Loading...
1/* SPDX-License-Identifier: GPL-2.0 */
2 /* SunOS's execv() call only specifies the argv argument, the
3 * environment settings are the same as the calling processes.
4 */
5sys64_execve:
6 set sys_execve, %g1
7 jmpl %g1, %g0
8 flushw
9
10sys64_execveat:
11 set sys_execveat, %g1
12 jmpl %g1, %g0
13 flushw
14
15#ifdef CONFIG_COMPAT
16sunos_execv:
17 mov %g0, %o2
18sys32_execve:
19 set compat_sys_execve, %g1
20 jmpl %g1, %g0
21 flushw
22
23sys32_execveat:
24 set compat_sys_execveat, %g1
25 jmpl %g1, %g0
26 flushw
27#endif
28
29 .align 32
30#ifdef CONFIG_COMPAT
31sys32_sigstack:
32 ba,pt %xcc, do_sys32_sigstack
33 mov %i6, %o2
34#endif
35 .align 32
36#ifdef CONFIG_COMPAT
37sys32_sigreturn:
38 add %sp, PTREGS_OFF, %o0
39 call do_sigreturn32
40 add %o7, 1f-.-4, %o7
41 nop
42#endif
43sys_rt_sigreturn:
44 add %sp, PTREGS_OFF, %o0
45 call do_rt_sigreturn
46 add %o7, 1f-.-4, %o7
47 nop
48#ifdef CONFIG_COMPAT
49sys32_rt_sigreturn:
50 add %sp, PTREGS_OFF, %o0
51 call do_rt_sigreturn32
52 add %o7, 1f-.-4, %o7
53 nop
54#endif
55 .align 32
561: ldx [%g6 + TI_FLAGS], %l5
57 andcc %l5, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
58 be,pt %icc, rtrap
59 nop
60 call syscall_trace_leave
61 add %sp, PTREGS_OFF, %o0
62 ba,pt %xcc, rtrap
63 nop
64
65 /* This is how fork() was meant to be done, 8 instruction entry.
66 *
67 * I questioned the following code briefly, let me clear things
68 * up so you must not reason on it like I did.
69 *
70 * Know the fork_kpsr etc. we use in the sparc32 port? We don't
71 * need it here because the only piece of window state we copy to
72 * the child is the CWP register. Even if the parent sleeps,
73 * we are safe because we stuck it into pt_regs of the parent
74 * so it will not change.
75 *
76 * XXX This raises the question, whether we can do the same on
77 * XXX sparc32 to get rid of fork_kpsr _and_ fork_kwim. The
78 * XXX answer is yes. We stick fork_kpsr in UREG_G0 and
79 * XXX fork_kwim in UREG_G1 (global registers are considered
80 * XXX volatile across a system call in the sparc ABI I think
81 * XXX if it isn't we can use regs->y instead, anyone who depends
82 * XXX upon the Y register being preserved across a fork deserves
83 * XXX to lose).
84 *
85 * In fact we should take advantage of that fact for other things
86 * during system calls...
87 */
88 .align 32
89sys_vfork: /* Under Linux, vfork and fork are just special cases of clone. */
90 sethi %hi(0x4000 | 0x0100 | SIGCHLD), %o0
91 or %o0, %lo(0x4000 | 0x0100 | SIGCHLD), %o0
92 ba,pt %xcc, sys_clone
93sys_fork:
94 clr %o1
95 mov SIGCHLD, %o0
96sys_clone:
97 flushw
98 movrz %o1, %fp, %o1
99 mov 0, %o3
100 ba,pt %xcc, sparc_do_fork
101 add %sp, PTREGS_OFF, %o2
102
103 .globl ret_from_fork
104ret_from_fork:
105 /* Clear current_thread_info()->new_child. */
106 stb %g0, [%g6 + TI_NEW_CHILD]
107 call schedule_tail
108 mov %g7, %o0
109 ldx [%sp + PTREGS_OFF + PT_V9_I0], %o0
110 brnz,pt %o0, ret_sys_call
111 ldx [%g6 + TI_FLAGS], %l0
112 ldx [%sp + PTREGS_OFF + PT_V9_G1], %l1
113 call %l1
114 ldx [%sp + PTREGS_OFF + PT_V9_G2], %o0
115 ba,pt %xcc, ret_sys_call
116 mov 0, %o0
117
118 .globl sparc_exit_group
119 .type sparc_exit_group,#function
120sparc_exit_group:
