     12 *  -traced syscall return code (r0) was not saved into pt_regs for restoring
     13 *   into user reg-file when traded task rets to user space.
     14 *  -syscalls needing arch-wrappers (mainly for passing sp as pt_regs)
     15 *   were not invoking post-syscall trace hook (jumping directly into
     16 *   ret_from_system_call)
     17 *
     18 * vineetg: Nov 2010:
     19 *  -Vector table jumps (@8 bytes) converted into branches (@4 bytes)
     20 *  -To maintain the slot size of 8 bytes/vector, added nop, which is
     21 *   not executed at runtime.
     22 *
     23 * vineetg: Nov 2009 (Everything needed for TIF_RESTORE_SIGMASK)
     24 *  -do_signal()invoked upon TIF_RESTORE_SIGMASK as well
     25 *  -Wrappers for sys_{,rt_}sigsuspend() no longer needed as they don't
     26 *   need ptregs anymore
     27 *
     28 * Vineetg: Oct 2009
     29 *  -In a rare scenario, Process gets a Priv-V exception and gets scheduled
     30 *   out. Since we don't do FAKE RTIE for Priv-V, CPU exception state remains
     31 *   active (AE bit enabled).  This causes a double fault for a subseq valid
     32 *   exception. Thus FAKE RTIE needed in low level Priv-Violation handler.
     33 *   Instr Error could also cause similar scenario, so same there as well.
     34 *
     35 * Vineetg: March 2009 (Supporting 2 levels of Interrupts)
     36 *
     37 * Vineetg: Aug 28th 2008: Bug #94984
     38 *  -Zero Overhead Loop Context shd be cleared when entering IRQ/EXcp/Trap
     39 *   Normally CPU does this automatically, however when doing FAKE rtie,
     40 *   we need to explicitly do this. The problem in macros
     41 *   FAKE_RET_FROM_EXCPN and FAKE_RET_FROM_EXCPN_LOCK_IRQ was that this bit
     42 *   was being "CLEARED" rather then "SET". Since it is Loop INHIBIT Bit,
     43 *   setting it and not clearing it clears ZOL context
     44 *
     45 * Vineetg: May 16th, 2008
     46 *  - r25 now contains the Current Task when in kernel
     47 *
     48 * Vineetg: Dec 22, 2007
     49 *    Minor Surgery of Low Level ISR to make it SMP safe
     50 *    - MMU_SCRATCH0 Reg used for freeing up r9 in Level 1 ISR
     51 *    - _current_task is made an array of NR_CPUS
     52 *    - Access of _current_task wrapped inside a macro so that if hardware
     53 *       team agrees for a dedicated reg, no other code is touched
     54 *
     55 * Amit Bhor, Rahul Trivedi, Kanika Nema, Sameer Dhavale : Codito Tech 2004
     56 */
     57
     58#include <linux/errno.h>
     59#include <linux/linkage.h>	/* {ENTRY,EXIT} */
     60#include <asm/entry.h>
     61#include <asm/irqflags.h>
     62
     63	.cpu A7
     64
     65;############################ Vector Table #################################
     66
     67.macro VECTOR  lbl
     68#if 1   /* Just in case, build breaks */
     69	j   \lbl
     70#else
     71	b   \lbl
     72	nop
     73#endif
     74.endm
     75
     76	.section .vector, "ax",@progbits
     77	.align 4
     78
     79/* Each entry in the vector table must occupy 2 words. Since it is a jump
     80 * across sections (.vector to .text) we are guaranteed that 'j somewhere'
     81 * will use the 'j limm' form of the instruction as long as somewhere is in
     82 * a section other than .vector.
