root/arch/sparc/kernel/syscalls.S
/* SPDX-License-Identifier: GPL-2.0 */
        /* SunOS's execv() call only specifies the argv argument, the
         * environment settings are the same as the calling processes.
         */
sys64_execve:
        set     sys_execve, %g1
        jmpl    %g1, %g0
         flushw

sys64_execveat:
        set     sys_execveat, %g1
        jmpl    %g1, %g0
         flushw

#ifdef CONFIG_COMPAT
sunos_execv:
        mov     %g0, %o2
sys32_execve:
        set     compat_sys_execve, %g1
        jmpl    %g1, %g0
         flushw

sys32_execveat:
        set     compat_sys_execveat, %g1
        jmpl    %g1, %g0
         flushw
#endif

        .align  32
#ifdef CONFIG_COMPAT
sys32_sigstack:
        ba,pt   %xcc, do_sys32_sigstack
         mov    %i6, %o2
#endif
        .align  32
#ifdef CONFIG_COMPAT
sys32_sigreturn:
        add     %sp, PTREGS_OFF, %o0
        call    do_sigreturn32
         add    %o7, 1f-.-4, %o7
        nop
#endif
sys_rt_sigreturn:
        add     %sp, PTREGS_OFF, %o0
        call    do_rt_sigreturn
         add    %o7, 1f-.-4, %o7
        nop
#ifdef CONFIG_COMPAT
sys32_rt_sigreturn:
        add     %sp, PTREGS_OFF, %o0
        call    do_rt_sigreturn32
         add    %o7, 1f-.-4, %o7
        nop
#endif
        .align  32
1:      ldx     [%g6 + TI_FLAGS], %l5
        andcc   %l5, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
        be,pt   %icc, rtrap
         nop
        call    syscall_trace_leave
         add    %sp, PTREGS_OFF, %o0
        ba,pt   %xcc, rtrap
         nop

        /* This is how fork() was meant to be done, 8 instruction entry.
         *
         * I questioned the following code briefly, let me clear things
         * up so you must not reason on it like I did.
         *
         * Know the fork_kpsr etc. we use in the sparc32 port?  We don't
         * need it here because the only piece of window state we copy to
         * the child is the CWP register.  Even if the parent sleeps,
         * we are safe because we stuck it into pt_regs of the parent
         * so it will not change.
         *
         * XXX This raises the question, whether we can do the same on
         * XXX sparc32 to get rid of fork_kpsr _and_ fork_kwim.  The
         * XXX answer is yes.  We stick fork_kpsr in UREG_G0 and
         * XXX fork_kwim in UREG_G1 (global registers are considered
         * XXX volatile across a system call in the sparc ABI I think
         * XXX if it isn't we can use regs->y instead, anyone who depends
         * XXX upon the Y register being preserved across a fork deserves
         * XXX to lose).
         *
         * In fact we should take advantage of that fact for other things
         * during system calls...
         */
        .align  32
sys_vfork:
        flushw
        ba,pt   %xcc, sparc_vfork
         add    %sp, PTREGS_OFF, %o0

        .align  32
sys_fork:
        flushw
        ba,pt   %xcc, sparc_fork
         add    %sp, PTREGS_OFF, %o0

        .align  32
sys_clone:
        flushw
        ba,pt   %xcc, sparc_clone
         add    %sp, PTREGS_OFF, %o0

        .align  32
__sys_clone3:
        flushw
        ba,pt   %xcc, sparc_clone3
         add    %sp, PTREGS_OFF, %o0

        .globl  ret_from_fork
ret_from_fork:
        /* Clear current_thread_info()->new_child. */
        stb     %g0, [%g6 + TI_NEW_CHILD]
        call    schedule_tail
         mov    %g7, %o0
        ldx     [%sp + PTREGS_OFF + PT_V9_I0], %o0
        brnz,pt %o0, ret_sys_call
         ldx    [%g6 + TI_FLAGS], %l0
        ldx     [%sp + PTREGS_OFF + PT_V9_G1], %l1
        brz,pt  %l1, ret_sys_call
         nop
        call    %l1
         ldx    [%sp + PTREGS_OFF + PT_V9_G2], %o0
        ba,pt   %xcc, ret_sys_call
         mov    0, %o0

