1/* $NetBSD: SYS.h,v 1.18 2003/10/29 12:28:33 pooka Exp $ */ 2/* $FreeBSD: head/lib/libc/mips/SYS.h 178580 2008-04-26 12:08:02Z imp $ */
| 1/* $NetBSD: SYS.h,v 1.19 2009/12/14 01:07:41 matt Exp $ */ 2/* $FreeBSD: head/lib/libc/mips/SYS.h 209231 2010-06-16 12:55:14Z jchandra $ */
|
3 4/*- 5 * Copyright (c) 1996 Jonathan Stone 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. All advertising materials mentioning features or use of this software 17 * must display the following acknowledgement: 18 * This product includes software developed by Jonathan Stone for 19 * the NetBSD Project. 20 * 4. The name of the author may not be used to endorse or promote products 21 * derived from this software without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 24 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 25 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 26 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 27 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 28 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 29 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 30 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 31 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 32 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 33 */ 34 35/*- 36 * Copyright (c) 1991, 1993 37 * The Regents of the University of California. All rights reserved. 38 * 39 * This code is derived from software contributed to Berkeley by 40 * Ralph Campbell. 41 * 42 * Redistribution and use in source and binary forms, with or without 43 * modification, are permitted provided that the following conditions 44 * are met: 45 * 1. Redistributions of source code must retain the above copyright 46 * notice, this list of conditions and the following disclaimer. 47 * 2. Redistributions in binary form must reproduce the above copyright 48 * notice, this list of conditions and the following disclaimer in the 49 * documentation and/or other materials provided with the distribution. 50 * 3. Neither the name of the University nor the names of its contributors 51 * may be used to endorse or promote products derived from this software 52 * without specific prior written permission. 53 * 54 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 55 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 56 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 57 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 58 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 59 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 60 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 61 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 62 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 63 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 64 * SUCH DAMAGE. 65 * 66 * from: @(#)SYS.h 8.1 (Berkeley) 6/4/93 67 */ 68 69#include <sys/syscall.h> 70 71#include <machine/asm.h> 72 73/* 74 * If compiling for shared libs, Emit sysV ABI PIC segment pseudo-ops. 75 * 76 * i) Emit .abicalls before .LEAF entrypoint, and .cpload/.cprestore after. 77 * ii) Do interprocedure jumps indirectly via t9, with the side-effect of 78 * preserving the callee's entry address in t9. 79 */ 80#ifdef __ABICALLS__ 81 .abicalls
| 3 4/*- 5 * Copyright (c) 1996 Jonathan Stone 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. All advertising materials mentioning features or use of this software 17 * must display the following acknowledgement: 18 * This product includes software developed by Jonathan Stone for 19 * the NetBSD Project. 20 * 4. The name of the author may not be used to endorse or promote products 21 * derived from this software without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 24 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 25 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 26 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 27 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 28 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 29 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 30 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 31 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 32 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 33 */ 34 35/*- 36 * Copyright (c) 1991, 1993 37 * The Regents of the University of California. All rights reserved. 38 * 39 * This code is derived from software contributed to Berkeley by 40 * Ralph Campbell. 