syscalls.S 7.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298
  1. /* SPDX-License-Identifier: GPL-2.0 */
  2. /* SunOS's execv() call only specifies the argv argument, the
  3. * environment settings are the same as the calling processes.
  4. */
  5. sys64_execve:
  6. set sys_execve, %g1
  7. jmpl %g1, %g0
  8. flushw
  9. sys64_execveat:
  10. set sys_execveat, %g1
  11. jmpl %g1, %g0
  12. flushw
  13. #ifdef CONFIG_COMPAT
  14. sunos_execv:
  15. mov %g0, %o2
  16. sys32_execve:
  17. set compat_sys_execve, %g1
  18. jmpl %g1, %g0
  19. flushw
  20. sys32_execveat:
  21. set compat_sys_execveat, %g1
  22. jmpl %g1, %g0
  23. flushw
  24. #endif
  25. .align 32
  26. #ifdef CONFIG_COMPAT
  27. sys32_sigstack:
  28. ba,pt %xcc, do_sys32_sigstack
  29. mov %i6, %o2
  30. #endif
  31. .align 32
  32. #ifdef CONFIG_COMPAT
  33. sys32_sigreturn:
  34. add %sp, PTREGS_OFF, %o0
  35. call do_sigreturn32
  36. add %o7, 1f-.-4, %o7
  37. nop
  38. #endif
  39. sys_rt_sigreturn:
  40. add %sp, PTREGS_OFF, %o0
  41. call do_rt_sigreturn
  42. add %o7, 1f-.-4, %o7
  43. nop
  44. #ifdef CONFIG_COMPAT
  45. sys32_rt_sigreturn:
  46. add %sp, PTREGS_OFF, %o0
  47. call do_rt_sigreturn32
  48. add %o7, 1f-.-4, %o7
  49. nop
  50. #endif
  51. .align 32
  52. 1: ldx [%g6 + TI_FLAGS], %l5
  53. andcc %l5, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
  54. be,pt %icc, rtrap
  55. nop
  56. call syscall_trace_leave
  57. add %sp, PTREGS_OFF, %o0
  58. ba,pt %xcc, rtrap
  59. nop
  60. /* This is how fork() was meant to be done, 8 instruction entry.
  61. *
  62. * I questioned the following code briefly, let me clear things
  63. * up so you must not reason on it like I did.
  64. *
  65. * Know the fork_kpsr etc. we use in the sparc32 port? We don't
  66. * need it here because the only piece of window state we copy to
  67. * the child is the CWP register. Even if the parent sleeps,
  68. * we are safe because we stuck it into pt_regs of the parent
  69. * so it will not change.
  70. *
  71. * XXX This raises the question, whether we can do the same on
  72. * XXX sparc32 to get rid of fork_kpsr _and_ fork_kwim. The
  73. * XXX answer is yes. We stick fork_kpsr in UREG_G0 and
  74. * XXX fork_kwim in UREG_G1 (global registers are considered
  75. * XXX volatile across a system call in the sparc ABI I think
  76. * XXX if it isn't we can use regs->y instead, anyone who depends
  77. * XXX upon the Y register being preserved across a fork deserves
  78. * XXX to lose).
  79. *
  80. * In fact we should take advantage of that fact for other things
  81. * during system calls...