     83 */
     84
     85; ********* Critical System Events **********************
     86VECTOR   res_service             ; 0x0, Reset Vector	(0x0)
     87VECTOR   mem_service             ; 0x8, Mem exception   (0x1)
     88VECTOR   instr_service           ; 0x10, Instrn Error   (0x2)
     89
     90; ******************** Device ISRs **********************
     91#ifdef CONFIG_ARC_COMPACT_IRQ_LEVELS
     92VECTOR   handle_interrupt_level2
     93#else
     94VECTOR   handle_interrupt_level1
     95#endif
     96
     97.rept   28
     98VECTOR   handle_interrupt_level1 ; Other devices
     99.endr
    100
    101/* FOR ARC600: timer = 0x3, uart = 0x8, emac = 0x10 */
    102
    103; ******************** Exceptions **********************
    104VECTOR   EV_MachineCheck         ; 0x100, Fatal Machine check   (0x20)
    105VECTOR   EV_TLBMissI             ; 0x108, Instruction TLB miss  (0x21)
    106VECTOR   EV_TLBMissD             ; 0x110, Data TLB miss         (0x22)
    107VECTOR   EV_TLBProtV             ; 0x118, Protection Violation  (0x23)
    108				 ;         or Misaligned Access
    109VECTOR   EV_PrivilegeV           ; 0x120, Privilege Violation   (0x24)
    110VECTOR   EV_Trap                 ; 0x128, Trap exception        (0x25)
    111VECTOR   EV_Extension            ; 0x130, Extn Instruction Excp (0x26)
    112
    113.rept   24
    114VECTOR   reserved                ; Reserved Exceptions
    115.endr
    116
    117
    118;##################### Scratch Mem for IRQ stack switching #############
    119
    120ARCFP_DATA int1_saved_reg
    121	.align 32
    122	.type   int1_saved_reg, @object
    123	.size   int1_saved_reg, 4
    124int1_saved_reg:
    125	.zero 4
    126
    127/* Each Interrupt level needs its own scratch */
    128ARCFP_DATA int2_saved_reg
    129	.type   int2_saved_reg, @object
    130	.size   int2_saved_reg, 4
    131int2_saved_reg:
    132	.zero 4
    133
    134; ---------------------------------------------
    135	.section .text, "ax",@progbits
    136
    137
    138reserved:
    139	flag 1		; Unexpected event, halt
    140
    141;##################### Interrupt Handling ##############################
    142
    143#ifdef CONFIG_ARC_COMPACT_IRQ_LEVELS
    144; ---------------------------------------------
    145;  Level 2 ISR: Can interrupt a Level 1 ISR
    146; ---------------------------------------------
    147ENTRY(handle_interrupt_level2)
    148
    149	INTERRUPT_PROLOGUE 2
    150
    151	;------------------------------------------------------
    152	; if L2 IRQ interrupted a L1 ISR, disable preemption
    153	;
    154	; This is to avoid a potential L1-L2-L1 scenario
    155	;  -L1 IRQ taken
    156	;  -L2 interrupts L1 (before L1 ISR could run)
    157	;  -preemption off IRQ, user task in syscall picked to run
    158	;  -RTIE to userspace
    159	;	Returns from L2 context fine
    160	;	But both L1 and L2 re-enabled, so another L1 can be taken
    161	;	while prev L1 is still unserviced
    162	;
    163	;------------------------------------------------------
    164
    165	; L2 interrupting L1 implies both L2 and L1 active
    166	; However both A2 and A1 are NOT set in STATUS32, thus
    167	; need to check STATUS32_L2 to determine if L1 was active
    168
    169	ld r9, [sp, PT_status32]        ; get statu32_l2 (saved in pt_regs)
    170	bbit0 r9, STATUS_A1_BIT, 1f     ; L1 not active when L2 IRQ, so normal
    171
    172	; bump thread_info->preempt_count (Disable preemption)
    173	GET_CURR_THR_INFO_FROM_SP   r10
    174	ld      r9, [r10, THREAD_INFO_PREEMPT_COUNT]
    175	add     r9, r9, 1
    176	st      r9, [r10, THREAD_INFO_PREEMPT_COUNT]
    177
    1781:
    179	;------------------------------------------------------
    180	; setup params for Linux common ISR and invoke it
    181	;------------------------------------------------------
    182	lr  r0, [icause2]
    183	and r0, r0, 0x1f
    184
    185	bl.d  @arch_do_IRQ
    186	mov r1, sp
    187
    188	mov r8,0x2
    189	sr r8, [AUX_IRQ_LV12]       ; clear bit in Sticky Status Reg
    190
    191	b   ret_from_exception
    192
    193END(handle_interrupt_level2)
    194
    195#endif
    196
    197; ---------------------------------------------
