xref: /openbmc/linux/arch/arc/kernel/entry.S (revision c10d6969b0958e151c9dd6cfae70ce8db9db3c7e)
1/*
2 * Low Level Interrupts/Traps/Exceptions(non-TLB) Handling for ARC
3 *
4 * Copyright (C) 2004, 2007-2010, 2011-2012 Synopsys, Inc. (www.synopsys.com)
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 as
8 * published by the Free Software Foundation.
9 *
10 * vineetg: May 2011
11 *  -Userspace unaligned access emulation
12 *
13 * vineetg: Feb 2011 (ptrace low level code fixes)
14 *  -traced syscall return code (r0) was not saved into pt_regs for restoring
15 *   into user reg-file when traded task rets to user space.
16 *  -syscalls needing arch-wrappers (mainly for passing sp as pt_regs)
17 *   were not invoking post-syscall trace hook (jumping directly into
18 *   ret_from_system_call)
19 *
20 * vineetg: Nov 2010:
21 *  -Vector table jumps (@8 bytes) converted into branches (@4 bytes)
22 *  -To maintain the slot size of 8 bytes/vector, added nop, which is
23 *   not executed at runtime.
24 *
25 * vineetg: Nov 2009 (Everything needed for TIF_RESTORE_SIGMASK)
26 *  -do_signal()invoked upon TIF_RESTORE_SIGMASK as well
27 *  -Wrappers for sys_{,rt_}sigsuspend() nolonger needed as they don't
28 *   need ptregs anymore
29 *
30 * Vineetg: Oct 2009
31 *  -In a rare scenario, Process gets a Priv-V exception and gets scheduled
32 *   out. Since we don't do FAKE RTIE for Priv-V, CPU excpetion state remains
33 *   active (AE bit enabled).  This causes a double fault for a subseq valid
34 *   exception. Thus FAKE RTIE needed in low level Priv-Violation handler.
35 *   Instr Error could also cause similar scenario, so same there as well.
36 *
37 * Vineetg: March 2009 (Supporting 2 levels of Interrupts)
38 *
39 * Vineetg: Aug 28th 2008: Bug #94984
40 *  -Zero Overhead Loop Context shd be cleared when entering IRQ/EXcp/Trap
41 *   Normally CPU does this automatically, however when doing FAKE rtie,
42 *   we need to explicitly do this. The problem in macros
43 *   FAKE_RET_FROM_EXCPN and FAKE_RET_FROM_EXCPN_LOCK_IRQ was that this bit
44 *   was being "CLEARED" rather then "SET". Since it is Loop INHIBIT Bit,
45 *   setting it and not clearing it clears ZOL context
46 *
47 * Vineetg: May 16th, 2008
48 *  - r25 now contains the Current Task when in kernel
49 *
50 * Vineetg: Dec 22, 2007
51 *    Minor Surgery of Low Level ISR to make it SMP safe
52 *    - MMU_SCRATCH0 Reg used for freeing up r9 in Level 1 ISR
53 *    - _current_task is made an array of NR_CPUS
54 *    - Access of _current_task wrapped inside a macro so that if hardware
55 *       team agrees for a dedicated reg, no other code is touched
56 *
57 * Amit Bhor, Rahul Trivedi, Kanika Nema, Sameer Dhavale : Codito Tech 2004
58 */
59
60/*------------------------------------------------------------------
61 *    Function                            ABI
62 *------------------------------------------------------------------
63 *
64 *  Arguments                           r0 - r7
65 *  Caller Saved Registers              r0 - r12
66 *  Callee Saved Registers              r13- r25
67 *  Global Pointer (gp)                 r26
68 *  Frame Pointer (fp)                  r27
69 *  Stack Pointer (sp)                  r28
70 *  Interrupt link register (ilink1)    r29
71 *  Interrupt link register (ilink2)    r30
72 *  Branch link register (blink)        r31
73 *------------------------------------------------------------------
74 */
75
76	.cpu A7
77
78;############################ Vector Table #################################
79
80.macro VECTOR  lbl
81#if 1   /* Just in case, build breaks */
82	j   \lbl
83#else
84	b   \lbl
85	nop
86#endif
87.endm
88
89	.section .vector, "ax",@progbits
90	.align 4
91
92/* Each entry in the vector table must occupy 2 words. Since it is a jump
93 * across sections (.vector to .text) we are gauranteed that 'j somewhere'
94 * will use the 'j limm' form of the intrsuction as long as somewhere is in
95 * a section other than .vector.