  82. */
  83. .align 32
  84. sys_vfork: /* Under Linux, vfork and fork are just special cases of clone. */
  85. sethi %hi(0x4000 | 0x0100 | SIGCHLD), %o0
  86. or %o0, %lo(0x4000 | 0x0100 | SIGCHLD), %o0
  87. ba,pt %xcc, sys_clone
  88. sys_fork:
  89. clr %o1
  90. mov SIGCHLD, %o0
  91. sys_clone:
  92. flushw
  93. movrz %o1, %fp, %o1
  94. mov 0, %o3
  95. ba,pt %xcc, sparc_do_fork
  96. add %sp, PTREGS_OFF, %o2
  97. .globl ret_from_fork
  98. ret_from_fork:
  99. /* Clear current_thread_info()->new_child. */
  100. stb %g0, [%g6 + TI_NEW_CHILD]
  101. call schedule_tail
  102. mov %g7, %o0
  103. ldx [%sp + PTREGS_OFF + PT_V9_I0], %o0
  104. brnz,pt %o0, ret_sys_call
  105. ldx [%g6 + TI_FLAGS], %l0
  106. ldx [%sp + PTREGS_OFF + PT_V9_G1], %l1
  107. call %l1
  108. ldx [%sp + PTREGS_OFF + PT_V9_G2], %o0
  109. ba,pt %xcc, ret_sys_call
  110. mov 0, %o0
  111. .globl sparc_exit_group
  112. .type sparc_exit_group,#function
  113. sparc_exit_group:
  114. sethi %hi(sys_exit_group), %g7
  115. ba,pt %xcc, 1f
  116. or %g7, %lo(sys_exit_group), %g7
  117. .size sparc_exit_group,.-sparc_exit_group
  118. .globl sparc_exit
  119. .type sparc_exit,#function
  120. sparc_exit:
  121. sethi %hi(sys_exit), %g7
  122. or %g7, %lo(sys_exit), %g7
  123. 1: rdpr %pstate, %g2
  124. wrpr %g2, PSTATE_IE, %pstate
  125. rdpr %otherwin, %g1
  126. rdpr %cansave, %g3
  127. add %g3, %g1, %g3
  128. wrpr %g3, 0x0, %cansave
  129. wrpr %g0, 0x0, %otherwin
  130. wrpr %g2, 0x0, %pstate
  131. jmpl %g7, %g0
  132. stb %g0, [%g6 + TI_WSAVED]
  133. .size sparc_exit,.-sparc_exit
  134. linux_sparc_ni_syscall:
  135. sethi %hi(sys_ni_syscall), %l7
  136. ba,pt %xcc, 4f
  137. or %l7, %lo(sys_ni_syscall), %l7
  138. linux_syscall_trace32:
  139. call syscall_trace_enter
  140. add %sp, PTREGS_OFF, %o0
  141. brnz,pn %o0, 3f
  142. mov -ENOSYS, %o0
  143. /* Syscall tracing can modify the registers. */
  144. ldx [%sp + PTREGS_OFF + PT_V9_G1], %g1
  145. sethi %hi(sys_call_table32), %l7
  146. ldx [%sp + PTREGS_OFF + PT_V9_I0], %i0
  147. or %l7, %lo(sys_call_table32), %l7
  148. ldx [%sp + PTREGS_OFF + PT_V9_I1], %i1
  149. ldx [%sp + PTREGS_OFF + PT_V9_I2], %i2
  150. ldx [%sp + PTREGS_OFF + PT_V9_I3], %i3
  151. ldx [%sp + PTREGS_OFF + PT_V9_I4], %i4
  152. ldx [%sp + PTREGS_OFF + PT_V9_I5], %i5
  153. cmp %g1, NR_syscalls
  154. bgeu,pn %xcc, 3f
  155. mov -ENOSYS, %o0
  156. sll %g1, 2, %l4
  157. srl %i0, 0, %o0
  158. lduw [%l7 + %l4], %l7
  159. srl %i4, 0, %o4
  160. srl %i1, 0, %o1
  161. srl %i2, 0, %o2
  162. ba,pt %xcc, 5f
  163. srl %i3, 0, %o3
  164. linux_syscall_trace:
  165. call syscall_trace_enter
  166. add %sp, PTREGS_OFF, %o0
  167. brnz,pn %o0, 3f
  168. mov -ENOSYS, %o0
  169. /* Syscall tracing can modify the registers. */
  170. ldx [%sp + PTREGS_OFF + PT_V9_G1], %g1
  171. sethi %hi(sys_call_table64), %l7
  172. ldx [%sp + PTREGS_OFF + PT_V9_I0], %i0
  173. or %l7, %lo(sys_call_table64), %l7
  174. ldx [%sp + PTREGS_OFF + PT_V9_I1], %i1
  175. ldx [%sp + PTREGS_OFF + PT_V9_I2], %i2
  176. ldx [%sp + PTREGS_OFF + PT_V9_I3], %i3
  177. ldx [%sp + PTREGS_OFF + PT_V9_I4], %i4
  178. ldx [%sp + PTREGS_OFF + PT_V9_I5], %i5
  179. cmp %g1, NR_syscalls
