Home | History | Annotate | Line # | Download | only in mips
      1 /*	$NetBSD: SYS.h,v 1.21 2023/07/23 07:24:20 skrll Exp $ */
      2 
      3 /*-
      4  * Copyright (c) 1996 Jonathan Stone
      5  * All rights reserved.
      6  *
      7  * Redistribution and use in source and binary forms, with or without
      8  * modification, are permitted provided that the following conditions
      9  * are met:
     10  * 1. Redistributions of source code must retain the above copyright
     11  *    notice, this list of conditions and the following disclaimer.
     12  * 2. Redistributions in binary form must reproduce the above copyright
     13  *    notice, this list of conditions and the following disclaimer in the
     14  *    documentation and/or other materials provided with the distribution.
     15  * 3. All advertising materials mentioning features or use of this software
     16  *    must display the following acknowledgement:
     17  *      This product includes software developed by Jonathan Stone for
     18  *      the NetBSD Project.
     19  * 4. The name of the author may not be used to endorse or promote products
     20  *    derived from this software without specific prior written permission.
     21  *
     22  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
     23  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     24  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     25  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
     26  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
     27  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
     28  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
     29  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     30  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
     31  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     32  */
     33 
     34 /*-
     35  * Copyright (c) 1991, 1993
     36  *	The Regents of the University of California.  All rights reserved.
     37  *
     38  * This code is derived from software contributed to Berkeley by
     39  * Ralph Campbell.
     40  *
     41  * Redistribution and use in source and binary forms, with or without
     42  * modification, are permitted provided that the following conditions
     43  * are met:
     44  * 1. Redistributions of source code must retain the above copyright
     45  *    notice, this list of conditions and the following disclaimer.
     46  * 2. Redistributions in binary form must reproduce the above copyright
     47  *    notice, this list of conditions and the following disclaimer in the
     48  *    documentation and/or other materials provided with the distribution.
     49  * 3. Neither the name of the University nor the names of its contributors
     50  *    may be used to endorse or promote products derived from this software
     51  *    without specific prior written permission.
     52  *
     53  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     54  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     55  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     56  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     57  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     58  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     59  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     60  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     61  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     62  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     63  * SUCH DAMAGE.
     64  *
     65  *	from: @(#)SYS.h	8.1 (Berkeley) 6/4/93
     66  */
     67 
     68 #include <sys/syscall.h>
     69 #include <mips/asm.h>
     70 
     71 
     72 /*
     73  * If compiling for shared libs, Emit sysV ABI PIC segment pseudo-ops.
     74  *
     75  * i)  Emit .abicalls before .LEAF entrypoint, and .cpload/.cprestore after.
     76  * ii) Do interprocedure jumps indirectly via t9, with the side-effect of
     77  *     preserving the callee's entry address in t9.
     78  */
     79 #ifdef __mips_abicalls
     80 	.abicalls
     81 # if defined(__mips_o32) || defined(__mips_o64)
     82 #  define PIC_PROLOGUE(x)	SETUP_GP
     83 #  define PIC_TAILCALL(l)	PTR_LA t9, _C_LABEL(l); jr t9
     84 #  define PIC_RETURN()		j ra
     85 # else
     86 #  define PIC_PROLOGUE(x)	SETUP_GP64(t3, x)
     87 #  define PIC_TAILCALL(l)	PTR_LA t9, _C_LABEL(l); RESTORE_GP64; jr t9
     88 #  define PIC_RETURN()		RESTORE_GP64; j ra
     89 # endif
     90 #else
     91 # define PIC_PROLOGUE(x)
     92 # define PIC_TAILCALL(l)	j  _C_LABEL(l)
     93 # define PIC_RETURN()
     94 #endif /* __mips_abicalls */
     95 
     96 
     97 #ifdef __STDC__
     98 # define SYSTRAP(x)	li v0,SYS_ ## x; syscall;
     99 #else
    100 # define SYSTRAP(x)	li v0,SYS_/**/x; syscall;
    101 #endif
    102 
    103 
    104 /*
    105  * Do a syscall that cannot fail (sync, get{p,u,g,eu,eg)id)
    106  */
    107 #define RSYSCALL_NOERROR(x)						\
    108 	PSEUDO_NOERROR(x,x)
    109 
    110 /*
    111  * Do a normal syscall.
    112  */
    113 #define RSYSCALL(x)							\
    114 	PSEUDO(x,x)
    115 
    116 /*
    117  * Do a syscall that has an internal name and a weak external alias.
    118  */
    119 #define	WSYSCALL(weak,strong)						\
    120 	WEAK_ALIAS(weak,strong);					\
    121 	PSEUDO(strong,weak)
    122 
    123 /*
    124  * Do a renamed or pseudo syscall (e.g., _exit()), where the entrypoint
    125  * and syscall name are not the same.
    126  */
    127 #define PSEUDO_NOERROR(x,y)						\
    128 LEAF(x);								\
    129 	SYSTRAP(y);							\
    130 	j ra;								\
    131 END(x)
    132 
    133 #define PSEUDO(x,y)							\
    134 LEAF(x);								\
    135 	PIC_PROLOGUE(x);						\
    136 	SYSTRAP(y);							\
    137 	bne a3,zero,err;						\
    138 	PIC_RETURN();							\
    139 err:									\
    140 	PIC_TAILCALL(__cerror);						\
    141 END(x)
    142