    198; User Mode Memory Bus Error Interrupt Handler
    199; (Kernel mode memory errors handled via separate exception vectors)
    200; ---------------------------------------------
    201ENTRY(mem_service)
    202
    203	INTERRUPT_PROLOGUE 2
    204
    205	mov r0, ilink2
    206	mov r1, sp
    207
    208	; User process needs to be killed with SIGBUS, but first need to get
    209	; out of the L2 interrupt context (drop to pure kernel mode) and jump
    210	; off to "C" code where SIGBUS in enqueued
    211	lr  r3, [status32]
    212	bclr r3, r3, STATUS_A2_BIT
    213	or  r3, r3, (STATUS_E1_MASK|STATUS_E2_MASK)
    214	sr  r3, [status32_l2]
    215	mov ilink2, 1f
    216	rtie
    2171:
    218	bl  do_memory_error
    219	b   ret_from_exception
    220END(mem_service)
    221
    222; ---------------------------------------------
    223;  Level 1 ISR
    224; ---------------------------------------------
    225ENTRY(handle_interrupt_level1)
    226
    227	INTERRUPT_PROLOGUE 1
    228
    229	lr  r0, [icause1]
    230	and r0, r0, 0x1f
    231
    232#ifdef CONFIG_TRACE_IRQFLAGS
    233	; icause1 needs to be read early, before calling tracing, which
    234	; can clobber scratch regs, hence use of stack to stash it
    235	push r0
    236	TRACE_ASM_IRQ_DISABLE
    237	pop  r0
    238#endif
    239
    240	bl.d  @arch_do_IRQ
    241	mov r1, sp
    242
    243	mov r8,0x1
    244	sr r8, [AUX_IRQ_LV12]       ; clear bit in Sticky Status Reg
    245
    246	b   ret_from_exception
    247END(handle_interrupt_level1)
    248
    249;################### Non TLB Exception Handling #############################
    250
    251; ---------------------------------------------
    252; Protection Violation Exception Handler
    253; ---------------------------------------------
    254
    255ENTRY(EV_TLBProtV)
    256
    257	EXCEPTION_PROLOGUE
    258
    259	mov r2, r10	; ECR set into r10 already
    260	lr  r0, [efa]	; Faulting Data address (not part of pt_regs saved above)
    261
    262	; Exception auto-disables further Intr/exceptions.
    263	; Re-enable them by pretending to return from exception
    264	; (so rest of handler executes in pure K mode)
    265
    266	FAKE_RET_FROM_EXCPN
    267
    268	mov   r1, sp	; Handle to pt_regs
    269
    270	;------ (5) Type of Protection Violation? ----------
    271	;
    272	; ProtV Hardware Exception is triggered for Access Faults of 2 types
    273	;   -Access Violation	: 00_23_(00|01|02|03)_00
    274	;			         x  r  w  r+w
    275	;   -Unaligned Access	: 00_23_04_00
    276	;
    277	bbit1 r2, ECR_C_BIT_PROTV_MISALIG_DATA, 4f
    278
    279	;========= (6a) Access Violation Processing ========
    280	bl  do_page_fault
    281	b   ret_from_exception
    282
    283	;========== (6b) Non aligned access ============
    2844:
    285
    286	SAVE_CALLEE_SAVED_USER
    287	mov r2, sp              ; callee_regs
    288
    289	bl  do_misaligned_access
    290
    291	; TBD: optimize - do this only if a callee reg was involved
    292	; either a dst of emulated LD/ST or src with address-writeback
    293	RESTORE_CALLEE_SAVED_USER
    294
    295	b   ret_from_exception
    296
    297END(EV_TLBProtV)
    298
    299; Wrapper for Linux page fault handler called from EV_TLBMiss*
    300; Very similar to ProtV handler case (6a) above, but avoids the extra checks
    301; for Misaligned access
    302;
    303ENTRY(call_do_page_fault)
    304
    305	EXCEPTION_PROLOGUE
    306	lr  r0, [efa]	; Faulting Data address
    307	mov   r1, sp
    308	FAKE_RET_FROM_EXCPN
    309
    310	mov blink, ret_from_exception
    311	b  do_page_fault
    312
    313END(call_do_page_fault)
    314
    315;############# Common Handlers for ARCompact and ARCv2 ##############
    316
    317#include "entry.S"
    318
    319;############# Return from Intr/Excp/Trap (ARC Specifics) ##############
    320;
    321; Restore the saved sys context (common exit-path for EXCPN/IRQ/Trap)
    322; IRQ shd definitely not happen between now and rtie
    323; All 2 entry points to here already disable interrupts
    324
    325.Lrestore_regs:
    326
    327	# Interrupts are actually disabled from this point on, but will get
    328	# reenabled after we return from interrupt/exception.
