xref: /openbmc/linux/arch/sparc/kernel/syscalls.S (revision bbecb07f)
1/* SPDX-License-Identifier: GPL-2.0 */
2	/* SunOS's execv() call only specifies the argv argument, the
3	 * environment settings are the same as the calling processes.
4	 */
5sys64_execve:
6	set	sys_execve, %g1
7	jmpl	%g1, %g0
8	 flushw
9
10sys64_execveat:
11	set	sys_execveat, %g1
12	jmpl	%g1, %g0
13	 flushw
14
15#ifdef CONFIG_COMPAT
16sunos_execv:
17	mov	%g0, %o2
18sys32_execve:
19	set	compat_sys_execve, %g1
20	jmpl	%g1, %g0
21	 flushw
22
23sys32_execveat:
24	set	compat_sys_execveat, %g1
25	jmpl	%g1, %g0
26	 flushw
27#endif
28
29	.align	32
30sys_sparc_pipe:
31	ba,pt	%xcc, sys_sparc_pipe_real
32	 add	%sp, PTREGS_OFF, %o0
33sys_nis_syscall:
34	ba,pt	%xcc, c_sys_nis_syscall
35	 add	%sp, PTREGS_OFF, %o0
36sys_memory_ordering:
37	ba,pt	%xcc, sparc_memory_ordering
38	 add	%sp, PTREGS_OFF, %o1
39#ifdef CONFIG_COMPAT
40sys32_sigstack:
41	ba,pt	%xcc, do_sys32_sigstack
42	 mov	%i6, %o2
43#endif
44	.align	32
45#ifdef CONFIG_COMPAT
46sys32_sigreturn:
47	add	%sp, PTREGS_OFF, %o0
48	call	do_sigreturn32
49	 add	%o7, 1f-.-4, %o7
50	nop
51#endif
52sys_rt_sigreturn:
53	add	%sp, PTREGS_OFF, %o0
54	call	do_rt_sigreturn
55	 add	%o7, 1f-.-4, %o7
56	nop
57#ifdef CONFIG_COMPAT
58sys32_rt_sigreturn:
59	add	%sp, PTREGS_OFF, %o0
60	call	do_rt_sigreturn32
61	 add	%o7, 1f-.-4, %o7
62	nop
63#endif
64	.align	32
651:	ldx	[%g6 + TI_FLAGS], %l5
66	andcc	%l5, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
67	be,pt	%icc, rtrap
68	 nop
69	call	syscall_trace_leave
70	 add	%sp, PTREGS_OFF, %o0
71	ba,pt	%xcc, rtrap
72	 nop
73
74	/* This is how fork() was meant to be done, 8 instruction entry.
75	 *
76	 * I questioned the following code briefly, let me clear things
77	 * up so you must not reason on it like I did.
78	 *
79	 * Know the fork_kpsr etc. we use in the sparc32 port?  We don't
80	 * need it here because the only piece of window state we copy to
81	 * the child is the CWP register.  Even if the parent sleeps,
82	 * we are safe because we stuck it into pt_regs of the parent
83	 * so it will not change.
84	 *
85	 * XXX This raises the question, whether we can do the same on
86	 * XXX sparc32 to get rid of fork_kpsr _and_ fork_kwim.  The
87	 * XXX answer is yes.  We stick fork_kpsr in UREG_G0 and
88	 * XXX fork_kwim in UREG_G1 (global registers are considered
89	 * XXX volatile across a system call in the sparc ABI I think
90	 * XXX if it isn't we can use regs->y instead, anyone who depends
91	 * XXX upon the Y register being preserved across a fork deserves
92	 * XXX to lose).
93	 *
94	 * In fact we should take advantage of that fact for other things
95	 * during system calls...