        .globl  sparc_exit_group
        .type   sparc_exit_group,#function
sparc_exit_group:
        sethi   %hi(sys_exit_group), %g7
        ba,pt   %xcc, 1f
         or     %g7, %lo(sys_exit_group), %g7
        .size   sparc_exit_group,.-sparc_exit_group

        .globl  sparc_exit
        .type   sparc_exit,#function
sparc_exit:
        sethi   %hi(sys_exit), %g7
        or      %g7, %lo(sys_exit), %g7
1:      rdpr    %pstate, %g2
        wrpr    %g2, PSTATE_IE, %pstate
        rdpr    %otherwin, %g1
        rdpr    %cansave, %g3
        add     %g3, %g1, %g3
        wrpr    %g3, 0x0, %cansave
        wrpr    %g0, 0x0, %otherwin
        wrpr    %g2, 0x0, %pstate
        jmpl    %g7, %g0
         stb    %g0, [%g6 + TI_WSAVED]
        .size   sparc_exit,.-sparc_exit

linux_sparc_ni_syscall:
        sethi   %hi(sys_ni_syscall), %l7
        ba,pt   %xcc, 4f
         or     %l7, %lo(sys_ni_syscall), %l7

linux_syscall_trace32:
        call    syscall_trace_enter
         add    %sp, PTREGS_OFF, %o0
        brnz,pn %o0, 3f
         mov    -ENOSYS, %o0

        /* Syscall tracing can modify the registers.  */
        ldx     [%sp + PTREGS_OFF + PT_V9_G1], %g1
        sethi   %hi(sys_call_table32), %l7
        ldx     [%sp + PTREGS_OFF + PT_V9_I0], %i0
        or      %l7, %lo(sys_call_table32), %l7
        ldx     [%sp + PTREGS_OFF + PT_V9_I1], %i1
        ldx     [%sp + PTREGS_OFF + PT_V9_I2], %i2
        ldx     [%sp + PTREGS_OFF + PT_V9_I3], %i3
        ldx     [%sp + PTREGS_OFF + PT_V9_I4], %i4
        ldx     [%sp + PTREGS_OFF + PT_V9_I5], %i5

        cmp     %g1, NR_syscalls
        bgeu,pn %xcc, 3f
         mov    -ENOSYS, %o0

        sll     %g1, 2, %l4
        srl     %i0, 0, %o0
        lduw    [%l7 + %l4], %l7
        srl     %i4, 0, %o4
        srl     %i1, 0, %o1
        srl     %i2, 0, %o2
        ba,pt   %xcc, 5f
         srl    %i3, 0, %o3

linux_syscall_trace:
        call    syscall_trace_enter
         add    %sp, PTREGS_OFF, %o0
        brnz,pn %o0, 3f
         mov    -ENOSYS, %o0

        /* Syscall tracing can modify the registers.  */
        ldx     [%sp + PTREGS_OFF + PT_V9_G1], %g1
        sethi   %hi(sys_call_table64), %l7
        ldx     [%sp + PTREGS_OFF + PT_V9_I0], %i0
        or      %l7, %lo(sys_call_table64), %l7
        ldx     [%sp + PTREGS_OFF + PT_V9_I1], %i1
        ldx     [%sp + PTREGS_OFF + PT_V9_I2], %i2
        ldx     [%sp + PTREGS_OFF + PT_V9_I3], %i3
        ldx     [%sp + PTREGS_OFF + PT_V9_I4], %i4
        ldx     [%sp + PTREGS_OFF + PT_V9_I5], %i5

        cmp     %g1, NR_syscalls
        bgeu,pn %xcc, 3f
         mov    -ENOSYS, %o0

        sll     %g1, 2, %l4
        mov     %i0, %o0
        lduw    [%l7 + %l4], %l7
        mov     %i1, %o1
        mov     %i2, %o2
        mov     %i3, %o3
        b,pt    %xcc, 2f
         mov    %i4, %o4


