SYS.h revision 1.3 1 /*-
2 * Copyright (c) 1992, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * This software was developed by the Computer Systems Engineering group
6 * at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and
7 * contributed to Berkeley.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. All advertising materials mentioning features or use of this software
18 * must display the following acknowledgement:
19 * This product includes software developed by the University of
20 * California, Berkeley and its contributors.
21 * 4. Neither the name of the University nor the names of its contributors
22 * may be used to endorse or promote products derived from this software
23 * without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 * SUCH DAMAGE.
36 *
37 * @(#)SYS.h 8.1 (Berkeley) 6/4/93
38 *
39 * from: Header: SYS.h,v 1.2 92/07/03 18:57:00 torek Exp
40 * $Id: SYS.h,v 1.3 1994/02/10 20:15:31 pk Exp $
41 */
42
43 #include <machine/asm.h>
44 #include <sys/syscall.h>
45 #include <machine/trap.h>
46
47 #ifdef __STDC__
48 #define _CAT(x,y) x##y
49 #else
50 #define _CAT(x,y) x/**/y
51 #endif
52
53 /*
54 * ERROR branches to cerror. This is done with a macro so that I can
55 * change it to be position independent later, if need be.
56 */
57 #ifdef PIC
58 #define ERROR() \
59 PIC_PROLOGUE(%g1,%g2); \
60 ld [%g1+cerror],%g2; jmp %g2; nop
61 #else
62 #define ERROR() \
63 sethi %hi(cerror),%g1; or %lo(cerror),%g1,%g1; jmp %g1; nop
64 #endif
65
66 /*
67 * SYSCALL is used when further action must be taken before returning.
68 * Note that it adds a `nop' over what we could do, if we only knew what
69 * came at label 1....
70 */
71 #define SYSCALL(x) \
72 ENTRY(x); mov _CAT(SYS_,x),%g1; t ST_SYSCALL; bcc 1f; nop; ERROR(); 1:
73
74 /*
75 * RSYSCALL is used when the system call should just return. Here
76 * we use the SYSCALL_G2RFLAG to put the `success' return address in %g2
77 * and avoid a branch.
78 */
79 #define RSYSCALL(x) \
80 ENTRY(x); mov (_CAT(SYS_,x))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \
81 t ST_SYSCALL; ERROR()
82
83 /*
84 * PSEUDO(x,y) is like RSYSCALL(y) except that the name is x.
85 */
86 #define PSEUDO(x,y) \
87 ENTRY(x); mov (_CAT(SYS_,y))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \
88 t ST_SYSCALL; ERROR()
89
90 .globl cerror
91