96 */
97
98; ********* Critical System Events **********************
99VECTOR   res_service             ; 0x0, Restart Vector  (0x0)
100VECTOR   mem_service             ; 0x8, Mem exception   (0x1)
101VECTOR   instr_service           ; 0x10, Instrn Error   (0x2)
102
103; ******************** Device ISRs **********************
104#ifdef CONFIG_ARC_IRQ3_LV2
105VECTOR   handle_interrupt_level2
106#else
107VECTOR   handle_interrupt_level1
108#endif
109
110VECTOR   handle_interrupt_level1
111
112#ifdef CONFIG_ARC_IRQ5_LV2
113VECTOR   handle_interrupt_level2
114#else
115VECTOR   handle_interrupt_level1
116#endif
117
118#ifdef CONFIG_ARC_IRQ6_LV2
119VECTOR   handle_interrupt_level2
120#else
121VECTOR   handle_interrupt_level1
122#endif
123
124.rept   25
125VECTOR   handle_interrupt_level1 ; Other devices
126.endr
127
128/* FOR ARC600: timer = 0x3, uart = 0x8, emac = 0x10 */
129
130; ******************** Exceptions **********************
131VECTOR   EV_MachineCheck         ; 0x100, Fatal Machine check   (0x20)
132VECTOR   EV_TLBMissI             ; 0x108, Intruction TLB miss   (0x21)
133VECTOR   EV_TLBMissD             ; 0x110, Data TLB miss         (0x22)
134VECTOR   EV_TLBProtV             ; 0x118, Protection Violation  (0x23)
135				 ;         or Misaligned Access
136VECTOR   EV_PrivilegeV           ; 0x120, Privilege Violation   (0x24)
137VECTOR   EV_Trap                 ; 0x128, Trap exception        (0x25)
138VECTOR   EV_Extension            ; 0x130, Extn Intruction Excp  (0x26)
139
140.rept   24
141VECTOR   reserved                ; Reserved Exceptions
142.endr
143
144#include <linux/linkage.h>   /* {EXTRY,EXIT} */
145#include <asm/entry.h>       /* SAVE_ALL_{INT1,INT2,SYS...} */
146#include <asm/errno.h>
147#include <asm/arcregs.h>
148#include <asm/irqflags.h>
149
150;##################### Scratch Mem for IRQ stack switching #############
151
152ARCFP_DATA int1_saved_reg
153	.align 32
154	.type   int1_saved_reg, @object
155	.size   int1_saved_reg, 4
156int1_saved_reg:
157	.zero 4
158
159/* Each Interrupt level needs its own scratch */
160#ifdef CONFIG_ARC_COMPACT_IRQ_LEVELS
161
162ARCFP_DATA int2_saved_reg
163	.type   int2_saved_reg, @object
164	.size   int2_saved_reg, 4
165int2_saved_reg:
166	.zero 4
167
168#endif
169
170; ---------------------------------------------
171	.section .text, "ax",@progbits
172
173res_service:		; processor restart
174	flag    0x1     ; not implemented
175	nop
176	nop
177
178reserved:		; processor restart
179	rtie            ; jump to processor initializations
180
181;##################### Interrupt Handling ##############################
182
183#ifdef CONFIG_ARC_COMPACT_IRQ_LEVELS
184; ---------------------------------------------
185;  Level 2 ISR: Can interrupt a Level 1 ISR
186; ---------------------------------------------
187ENTRY(handle_interrupt_level2)
188
189	INTERRUPT_PROLOGUE 2
190
191	;------------------------------------------------------
192	; if L2 IRQ interrupted a L1 ISR, disable preemption
193	;------------------------------------------------------
194
195	ld r9, [sp, PT_status32]        ; get statu32_l2 (saved in pt_regs)
