1 /*- 2 * Copyright (c) 1992, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * This software was developed by the Computer Systems Engineering group 6 * at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and 7 * contributed to Berkeley. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 3. All advertising materials mentioning features or use of this software 18 * must display the following acknowledgement: 19 * This product includes software developed by the University of 20 * California, Berkeley and its contributors. 21 * 4. Neither the name of the University nor the names of its contributors 22 * may be used to endorse or promote products derived from this software 23 * without specific prior written permission. 24 * 25 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 28 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 35 * SUCH DAMAGE. 36 * 37 * @(#)SYS.h 8.1 (Berkeley) 6/4/93 38 * 39 * from: Header: SYS.h,v 1.2 92/07/03 18:57:00 torek Exp 40 * $Id: SYS.h,v 1.1 1993/10/07 00:21:21 cgd Exp $ 41 */ 42 43 #include <sys/syscall.h> 44 #include <machine/trap.h> 45 46 #ifdef PROF 47 #define ENTRY(x) \ 48 .align 4; .globl _##x; .proc 1; _##x:; .data; .align 4; 1: .long 0; \ 49 .text; save %sp,-96,%sp; sethi %hi(1b),%o0; call mcount; \ 50 or %o0,%lo(1b),%o0; restore 51 #else 52 #define ENTRY(x) \ 53 .align 4; .globl _##x; .proc 1; _##x: 54 #endif 55 56 /* 57 * ERROR branches to cerror. This is done with a macro so that I can 58 * change it to be position independent later, if need be. 59 */ 60 #define ERROR() \ 61 sethi %hi(cerror),%g1; or %lo(cerror),%g1,%g1; jmp %g1; nop 62 63 /* 64 * SYSCALL is used when further action must be taken before returning. 65 * Note that it adds a `nop' over what we could do, if we only knew what 66 * came at label 1.... 67 */ 68 #define SYSCALL(x) \ 69 ENTRY(x); mov SYS_##x,%g1; t ST_SYSCALL; bcc 1f; nop; ERROR(); 1: 70 71 /* 72 * RSYSCALL is used when the system call should just return. Here 73 * we use the SYSCALL_G2RFLAG to put the `success' return address in %g2 74 * and avoid a branch. 75 */ 76 #define RSYSCALL(x) \ 77 ENTRY(x); mov (SYS_##x)|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \ 78 t ST_SYSCALL; ERROR() 79 80 /* 81 * PSEUDO(x,y) is like RSYSCALL(y) except that the name is x. 82 */ 83 #define PSEUDO(x,y) \ 84 ENTRY(x); mov (SYS_##y)|SYSCALL_G2RFLAG,%g1; add %o7,8,%g2; \ 85 t ST_SYSCALL; ERROR() 86 87 #define ASMSTR .asciz 88 89 .globl cerror 90