1 /*- 2 * Copyright (c) 1992, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * This software was developed by the Computer Systems Engineering group 6 * at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and 7 * contributed to Berkeley. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 3. All advertising materials mentioning features or use of this software 18 * must display the following acknowledgement: 19 * This product includes software developed by the University of 20 * California, Berkeley and its contributors. 21 * 4. Neither the name of the University nor the names of its contributors 22 * may be used to endorse or promote products derived from this software 23 * without specific prior written permission. 24 * 25 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 28 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 35 * SUCH DAMAGE. 36 * 37 * @(#)SYS.h 8.1 (Berkeley) 6/4/93 38 * 39 * from: Header: SYS.h,v 1.2 92/07/03 18:57:00 torek Exp 40 * $NetBSD: SYS.h,v 1.8 1997/05/04 06:40:57 kleink Exp $ 41 */ 42 43 #include <machine/asm.h> 44 #include <sys/syscall.h> 45 #include <machine/trap.h> 46 47 #ifdef __STDC__ 48 #define _CAT(x,y) x##y 49 #else 50 #define _CAT(x,y) x/**/y 51 #endif 52 53 /* 54 * ERROR branches to cerror. This is done with a macro so that I can 55 * change it to be position independent later, if need be. 56 */ 57 #ifdef PIC 58 #define ERROR() \ 59 PIC_PROLOGUE(%g1,%g2); \ 60 ld [%g1+cerror],%g2; jmp %g2; nop 61 #else 62 #define ERROR() \ 63 sethi %hi(cerror),%g1; or %lo(cerror),%g1,%g1; jmp %g1; nop 64 #endif 65 66 /* 67 * SYSCALL is used when further action must be taken before returning. 68 * Note that it adds a `nop' over what we could do, if we only knew what 69 * came at label 1.... 70 */ 71 #define SYSCALL(x) \ 72 ENTRY(x); mov _CAT(SYS_,x),%g1; t ST_SYSCALL; bcc 1f; nop; ERROR(); 1: 73 74 /* 75 * RSYSCALL is used when the system call should just return. Here 76 * we use the SYSCALL_G2RFLAG to put the `success' return address in %g2 77 * and avoid a branch. 78 */ 79 #define RSYSCALL(x) \ 80 ENTRY(x); mov (_CAT(SYS_,x))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \ 81 t ST_SYSCALL; ERROR() 82 83 /* 84 * PSEUDO(x,y) is like RSYSCALL(y) except that the name is x. 85 */ 86 #define PSEUDO(x,y) \ 87 ENTRY(x); mov (_CAT(SYS_,y))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \ 88 t ST_SYSCALL; ERROR() 89 90 /* 91 * SYSCALL_NOERROR is like SYSCALL, except it's used for syscalls 92 * that never fail. 93 * 94 * XXX - This should be optimized. 95 */ 96 #define SYSCALL_NOERROR(x) \ 97 ENTRY(x); mov _CAT(SYS_,x),%g1; t ST_SYSCALL 98 99 /* 100 * RSYSCALL_NOERROR is like RSYSCALL, except it's used for syscalls 101 * that never fail. 102 * 103 * XXX - This should be optimized. 104 */ 105 #define RSYSCALL_NOERROR(x) \ 106 ENTRY(x); mov (_CAT(SYS_,x))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \ 107 t ST_SYSCALL 108 109 /* 110 * PSEUDO_NOERROR(x,y) is like RSYSCALL_NOERROR(y) except that the name is x. 111 */ 112 #define PSEUDO_NOERROR(x,y) \ 113 ENTRY(x); mov (_CAT(SYS_,y))|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \ 114 t ST_SYSCALL 115 116 .globl cerror 117