    329	# But irq tracer needs to be told now...
    330	TRACE_ASM_IRQ_ENABLE
    331
    332	lr	r10, [status32]
    333
    334	; Restore REG File. In case multiple Events outstanding,
    335	; use the same priority as rtie: EXCPN, L2 IRQ, L1 IRQ, None
    336	; Note that we use realtime STATUS32 (not pt_regs->status32) to
    337	; decide that.
    338
    339	and.f	0, r10, (STATUS_A1_MASK|STATUS_A2_MASK)
    340	bz	.Lexcep_or_pure_K_ret
    341
    342	; Returning from Interrupts (Level 1 or 2)
    343
    344#ifdef CONFIG_ARC_COMPACT_IRQ_LEVELS
    345
    346	; Level 2 interrupt return Path - from hardware standpoint
    347	bbit0  r10, STATUS_A2_BIT, not_level2_interrupt
    348
    349	;------------------------------------------------------------------
    350	; However the context returning might not have taken L2 intr itself
    351	; e.g. Task'A' user-code -> L2 intr -> schedule -> 'B' user-code ret
    352	; Special considerations needed for the context which took L2 intr
    353
    354	ld   r9, [sp, PT_event]        ; Ensure this is L2 intr context
    355	brne r9, event_IRQ2, 149f
    356
    357	;------------------------------------------------------------------
    358	; if L2 IRQ interrupted an L1 ISR,  we'd disabled preemption earlier
    359	; so that sched doesn't move to new task, causing L1 to be delayed
    360	; undeterministically. Now that we've achieved that, let's reset
    361	; things to what they were, before returning from L2 context
    362	;----------------------------------------------------------------
    363
    364	ld r9, [sp, PT_status32]       ; get statu32_l2 (saved in pt_regs)
    365	bbit0 r9, STATUS_A1_BIT, 149f  ; L1 not active when L2 IRQ, so normal
    366
    367	; decrement thread_info->preempt_count (re-enable preemption)
    368	GET_CURR_THR_INFO_FROM_SP   r10
    369	ld      r9, [r10, THREAD_INFO_PREEMPT_COUNT]
    370
    371	; paranoid check, given A1 was active when A2 happened, preempt count
    372	; must not be 0 because we would have incremented it.
    373	; If this does happen we simply HALT as it means a BUG !!!
    374	cmp     r9, 0
    375	bnz     2f
    376	flag 1
    377
    3782:
    379	sub     r9, r9, 1
    380	st      r9, [r10, THREAD_INFO_PREEMPT_COUNT]
    381
    382149:
    383	INTERRUPT_EPILOGUE 2	; return from level 2 interrupt
    384debug_marker_l2:
    385	rtie
    386
    387not_level2_interrupt:
    388
    389#endif
    390
    391	INTERRUPT_EPILOGUE 1	; return from level 1 interrupt
    392debug_marker_l1:
    393	rtie
    394
    395.Lexcep_or_pure_K_ret:
    396
    397	;this case is for syscalls or Exceptions or pure kernel mode
    398
    399	EXCEPTION_EPILOGUE
    400debug_marker_syscall:
    401	rtie
    402
    403END(ret_from_exception)