diff options
| author | Jon Medhurst <tixy@yxit.co.uk> | 2011-07-03 17:23:21 +0400 |
|---|---|---|
| committer | Tixy <tixy@medhuaa1.miniserver.com> | 2011-07-13 21:32:46 +0400 |
| commit | b48354d3584e93284fba2ee99f6f9f44d18e4f83 (patch) | |
| tree | 52ba729846dd1a514d536dfaab78627b2e1b0d61 /tools/perf/scripts/python/syscall-counts-by-pid.py | |
| parent | eaf1d06500c48109dcd37b7856773fdf608a8d21 (diff) | |
| download | linux-b48354d3584e93284fba2ee99f6f9f44d18e4f83.tar.xz | |
ARM: kprobes: Decode 32-bit Thumb load/store dual and load/store exclusive instructions
We reject probing of load/store exclusive instructions because any
emulation routine could never succeed in gaining exclusive access as the
exception framework clears the exclusivity monitor when a probes
breakpoint is hit.
Signed-off-by: Jon Medhurst <tixy@yxit.co.uk>
Acked-by: Nicolas Pitre <nicolas.pitre@linaro.org>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts-by-pid.py')
0 files changed, 0 insertions, 0 deletions