121 sethi %hi(sys_exit_group), %g7
122 ba,pt %xcc, 1f
123 or %g7, %lo(sys_exit_group), %g7
124 .size sparc_exit_group,.-sparc_exit_group
125
126 .globl sparc_exit
127 .type sparc_exit,#function
128sparc_exit:
129 sethi %hi(sys_exit), %g7
130 or %g7, %lo(sys_exit), %g7
1311: rdpr %pstate, %g2
132 wrpr %g2, PSTATE_IE, %pstate
133 rdpr %otherwin, %g1
134 rdpr %cansave, %g3
135 add %g3, %g1, %g3
136 wrpr %g3, 0x0, %cansave
137 wrpr %g0, 0x0, %otherwin
138 wrpr %g2, 0x0, %pstate
139 jmpl %g7, %g0
140 stb %g0, [%g6 + TI_WSAVED]
141 .size sparc_exit,.-sparc_exit
142
143linux_sparc_ni_syscall:
144 sethi %hi(sys_ni_syscall), %l7
145 ba,pt %xcc, 4f
146 or %l7, %lo(sys_ni_syscall), %l7
147
148linux_syscall_trace32:
149 call syscall_trace_enter
150 add %sp, PTREGS_OFF, %o0
151 brnz,pn %o0, 3f
152 mov -ENOSYS, %o0
153
154 /* Syscall tracing can modify the registers. */
155 ldx [%sp + PTREGS_OFF + PT_V9_G1], %g1
156 sethi %hi(sys_call_table32), %l7
157 ldx [%sp + PTREGS_OFF + PT_V9_I0], %i0
158 or %l7, %lo(sys_call_table32), %l7
159 ldx [%sp + PTREGS_OFF + PT_V9_I1], %i1
160 ldx [%sp + PTREGS_OFF + PT_V9_I2], %i2
161 ldx [%sp + PTREGS_OFF + PT_V9_I3], %i3
162 ldx [%sp + PTREGS_OFF + PT_V9_I4], %i4
163 ldx [%sp + PTREGS_OFF + PT_V9_I5], %i5
164
165 cmp %g1, NR_syscalls
166 bgeu,pn %xcc, 3f
167 mov -ENOSYS, %o0
168
169 sll %g1, 2, %l4
170 srl %i0, 0, %o0
171 lduw [%l7 + %l4], %l7
172 srl %i4, 0, %o4
173 srl %i1, 0, %o1
174 srl %i2, 0, %o2
175 ba,pt %xcc, 5f
176 srl %i3, 0, %o3
177
178linux_syscall_trace:
179 call syscall_trace_enter
180 add %sp, PTREGS_OFF, %o0
181 brnz,pn %o0, 3f
182 mov -ENOSYS, %o0
183
184 /* Syscall tracing can modify the registers. */
185 ldx [%sp + PTREGS_OFF + PT_V9_G1], %g1
186 sethi %hi(sys_call_table64), %l7
187 ldx [%sp + PTREGS_OFF + PT_V9_I0], %i0
188 or %l7, %lo(sys_call_table64), %l7
189 ldx [%sp + PTREGS_OFF + PT_V9_I1], %i1
190 ldx [%sp + PTREGS_OFF + PT_V9_I2], %i2
191 ldx [%sp + PTREGS_OFF + PT_V9_I3], %i3
192 ldx [%sp + PTREGS_OFF + PT_V9_I4], %i4
193 ldx [%sp + PTREGS_OFF + PT_V9_I5], %i5
194
195 cmp %g1, NR_syscalls
196 bgeu,pn %xcc, 3f
197 mov -ENOSYS, %o0
198
199 sll %g1, 2, %l4
200 mov %i0, %o0
201 lduw [%l7 + %l4], %l7
202 mov %i1, %o1
203 mov %i2, %o2
204 mov %i3, %o3
205 b,pt %xcc, 2f
206 mov %i4, %o4
207
208
209 /* Linux 32-bit system calls enter here... */
210 .align 32
211 .globl linux_sparc_syscall32
212linux_sparc_syscall32:
213 /* Direct access to user regs, much faster. */
214 cmp %g1, NR_syscalls ! IEU1 Group
215 bgeu,pn %xcc, linux_sparc_ni_syscall ! CTI
216 srl %i0, 0, %o0 ! IEU0
217 sll %g1, 2, %l4 ! IEU0 Group
218 srl %i4, 0, %o4 ! IEU1
219 lduw [%l7 + %l4], %l7 ! Load
220 srl %i1, 0, %o1 ! IEU0 Group
221 ldx [%g6 + TI_FLAGS], %l0 ! Load
222
223 srl %i3, 0, %o3 ! IEU0
224 srl %i2, 0, %o2 ! IEU0 Group
225 andcc %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
226 bne,pn %icc, linux_syscall_trace32 ! CTI
227 mov %i0, %l5 ! IEU1
2285: call %l7 ! CTI Group brk forced
229 srl %i5, 0, %o5 ! IEU1
230 ba,pt %xcc, 3f
231 sra %o0, 0, %o0
232
233 /* Linux native system calls enter here... */
234 .align 32
235 .globl linux_sparc_syscall
236linux_sparc_syscall:
237 /* Direct access to user regs, much faster. */
238 cmp %g1, NR_syscalls ! IEU1 Group
