1 /*- 2 * Copyright (c) 1992, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * This software was developed by the Computer Systems Engineering group 6 * at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and 7 * contributed to Berkeley. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 3. All advertising materials mentioning features or use of this software 18 * must display the following acknowledgement: 19 * This product includes software developed by the University of 20 * California, Berkeley and its contributors. 21 * 4. Neither the name of the University nor the names of its contributors 22 * may be used to endorse or promote products derived from this software 23 * without specific prior written permission. 24 * 25 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 28 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 35 * SUCH DAMAGE. 36 * 37 * @(#)SYS.h 8.1 (Berkeley) 6/4/93 38 * 39 * from: Header: SYS.h,v 1.2 92/07/03 18:57:00 torek Exp 40 * $NetBSD: SYS.h,v 1.14 2002/05/26 12:24:58 wiz Exp $ 41 */ 42 43 #include <machine/asm.h> 44 #include <sys/syscall.h> 45 #include <machine/trap.h> 46 47 #ifdef __STDC__ 48 #define _CAT(x,y) x##y 49 #else 50 #define _CAT(x,y) x/**/y 51 #endif 52 53 #ifdef __ELF__ 54 #define CERROR _C_LABEL(__cerror) 55 #define CURBRK _C_LABEL(__curbrk) 56 #else 57 #define CERROR _ASM_LABEL(cerror) 58 #define CURBRK _ASM_LABEL(curbrk) 59 #endif 60 61 /* 62 * ERROR branches to cerror. This is done with a macro so that I can 63 * change it to be position independent later, if need be. 64 */ 65 #ifdef PIC 66 #define CALL(name) \ 67 PIC_PROLOGUE(%g1,%g2); \ 68 ld [%g1+name],%g2; jmp %g2; nop 69 #else 70 #define CALL(name) \ 71 sethi %hi(name),%g1; or %lo(name),%g1,%g1; jmp %g1; nop 72 #endif 73 #define ERROR() CALL(CERROR) 74 75 /* 76 * SYSCALL is used when further action must be taken before returning. 77 * Note that it adds a `nop' over what we could do, if we only knew what 78 * came at label 1.... 79 */ 80 #define _SYSCALL(x,y) \ 81 ENTRY(x); mov _CAT(SYS_,y),%g1; t ST_SYSCALL; bcc 1f; nop; ERROR(); 1: 82 83 #define SYSCALL(x) \ 84 _SYSCALL(x,x) 85 86 /* 87 * RSYSCALL is used when the system call should just return. Here 88 * we use the SYSCALL_G2RFLAG to put the `success' return address in %g2 89 * and avoid a branch. 90 */ 91 #define RSYSCALL(x) \ 92 ENTRY(x); mov (_CAT(SYS_,x))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \ 93 t ST_SYSCALL; ERROR() 94 95 /* 96 * PSEUDO(x,y) is like RSYSCALL(y) except that the name is x. 97 */ 98 #define PSEUDO(x,y) \ 99 ENTRY(x); mov (_CAT(SYS_,y))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \ 100 t ST_SYSCALL; ERROR() 101 102 /* 103 * WSYSCALL(weak,strong) is like RSYSCALL(weak), except that weak is 104 * a weak internal alias for the strong symbol. 105 */ 106 #ifdef WEAK_ALIAS 107 #define WSYSCALL(weak,strong) \ 108 WEAK_ALIAS(weak,strong); \ 109 PSEUDO(strong,weak) 110 #else 111 #define WSYSCALL(weak,strong) \ 112 RSYSCALL(weak) 113 #endif 114 115 /* 116 * SYSCALL_NOERROR is like SYSCALL, except it's used for syscalls 117 * that never fail. 118 * 119 * XXX - This should be optimized. 120 */ 121 #define SYSCALL_NOERROR(x) \ 122 ENTRY(x); mov _CAT(SYS_,x),%g1; t ST_SYSCALL 123 124 /* 125 * RSYSCALL_NOERROR is like RSYSCALL, except it's used for syscalls 126 * that never fail. 127 * 128 * XXX - This should be optimized. 129 */ 130 #define RSYSCALL_NOERROR(x) \ 131 ENTRY(x); mov (_CAT(SYS_,x))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \ 132 t ST_SYSCALL 133 134 /* 135 * PSEUDO_NOERROR(x,y) is like RSYSCALL_NOERROR(y) except that the name is x. 136 */ 137 #define PSEUDO_NOERROR(x,y) \ 138 ENTRY(x); mov (_CAT(SYS_,y))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \ 139 t ST_SYSCALL 140 141 .globl CERROR 142