96	 */
97	.align	32
98sys_vfork: /* Under Linux, vfork and fork are just special cases of clone. */
99	sethi	%hi(0x4000 | 0x0100 | SIGCHLD), %o0
100	or	%o0, %lo(0x4000 | 0x0100 | SIGCHLD), %o0
101	ba,pt	%xcc, sys_clone
102sys_fork:
103	 clr	%o1
104	mov	SIGCHLD, %o0
105sys_clone:
106	flushw
107	movrz	%o1, %fp, %o1
108	mov	0, %o3
109	ba,pt	%xcc, sparc_do_fork
110	 add	%sp, PTREGS_OFF, %o2
111
112	.globl	ret_from_fork
113ret_from_fork:
114	/* Clear current_thread_info()->new_child. */
115	stb	%g0, [%g6 + TI_NEW_CHILD]
116	call	schedule_tail
117	 mov	%g7, %o0
118	ldx	[%sp + PTREGS_OFF + PT_V9_I0], %o0
119	brnz,pt	%o0, ret_sys_call
120	 ldx	[%g6 + TI_FLAGS], %l0
121	ldx	[%sp + PTREGS_OFF + PT_V9_G1], %l1
122	call	%l1
123	 ldx	[%sp + PTREGS_OFF + PT_V9_G2], %o0
124	ba,pt	%xcc, ret_sys_call
125	 mov	0, %o0
126
127	.globl	sparc_exit_group
128	.type	sparc_exit_group,#function
129sparc_exit_group:
130	sethi	%hi(sys_exit_group), %g7
131	ba,pt	%xcc, 1f
132	 or	%g7, %lo(sys_exit_group), %g7
133	.size	sparc_exit_group,.-sparc_exit_group
134
135	.globl	sparc_exit
136	.type	sparc_exit,#function
137sparc_exit:
138	sethi	%hi(sys_exit), %g7
139	or	%g7, %lo(sys_exit), %g7
1401:	rdpr	%pstate, %g2
141	wrpr	%g2, PSTATE_IE, %pstate
142	rdpr	%otherwin, %g1
143	rdpr	%cansave, %g3
144	add	%g3, %g1, %g3
145	wrpr	%g3, 0x0, %cansave
146	wrpr	%g0, 0x0, %otherwin
147	wrpr	%g2, 0x0, %pstate
148	jmpl	%g7, %g0
149	 stb	%g0, [%g6 + TI_WSAVED]
150	.size	sparc_exit,.-sparc_exit
151
152linux_sparc_ni_syscall:
153	sethi	%hi(sys_ni_syscall), %l7
154	ba,pt	%xcc, 4f
155	 or	%l7, %lo(sys_ni_syscall), %l7
156
157linux_syscall_trace32:
158	call	syscall_trace_enter
159	 add	%sp, PTREGS_OFF, %o0
160	brnz,pn	%o0, 3f
161	 mov	-ENOSYS, %o0
162
163	/* Syscall tracing can modify the registers.  */
164	ldx	[%sp + PTREGS_OFF + PT_V9_G1], %g1
165	sethi	%hi(sys_call_table32), %l7
166	ldx	[%sp + PTREGS_OFF + PT_V9_I0], %i0
167	or	%l7, %lo(sys_call_table32), %l7
168	ldx	[%sp + PTREGS_OFF + PT_V9_I1], %i1
169	ldx	[%sp + PTREGS_OFF + PT_V9_I2], %i2
170	ldx	[%sp + PTREGS_OFF + PT_V9_I3], %i3
171	ldx	[%sp + PTREGS_OFF + PT_V9_I4], %i4
172	ldx	[%sp + PTREGS_OFF + PT_V9_I5], %i5
173
174	cmp	%g1, NR_syscalls
175	bgeu,pn	%xcc, 3f
176	 mov	-ENOSYS, %o0
177
178	sll	%g1, 2, %l4
179	srl	%i0, 0, %o0
180	lduw	[%l7 + %l4], %l7
181	srl	%i4, 0, %o4
182	srl	%i1, 0, %o1
183	srl	%i2, 0, %o2
184	ba,pt	%xcc, 5f
185	 srl	%i3, 0, %o3
186
187linux_syscall_trace:
188	call	syscall_trace_enter
189	 add	%sp, PTREGS_OFF, %o0
190	brnz,pn	%o0, 3f
191	 mov	-ENOSYS, %o0
192
193	/* Syscall tracing can modify the registers.  */
194	ldx	[%sp + PTREGS_OFF + PT_V9_G1], %g1
195	sethi	%hi(sys_call_table64), %l7
196	ldx	[%sp + PTREGS_OFF + PT_V9_I0], %i0
197	or	%l7, %lo(sys_call_table64), %l7
198	ldx	[%sp + PTREGS_OFF + PT_V9_I1], %i1
199	ldx	[%sp + PTREGS_OFF + PT_V9_I2], %i2
200	ldx	[%sp + PTREGS_OFF + PT_V9_I3], %i3
201	ldx	[%sp + PTREGS_OFF + PT_V9_I4], %i4
202	ldx	[%sp + PTREGS_OFF + PT_V9_I5], %i5
203
204	cmp	%g1, NR_syscalls
205	bgeu,pn	%xcc, 3f
206	 mov	-ENOSYS, %o0
207
