Searched refs:dcbz (Results 1 - 15 of 15) sorted by relevance

/linux-4.4.14/arch/powerpc/include/asm/
H A Dpage_64.h65 1: dcbz 0,%0\n\ clear_page()
66 dcbz %3,%0\n\ clear_page()
67 dcbz %4,%0\n\ clear_page()
68 dcbz %5,%0\n\ clear_page()
69 dcbz %6,%0\n\ clear_page()
70 dcbz %7,%0\n\ clear_page()
71 dcbz %8,%0\n\ clear_page()
72 dcbz %9,%0\n\ clear_page()
H A Demulated_ops.h37 struct ppc_emulated_entry dcbz; member in struct:ppc_emulated
/linux-4.4.14/arch/powerpc/include/uapi/asm/
H A Dauxvec.h6 * the cache block size is, so it can use the dcbz instruction safely.
/linux-4.4.14/arch/powerpc/lib/
H A Dcopy_32.S73 * Use dcbz on the complete cache lines in the destination
77 * During early init, cache might not be active yet, so dcbz cannot be used.
78 * We therefore skip the optimised bloc that uses dcbz. This jump is
111 10: dcbz r7,r6
132 * This version uses dcbz on the complete cache lines in the
138 * During early init, cache might not be active yet, so dcbz cannot be used.
139 * We therefore jump to generic_memcpy which doesn't use dcbz. This jump is
186 dcbz r11,r6
362 54: dcbz r11,r6
444 /* fault on dcbz (effectively a write fault) */
H A Dcopypage_64.S36 dcbz r9,r3
H A Dstring_64.S194 err1; dcbz r0,r3
/linux-4.4.14/arch/powerpc/kvm/
H A Dbook3s_segment.S102 /* Some guests may need to have dcbz set to 32 byte length.
105 * to trap on dcbz and emulate it in the hypervisor.
107 * If we can, we should tell the CPU to use 32 byte dcbz though,
H A Dbook3s_pr.c457 /* 32 bit Book3S always has 32 byte dcbz */ kvmppc_set_pvr_pr()
480 * make Book3s_32 Linux work on Book3s_64, we have to make sure we trap dcbz to
481 * emulate 32 bytes dcbz length.
486 * My approach here is to patch the dcbz instruction on executing pages.
506 /* patch dcbz into reserved instruction, so we trap */ kvmppc_patch_dcbz()
588 * If we do the dcbz hack, we have to NX on every execution, kvmppc_handle_pagefault()
933 * XXX If we do the dcbz hack we use the NX bit to flush&patch the page, kvmppc_handle_exit_pr()
935 * that no guest that needs the dcbz hack does NX. kvmppc_handle_exit_pr()
H A Dbook3s_hv.c3051 /* We don't need to emulate any privileged instructions or dcbz */ kvmppc_core_emulate_op_hv()
/linux-4.4.14/arch/powerpc/kernel/
H A Dalign.c54 #define DCBZ 0x5f /* 8xx/82xx dcbz faults when cache not enabled */
158 { 0, ST+HARD }, /* 10 1 1111: dcbz */
194 * The dcbz (data cache block zero) instruction
882 PPC_WARN_ALIGNMENT(dcbz, regs); fix_alignment()
H A Dmisc_32.S522 * Clear pages using the dcbz instruction, which doesn't cause any
532 1: dcbz 0,r3
538 * Copy a whole page. We use the dcbz instruction on the destination
576 dcbz r5,r3
H A Dhead_8xx.S552 cmpwi cr0, r10, 2028 /* Is dcbz? */
H A Dtraps.c1899 WARN_EMULATED_SETUP(dcbz),
/linux-4.4.14/drivers/video/fbdev/
H A Dfsl-diu-fb.c1607 "dcbz 0, %[input]" fsl_diu_isr()
/linux-4.4.14/arch/powerpc/xmon/
H A Dppc-opc.c4518 { "dcbz", X(31,1014), XRT_MASK, PPC, { RA, RB } },

Completed in 488 milliseconds