1 /* SPDX-License-Identifier: GPL-2.0 */ 2 /* SunOS's execv() call only specifies the argv argument, the 3 * environment settings are the same as the calling processes. 4 */ 5 sys64_execve: 6 set sys_execve, %g1 7 jmpl %g1, %g0 8 flushw 9 10 sys64_execveat: 11 set sys_execveat, %g1 12 jmpl %g1, %g0 13 flushw 14 15 #ifdef CONFIG_COMPAT 16 sunos_execv: 17 mov %g0, %o2 18 sys32_execve: 19 set compat_sys_execve, %g1 20 jmpl %g1, %g0 21 flushw 22 23 sys32_execveat: 24 set compat_sys_execveat, %g1 25 jmpl %g1, %g0 26 flushw 27 #endif 28 29 .align 32 30 #ifdef CONFIG_COMPAT 31 sys32_sigstack: 32 ba,pt %xcc, do_sys32_sigstack 33 mov %i6, %o2 34 #endif 35 .align 32 36 #ifdef CONFIG_COMPAT 37 sys32_sigreturn: 38 add %sp, PTREGS_OFF, %o0 39 call do_sigreturn32 40 add %o7, 1f-.-4, %o7 41 nop 42 #endif 43 sys_rt_sigreturn: 44 add %sp, PTREGS_OFF, %o0 45 call do_rt_sigreturn 46 add %o7, 1f-.-4, %o7 47 nop 48 #ifdef CONFIG_COMPAT 49 sys32_rt_sigreturn: 50 add %sp, PTREGS_OFF, %o0 51 call do_rt_sigreturn32 52 add %o7, 1f-.-4, %o7 53 nop 54 #endif 55 .align 32 56 1: ldx [%g6 + TI_FLAGS], %l5 57 andcc %l5, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0 58 be,pt %icc, rtrap 59 nop 60 call syscall_trace_leave 61 add %sp, PTREGS_OFF, %o0 62 ba,pt %xcc, rtrap 63 nop 64 65 /* This is how fork() was meant to be done, 8 instruction entry. 66 * 67 * I questioned the following code briefly, let me clear things 68 * up so you must not reason on it like I did. 69 * 70 * Know the fork_kpsr etc. we use in the sparc32 port? We don't 71 * need it here because the only piece of window state we copy to 72 * the child is the CWP register. Even if the parent sleeps, 73 * we are safe because we stuck it into pt_regs of the parent 74 * so it will not change. 75 * 76 * XXX This raises the question, whether we can do the same on 77 * XXX sparc32 to get rid of fork_kpsr _and_ fork_kwim. The 78 * XXX answer is yes. We stick fork_kpsr in UREG_G0 and 79 * XXX fork_kwim in UREG_G1 (global registers are considered 80 * XXX volatile across a system call in the sparc ABI I think 81 * XXX if it isn't we can use regs->y instead, anyone who depends 82 * XXX upon the Y register being preserved across a fork deserves 83 * XXX to lose). 84 * 85 * In fact we should take advantage of that fact for other things 86 * during system calls... 87 */ 88 .align 32 89 sys_vfork: 90 flushw 91 ba,pt %xcc, sparc_vfork 92 add %sp, PTREGS_OFF, %o0 93 94 .align 32 95 sys_fork: 96 flushw 97 ba,pt %xcc, sparc_fork 98 add %sp, PTREGS_OFF, %o0 99 100 .align 32 101 sys_clone: 102 flushw 103 ba,pt %xcc, sparc_clone 104 add %sp, PTREGS_OFF, %o0 105 106 .globl ret_from_fork 107 ret_from_fork: 108 /* Clear current_thread_info()->new_child. */ 109 stb %g0, [%g6 + TI_NEW_CHILD] 110 