SYS.h revision 1.2 1 /*-
2 * Copyright (c) 1992, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * This software was developed by the Computer Systems Engineering group
6 * at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and
7 * contributed to Berkeley.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. All advertising materials mentioning features or use of this software
18 * must display the following acknowledgement:
19 * This product includes software developed by the University of
20 * California, Berkeley and its contributors.
21 * 4. Neither the name of the University nor the names of its contributors
22 * may be used to endorse or promote products derived from this software
23 * without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 * SUCH DAMAGE.
36 *
37 * @(#)SYS.h 8.1 (Berkeley) 6/4/93
38 *
39 * from: Header: SYS.h,v 1.2 92/07/03 18:57:00 torek Exp
40 * $Id: SYS.h,v 1.2 1994/01/15 20:19:43 pk Exp $
41 */
42
43 #include <sys/syscall.h>
44 #include <machine/trap.h>
45
46 #ifdef __STDC__
47 #define _CAT(x,y) x##y
48 #else
49 #define _CAT(x,y) x/**/y
50 #endif
51
52 #ifdef PROF
53 #define ENTRY(x) \
54 .align 4; .globl _CAT(_,x); .proc 1; _CAT(_,x):; .data; .align 4; 1: .long 0; \
55 .text; save %sp,-96,%sp; sethi %hi(1b),%o0; call mcount; \
56 or %o0,%lo(1b),%o0; restore
57 #else
58 #define ENTRY(x) \
59 .align 4; .globl _CAT(_,x); .proc 1; _CAT(_,x):
60 #endif
61
62 /*
63 * ERROR branches to cerror. This is done with a macro so that I can
64 * change it to be position independent later, if need be.
65 */
66 #define ERROR() \
67 sethi %hi(cerror),%g1; or %lo(cerror),%g1,%g1; jmp %g1; nop
68
69 /*
70 * SYSCALL is used when further action must be taken before returning.
71 * Note that it adds a `nop' over what we could do, if we only knew what
72 * came at label 1....
73 */
74 #define SYSCALL(x) \
75 ENTRY(x); mov _CAT(SYS_,x),%g1; t ST_SYSCALL; bcc 1f; nop; ERROR(); 1:
76
77 /*
78 * RSYSCALL is used when the system call should just return. Here
79 * we use the SYSCALL_G2RFLAG to put the `success' return address in %g2
80 * and avoid a branch.
81 */
82 #define RSYSCALL(x) \
83 ENTRY(x); mov (_CAT(SYS_,x))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \
84 t ST_SYSCALL; ERROR()
85
86 /*
87 * PSEUDO(x,y) is like RSYSCALL(y) except that the name is x.
88 */
89 #define PSEUDO(x,y) \
90 ENTRY(x); mov (_CAT(SYS_,y))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \
91 t ST_SYSCALL; ERROR()
92
93 #define ASMSTR .asciz
94
95 .globl cerror
96