239 bgeu,pn %xcc, linux_sparc_ni_syscall ! CTI
240 mov %i0, %o0 ! IEU0
241 sll %g1, 2, %l4 ! IEU0 Group
242 mov %i1, %o1 ! IEU1
243 lduw [%l7 + %l4], %l7 ! Load
2444: mov %i2, %o2 ! IEU0 Group
245 ldx [%g6 + TI_FLAGS], %l0 ! Load
246
247 mov %i3, %o3 ! IEU1
248 mov %i4, %o4 ! IEU0 Group
249 andcc %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
250 bne,pn %icc, linux_syscall_trace ! CTI Group
251 mov %i0, %l5 ! IEU0
2522: call %l7 ! CTI Group brk forced
253 mov %i5, %o5 ! IEU0
254 nop
255
2563: stx %o0, [%sp + PTREGS_OFF + PT_V9_I0]
257ret_sys_call:
258 ldx [%sp + PTREGS_OFF + PT_V9_TSTATE], %g3
259 mov %ulo(TSTATE_XCARRY | TSTATE_ICARRY), %g2
260 sllx %g2, 32, %g2
261
262 cmp %o0, -ERESTART_RESTARTBLOCK
263 bgeu,pn %xcc, 1f
264 andcc %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
265 ldx [%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc
266
2672:
268 /* System call success, clear Carry condition code. */
269 andn %g3, %g2, %g3
2703:
271 stx %g3, [%sp + PTREGS_OFF + PT_V9_TSTATE]
272 bne,pn %icc, linux_syscall_trace2
273 add %l1, 0x4, %l2 ! npc = npc+4
274 stx %l1, [%sp + PTREGS_OFF + PT_V9_TPC]
275 ba,pt %xcc, rtrap
276 stx %l2, [%sp + PTREGS_OFF + PT_V9_TNPC]
277
2781:
279 /* Check if force_successful_syscall_return()
280 * was invoked.
281 */
282 ldub [%g6 + TI_SYS_NOERROR], %l2
283 brnz,pn %l2, 2b
284 ldx [%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc
285 /* System call failure, set Carry condition code.
286 * Also, get abs(errno) to return to the process.
287 */
288 sub %g0, %o0, %o0
289 stx %o0, [%sp + PTREGS_OFF + PT_V9_I0]
290 ba,pt %xcc, 3b
291 or %g3, %g2, %g3
292
293linux_syscall_trace2:
294 call syscall_trace_leave
295 add %sp, PTREGS_OFF, %o0
296 stx %l1, [%sp + PTREGS_OFF + PT_V9_TPC]
297 ba,pt %xcc, rtrap
298 stx %l2, [%sp + PTREGS_OFF + PT_V9_TNPC]
1 /* SunOS's execv() call only specifies the argv argument, the
2 * environment settings are the same as the calling processes.
3 */
4sys64_execve:
5 set sys_execve, %g1
6 jmpl %g1, %g0
7 flushw
8
9#ifdef CONFIG_COMPAT
10sunos_execv:
11 mov %g0, %o2
12sys32_execve:
13 set compat_sys_execve, %g1
14 jmpl %g1, %g0
15 flushw
16#endif
17
18 .align 32
19sys_sparc_pipe:
20 ba,pt %xcc, sys_sparc_pipe_real
21 add %sp, PTREGS_OFF, %o0
22sys_nis_syscall:
23 ba,pt %xcc, c_sys_nis_syscall
24 add %sp, PTREGS_OFF, %o0
25sys_memory_ordering:
26 ba,pt %xcc, sparc_memory_ordering
27 add %sp, PTREGS_OFF, %o1
28#ifdef CONFIG_COMPAT
29sys32_sigstack:
30 ba,pt %xcc, do_sys32_sigstack
31 mov %i6, %o2
32#endif
33 .align 32
34#ifdef CONFIG_COMPAT
35sys32_sigreturn:
36 add %sp, PTREGS_OFF, %o0
37 call do_sigreturn32
38 add %o7, 1f-.-4, %o7
39 nop
40#endif
41sys_rt_sigreturn:
42 add %sp, PTREGS_OFF, %o0
43 call do_rt_sigreturn
44 add %o7, 1f-.-4, %o7
45 nop
46#ifdef CONFIG_COMPAT
47sys32_rt_sigreturn:
48 add %sp, PTREGS_OFF, %o0
49 call do_rt_sigreturn32
50 add %o7, 1f-.-4, %o7
51 nop
52#endif
53 .align 32
541: ldx [%g6 + TI_FLAGS], %l5
55 andcc %l5, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
56 be,pt %icc, rtrap
57 nop
58 call syscall_trace_leave
59 add %sp, PTREGS_OFF, %o0
60 ba,pt %xcc, rtrap
61 nop
62
63 /* This is how fork() was meant to be done, 8 instruction entry.
