rtrap_32.S 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322
  1. /*
  2. * rtrap.S: Return from Sparc trap low-level code.
  3. *
  4. * Copyright (C) 1995 David S. Miller (davem@caip.rutgers.edu)
  5. */
  6. #include <asm/page.h>
  7. #include <asm/ptrace.h>
  8. #include <asm/psr.h>
  9. #include <asm/asi.h>
  10. #include <asm/smp.h>
  11. #include <asm/contregs.h>
  12. #include <asm/winmacro.h>
  13. #include <asm/asmmacro.h>
  14. #include <asm/thread_info.h>
  15. #define t_psr l0
  16. #define t_pc l1
  17. #define t_npc l2
  18. #define t_wim l3
  19. #define twin_tmp1 l4
  20. #define glob_tmp g4
  21. #define curptr g6
  22. /* 7 WINDOW SPARC PATCH INSTRUCTIONS */
  23. .globl rtrap_7win_patch1, rtrap_7win_patch2, rtrap_7win_patch3
  24. .globl rtrap_7win_patch4, rtrap_7win_patch5
  25. rtrap_7win_patch1: srl %t_wim, 0x6, %glob_tmp
  26. rtrap_7win_patch2: and %glob_tmp, 0x7f, %glob_tmp
  27. rtrap_7win_patch3: srl %g1, 7, %g2
  28. rtrap_7win_patch4: srl %g2, 6, %g2
  29. rtrap_7win_patch5: and %g1, 0x7f, %g1
  30. /* END OF PATCH INSTRUCTIONS */
  31. /* We need to check for a few things which are:
  32. * 1) The need to call schedule() because this
  33. * processes quantum is up.
  34. * 2) Pending signals for this process, if any
  35. * exist we need to call do_signal() to do
  36. * the needy.
  37. *
  38. * Else we just check if the rett would land us
  39. * in an invalid window, if so we need to grab
  40. * it off the user/kernel stack first.
  41. */
  42. .globl ret_trap_entry, rtrap_patch1, rtrap_patch2
  43. .globl rtrap_patch3, rtrap_patch4, rtrap_patch5
  44. .globl ret_trap_lockless_ipi
  45. ret_trap_entry:
  46. ret_trap_lockless_ipi:
  47. andcc %t_psr, PSR_PS, %g0
  48. sethi %hi(PSR_SYSCALL), %g1
  49. be 1f
  50. andn %t_psr, %g1, %t_psr
  51. wr %t_psr, 0x0, %psr
  52. b ret_trap_kernel
  53. nop
  54. 1:
  55. ld [%curptr + TI_FLAGS], %g2
  56. andcc %g2, (_TIF_NEED_RESCHED), %g0
  57. be signal_p
  58. nop
  59. call schedule
  60. nop
  61. ld [%curptr + TI_FLAGS], %g2
  62. signal_p:
  63. andcc %g2, _TIF_DO_NOTIFY_RESUME_MASK, %g0
  64. bz,a ret_trap_continue
  65. ld [%sp + STACKFRAME_SZ + PT_PSR], %t_psr
  66. mov %g2, %o2
  67. mov %l5, %o1
  68. call do_notify_resume
  69. add %sp, STACKFRAME_SZ, %o0 ! pt_regs ptr
  70. /* Fall through. */
  71. ld [%sp + STACKFRAME_SZ + PT_PSR], %t_psr
  72. clr %l6
  73. ret_trap_continue:
  74. sethi %hi(PSR_SYSCALL), %g1
  75. andn %t_psr, %g1, %t_psr
  76. wr %t_psr, 0x0, %psr
  77. WRITE_PAUSE
  78. ld [%curptr + TI_W_SAVED], %twin_tmp1
  79. orcc %g0, %twin_tmp1, %g0
  80. be ret_trap_nobufwins
  81. nop
  82. wr %t_psr, PSR_ET, %psr
  83. WRITE_PAUSE
  84. mov 1, %o1
  85. call try_to_clear_window_buffer
  86. add %sp, STACKFRAME_SZ, %o0
  87. b signal_p
  88. ld [%curptr + TI_FLAGS], %g2
  89. ret_trap_nobufwins:
  90. /* Load up the user's out registers so we can pull
  91. * a window from the stack, if necessary.