        /* Linux 32-bit system calls enter here... */
        .align  32
        .globl  linux_sparc_syscall32
linux_sparc_syscall32:
        /* Direct access to user regs, much faster. */
        cmp     %g1, NR_syscalls                        ! IEU1  Group
        bgeu,pn %xcc, linux_sparc_ni_syscall            ! CTI
         srl    %i0, 0, %o0                             ! IEU0
        sll     %g1, 2, %l4                             ! IEU0  Group
        srl     %i4, 0, %o4                             ! IEU1
        lduw    [%l7 + %l4], %l7                        ! Load
        srl     %i1, 0, %o1                             ! IEU0  Group
        ldx     [%g6 + TI_FLAGS], %l0           ! Load

        srl     %i3, 0, %o3                             ! IEU0
        srl     %i2, 0, %o2                             ! IEU0  Group
        andcc   %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
        bne,pn  %icc, linux_syscall_trace32             ! CTI
         mov    %i0, %l5                                ! IEU1
5:      call    %l7                                     ! CTI   Group brk forced
         srl    %i5, 0, %o5                             ! IEU1
        ba,pt   %xcc, 3f
         sra    %o0, 0, %o0

        /* Linux native system calls enter here... */
        .align  32
        .globl  linux_sparc_syscall
linux_sparc_syscall:
        /* Direct access to user regs, much faster. */
        cmp     %g1, NR_syscalls                        ! IEU1  Group
        bgeu,pn %xcc, linux_sparc_ni_syscall            ! CTI
         mov    %i0, %o0                                ! IEU0
        sll     %g1, 2, %l4                             ! IEU0  Group
        mov     %i1, %o1                                ! IEU1
        lduw    [%l7 + %l4], %l7                        ! Load
4:      mov     %i2, %o2                                ! IEU0  Group
        ldx     [%g6 + TI_FLAGS], %l0           ! Load

        mov     %i3, %o3                                ! IEU1
        mov     %i4, %o4                                ! IEU0  Group
        andcc   %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
        bne,pn  %icc, linux_syscall_trace               ! CTI   Group
         mov    %i0, %l5                                ! IEU0
2:      call    %l7                                     ! CTI   Group brk forced
         mov    %i5, %o5                                ! IEU0
        nop

3:      stx     %o0, [%sp + PTREGS_OFF + PT_V9_I0]
ret_sys_call:
        ldx     [%sp + PTREGS_OFF + PT_V9_TSTATE], %g3
        mov     %ulo(TSTATE_XCARRY | TSTATE_ICARRY), %g2
        sllx    %g2, 32, %g2

        cmp     %o0, -ERESTART_RESTARTBLOCK
        bgeu,pn %xcc, 1f
         andcc  %l0, (_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT|_TIF_SYSCALL_TRACEPOINT|_TIF_NOHZ), %g0
        ldx     [%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc

2:
        /* System call success, clear Carry condition code. */
        andn    %g3, %g2, %g3
3:
        stx     %g3, [%sp + PTREGS_OFF + PT_V9_TSTATE]  
        bne,pn  %icc, linux_syscall_trace2
         add    %l1, 0x4, %l2                   ! npc = npc+4
        stx     %l1, [%sp + PTREGS_OFF + PT_V9_TPC]
        ba,pt   %xcc, rtrap
         stx    %l2, [%sp + PTREGS_OFF + PT_V9_TNPC]

1:
        /* Check if force_successful_syscall_return()
         * was invoked.
         */
        ldub    [%g6 + TI_SYS_NOERROR], %l2
        brnz,pn %l2, 2b
         ldx    [%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc
        /* System call failure, set Carry condition code.
         * Also, get abs(errno) to return to the process.
         */
        sub     %g0, %o0, %o0
        stx     %o0, [%sp + PTREGS_OFF + PT_V9_I0]
        ba,pt   %xcc, 3b
         or     %g3, %g2, %g3

linux_syscall_trace2:
        call    syscall_trace_leave
         add    %sp, PTREGS_OFF, %o0
        stx     %l1, [%sp + PTREGS_OFF + PT_V9_TPC]
        ba,pt   %xcc, rtrap
         stx    %l2, [%sp + PTREGS_OFF + PT_V9_TNPC]