When looking for jump address in the syscall table, we need to multiply the syscall ID by 4 before adding the address offset of the beginning of the table. This is due to the jump address being 32-bit (4 bytes). Instead of using two instructions to shift the ID by 4 first and then the addition, we can use one ADDX4 instruction to achieve the same result. Signed-off-by: Daniel Leung <daniel.leung@intel.com> |
||
|---|---|---|
| .. | ||
| offsets | ||
| startup | ||
| CMakeLists.txt | ||
| coredump.c | ||
| cpu_idle.c | ||
| crt1.S | ||
| debug_helpers_asm.S | ||
| elf.c | ||
| fatal.c | ||
| gdbstub.c | ||
| gen_vectors.py | ||
| gen_zsr.py | ||
| irq_manage.c | ||
| irq_offload.c | ||
| mem_manage.c | ||
| mmu.c | ||
| mpu.c | ||
| prep_c.c | ||
| ptables.c | ||
| README_MMU.txt | ||
| README_WINDOWS.rst | ||
| smp.c | ||
| syscall_helper.c | ||
| thread.c | ||
| timing.c | ||
| tls.c | ||
| userspace.S | ||
| vector_handlers.c | ||
| window_vectors.S | ||
| xcc_stubs.c | ||
| xtensa_asm2_util.S | ||
| xtensa_backtrace.c | ||
| xtensa_hifi.S | ||
| xtensa_intgen.py | ||
| xtensa_intgen.tmpl | ||