64 *
65 * I questioned the following code briefly, let me clear things
66 * up so you must not reason on it like I did.
67 *
68 * Know the fork_kpsr etc. we use in the sparc32 port? We don't
69 * need it here because the only piece of window state we copy to
70 * the child is the CWP register. Even if the parent sleeps,
71 * we are safe because we stuck it into pt_regs of the parent
72 * so it will not change.
73 *
74 * XXX This raises the question, whether we can do the same on
75 * XXX sparc32 to get rid of fork_kpsr _and_ fork_kwim. The
76 * XXX answer is yes. We stick fork_kpsr in UREG_G0 and
77 * XXX fork_kwim in UREG_G1 (global registers are considered
78 * XXX volatile across a system call in the sparc ABI I think
79 * XXX if it isn't we can use regs->y instead, anyone who depends
80 * XXX upon the Y register being preserved across a fork deserves
81 * XXX to lose).
82 *
83 * In fact we should take advantage of that fact for other things
84 * during system calls...
85 */
86 .align 32
87sys_vfork: /* Under Linux, vfork and fork are just special cases of clone. */
88 sethi %hi(0x4000 | 0x0100 | SIGCHLD), %o0
89 or %o0, %lo(0x4000 | 0x0100 | SIGCHLD), %o0
90 ba,pt %xcc, sys_clone
91sys_fork:
92 clr %o1
93 mov SIGCHLD, %o0
94sys_clone:
95 flushw
96 movrz %o1, %fp, %o1
97 mov 0, %o3
98 ba,pt %xcc, sparc_do_fork
99 add %sp, PTREGS_OFF, %o2
100
101 .globl ret_from_fork
102ret_from_fork:
103 /* Clear current_thread_info()->new_child. */
104 stb %g0, [%g6 + TI_NEW_CHILD]
105 call schedule_tail
106 mov %g7, %o0
107 ldx [%sp + PTREGS_OFF + PT_V9_I0], %o0
108 brnz,pt %o0, ret_sys_call
109 ldx [%g6 + TI_FLAGS], %l0
110 ldx [%sp + PTREGS_OFF + PT_V9_G1], %l1
111 call %l1
112 ldx [%sp + PTREGS_OFF + PT_V9_G2], %o0
113 ba,pt %xcc, ret_sys_call
114 mov 0, %o0
115
116 .globl sparc_exit_group
117 .type sparc_exit_group,#function
118sparc_exit_group:
119 sethi %hi(sys_exit_group), %g7
120 ba,pt %xcc, 1f
121 or %g7, %lo(sys_exit_group), %g7
122 .size sparc_exit_group,.-sparc_exit_group
123
124 .globl sparc_exit
125 .type sparc_exit,#function
126sparc_exit:
127 sethi %hi(sys_exit), %g7
128 or %g7, %lo(sys_exit), %g7
1291: rdpr %pstate, %g2
130 wrpr %g2, PSTATE_IE, %pstate
131 rdpr %otherwin, %g1
132 rdpr %cansave, %g3
133 add %g3, %g1, %g3
134 wrpr %g3, 0x0, %cansave
135 wrpr %g0, 0x0, %otherwin
136 wrpr %g2, 0x0, %pstate
137 jmpl %g7, %g0
138 stb %g0, [%g6 + TI_WSAVED]
139 .size sparc_exit,.-sparc_exit
140
141linux_sparc_ni_syscall:
142 sethi %hi(sys_ni_syscall), %l7
143 ba,pt %xcc, 4f
144 or %l7, %lo(sys_ni_syscall), %l7
145
146linux_syscall_trace32:
147 call syscall_trace_enter
148 add %sp, PTREGS_OFF, %o0
149 brnz,pn %o0, 3f
150 mov -ENOSYS, %o0
151 srl %i0, 0, %o0
152 srl %i4, 0, %o4
153 srl %i1, 0, %o1
154 srl %i2, 0, %o2
155 ba,pt %xcc, 5f
156 srl %i3, 0, %o3
157
158linux_syscall_trace:
159 call syscall_trace_enter
160 add %sp, PTREGS_OFF, %o0
161 brnz,pn %o0, 3f
