diff options
author | Masami Hiramatsu <[email protected]> | 2019-09-06 22:14:10 +0900 |
---|---|---|
committer | Peter Zijlstra <[email protected]> | 2019-10-17 21:31:57 +0200 |
commit | 4d65adfcd1196818659d3bd9b42dccab291e1751 (patch) | |
tree | 5bbd7d53237302e8e65bc7ff9b06320129b2d5f6 /tools/perf/util/trace-event-scripting.c | |
parent | b3dc0695fa40c3b280230fb6fb7fb7a94ce28bf4 (diff) |
x86: xen: insn: Decode Xen and KVM emulate-prefix signature
Decode Xen and KVM's emulate-prefix signature by x86 insn decoder.
It is called "prefix" but actually not x86 instruction prefix, so
this adds insn.emulate_prefix_size field instead of reusing
insn.prefixes.
If x86 decoder finds a special sequence of instructions of
XEN_EMULATE_PREFIX and 'ud2a; .ascii "kvm"', it just counts the
length, set insn.emulate_prefix_size and fold it with the next
instruction. In other words, the signature and the next instruction
is treated as a single instruction.
Signed-off-by: Masami Hiramatsu <[email protected]>
Signed-off-by: Peter Zijlstra (Intel) <[email protected]>
Acked-by: Josh Poimboeuf <[email protected]>
Cc: Juergen Gross <[email protected]>
Cc: [email protected]
Cc: Boris Ostrovsky <[email protected]>
Cc: Ingo Molnar <[email protected]>
Cc: Stefano Stabellini <[email protected]>
Cc: Andrew Cooper <[email protected]>
Cc: Borislav Petkov <[email protected]>
Cc: [email protected]
Cc: Randy Dunlap <[email protected]>
Link: https://lkml.kernel.org/r/156777564986.25081.4964537658500952557.stgit@devnote2
Diffstat (limited to 'tools/perf/util/trace-event-scripting.c')
0 files changed, 0 insertions, 0 deletions