  92. */
  93. LOAD_PT_INS(sp)
  94. /* If there are already live user windows in the
  95. * set we can return from trap safely.
  96. */
  97. ld [%curptr + TI_UWINMASK], %twin_tmp1
  98. orcc %g0, %twin_tmp1, %g0
  99. bne ret_trap_userwins_ok
  100. nop
  101. /* Calculate new %wim, we have to pull a register
  102. * window from the users stack.
  103. */
  104. ret_trap_pull_one_window:
  105. rd %wim, %t_wim
  106. sll %t_wim, 0x1, %twin_tmp1
  107. rtrap_patch1: srl %t_wim, 0x7, %glob_tmp
  108. or %glob_tmp, %twin_tmp1, %glob_tmp
  109. rtrap_patch2: and %glob_tmp, 0xff, %glob_tmp
  110. wr %glob_tmp, 0x0, %wim
  111. /* Here comes the architecture specific
  112. * branch to the user stack checking routine
  113. * for return from traps.
  114. */
  115. .globl rtrap_mmu_patchme
  116. rtrap_mmu_patchme: b sun4c_rett_stackchk
  117. andcc %fp, 0x7, %g0
  118. ret_trap_userwins_ok:
  119. LOAD_PT_PRIV(sp, t_psr, t_pc, t_npc)
  120. or %t_pc, %t_npc, %g2
  121. andcc %g2, 0x3, %g0
  122. sethi %hi(PSR_SYSCALL), %g2
  123. be 1f
  124. andn %t_psr, %g2, %t_psr
  125. b ret_trap_unaligned_pc
  126. add %sp, STACKFRAME_SZ, %o0
  127. 1:
  128. LOAD_PT_YREG(sp, g1)
  129. LOAD_PT_GLOBALS(sp)
  130. wr %t_psr, 0x0, %psr
  131. WRITE_PAUSE
  132. jmp %t_pc
  133. rett %t_npc
  134. ret_trap_unaligned_pc:
  135. ld [%sp + STACKFRAME_SZ + PT_PC], %o1
  136. ld [%sp + STACKFRAME_SZ + PT_NPC], %o2
  137. ld [%sp + STACKFRAME_SZ + PT_PSR], %o3
  138. wr %t_wim, 0x0, %wim ! or else...
  139. wr %t_psr, PSR_ET, %psr
  140. WRITE_PAUSE
  141. call do_memaccess_unaligned
  142. nop
  143. b signal_p
  144. ld [%curptr + TI_FLAGS], %g2
  145. ret_trap_kernel:
  146. /* Will the rett land us in the invalid window? */
  147. mov 2, %g1
  148. sll %g1, %t_psr, %g1
  149. rtrap_patch3: srl %g1, 8, %g2
  150. or %g1, %g2, %g1
  151. rd %wim, %g2
  152. andcc %g2, %g1, %g0
  153. be 1f ! Nope, just return from the trap
  154. sll %g2, 0x1, %g1
  155. /* We have to grab a window before returning. */
  156. rtrap_patch4: srl %g2, 7, %g2
  157. or %g1, %g2, %g1
  158. rtrap_patch5: and %g1, 0xff, %g1
  159. wr %g1, 0x0, %wim
  160. /* Grrr, make sure we load from the right %sp... */
  161. LOAD_PT_ALL(sp, t_psr, t_pc, t_npc, g1)
  162. restore %g0, %g0, %g0
  163. LOAD_WINDOW(sp)
  164. b 2f
  165. save %g0, %g0, %g0
  166. /* Reload the entire frame in case this is from a
  167. * kernel system call or whatever...