162 mov -ENOSYS, %o0
163 mov %i0, %o0
164 mov %i1, %o1
165 mov %i2, %o2
166 mov %i3, %o3
167 b,pt %xcc, 2f
168 mov %i4, %o4
169
170
171 /* Linux 32-bit system calls enter here... */
172 .align 32
173 .globl linux_sparc_syscall32
174linux_sparc_syscall32:
175 /* Direct access to user regs, much faster. */
176 cmp %g1, NR_syscalls ! IEU1 Group
177 bgeu,pn %xcc, linux_sparc_ni_syscall ! CTI
178 srl %i0, 0, %o0 ! IEU0
179 sll %g1, 2, %l4 ! IEU0 Group
180 srl %i4, 0, %o4 ! IEU1
181 lduw [%l7 + %l4], %l7 ! Load
182 srl %i1, 0, %o1 ! IEU0 Group
183 ldx [%g6 + TI_FLAGS], %l0 ! Load
184
185 srl %i3, 0, %o3 ! IEU0
186 srl %i2, 0, %o2 ! IEU0 Group
187 andcc %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
188 bne,pn %icc, linux_syscall_trace32 ! CTI
189 mov %i0, %l5 ! IEU1
1905: call %l7 ! CTI Group brk forced
191 srl %i5, 0, %o5 ! IEU1
192 ba,pt %xcc, 3f
193 sra %o0, 0, %o0
194
195 /* Linux native system calls enter here... */
196 .align 32
197 .globl linux_sparc_syscall
198linux_sparc_syscall:
199 /* Direct access to user regs, much faster. */
200 cmp %g1, NR_syscalls ! IEU1 Group
201 bgeu,pn %xcc, linux_sparc_ni_syscall ! CTI
202 mov %i0, %o0 ! IEU0
203 sll %g1, 2, %l4 ! IEU0 Group
204 mov %i1, %o1 ! IEU1
205 lduw [%l7 + %l4], %l7 ! Load
2064: mov %i2, %o2 ! IEU0 Group
207 ldx [%g6 + TI_FLAGS], %l0 ! Load
208
209 mov %i3, %o3 ! IEU1
210 mov %i4, %o4 ! IEU0 Group
211 andcc %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
212 bne,pn %icc, linux_syscall_trace ! CTI Group
213 mov %i0, %l5 ! IEU0
2142: call %l7 ! CTI Group brk forced
215 mov %i5, %o5 ! IEU0
216 nop
217
2183: stx %o0, [%sp + PTREGS_OFF + PT_V9_I0]
219ret_sys_call:
220 ldx [%sp + PTREGS_OFF + PT_V9_TSTATE], %g3
221 mov %ulo(TSTATE_XCARRY | TSTATE_ICARRY), %g2
222 sllx %g2, 32, %g2
223
224 cmp %o0, -ERESTART_RESTARTBLOCK
225 bgeu,pn %xcc, 1f
226 andcc %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
227 ldx [%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc
228
2292:
230 /* System call success, clear Carry condition code. */
231 andn %g3, %g2, %g3
2323:
233 stx %g3, [%sp + PTREGS_OFF + PT_V9_TSTATE]
234 bne,pn %icc, linux_syscall_trace2
235 add %l1, 0x4, %l2 ! npc = npc+4
236 stx %l1, [%sp + PTREGS_OFF + PT_V9_TPC]
237 ba,pt %xcc, rtrap
238 stx %l2, [%sp + PTREGS_OFF + PT_V9_TNPC]
239
2401:
241 /* Check if force_successful_syscall_return()
242 * was invoked.
243 */
244 ldub [%g6 + TI_SYS_NOERROR], %l2
245 brnz,pn %l2, 2b
246 ldx [%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc
247 /* System call failure, set Carry condition code.
248 * Also, get abs(errno) to return to the process.
249 */
250 sub %g0, %o0, %o0
251 stx %o0, [%sp + PTREGS_OFF + PT_V9_I0]
252 ba,pt %xcc, 3b
253 or %g3, %g2, %g3
254
255linux_syscall_trace2:
256 call syscall_trace_leave
257 add %sp, PTREGS_OFF, %o0
258 stx %l1, [%sp + PTREGS_OFF + PT_V9_TPC]
259 ba,pt %xcc, rtrap
260 stx %l2, [%sp + PTREGS_OFF + PT_V9_TNPC]