196	bbit0 r9, STATUS_A1_BIT, 1f     ; L1 not active when L2 IRQ, so normal
197
198	; A1 is set in status32_l2
199	; bump thread_info->preempt_count (Disable preemption)
200	GET_CURR_THR_INFO_FROM_SP   r10
201	ld      r9, [r10, THREAD_INFO_PREEMPT_COUNT]
202	add     r9, r9, 1
203	st      r9, [r10, THREAD_INFO_PREEMPT_COUNT]
204
2051:
206	;------------------------------------------------------
207	; setup params for Linux common ISR and invoke it
208	;------------------------------------------------------
209	lr  r0, [icause2]
210	and r0, r0, 0x1f
211
212	bl.d  @arch_do_IRQ
213	mov r1, sp
214
215	mov r8,0x2
216	sr r8, [AUX_IRQ_LV12]       ; clear bit in Sticky Status Reg
217
218	b   ret_from_exception
219
220END(handle_interrupt_level2)
221
222#endif
223
224; ---------------------------------------------
225;  Level 1 ISR
226; ---------------------------------------------
227ENTRY(handle_interrupt_level1)
228
229	INTERRUPT_PROLOGUE 1
230
231	lr  r0, [icause1]
232	and r0, r0, 0x1f
233
234#ifdef CONFIG_TRACE_IRQFLAGS
235	; icause1 needs to be read early, before calling tracing, which
236	; can clobber scratch regs, hence use of stack to stash it
237	push r0
238	TRACE_ASM_IRQ_DISABLE
239	pop  r0
240#endif
241
242	bl.d  @arch_do_IRQ
243	mov r1, sp
244
245	mov r8,0x1
246	sr r8, [AUX_IRQ_LV12]       ; clear bit in Sticky Status Reg
247
248	b   ret_from_exception
249END(handle_interrupt_level1)
250
251;################### Non TLB Exception Handling #############################
252
253; ---------------------------------------------
254; Instruction Error Exception Handler
255; ---------------------------------------------
256
257ENTRY(instr_service)
258
259	EXCEPTION_PROLOGUE
260
261	lr  r0, [efa]
262	mov r1, sp
263
264	FAKE_RET_FROM_EXCPN
265
266	bl  do_insterror_or_kprobe
267	b   ret_from_exception
268END(instr_service)
269
270; ---------------------------------------------
271; Memory Error Exception Handler
272; ---------------------------------------------
273
274ENTRY(mem_service)
275
276	EXCEPTION_PROLOGUE
277
278	lr  r0, [efa]
279	mov r1, sp
280
281	FAKE_RET_FROM_EXCPN
282
283	bl  do_memory_error
284	b   ret_from_exception
285END(mem_service)
286
287; ---------------------------------------------
288; Machine Check Exception Handler
289; ---------------------------------------------
290
291ENTRY(EV_MachineCheck)
292
293	EXCEPTION_PROLOGUE
294
295	lr  r2, [ecr]
296	lr  r0, [efa]
297	mov r1, sp
298
299	lsr  	r3, r2, 8
300	bmsk 	r3, r3, 7
301	brne    r3, ECR_C_MCHK_DUP_TLB, 1f
302
303	bl      do_tlb_overlap_fault
304	b       ret_from_exception
305
3061:
307	; DEAD END: can't do much, display Regs and HALT
308	SAVE_CALLEE_SAVED_USER
309
310	GET_CURR_TASK_FIELD_PTR   TASK_THREAD, r10
311	st  sp, [r10, THREAD_CALLEE_REG]
312
313	j  do_machine_check_fault
314
315END(EV_MachineCheck)
316
317; ---------------------------------------------
318; Protection Violation Exception Handler
319; ---------------------------------------------
320
321ENTRY(EV_TLBProtV)
322
323	EXCEPTION_PROLOGUE
324
325	lr  r2, [ecr]
326	lr  r0, [efa]	; Faulting Data addr (not part of pt_regs saved above)
327
328	; Exception auto-disables further Intr/exceptions.