  168. */
  169. 1:
  170. LOAD_PT_ALL(sp, t_psr, t_pc, t_npc, g1)
  171. 2:
  172. sethi %hi(PSR_SYSCALL), %twin_tmp1
  173. andn %t_psr, %twin_tmp1, %t_psr
  174. wr %t_psr, 0x0, %psr
  175. WRITE_PAUSE
  176. jmp %t_pc
  177. rett %t_npc
  178. ret_trap_user_stack_is_bolixed:
  179. wr %t_wim, 0x0, %wim
  180. wr %t_psr, PSR_ET, %psr
  181. WRITE_PAUSE
  182. call window_ret_fault
  183. add %sp, STACKFRAME_SZ, %o0
  184. b signal_p
  185. ld [%curptr + TI_FLAGS], %g2
  186. sun4c_rett_stackchk:
  187. be 1f
  188. and %fp, 0xfff, %g1 ! delay slot
  189. b ret_trap_user_stack_is_bolixed + 0x4
  190. wr %t_wim, 0x0, %wim
  191. /* See if we have to check the sanity of one page or two */
  192. 1:
  193. add %g1, 0x38, %g1
  194. sra %fp, 29, %g2
  195. add %g2, 0x1, %g2
  196. andncc %g2, 0x1, %g0
  197. be 1f
  198. andncc %g1, 0xff8, %g0
  199. /* %sp is in vma hole, yuck */
  200. b ret_trap_user_stack_is_bolixed + 0x4
  201. wr %t_wim, 0x0, %wim
  202. 1:
  203. be sun4c_rett_onepage /* Only one page to check */
  204. lda [%fp] ASI_PTE, %g2
  205. sun4c_rett_twopages:
  206. add %fp, 0x38, %g1
  207. sra %g1, 29, %g2
  208. add %g2, 0x1, %g2
  209. andncc %g2, 0x1, %g0
  210. be 1f
  211. lda [%g1] ASI_PTE, %g2
  212. /* Second page is in vma hole */
  213. b ret_trap_user_stack_is_bolixed + 0x4
  214. wr %t_wim, 0x0, %wim
  215. 1:
  216. srl %g2, 29, %g2
  217. andcc %g2, 0x4, %g0
  218. bne sun4c_rett_onepage
  219. lda [%fp] ASI_PTE, %g2
  220. /* Second page has bad perms */
  221. b ret_trap_user_stack_is_bolixed + 0x4
  222. wr %t_wim, 0x0, %wim
  223. sun4c_rett_onepage:
  224. srl %g2, 29, %g2
  225. andcc %g2, 0x4, %g0
  226. bne,a 1f
  227. restore %g0, %g0, %g0
  228. /* A page had bad page permissions, losing... */
  229. b ret_trap_user_stack_is_bolixed + 0x4
  230. wr %t_wim, 0x0, %wim
  231. /* Whee, things are ok, load the window and continue. */
  232. 1:
  233. LOAD_WINDOW(sp)
  234. b ret_trap_userwins_ok
  235. save %g0, %g0, %g0
  236. .globl srmmu_rett_stackchk
  237. srmmu_rett_stackchk:
  238. bne ret_trap_user_stack_is_bolixed
  239. sethi %hi(PAGE_OFFSET), %g1
  240. cmp %g1, %fp
  241. bleu ret_trap_user_stack_is_bolixed
  242. mov AC_M_SFSR, %g1
  243. lda [%g1] ASI_M_MMUREGS, %g0
  244. lda [%g0] ASI_M_MMUREGS, %g1
  245. or %g1, 0x2, %g1
  246. sta %g1, [%g0] ASI_M_MMUREGS
  247. restore %g0, %g0, %g0
  248. LOAD_WINDOW(sp)
  249. save %g0, %g0, %g0
  250. andn %g1, 0x2, %g1
  251. sta %g1, [%g0] ASI_M_MMUREGS
  252. mov AC_M_SFAR, %g2
  253. lda [%g2] ASI_M_MMUREGS, %g2
  254. mov AC_M_SFSR, %g1
  255. lda [%g1] ASI_M_MMUREGS, %g1
  256. andcc %g1, 0x2, %g0
  257. be ret_trap_userwins_ok
  258. nop
  259. b,a ret_trap_user_stack_is_bolixed