1/*	$NetBSD: SYS.h,v 1.19 2009/12/14 01:07:41 matt Exp $ */
2/* $FreeBSD$ */
3
4/*-
5 * Copyright (c) 1996 Jonathan Stone
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 *    notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 *    notice, this list of conditions and the following disclaimer in the
15 *    documentation and/or other materials provided with the distribution.
16 * 3. All advertising materials mentioning features or use of this software
17 *    must display the following acknowledgement:
18 *      This product includes software developed by Jonathan Stone for
19 *      the NetBSD Project.
20 * 4. The name of the author may not be used to endorse or promote products
21 *    derived from this software without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
24 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
25 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
26 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
27 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
28 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
29 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
30 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
31 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
32 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
33 */
34
35/*-
36 * Copyright (c) 1991, 1993
37 *	The Regents of the University of California.  All rights reserved.
38 *
39 * This code is derived from software contributed to Berkeley by
40 * Ralph Campbell.
41 *
42 * Redistribution and use in source and binary forms, with or without
43 * modification, are permitted provided that the following conditions
44 * are met:
45 * 1. Redistributions of source code must retain the above copyright
46 *    notice, this list of conditions and the following disclaimer.
47 * 2. Redistributions in binary form must reproduce the above copyright
48 *    notice, this list of conditions and the following disclaimer in the
49 *    documentation and/or other materials provided with the distribution.
50 * 3. Neither the name of the University nor the names of its contributors
51 *    may be used to endorse or promote products derived from this software
52 *    without specific prior written permission.
53 *
54 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
55 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
56 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
57 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
58 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
59 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
60 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
61 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
62 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
63 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
64 * SUCH DAMAGE.
65 *
66 *	from: @(#)SYS.h	8.1 (Berkeley) 6/4/93
67 */
68
69#include <sys/syscall.h>
70
71#include <machine/asm.h>
72
73/*
74 * If compiling for shared libs, Emit sysV ABI PIC segment pseudo-ops.
75 *
76 * i)  Emit .abicalls before .LEAF entrypoint, and .cpload/.cprestore after.
77 * ii) Do interprocedure jumps indirectly via t9, with the side-effect of
78 *     preserving the callee's entry address in t9.
79 */
80#ifdef __ABICALLS__
81	.abicalls
82# if defined(__mips_o32) || defined(__mips_o64)
83#  define PIC_PROLOGUE(x)	SETUP_GP
84#  define PIC_TAILCALL(l)	PTR_LA t9, _C_LABEL(l); jr t9
85#  define PIC_RETURN()		j ra
86# else
87#  define PIC_PROLOGUE(x)	SETUP_GP64(t3, x)
88#  define PIC_TAILCALL(l)	PTR_LA t9, _C_LABEL(l); RESTORE_GP64; jr t9
89#  define PIC_RETURN()		RESTORE_GP64; j ra
90# endif
91#else
92# define PIC_PROLOGUE(x)
93# define PIC_TAILCALL(l)	j  _C_LABEL(l)
94# define PIC_RETURN()		j ra
95#endif /* __ABICALLS__ */
96
97# define SYSTRAP(x)	li v0,SYS_ ## x; syscall;
98
99/*
100 * Do a syscall that cannot fail (sync, get{p,u,g,eu,eg)id)
101 */
102#define RSYSCALL_NOERROR(x)						\
103	PSEUDO_NOERROR(x)
104
105/*
106 * Do a normal syscall.
107 */
108#define RSYSCALL(x)							\
109	PSEUDO(x)
110
111/*
112 * Do a renamed or pseudo syscall (e.g., _exit()), where the entrypoint
113 * and syscall name are not the same.
114 */
115#define PSEUDO_NOERROR(x)						\
116LEAF(__sys_ ## x);							\
117	.weak _C_LABEL(x);						\
118	_C_LABEL(x) = _C_LABEL(__CONCAT(__sys_,x));			\
119	.weak _C_LABEL(__CONCAT(_,x));					\
120	_C_LABEL(__CONCAT(_,x)) = _C_LABEL(__CONCAT(__sys_,x));		\
121	SYSTRAP(x);							\
122	j ra;								\
123	END(__sys_ ## x)
124
125#define PSEUDO(x)							\
126LEAF(__sys_ ## x);							\
127	.weak _C_LABEL(x);						\
128	_C_LABEL(x) = _C_LABEL(__CONCAT(__sys_,x));			\
129	.weak _C_LABEL(__CONCAT(_,x));					\
130	_C_LABEL(__CONCAT(_,x)) = _C_LABEL(__CONCAT(__sys_,x));		\
131	PIC_PROLOGUE(__sys_ ## x);					\
132	SYSTRAP(x);							\
133	bne a3,zero,err;						\
134	PIC_RETURN();							\
135err:									\
136	PIC_TAILCALL(__cerror);						\
137END(__sys_ ## x)
138