41 * 42 * Redistribution and use in source and binary forms, with or without 43 * modification, are permitted provided that the following conditions 44 * are met: 45 * 1. Redistributions of source code must retain the above copyright 46 * notice, this list of conditions and the following disclaimer. 47 * 2. Redistributions in binary form must reproduce the above copyright 48 * notice, this list of conditions and the following disclaimer in the 49 * documentation and/or other materials provided with the distribution. 50 * 3. Neither the name of the University nor the names of its contributors 51 * may be used to endorse or promote products derived from this software 52 * without specific prior written permission. 53 * 54 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 55 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 56 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 57 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 58 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 59 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 60 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 61 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 62 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 63 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 64 * SUCH DAMAGE. 65 * 66 * from: @(#)SYS.h 8.1 (Berkeley) 6/4/93 67 */ 68 69#include <sys/syscall.h> 70 71#include <machine/asm.h> 72 73/* 74 * If compiling for shared libs, Emit sysV ABI PIC segment pseudo-ops. 75 * 76 * i) Emit .abicalls before .LEAF entrypoint, and .cpload/.cprestore after. 77 * ii) Do interprocedure jumps indirectly via t9, with the side-effect of 78 * preserving the callee's entry address in t9. 79 */ 80#ifdef __ABICALLS__ 81 .abicalls
|
82# define PIC_PROLOGUE(x,sr) .set noreorder; .cpload sr; .set reorder 83# define PIC_CALL(l,sr) la sr, _C_LABEL(l); jr sr
| 82# if defined(__mips_o32) || defined(__mips_o64) 83# define PIC_PROLOGUE(x) SETUP_GP 84# define PIC_TAILCALL(l) PTR_LA t9, _C_LABEL(l); jr t9 85# define PIC_RETURN() j ra 86# else 87# define PIC_PROLOGUE(x) SETUP_GP64(t3, x) 88# define PIC_TAILCALL(l) PTR_LA t9, _C_LABEL(l); RESTORE_GP64; jr t9 89# define PIC_RETURN() RESTORE_GP64; j ra 90# endif
|
84#else
| 91#else
|
85# define PIC_PROLOGUE(x,sr) 86# define PIC_CALL(l,sr) j _C_LABEL(l) 87#endif
| 92# define PIC_PROLOGUE(x) 93# define PIC_TAILCALL(l) j _C_LABEL(l) 94# define PIC_RETURN() 95#endif /* __ABICALLS__ */
|
88
| 96
|
89# define SYSTRAP(x) li v0, SYS_ ## x; syscall;
| 97# define SYSTRAP(x) li v0,SYS_ ## x; syscall;
|
90 91/* 92 * Do a syscall that cannot fail (sync, get{p,u,g,eu,eg)id) 93 */ 94#define RSYSCALL_NOERROR(x) \ 95 PSEUDO_NOERROR(x) 96 97/* 98 * Do a normal syscall. 99 */ 100#define RSYSCALL(x) \ 101 PSEUDO(x) 102 103/* 104 * Do a renamed or pseudo syscall (e.g., _exit()), where the entrypoint 105 * and syscall name are not the same. 106 */ 107#define PSEUDO_NOERROR(x) \ 108LEAF(__sys_ ## x); \
| 98 99/* 100 * Do a syscall that cannot fail (sync, get{p,u,g,eu,eg)id) 101 */ 102#define RSYSCALL_NOERROR(x) \ 103 PSEUDO_NOERROR(x) 104 105/* 106 * Do a normal syscall. 107 */ 108#define RSYSCALL(x) \ 109 PSEUDO(x) 110 111/* 112 * Do a renamed or pseudo syscall (e.g., _exit()), where the entrypoint 113 * and syscall name are not the same. 114 */ 115#define PSEUDO_NOERROR(x) \ 116LEAF(__sys_ ## x); \
|
109 .weak _C_LABEL(x); \
| 117 .weak _C_LABEL(x); \
|
110 _C_LABEL(x) = _C_LABEL(__CONCAT(__sys_,x)); \ 111 .weak _C_LABEL(__CONCAT(_,x)); \ 112 _C_LABEL(__CONCAT(_,x)) = _C_LABEL(__CONCAT(__sys_,x)); \ 113 SYSTRAP(x); \ 114 j ra; \ 115 END(__sys_ ## x) 116 117#define PSEUDO(x) \ 118LEAF(__sys_ ## x); \
| 118 _C_LABEL(x) = _C_LABEL(__CONCAT(__sys_,x)); \ 119 .weak _C_LABEL(__CONCAT(_,x)); \ 120 _C_LABEL(__CONCAT(_,x)) = _C_LABEL(__CONCAT(__sys_,x)); \ 121 SYSTRAP(x); \ 122 j ra; \ 123 END(__sys_ ## x) 124 125#define PSEUDO(x) \ 126LEAF(__sys_ ## x); \
|
119 .weak _C_LABEL(x); \
| 127 .weak _C_LABEL(x); \
|
120 _C_LABEL(x) = _C_LABEL(__CONCAT(__sys_,x)); \ 121 .weak _C_LABEL(__CONCAT(_,x)); \ 122 _C_LABEL(__CONCAT(_,x)) = _C_LABEL(__CONCAT(__sys_,x)); \
| 128 _C_LABEL(x) = _C_LABEL(__CONCAT(__sys_,x)); \ 129 .weak _C_LABEL(__CONCAT(_,x)); \ 130 _C_LABEL(__CONCAT(_,x)) = _C_LABEL(__CONCAT(__sys_,x)); \
|
123 PIC_PROLOGUE(x,t9); \
| 131 PIC_PROLOGUE(__sys_ ## x); \
|
124 SYSTRAP(x); \ 125 bne a3,zero,err; \
| 132 SYSTRAP(x); \ 133 bne a3,zero,err; \
|
126 j ra; \
| 134 PIC_RETURN(); \
|
127err: \
| 135err: \
|
128 PIC_CALL(__cerror,t9); \ 129 END(__sys_ ## x)
| 136 PIC_TAILCALL(__cerror); \ 137END(__sys_ ## x)
|
| |