SYS.h revision 1.1 1 /*-
2 * Copyright (c) 1992, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * This software was developed by the Computer Systems Engineering group
6 * at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and
7 * contributed to Berkeley.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. All advertising materials mentioning features or use of this software
18 * must display the following acknowledgement:
19 * This product includes software developed by the University of
20 * California, Berkeley and its contributors.
21 * 4. Neither the name of the University nor the names of its contributors
22 * may be used to endorse or promote products derived from this software
23 * without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 * SUCH DAMAGE.
36 *
37 * @(#)SYS.h 8.1 (Berkeley) 6/4/93
38 *
39 * from: Header: SYS.h,v 1.2 92/07/03 18:57:00 torek Exp
40 * $Id: SYS.h,v 1.1 1993/10/07 00:21:21 cgd Exp $
41 */
42
43 #include <sys/syscall.h>
44 #include <machine/trap.h>
45
46 #ifdef PROF
47 #define ENTRY(x) \
48 .align 4; .globl _##x; .proc 1; _##x:; .data; .align 4; 1: .long 0; \
49 .text; save %sp,-96,%sp; sethi %hi(1b),%o0; call mcount; \
50 or %o0,%lo(1b),%o0; restore
51 #else
52 #define ENTRY(x) \
53 .align 4; .globl _##x; .proc 1; _##x:
54 #endif
55
56 /*
57 * ERROR branches to cerror. This is done with a macro so that I can
58 * change it to be position independent later, if need be.
59 */
60 #define ERROR() \
61 sethi %hi(cerror),%g1; or %lo(cerror),%g1,%g1; jmp %g1; nop
62
63 /*
64 * SYSCALL is used when further action must be taken before returning.
65 * Note that it adds a `nop' over what we could do, if we only knew what
66 * came at label 1....
67 */
68 #define SYSCALL(x) \
69 ENTRY(x); mov SYS_##x,%g1; t ST_SYSCALL; bcc 1f; nop; ERROR(); 1:
70
71 /*
72 * RSYSCALL is used when the system call should just return. Here
73 * we use the SYSCALL_G2RFLAG to put the `success' return address in %g2
74 * and avoid a branch.
75 */
76 #define RSYSCALL(x) \
77 ENTRY(x); mov (SYS_##x)|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \
78 t ST_SYSCALL; ERROR()
79
80 /*
81 * PSEUDO(x,y) is like RSYSCALL(y) except that the name is x.
82 */
83 #define PSEUDO(x,y) \
84 ENTRY(x); mov (SYS_##y)|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \
85 t ST_SYSCALL; ERROR()
86
87 #define ASMSTR .asciz
88
89 .globl cerror
90