208	sll	%g1, 2, %l4
209	mov	%i0, %o0
210	lduw	[%l7 + %l4], %l7
211	mov	%i1, %o1
212	mov	%i2, %o2
213	mov	%i3, %o3
214	b,pt	%xcc, 2f
215	 mov	%i4, %o4
216
217
218	/* Linux 32-bit system calls enter here... */
219	.align	32
220	.globl	linux_sparc_syscall32
221linux_sparc_syscall32:
222	/* Direct access to user regs, much faster. */
223	cmp	%g1, NR_syscalls			! IEU1	Group
224	bgeu,pn	%xcc, linux_sparc_ni_syscall		! CTI
225	 srl	%i0, 0, %o0				! IEU0
226	sll	%g1, 2, %l4				! IEU0	Group
227	srl	%i4, 0, %o4				! IEU1
228	lduw	[%l7 + %l4], %l7			! Load
229	srl	%i1, 0, %o1				! IEU0	Group
230	ldx	[%g6 + TI_FLAGS], %l0		! Load
231
232	srl	%i3, 0, %o3				! IEU0
233	srl	%i2, 0, %o2				! IEU0	Group
234	andcc	%l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
235	bne,pn	%icc, linux_syscall_trace32		! CTI
236	 mov	%i0, %l5				! IEU1
2375:	call	%l7					! CTI	Group brk forced
238	 srl	%i5, 0, %o5				! IEU1
239	ba,pt	%xcc, 3f
240	 sra	%o0, 0, %o0
241
242	/* Linux native system calls enter here... */
243	.align	32
244	.globl	linux_sparc_syscall
245linux_sparc_syscall:
246	/* Direct access to user regs, much faster. */
247	cmp	%g1, NR_syscalls			! IEU1	Group
248	bgeu,pn	%xcc, linux_sparc_ni_syscall		! CTI
249	 mov	%i0, %o0				! IEU0
250	sll	%g1, 2, %l4				! IEU0	Group
251	mov	%i1, %o1				! IEU1
252	lduw	[%l7 + %l4], %l7			! Load
2534:	mov	%i2, %o2				! IEU0	Group
254	ldx	[%g6 + TI_FLAGS], %l0		! Load
255
256	mov	%i3, %o3				! IEU1
257	mov	%i4, %o4				! IEU0	Group
258	andcc	%l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
259	bne,pn	%icc, linux_syscall_trace		! CTI	Group
260	 mov	%i0, %l5				! IEU0
2612:	call	%l7					! CTI	Group brk forced
262	 mov	%i5, %o5				! IEU0
263	nop
264
2653:	stx	%o0, [%sp + PTREGS_OFF + PT_V9_I0]
266ret_sys_call:
267	ldx	[%sp + PTREGS_OFF + PT_V9_TSTATE], %g3
268	mov	%ulo(TSTATE_XCARRY | TSTATE_ICARRY), %g2
269	sllx	%g2, 32, %g2
270
271	cmp	%o0, -ERESTART_RESTARTBLOCK
272	bgeu,pn	%xcc, 1f
273	 andcc	%l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
274	ldx	[%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc
275
2762:
277	/* System call success, clear Carry condition code. */
278	andn	%g3, %g2, %g3
2793:
280	stx	%g3, [%sp + PTREGS_OFF + PT_V9_TSTATE]
281	bne,pn	%icc, linux_syscall_trace2
282	 add	%l1, 0x4, %l2			! npc = npc+4
283	stx	%l1, [%sp + PTREGS_OFF + PT_V9_TPC]
284	ba,pt	%xcc, rtrap
285	 stx	%l2, [%sp + PTREGS_OFF + PT_V9_TNPC]
286
2871:
288	/* Check if force_successful_syscall_return()
289	 * was invoked.
290	 */
291	ldub	[%g6 + TI_SYS_NOERROR], %l2
292	brnz,pn %l2, 2b
293	 ldx	[%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc
294	/* System call failure, set Carry condition code.
295	 * Also, get abs(errno) to return to the process.
296	 */
297	sub	%g0, %o0, %o0
298	stx	%o0, [%sp + PTREGS_OFF + PT_V9_I0]
299	ba,pt	%xcc, 3b
300	 or	%g3, %g2, %g3
301
302linux_syscall_trace2:
303	call	syscall_trace_leave
304	 add	%sp, PTREGS_OFF, %o0
305	stx	%l1, [%sp + PTREGS_OFF + PT_V9_TPC]
306	ba,pt	%xcc, rtrap
307	 stx	%l2, [%sp + PTREGS_OFF + PT_V9_TNPC]
308