329	; Re-enable them by pretending to return from exception
330	; (so rest of handler executes in pure K mode)
331
332	FAKE_RET_FROM_EXCPN
333
334	mov   r1, sp	; Handle to pt_regs
335
336	;------ (5) Type of Protection Violation? ----------
337	;
338	; ProtV Hardware Exception is triggered for Access Faults of 2 types
339	;   -Access Violaton	: 00_23_(00|01|02|03)_00
340	;			         x  r  w  r+w
341	;   -Unaligned Access	: 00_23_04_00
342	;
343	bbit1 r2, ECR_C_BIT_PROTV_MISALIG_DATA, 4f
344
345	;========= (6a) Access Violation Processing ========
346	bl  do_page_fault
347	b   ret_from_exception
348
349	;========== (6b) Non aligned access ============
3504:
351
352	SAVE_CALLEE_SAVED_USER
353	mov r2, sp              ; callee_regs
354
355	bl  do_misaligned_access
356
357	; TBD: optimize - do this only if a callee reg was involved
358	; either a dst of emulated LD/ST or src with address-writeback
359	RESTORE_CALLEE_SAVED_USER
360
361	b   ret_from_exception
362
363END(EV_TLBProtV)
364
365; Wrapper for Linux page fault handler called from EV_TLBMiss*
366; Very similar to ProtV handler case (6a) above, but avoids the extra checks
367; for Misaligned access
368;
369ENTRY(call_do_page_fault)
370
371	EXCEPTION_PROLOGUE
372	lr  r0, [efa]	; Faulting Data address
373	mov   r1, sp
374	FAKE_RET_FROM_EXCPN
375
376	mov blink, ret_from_exception
377	b  do_page_fault
378
379END(call_do_page_fault)
380
381; ---------------------------------------------
382; Privilege Violation Exception Handler
383; ---------------------------------------------
384ENTRY(EV_PrivilegeV)
385
386	EXCEPTION_PROLOGUE
387
388	lr  r0, [efa]
389	mov r1, sp
390
391	FAKE_RET_FROM_EXCPN
392
393	bl  do_privilege_fault
394	b   ret_from_exception
395END(EV_PrivilegeV)
396
397; ---------------------------------------------
398; Extension Instruction Exception Handler
399; ---------------------------------------------
400ENTRY(EV_Extension)
401
402	EXCEPTION_PROLOGUE
403
404	lr  r0, [efa]
405	mov r1, sp
406
407	FAKE_RET_FROM_EXCPN
408
409	bl  do_extension_fault
410	b   ret_from_exception
411END(EV_Extension)
412
413;################ Trap Handling (Syscall, Breakpoint) ##################
414
415; ---------------------------------------------
416; syscall Tracing
417; ---------------------------------------------
418tracesys:
419	; save EFA in case tracer wants the PC of traced task
420	; using ERET won't work since next-PC has already committed
421	lr  r12, [efa]
422	GET_CURR_TASK_FIELD_PTR   TASK_THREAD, r11
423	st  r12, [r11, THREAD_FAULT_ADDR]	; thread.fault_address
424
425	; PRE Sys Call Ptrace hook
426	mov r0, sp			; pt_regs needed
427	bl  @syscall_trace_entry
428
429	; Tracing code now returns the syscall num (orig or modif)
430	mov r8, r0
431
432	; Do the Sys Call as we normally would.
