aboutsummaryrefslogtreecommitdiffstats
path: root/tools/perf/scripts/python/syscall-counts-by-pid.py
diff options
context:
space:
mode:
authorDave Martin <[email protected]>2019-06-03 15:35:02 +0000
committerWill Deacon <[email protected]>2019-06-05 12:05:28 +0000
commit78ed70bf3a923f1965e3c19f544677d418397108 (patch)
treeeea8210beec14f5d0c85f793af4fea631ff4d74d /tools/perf/scripts/python/syscall-counts-by-pid.py
parentarm64: use the correct function type for __arm64_sys_ni_syscall (diff)
downloadkernel-78ed70bf3a923f1965e3c19f544677d418397108.tar.gz
kernel-78ed70bf3a923f1965e3c19f544677d418397108.zip
arm64: cpufeature: Fix missing ZFR0 in __read_sysreg_by_encoding()
In commit 06a916feca2b ("arm64: Expose SVE2 features for userspace"), new hwcaps are added that are detected via fields in the SVE-specific ID register ID_AA64ZFR0_EL1. In order to check compatibility of secondary cpus with the hwcaps established at boot, the cpufeatures code uses __read_sysreg_by_encoding() to read this ID register based on the sys_reg field of the arm64_elf_hwcaps[] table. This leads to a kernel splat if an hwcap uses an ID register that __read_sysreg_by_encoding() doesn't explicitly handle, as now happens when exercising cpu hotplug on an SVE2-capable platform. So fix it by adding the required case in there. Fixes: 06a916feca2b ("arm64: Expose SVE2 features for userspace") Signed-off-by: Dave Martin <[email protected]> Signed-off-by: Will Deacon <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts-by-pid.py')
0 files changed, 0 insertions, 0 deletions