SYS.h revision 1.14 1 /*-
2 * Copyright (c) 1992, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * This software was developed by the Computer Systems Engineering group
6 * at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and
7 * contributed to Berkeley.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. All advertising materials mentioning features or use of this software
18 * must display the following acknowledgement:
19 * This product includes software developed by the University of
20 * California, Berkeley and its contributors.
21 * 4. Neither the name of the University nor the names of its contributors
22 * may be used to endorse or promote products derived from this software
23 * without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 * SUCH DAMAGE.
36 *
37 * @(#)SYS.h 8.1 (Berkeley) 6/4/93
38 *
39 * from: Header: SYS.h,v 1.2 92/07/03 18:57:00 torek Exp
40 * $NetBSD: SYS.h,v 1.14 2002/05/26 12:24:58 wiz Exp $
41 */
42
43 #include <machine/asm.h>
44 #include <sys/syscall.h>
45 #include <machine/trap.h>
46
47 #ifdef __STDC__
48 #define _CAT(x,y) x##y
49 #else
50 #define _CAT(x,y) x/**/y
51 #endif
52
53 #ifdef __ELF__
54 #define CERROR _C_LABEL(__cerror)
55 #define CURBRK _C_LABEL(__curbrk)
56 #else
57 #define CERROR _ASM_LABEL(cerror)
58 #define CURBRK _ASM_LABEL(curbrk)
59 #endif
60
61 /*
62 * ERROR branches to cerror. This is done with a macro so that I can
63 * change it to be position independent later, if need be.
64 */
65 #ifdef PIC
66 #define CALL(name) \
67 PIC_PROLOGUE(%g1,%g2); \
68 ld [%g1+name],%g2; jmp %g2; nop
69 #else
70 #define CALL(name) \
71 sethi %hi(name),%g1; or %lo(name),%g1,%g1; jmp %g1; nop
72 #endif
73 #define ERROR() CALL(CERROR)
74
75 /*
76 * SYSCALL is used when further action must be taken before returning.
77 * Note that it adds a `nop' over what we could do, if we only knew what
78 * came at label 1....
79 */
80 #define _SYSCALL(x,y) \
81 ENTRY(x); mov _CAT(SYS_,y),%g1; t ST_SYSCALL; bcc 1f; nop; ERROR(); 1:
82
83 #define SYSCALL(x) \
84 _SYSCALL(x,x)
85
86 /*
87 * RSYSCALL is used when the system call should just return. Here
88 * we use the SYSCALL_G2RFLAG to put the `success' return address in %g2
89 * and avoid a branch.
90 */
91 #define RSYSCALL(x) \
92 ENTRY(x); mov (_CAT(SYS_,x))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \
93 t ST_SYSCALL; ERROR()
94
95 /*
96 * PSEUDO(x,y) is like RSYSCALL(y) except that the name is x.
97 */
98 #define PSEUDO(x,y) \
99 ENTRY(x); mov (_CAT(SYS_,y))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \
100 t ST_SYSCALL; ERROR()
101
102 /*
103 * WSYSCALL(weak,strong) is like RSYSCALL(weak), except that weak is
104 * a weak internal alias for the strong symbol.
105 */
106 #ifdef WEAK_ALIAS
107 #define WSYSCALL(weak,strong) \
108 WEAK_ALIAS(weak,strong); \
109 PSEUDO(strong,weak)
110 #else
111 #define WSYSCALL(weak,strong) \
112 RSYSCALL(weak)
113 #endif
114
115 /*
116 * SYSCALL_NOERROR is like SYSCALL, except it's used for syscalls
117 * that never fail.
118 *
119 * XXX - This should be optimized.
120 */
121 #define SYSCALL_NOERROR(x) \
122 ENTRY(x); mov _CAT(SYS_,x),%g1; t ST_SYSCALL
123
124 /*
125 * RSYSCALL_NOERROR is like RSYSCALL, except it's used for syscalls
126 * that never fail.
127 *
128 * XXX - This should be optimized.
129 */
130 #define RSYSCALL_NOERROR(x) \
131 ENTRY(x); mov (_CAT(SYS_,x))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \
132 t ST_SYSCALL
133
134 /*
135 * PSEUDO_NOERROR(x,y) is like RSYSCALL_NOERROR(y) except that the name is x.
136 */
137 #define PSEUDO_NOERROR(x,y) \
138 ENTRY(x); mov (_CAT(SYS_,y))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \
139 t ST_SYSCALL
140
141 .globl CERROR
142