433	; Validate the Sys Call number
434	cmp     r8,  NR_syscalls
435	mov.hi  r0, -ENOSYS
436	bhi     tracesys_exit
437
438	; Restore the sys-call args. Mere invocation of the hook abv could have
439	; clobbered them (since they are in scratch regs). The tracer could also
440	; have deliberately changed the syscall args: r0-r7
441	ld  r0, [sp, PT_r0]
442	ld  r1, [sp, PT_r1]
443	ld  r2, [sp, PT_r2]
444	ld  r3, [sp, PT_r3]
445	ld  r4, [sp, PT_r4]
446	ld  r5, [sp, PT_r5]
447	ld  r6, [sp, PT_r6]
448	ld  r7, [sp, PT_r7]
449	ld.as   r9, [sys_call_table, r8]
450	jl      [r9]        ; Entry into Sys Call Handler
451
452tracesys_exit:
453	st  r0, [sp, PT_r0]     ; sys call return value in pt_regs
454
455	;POST Sys Call Ptrace Hook
456	bl  @syscall_trace_exit
457	b   ret_from_exception ; NOT ret_from_system_call at is saves r0 which
458	; we'd done before calling post hook above
459
460; ---------------------------------------------
461; Breakpoint TRAP
462; ---------------------------------------------
463trap_with_param:
464
465	; stop_pc info by gdb needs this info
466	lr  r0, [efa]
467	mov r1, sp
468
469	; Now that we have read EFA, it is safe to do "fake" rtie
470	;   and get out of CPU exception mode
471	FAKE_RET_FROM_EXCPN
472
473	; Save callee regs in case gdb wants to have a look
474	; SP will grow up by size of CALLEE Reg-File
475	; NOTE: clobbers r12
476	SAVE_CALLEE_SAVED_USER
477
478	; save location of saved Callee Regs @ thread_struct->pc
479	GET_CURR_TASK_FIELD_PTR   TASK_THREAD, r10
480	st  sp, [r10, THREAD_CALLEE_REG]
481
482	; Call the trap handler
483	bl  do_non_swi_trap
484
485	; unwind stack to discard Callee saved Regs
486	DISCARD_CALLEE_SAVED_USER
487
488	b   ret_from_exception
489
490; ---------------------------------------------
491; syscall TRAP
492; ABI: (r0-r7) upto 8 args, (r8) syscall number
493; ---------------------------------------------
494
495ENTRY(EV_Trap)
496
497	EXCEPTION_PROLOGUE
498
499	;============ TRAP 1   :breakpoints
500	lr     r10, [ecr]
501	bmsk.f 0, r10, 7
502	bnz    trap_with_param
503
504	;============ TRAP  (no param): syscall top level
505
506	; First return from Exception to pure K mode (Exception/IRQs renabled)
507	FAKE_RET_FROM_EXCPN
508
509	; If syscall tracing ongoing, invoke pre-post-hooks
510	GET_CURR_THR_INFO_FLAGS   r10
511	btst r10, TIF_SYSCALL_TRACE
512	bnz tracesys  ; this never comes back
513
514	;============ Normal syscall case
515
516	; syscall num shd not exceed the total system calls avail
517	cmp     r8,  NR_syscalls
518	mov.hi  r0, -ENOSYS
519	bhi     ret_from_system_call
520
521	; Offset into the syscall_table and call handler
522	ld.as   r9,[sys_call_table, r8]
523	jl      [r9]        ; Entry into Sys Call Handler
524
525	; fall through to ret_from_system_call
526END(EV_Trap)
527
528ENTRY(ret_from_system_call)
529
530	st  r0, [sp, PT_r0]     ; sys call return value in pt_regs
531
532	; fall through yet again to ret_from_exception
533
534;############# Return from Intr/Excp/Trap (Linux Specifics) ##############
535;
536; If ret to user mode do we need to handle signals, schedule() et al.
537
538ENTRY(ret_from_exception)
539
540	; Pre-{IRQ,Trap,Exception} K/U mode from pt_regs->status32
541	ld  r8, [sp, PT_status32]   ; returning to User/Kernel Mode
542
543	bbit0  r8, STATUS_U_BIT, resume_kernel_mode
544
545	; Before returning to User mode check-for-and-complete any pending work
546	; such as rescheduling/signal-delivery etc.
547resume_user_mode_begin:
548
549	; Disable IRQs to ensures that chk for pending work itself is atomic
550	; (and we don't end up missing a NEED_RESCHED/SIGPENDING due to an
551	; interim IRQ).
