1 /* SPDX-License-Identifier: GPL-2.0 */
2 /* SunOS's execv() call only specifies the argv argument, the
3 * environment settings are the same as the calling processes.
19 set compat_sys_execve, %g1
24 set compat_sys_execveat, %g1
32 ba,pt %xcc, do_sys32_sigstack
38 add %sp, PTREGS_OFF, %o0
44 add %sp, PTREGS_OFF, %o0
50 add %sp, PTREGS_OFF, %o0
51 call do_rt_sigreturn32
56 1: ldx [%g6 + TI_FLAGS], %l5
57 andcc %l5, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
60 call syscall_trace_leave
61 add %sp, PTREGS_OFF, %o0
65 /* This is how fork() was meant to be done, 8 instruction entry.
67 * I questioned the following code briefly, let me clear things
68 * up so you must not reason on it like I did.
70 * Know the fork_kpsr etc. we use in the sparc32 port? We don't
71 * need it here because the only piece of window state we copy to
72 * the child is the CWP register. Even if the parent sleeps,
73 * we are safe because we stuck it into pt_regs of the parent
74 * so it will not change.
76 * XXX This raises the question, whether we can do the same on
77 * XXX sparc32 to get rid of fork_kpsr _and_ fork_kwim. The
78 * XXX answer is yes. We stick fork_kpsr in UREG_G0 and
79 * XXX fork_kwim in UREG_G1 (global registers are considered
80 * XXX volatile across a system call in the sparc ABI I think
81 * XXX if it isn't we can use regs->y instead, anyone who depends
82 * XXX upon the Y register being preserved across a fork deserves
85 * In fact we should take advantage of that fact for other things
86 * during system calls...
89 sys_vfork: /* Under Linux, vfork and fork are just special cases of clone. */
90 sethi %hi(0x4000 | 0x0100 | SIGCHLD), %o0
91 or %o0, %lo(0x4000 | 0x0100 | SIGCHLD), %o0
100 ba,pt %xcc, sparc_do_fork
101 add %sp, PTREGS_OFF, %o2
105 /* Clear current_thread_info()->new_child. */
106 stb %g0, [%g6 + TI_NEW_CHILD]
109 ldx [%sp + PTREGS_OFF + PT_V9_I0], %o0
110 brnz,pt %o0, ret_sys_call
111 ldx [%g6 + TI_FLAGS], %l0
112 ldx [%sp + PTREGS_OFF + PT_V9_G1], %l1
114 ldx [%sp + PTREGS_OFF + PT_V9_G2], %o0
115 ba,pt %xcc, ret_sys_call
118 .globl sparc_exit_group
119 .type sparc_exit_group,#function
121 sethi %hi(sys_exit_group), %g7
123 or %g7, %lo(sys_exit_group), %g7
124 .size sparc_exit_group,.-sparc_exit_group
127 .type sparc_exit,#function
129 sethi %hi(sys_exit), %g7
130 or %g7, %lo(sys_exit), %g7
132 wrpr %g2, PSTATE_IE, %pstate
136 wrpr %g3, 0x0, %cansave
137 wrpr %g0, 0x0, %otherwin
138 wrpr %g2, 0x0, %pstate
140 stb %g0, [%g6 + TI_WSAVED]
141 .size sparc_exit,.-sparc_exit
143 linux_sparc_ni_syscall:
144 sethi %hi(sys_ni_syscall), %l7
146 or %l7, %lo(sys_ni_syscall), %l7
148 linux_syscall_trace32:
149 call syscall_trace_enter
150 add %sp, PTREGS_OFF, %o0
154 /* Syscall tracing can modify the registers. */
155 ldx [%sp + PTREGS_OFF + PT_V9_G1], %g1
156 sethi %hi(sys_call_table32), %l7
157 ldx [%sp + PTREGS_OFF + PT_V9_I0], %i0
158 or %l7, %lo(sys_call_table32), %l7
159 ldx [%sp + PTREGS_OFF + PT_V9_I1], %i1
