Remove building with NOCRYPTO option
[minix3.git] / lib / libc / arch / mips / SYS.h
blob2bafcc08b304f637ce21a6a0828094607f4d84ac
1 /* $NetBSD: SYS.h,v 1.19 2009/12/14 01:07:41 matt Exp $ */
3 /*-
4 * Copyright (c) 1996 Jonathan Stone
5 * All rights reserved.
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. All advertising materials mentioning features or use of this software
16 * must display the following acknowledgement:
17 * This product includes software developed by Jonathan Stone for
18 * the NetBSD Project.
19 * 4. The name of the author may not be used to endorse or promote products
20 * derived from this software without specific prior written permission.
22 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
23 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
24 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
25 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
26 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
27 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
31 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 /*-
35 * Copyright (c) 1991, 1993
36 * The Regents of the University of California. All rights reserved.
38 * This code is derived from software contributed to Berkeley by
39 * Ralph Campbell.
41 * Redistribution and use in source and binary forms, with or without
42 * modification, are permitted provided that the following conditions
43 * are met:
44 * 1. Redistributions of source code must retain the above copyright
45 * notice, this list of conditions and the following disclaimer.
46 * 2. Redistributions in binary form must reproduce the above copyright
47 * notice, this list of conditions and the following disclaimer in the
48 * documentation and/or other materials provided with the distribution.
49 * 3. Neither the name of the University nor the names of its contributors
50 * may be used to endorse or promote products derived from this software
51 * without specific prior written permission.
53 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
54 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
55 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
56 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
57 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
58 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
59 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
60 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
61 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
62 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
63 * SUCH DAMAGE.
65 * from: @(#)SYS.h 8.1 (Berkeley) 6/4/93
68 #include <sys/syscall.h>
69 #include <mips/asm.h>
73 * If compiling for shared libs, Emit sysV ABI PIC segment pseudo-ops.
75 * i) Emit .abicalls before .LEAF entrypoint, and .cpload/.cprestore after.
76 * ii) Do interprocedure jumps indirectly via t9, with the side-effect of
77 * preserving the callee's entry address in t9.
79 #ifdef __ABICALLS__
80 .abicalls
81 # if defined(__mips_o32) || defined(__mips_o64)
82 # define PIC_PROLOGUE(x) SETUP_GP
83 # define PIC_TAILCALL(l) PTR_LA t9, _C_LABEL(l); jr t9
84 # define PIC_RETURN() j ra
85 # else
86 # define PIC_PROLOGUE(x) SETUP_GP64(t3, x)
87 # define PIC_TAILCALL(l) PTR_LA t9, _C_LABEL(l); RESTORE_GP64; jr t9
88 # define PIC_RETURN() RESTORE_GP64; j ra
89 # endif
90 #else
91 # define PIC_PROLOGUE(x)
92 # define PIC_TAILCALL(l) j _C_LABEL(l)
93 # define PIC_RETURN()
94 #endif /* __ABICALLS__ */
97 #ifdef __STDC__
98 # define SYSTRAP(x) li v0,SYS_ ## x; syscall;
99 #else
100 # define SYSTRAP(x) li v0,SYS_/**/x; syscall;
101 #endif
105 * Do a syscall that cannot fail (sync, get{p,u,g,eu,eg)id)
107 #define RSYSCALL_NOERROR(x) \
108 PSEUDO_NOERROR(x,x)
111 * Do a normal syscall.
113 #define RSYSCALL(x) \
114 PSEUDO(x,x)
117 * Do a syscall that has an internal name and a weak external alias.
119 #define WSYSCALL(weak,strong) \
120 WEAK_ALIAS(weak,strong); \
121 PSEUDO(strong,weak)
124 * Do a renamed or pseudo syscall (e.g., _exit()), where the entrypoint
125 * and syscall name are not the same.
127 #define PSEUDO_NOERROR(x,y) \
128 LEAF(x); \
129 SYSTRAP(y); \
130 j ra; \
131 END(x)
133 #define PSEUDO(x,y) \
134 LEAF(x); \
135 PIC_PROLOGUE(x); \
136 SYSTRAP(y); \
137 bne a3,zero,err; \
138 PIC_RETURN(); \
139 err: \
140 PIC_TAILCALL(__cerror); \
141 END(x)