Home
last modified time | relevance | path

Searched hist:"1 a4b739bbb4f8857d1b4feb46d6b3ec72269c111" (Results 1 – 3 of 3) sorted by relevance

/openbmc/linux/arch/powerpc/kernel/
H A Dhead_booke.hdiff 1a4b739bbb4f8857d1b4feb46d6b3ec72269c111 Tue Apr 30 07:39:03 CDT 2019 Christophe Leroy <christophe.leroy@c-s.fr> powerpc/32: implement fast entry for syscalls on BOOKE

This patch implements a fast entry for syscalls.

Syscalls don't have to preserve non volatile registers except LR.

This patch then implement a fast entry for syscalls, where
volatile registers get clobbered.

As this entry is dedicated to syscall it always sets MSR_EE
and warns in case MSR_EE was previously off

It also assumes that the call is always from user, system calls are
unexpected from kernel.

Signed-off-by: Christophe Leroy <christophe.leroy@c-s.fr>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
H A Dhead_44x.Sdiff 1a4b739bbb4f8857d1b4feb46d6b3ec72269c111 Tue Apr 30 07:39:03 CDT 2019 Christophe Leroy <christophe.leroy@c-s.fr> powerpc/32: implement fast entry for syscalls on BOOKE

This patch implements a fast entry for syscalls.

Syscalls don't have to preserve non volatile registers except LR.

This patch then implement a fast entry for syscalls, where
volatile registers get clobbered.

As this entry is dedicated to syscall it always sets MSR_EE
and warns in case MSR_EE was previously off

It also assumes that the call is always from user, system calls are
unexpected from kernel.

Signed-off-by: Christophe Leroy <christophe.leroy@c-s.fr>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
H A Dentry_32.Sdiff 1a4b739bbb4f8857d1b4feb46d6b3ec72269c111 Tue Apr 30 07:39:03 CDT 2019 Christophe Leroy <christophe.leroy@c-s.fr> powerpc/32: implement fast entry for syscalls on BOOKE

This patch implements a fast entry for syscalls.

Syscalls don't have to preserve non volatile registers except LR.

This patch then implement a fast entry for syscalls, where
volatile registers get clobbered.

As this entry is dedicated to syscall it always sets MSR_EE
and warns in case MSR_EE was previously off

It also assumes that the call is always from user, system calls are
unexpected from kernel.

Signed-off-by: Christophe Leroy <christophe.leroy@c-s.fr>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>