diff options
| author | Anshuman Khandual <[email protected]> | 2018-09-20 09:36:21 +0530 |
|---|---|---|
| committer | Catalin Marinas <[email protected]> | 2018-09-21 11:06:18 +0100 |
| commit | 21f84796177443695680180a8493a9e20d254d5e (patch) | |
| tree | 8808359a3a825302a71aa12f2599c0e2b517dc5f /tools/perf/scripts/python/event_analyzing_sample.py | |
| parent | 520ad98871a072471d2583a9386b9d7243fa584d (diff) | |
arm64/cpufeatures: Emulate MRS instructions by parsing ESR_ELx.ISS
Armv8.4-A extension enables MRS instruction encodings inside ESR_ELx.ISS
during exception class ESR_ELx_EC_SYS64 (0x18). This encoding can be used
to emulate MRS instructions which can avoid fetch/decode from user space
thus improving performance. This adds a new sys64_hook structure element
with applicable ESR mask/value pair for MRS instructions on various system
registers but constrained by sysreg encodings which is currently allowed
to be emulated.
Reviewed-by: Suzuki K Poulose <[email protected]>
Acked-by: Mark Rutland <[email protected]>
Signed-off-by: Anshuman Khandual <[email protected]>
Signed-off-by: Catalin Marinas <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/event_analyzing_sample.py')
0 files changed, 0 insertions, 0 deletions