call schedule_tail 111 mov %g7, %o0 112 ldx [%sp + PTREGS_OFF + PT_V9_I0], %o0 113 brnz,pt %o0, ret_sys_call 114 ldx [%g6 + TI_FLAGS], %l0 115 ldx [%sp + PTREGS_OFF + PT_V9_G1], %l1 116 call %l1 117 ldx [%sp + PTREGS_OFF + PT_V9_G2], %o0 118 ba,pt %xcc, ret_sys_call 119 mov 0, %o0 120 121 .globl sparc_exit_group 122 .type sparc_exit_group,#function 123 sparc_exit_group: 124 sethi %hi(sys_exit_group), %g7 125 ba,pt %xcc, 1f 126 or %g7, %lo(sys_exit_group), %g7 127 .size sparc_exit_group,.-sparc_exit_group 128 129 .globl sparc_exit 130 .type sparc_exit,#function 131 sparc_exit: 132 sethi %hi(sys_exit), %g7 133 or %g7, %lo(sys_exit), %g7 134 1: rdpr %pstate, %g2 135 wrpr %g2, PSTATE_IE, %pstate 136 rdpr %otherwin, %g1 137 rdpr %cansave, %g3 138 add %g3, %g1, %g3 139 wrpr %g3, 0x0, %cansave 140 wrpr %g0, 0x0, %otherwin 141 wrpr %g2, 0x0, %pstate 142 jmpl %g7, %g0 143 stb %g0, [%g6 + TI_WSAVED] 144 .size sparc_exit,.-sparc_exit 145 146 linux_sparc_ni_syscall: 147 sethi %hi(sys_ni_syscall), %l7 148 ba,pt %xcc, 4f 149 or %l7, %lo(sys_ni_syscall), %l7 150 151 linux_syscall_trace32: 152 call syscall_trace_enter 153 add %sp, PTREGS_OFF, %o0 154 brnz,pn %o0, 3f 155 mov -ENOSYS, %o0 156 157 /* Syscall tracing can modify the registers. */ 158 ldx [%sp + PTREGS_OFF + PT_V9_G1], %g1 159 sethi %hi(sys_call_table32), %l7 160 ldx [%sp + PTREGS_OFF + PT_V9_I0], %i0 161 or %l7, %lo(sys_call_table32), %l7 162 ldx [%sp + PTREGS_OFF + PT_V9_I1], %i1 163 ldx [%sp + PTREGS_OFF + PT_V9_I2], %i2 164 ldx [%sp + PTREGS_OFF + PT_V9_I3], %i3 165 ldx [%sp + PTREGS_OFF + PT_V9_I4], %i4 166 ldx [%sp + PTREGS_OFF + PT_V9_I5], %i5 167 168 cmp %g1, NR_syscalls 169 bgeu,pn %xcc, 3f 170 mov -ENOSYS, %o0 171 172 sll %g1, 2, %l4 173 srl %i0, 0, %o0 174 lduw [%l7 + %l4], %l7 175 srl %i4, 0, %o4 176 srl %i1, 0, %o1 177 srl %i2, 0, %o2 178 ba,pt %xcc, 5f 179 srl %i3, 0, %o3 180 181 linux_syscall_trace: 182 call syscall_trace_enter 183 add %sp, PTREGS_OFF, %o0 184 brnz,pn %o0, 3f 185 mov -ENOSYS, %o0 186 187 /* Syscall tracing can modify the registers. */ 188 ldx [%sp + PTREGS_OFF + PT_V9_G1], %g1 189 sethi %hi(sys_call_table64), %l7 190 ldx [%sp + PTREGS_OFF + PT_V9_I0], %i0 191 or %l7, %lo(sys_call_table64), %l7 192 ldx [%sp + PTREGS_OFF + PT_V9_I1], %i1 193 ldx [%sp + PTREGS_OFF + PT_V9_I2], %i2 194 ldx [%sp + PTREGS_OFF + PT_V9_I3], %i3 195 ldx [%sp + PTREGS_OFF + PT_V9_I4], %i4 196 ldx [%sp + PTREGS_OFF + PT_V9_I5], %i5 197 198 cmp %g1, NR_syscalls 199 bgeu,pn %xcc, 3f 200 mov -ENOSYS, %o0 201 202 sll %g1, 2, %l4 203 mov %i0, %o0 204 lduw [%l7 + %l4], %l7 205 mov %i1, %o1 206 mov %i2, %o2 207 mov %i3, %o3 208 b,pt %xcc, 2f 209 mov %i4, %o4 210 211 212 /* Linux 32-bit system calls enter here... */ 213 .align 32 214 .globl linux_sparc_syscall32 215 