  180. bgeu,pn %xcc, 3f
  181. mov -ENOSYS, %o0
  182. sll %g1, 2, %l4
  183. mov %i0, %o0
  184. lduw [%l7 + %l4], %l7
  185. mov %i1, %o1
  186. mov %i2, %o2
  187. mov %i3, %o3
  188. b,pt %xcc, 2f
  189. mov %i4, %o4
  190. /* Linux 32-bit system calls enter here... */
  191. .align 32
  192. .globl linux_sparc_syscall32
  193. linux_sparc_syscall32:
  194. /* Direct access to user regs, much faster. */
  195. cmp %g1, NR_syscalls ! IEU1 Group
  196. bgeu,pn %xcc, linux_sparc_ni_syscall ! CTI
  197. srl %i0, 0, %o0 ! IEU0
  198. sll %g1, 2, %l4 ! IEU0 Group
  199. srl %i4, 0, %o4 ! IEU1
  200. lduw [%l7 + %l4], %l7 ! Load
  201. srl %i1, 0, %o1 ! IEU0 Group
  202. ldx [%g6 + TI_FLAGS], %l0 ! Load
  203. srl %i3, 0, %o3 ! IEU0
  204. srl %i2, 0, %o2 ! IEU0 Group
  205. andcc %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
  206. bne,pn %icc, linux_syscall_trace32 ! CTI
  207. mov %i0, %l5 ! IEU1
  208. 5: call %l7 ! CTI Group brk forced
  209. srl %i5, 0, %o5 ! IEU1
  210. ba,pt %xcc, 3f
  211. sra %o0, 0, %o0
  212. /* Linux native system calls enter here... */
  213. .align 32
  214. .globl linux_sparc_syscall
  215. linux_sparc_syscall:
  216. /* Direct access to user regs, much faster. */
  217. cmp %g1, NR_syscalls ! IEU1 Group
  218. bgeu,pn %xcc, linux_sparc_ni_syscall ! CTI
  219. mov %i0, %o0 ! IEU0
  220. sll %g1, 2, %l4 ! IEU0 Group
  221. mov %i1, %o1 ! IEU1
  222. lduw [%l7 + %l4], %l7 ! Load
  223. 4: mov %i2, %o2 ! IEU0 Group
  224. ldx [%g6 + TI_FLAGS], %l0 ! Load
  225. mov %i3, %o3 ! IEU1
  226. mov %i4, %o4 ! IEU0 Group
  227. andcc %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
  228. bne,pn %icc, linux_syscall_trace ! CTI Group
  229. mov %i0, %l5 ! IEU0
  230. 2: call %l7 ! CTI Group brk forced
  231. mov %i5, %o5 ! IEU0
  232. nop
  233. 3: stx %o0, [%sp + PTREGS_OFF + PT_V9_I0]
  234. ret_sys_call:
  235. ldx [%sp + PTREGS_OFF + PT_V9_TSTATE], %g3
  236. mov %ulo(TSTATE_XCARRY | TSTATE_ICARRY), %g2
  237. sllx %g2, 32, %g2
  238. cmp %o0, -ERESTART_RESTARTBLOCK
  239. bgeu,pn %xcc, 1f
  240. andcc %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
  241. ldx [%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc
  242. 2:
  243. /* System call success, clear Carry condition code. */
  244. andn %g3, %g2, %g3
  245. 3:
  246. stx %g3, [%sp + PTREGS_OFF + PT_V9_TSTATE]
  247. bne,pn %icc, linux_syscall_trace2
  248. add %l1, 0x4, %l2 ! npc = npc+4
  249. stx %l1, [%sp + PTREGS_OFF + PT_V9_TPC]
  250. ba,pt %xcc, rtrap
  251. stx %l2, [%sp + PTREGS_OFF + PT_V9_TNPC]
  252. 1:
  253. /* Check if force_successful_syscall_return()
  254. * was invoked.
  255. */
  256. ldub [%g6 + TI_SYS_NOERROR], %l2
  257. brnz,pn %l2, 2b
  258. ldx [%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc
  259. /* System call failure, set Carry condition code.
  260. * Also, get abs(errno) to return to the process.
  261. */
  262. sub %g0, %o0, %o0
  263. stx %o0, [%sp + PTREGS_OFF + PT_V9_I0]
  264. ba,pt %xcc, 3b
  265. or %g3, %g2, %g3
  266. linux_syscall_trace2:
  267. call syscall_trace_leave
  268. add %sp, PTREGS_OFF, %o0
  269. stx %l1, [%sp + PTREGS_OFF + PT_V9_TPC]
  270. ba,pt %xcc, rtrap
  271. stx %l2, [%sp + PTREGS_OFF + PT_V9_TNPC]