552	IRQ_DISABLE	r10
553
554	; Fast Path return to user mode if no pending work
555	GET_CURR_THR_INFO_FLAGS   r9
556	and.f  0,  r9, _TIF_WORK_MASK
557	bz     .Lrestore_regs
558
559	; --- (Slow Path #1) task preemption ---
560	bbit0  r9, TIF_NEED_RESCHED, .Lchk_pend_signals
561	mov    blink, resume_user_mode_begin  ; tail-call to U mode ret chks
562	b      @schedule 	; BTST+Bnz causes relo error in link
563
564.Lchk_pend_signals:
565	IRQ_ENABLE	r10
566
567	; --- (Slow Path #2) pending signal  ---
568	mov r0, sp	; pt_regs for arg to do_signal()/do_notify_resume()
569
570	GET_CURR_THR_INFO_FLAGS   r9
571	bbit0  r9, TIF_SIGPENDING, .Lchk_notify_resume
572
573	; Normal Trap/IRQ entry only saves Scratch (caller-saved) regs
574	; in pt_reg since the "C" ABI (kernel code) will automatically
575	; save/restore callee-saved regs.
576	;
577	; However, here we need to explicitly save callee regs because
578	; (i)  If this signal causes coredump - full regfile needed
579	; (ii) If signal is SIGTRAP/SIGSTOP, task is being traced thus
580	;      tracer might call PEEKUSR(CALLEE reg)
581	;
582	; NOTE: SP will grow up by size of CALLEE Reg-File
583	SAVE_CALLEE_SAVED_USER		; clobbers r12
584
585	; save location of saved Callee Regs @ thread_struct->callee
586	GET_CURR_TASK_FIELD_PTR   TASK_THREAD, r10
587	st  sp, [r10, THREAD_CALLEE_REG]
588
589	bl  @do_signal
590
591	; Ideally we want to discard the Callee reg above, however if this was
592	; a tracing signal, tracer could have done a POKEUSR(CALLEE reg)
593	RESTORE_CALLEE_SAVED_USER
594
595	b      resume_user_mode_begin	; loop back to start of U mode ret
596
597	; --- (Slow Path #3) notify_resume ---
598.Lchk_notify_resume:
599	btst   r9, TIF_NOTIFY_RESUME
600	blnz   @do_notify_resume
601	b      resume_user_mode_begin	; unconditionally back to U mode ret chks
602					; for single exit point from this block
603
604resume_kernel_mode:
605
606	; Disable Interrupts from this point on
607	; CONFIG_PREEMPT: This is a must for preempt_schedule_irq()
608	; !CONFIG_PREEMPT: To ensure restore_regs is intr safe
609	IRQ_DISABLE	r9
610
611#ifdef CONFIG_PREEMPT
612
613	; Can't preempt if preemption disabled
614	GET_CURR_THR_INFO_FROM_SP   r10
615	ld  r8, [r10, THREAD_INFO_PREEMPT_COUNT]
616	brne  r8, 0, .Lrestore_regs
617
618	; check if this task's NEED_RESCHED flag set
619	ld  r9, [r10, THREAD_INFO_FLAGS]
620	bbit0  r9, TIF_NEED_RESCHED, .Lrestore_regs
621
622	; Invoke PREEMPTION
623	bl      preempt_schedule_irq
624
625	; preempt_schedule_irq() always returns with IRQ disabled
626#endif
627
628	; fall through
629
630;############# Return from Intr/Excp/Trap (ARC Specifics) ##############
631;
632; Restore the saved sys context (common exit-path for EXCPN/IRQ/Trap)
633; IRQ shd definitely not happen between now and rtie
634; All 2 entry points to here already disable interrupts
635
636.Lrestore_regs:
637
638	TRACE_ASM_IRQ_ENABLE
639
640	lr	r10, [status32]
641
642	; Restore REG File. In case multiple Events outstanding,
643	; use the same priorty as rtie: EXCPN, L2 IRQ, L1 IRQ, None
644	; Note that we use realtime STATUS32 (not pt_regs->status32) to
645	; decide that.