linux_sparc_syscall32: 216 /* Direct access to user regs, much faster. */ 217 cmp %g1, NR_syscalls ! IEU1 Group 218 bgeu,pn %xcc, linux_sparc_ni_syscall ! CTI 219 srl %i0, 0, %o0 ! IEU0 220 sll %g1, 2, %l4 ! IEU0 Group 221 srl %i4, 0, %o4 ! IEU1 222 lduw [%l7 + %l4], %l7 ! Load 223 srl %i1, 0, %o1 ! IEU0 Group 224 ldx [%g6 + TI_FLAGS], %l0 ! Load 225 226 srl %i3, 0, %o3 ! IEU0 227 srl %i2, 0, %o2 ! IEU0 Group 228 andcc %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0 229 bne,pn %icc, linux_syscall_trace32 ! CTI 230 mov %i0, %l5 ! IEU1 231 5: call %l7 ! CTI Group brk forced 232 srl %i5, 0, %o5 ! IEU1 233 ba,pt %xcc, 3f 234 sra %o0, 0, %o0 235 236 /* Linux native system calls enter here... */ 237 .align 32 238 .globl linux_sparc_syscall 239 linux_sparc_syscall: 240 /* Direct access to user regs, much faster. */ 241 cmp %g1, NR_syscalls ! IEU1 Group 242 bgeu,pn %xcc, linux_sparc_ni_syscall ! CTI 243 mov %i0, %o0 ! IEU0 244 sll %g1, 2, %l4 ! IEU0 Group 245 mov %i1, %o1 ! IEU1 246 lduw [%l7 + %l4], %l7 ! Load 247 4: mov %i2, %o2 ! IEU0 Group 248 ldx [%g6 + TI_FLAGS], %l0 ! Load 249 250 mov %i3, %o3 ! IEU1 251 mov %i4, %o4 ! IEU0 Group 252 andcc %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0 253 bne,pn %icc, linux_syscall_trace ! CTI Group 254 mov %i0, %l5 ! IEU0 255 2: call %l7 ! CTI Group brk forced 256 mov %i5, %o5 ! IEU0 257 nop 258 259 3: stx %o0, [%sp + PTREGS_OFF + PT_V9_I0] 260 ret_sys_call: 261 ldx [%sp + PTREGS_OFF + PT_V9_TSTATE], %g3 262 mov %ulo(TSTATE_XCARRY | TSTATE_ICARRY), %g2 263 sllx %g2, 32, %g2 264 265 cmp %o0, -ERESTART_RESTARTBLOCK 266 bgeu,pn %xcc, 1f 267 andcc %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0 268 ldx [%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc 269 270 2: 271 /* System call success, clear Carry condition code. */ 272 andn %g3, %g2, %g3 273 3: 274 stx %g3, [%sp + PTREGS_OFF + PT_V9_TSTATE] 275 bne,pn %icc, linux_syscall_trace2 276 add %l1, 0x4, %l2 ! npc = npc+4 277 stx %l1, [%sp + PTREGS_OFF + PT_V9_TPC] 278 ba,pt %xcc, rtrap 279 stx %l2, [%sp + PTREGS_OFF + PT_V9_TNPC] 280 281 1: 282 /* Check if force_successful_syscall_return() 283 * was invoked. 284 */ 285 ldub [%g6 + TI_SYS_NOERROR], %l2 286 brnz,pn %l2, 2b 287 ldx [%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc 288 /* System call failure, set Carry condition code. 289 * Also, get abs(errno) to return to the process. 290 */ 291 sub %g0, %o0, %o0 292 stx %o0, [%sp + PTREGS_OFF + PT_V9_I0] 293 ba,pt %xcc, 3b 294 or %g3, %g2, %g3 295 296 linux_syscall_trace2: 297 call syscall_trace_leave 298 add %sp, PTREGS_OFF, %o0 299 stx %l1, [%sp + PTREGS_OFF + PT_V9_TPC] 300 ba,pt %xcc, rtrap 301 stx %l2, [%sp + PTREGS_OFF + PT_V9_TNPC]
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.