This patch adds support for the new "jump label" feature. Unlike x86 and sparc we just merrily patch the code with no locks etc, as far as I know this is safe, but I'm not really sure what the x86/sparc code is protecting against so maybe it's not. I also don't see any reason for us to implement the poke_early() routine, even though sparc does. [BenH: Updated the patch to upstream generic changes] Signed-off-by: Michael Ellerman <michael@ellerman.id.au> Signed-off-by: Benjamin Herrenschmidt <benh@kernel.crashing.org>
		
			
				
	
	
		
			23 lines
		
	
	
	
		
			663 B
			
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			23 lines
		
	
	
	
		
			663 B
			
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * Copyright 2010 Michael Ellerman, IBM Corp.
 | 
						|
 *
 | 
						|
 * This program is free software; you can redistribute it and/or
 | 
						|
 * modify it under the terms of the GNU General Public License
 | 
						|
 * as published by the Free Software Foundation; either version
 | 
						|
 * 2 of the License, or (at your option) any later version.
 | 
						|
 */
 | 
						|
 | 
						|
#include <linux/kernel.h>
 | 
						|
#include <linux/jump_label.h>
 | 
						|
#include <asm/code-patching.h>
 | 
						|
 | 
						|
void arch_jump_label_transform(struct jump_entry *entry,
 | 
						|
			       enum jump_label_type type)
 | 
						|
{
 | 
						|
	u32 *addr = (u32 *)(unsigned long)entry->code;
 | 
						|
 | 
						|
	if (type == JUMP_LABEL_ENABLE)
 | 
						|
		patch_branch(addr, entry->target, 0);
 | 
						|
	else
 | 
						|
		patch_instruction(addr, PPC_INST_NOP);
 | 
						|
}
 |