646
647	; if Returning from Exception
648	bbit0  r10, STATUS_AE_BIT, not_exception
649	EXCEPTION_EPILOGUE
650	rtie
651
652	; Not Exception so maybe Interrupts (Level 1 or 2)
653
654not_exception:
655
656#ifdef CONFIG_ARC_COMPACT_IRQ_LEVELS
657
658	; Level 2 interrupt return Path - from hardware standpoint
659	bbit0  r10, STATUS_A2_BIT, not_level2_interrupt
660
661	;------------------------------------------------------------------
662	; However the context returning might not have taken L2 intr itself
663	; e.g. Task'A' user-code -> L2 intr -> schedule -> 'B' user-code ret
664	; Special considerations needed for the context which took L2 intr
665
666	ld   r9, [sp, PT_event]        ; Ensure this is L2 intr context
667	brne r9, event_IRQ2, 149f
668
669	;------------------------------------------------------------------
670	; if L2 IRQ interrupted an L1 ISR,  we'd disabled preemption earlier
671	; so that sched doesn't move to new task, causing L1 to be delayed
672	; undeterministically. Now that we've achieved that, let's reset
673	; things to what they were, before returning from L2 context
674	;----------------------------------------------------------------
675
676	ld r9, [sp, PT_status32]       ; get statu32_l2 (saved in pt_regs)
677	bbit0 r9, STATUS_A1_BIT, 149f  ; L1 not active when L2 IRQ, so normal
678
679	; decrement thread_info->preempt_count (re-enable preemption)
680	GET_CURR_THR_INFO_FROM_SP   r10
681	ld      r9, [r10, THREAD_INFO_PREEMPT_COUNT]
682
683	; paranoid check, given A1 was active when A2 happened, preempt count
684	; must not be 0 because we would have incremented it.
685	; If this does happen we simply HALT as it means a BUG !!!
686	cmp     r9, 0
687	bnz     2f
688	flag 1
689
6902:
691	sub     r9, r9, 1
692	st      r9, [r10, THREAD_INFO_PREEMPT_COUNT]
693
694149:
695	;return from level 2
696	INTERRUPT_EPILOGUE 2
697debug_marker_l2:
698	rtie
699
700not_level2_interrupt:
701
702#endif
703
704	bbit0  r10, STATUS_A1_BIT, not_level1_interrupt
705
706	;return from level 1
707	INTERRUPT_EPILOGUE 1
708debug_marker_l1:
709	rtie
710
711not_level1_interrupt:
712
713	;this case is for syscalls or Exceptions (with fake rtie)
714
715	EXCEPTION_EPILOGUE
716debug_marker_syscall:
717	rtie
718
719END(ret_from_exception)
720
721ENTRY(ret_from_fork)
722	; when the forked child comes here from the __switch_to function
723	; r0 has the last task pointer.
724	; put last task in scheduler queue
725	bl   @schedule_tail
726
727	ld   r9, [sp, PT_status32]
728	brne r9, 0, 1f
729
730	jl.d [r14]		; kernel thread entry point
731	mov  r0, r13		; (see PF_KTHREAD block in copy_thread)
732
7331:
734	; Return to user space
735	; 1. Any forked task (Reach here via BRne above)
736	; 2. First ever init task (Reach here via return from JL above)
737	;    This is the historic "kernel_execve" use-case, to return to init
738	;    user mode, in a round about way since that is always done from
739	;    a kernel thread which is executed via JL above but always returns
740	;    out whenever kernel_execve (now inline do_fork()) is involved
741	b    ret_from_exception
742END(ret_from_fork)
743
744;################### Special Sys Call Wrappers ##########################
745
746ENTRY(sys_clone_wrapper)
747	SAVE_CALLEE_SAVED_USER
748	bl  @sys_clone
749	DISCARD_CALLEE_SAVED_USER
750
751	GET_CURR_THR_INFO_FLAGS   r10
752	btst r10, TIF_SYSCALL_TRACE
753	bnz  tracesys_exit
754
755	b ret_from_system_call
756END(sys_clone_wrapper)
757
758#ifdef CONFIG_ARC_DW2_UNWIND
759; Workaround for bug 94179 (STAR ):
760; Despite -fasynchronous-unwind-tables, linker is not making dwarf2 unwinder
761; section (.debug_frame) as loadable. So we force it here.
762; This also fixes STAR 9000487933 where the prev-workaround (objcopy --setflag)
763; would not work after a clean build due to kernel build system dependencies.
764.section .debug_frame, "wa",@progbits
765#endif
766