160 ldx [%sp + PTREGS_OFF + PT_V9_I2], %i2
161 ldx [%sp + PTREGS_OFF + PT_V9_I3], %i3
162 ldx [%sp + PTREGS_OFF + PT_V9_I4], %i4
163 ldx [%sp + PTREGS_OFF + PT_V9_I5], %i5
171 lduw [%l7 + %l4], %l7
179 call syscall_trace_enter
180 add %sp, PTREGS_OFF, %o0
184 /* Syscall tracing can modify the registers. */
185 ldx [%sp + PTREGS_OFF + PT_V9_G1], %g1
186 sethi %hi(sys_call_table64), %l7
187 ldx [%sp + PTREGS_OFF + PT_V9_I0], %i0
188 or %l7, %lo(sys_call_table64), %l7
189 ldx [%sp + PTREGS_OFF + PT_V9_I1], %i1
190 ldx [%sp + PTREGS_OFF + PT_V9_I2], %i2
191 ldx [%sp + PTREGS_OFF + PT_V9_I3], %i3
192 ldx [%sp + PTREGS_OFF + PT_V9_I4], %i4
193 ldx [%sp + PTREGS_OFF + PT_V9_I5], %i5
201 lduw [%l7 + %l4], %l7
209 /* Linux 32-bit system calls enter here... */
211 .globl linux_sparc_syscall32
212 linux_sparc_syscall32:
213 /* Direct access to user regs, much faster. */
214 cmp %g1, NR_syscalls ! IEU1 Group
215 bgeu,pn %xcc, linux_sparc_ni_syscall ! CTI
216 srl %i0, 0, %o0 ! IEU0
217 sll %g1, 2, %l4 ! IEU0 Group
218 srl %i4, 0, %o4 ! IEU1
219 lduw [%l7 + %l4], %l7 ! Load
220 srl %i1, 0, %o1 ! IEU0 Group
221 ldx [%g6 + TI_FLAGS], %l0 ! Load
223 srl %i3, 0, %o3 ! IEU0
224 srl %i2, 0, %o2 ! IEU0 Group
225 andcc %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
226 bne,pn %icc, linux_syscall_trace32 ! CTI
228 5: call %l7 ! CTI Group brk forced
229 srl %i5, 0, %o5 ! IEU1
233 /* Linux native system calls enter here... */
235 .globl linux_sparc_syscall
237 /* Direct access to user regs, much faster. */
238 cmp %g1, NR_syscalls ! IEU1 Group
239 bgeu,pn %xcc, linux_sparc_ni_syscall ! CTI
241 sll %g1, 2, %l4 ! IEU0 Group
243 lduw [%l7 + %l4], %l7 ! Load
244 4: mov %i2, %o2 ! IEU0 Group
245 ldx [%g6 + TI_FLAGS], %l0 ! Load
248 mov %i4, %o4 ! IEU0 Group
249 andcc %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
250 bne,pn %icc, linux_syscall_trace ! CTI Group
252 2: call %l7 ! CTI Group brk forced
256 3: stx %o0, [%sp + PTREGS_OFF + PT_V9_I0]
258 ldx [%sp + PTREGS_OFF + PT_V9_TSTATE], %g3
259 mov %ulo(TSTATE_XCARRY | TSTATE_ICARRY), %g2
262 cmp %o0, -ERESTART_RESTARTBLOCK
264 andcc %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
265 ldx [%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc
268 /* System call success, clear Carry condition code. */
271 stx %g3, [%sp + PTREGS_OFF + PT_V9_TSTATE]
272 bne,pn %icc, linux_syscall_trace2
273 add %l1, 0x4, %l2 ! npc = npc+4
274 stx %l1, [%sp + PTREGS_OFF + PT_V9_TPC]
276 stx %l2, [%sp + PTREGS_OFF + PT_V9_TNPC]
279 /* Check if force_successful_syscall_return()
282 ldub [%g6 + TI_SYS_NOERROR], %l2
284 ldx [%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc
285 /* System call failure, set Carry condition code.
286 * Also, get abs(errno) to return to the process.
289 stx %o0, [%sp + PTREGS_OFF + PT_V9_I0]
293 linux_syscall_trace2:
294 call syscall_trace_leave
295 add %sp, PTREGS_OFF, %o0
296 stx %l1, [%sp + PTREGS_OFF + PT_V9_TPC]
298 stx %l2, [%sp + PTREGS_OFF + PT_V9_TNPC]