arm64: factor out entry stack manipulation
authorMark Rutland <mark.rutland@arm.com>
Wed, 19 Jul 2017 16:24:49 +0000 (17:24 +0100)
committerMark Rutland <mark.rutland@arm.com>
Tue, 15 Aug 2017 17:35:40 +0000 (18:35 +0100)
commitb11e5759bfac0c474d95ec4780b1566350e64cad
tree4b465918a07a398066b9ad39086cf2c048254e02
parent170976bcab073870af059b5e848c80689bd5e931
arm64: factor out entry stack manipulation

In subsequent patches, we will detect stack overflow in our exception
entry code, by verifying the SP after it has been decremented to make
space for the exception regs.

This verification code is small, and we can minimize its impact by
placing it directly in the vectors. To avoid redundant modification of
the SP, we also need to move the initial decrement of the SP into the
vectors.

As a preparatory step, this patch introduces kernel_ventry, which
performs this decrement, and updates the entry code accordingly.
Subsequent patches will fold SP verification into kernel_ventry.

There should be no functional change as a result of this patch.

Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
[Mark: turn into prep patch, expand commit msg]
Signed-off-by: Mark Rutland <mark.rutland@arm.com>
Reviewed-by: Will Deacon <will.deacon@arm.com>
Tested-by: Laura Abbott <labbott@redhat.com>
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: James Morse <james.morse@arm.com>
arch/arm64/kernel/entry.S