aboutsummaryrefslogtreecommitdiff
path: root/qemu-keymap.c
diff options
context:
space:
mode:
authorAnup Patel <anup.patel@wdc.com>2020-02-02 19:12:16 +0530
committerPalmer Dabbelt <palmerdabbelt@google.com>2020-02-27 13:46:36 -0800
commitc695724868ce4049fd79c5a509880dbdf171e744 (patch)
treee399f75e9a1aeb4f9c64dfa9a5e985413d5e8d24 /qemu-keymap.c
parentacead54c78c7294612f529413673eb4286fb8b18 (diff)
downloadqemu-c695724868ce4049fd79c5a509880dbdf171e744.zip
qemu-c695724868ce4049fd79c5a509880dbdf171e744.tar.gz
qemu-c695724868ce4049fd79c5a509880dbdf171e744.tar.bz2
target/riscv: Emulate TIME CSRs for privileged mode
Currently, TIME CSRs are emulated only for user-only mode. This patch add TIME CSRs emulation for privileged mode. For privileged mode, the TIME CSRs will return value provided by rdtime callback which is registered by QEMU machine/platform emulation (i.e. CLINT emulation). If rdtime callback is not available then the monitor (i.e. OpenSBI) will trap-n-emulate TIME CSRs in software. We see 25+% performance improvement in hackbench numbers when TIME CSRs are not trap-n-emulated. Signed-off-by: Anup Patel <anup.patel@wdc.com> Reviewed-by: Alistair Francis <alistair.francis@wdc.com> Signed-off-by: Palmer Dabbelt <palmerdabbelt@google.com>
Diffstat (limited to 'qemu-keymap.c')
0 files changed, 0 insertions, 0 deletions