diff options
author | Peter Zijlstra <peterz@infradead.org> | 2020-02-07 14:57:36 +0300 |
---|---|---|
committer | Ingo Molnar <mingo@kernel.org> | 2020-02-11 14:56:26 +0300 |
commit | be993e44badc448add6a18d6f12b20615692c4c3 (patch) | |
tree | e1fb23b396ab0d64257bdd8796808c1db05e3f92 /tools/perf/util/scripting-engines/trace-event-python.c | |
parent | 0a679e13ea30f85a1aef0669ee0c5a9fd7860b34 (diff) | |
download | linux-be993e44badc448add6a18d6f12b20615692c4c3.tar.xz |
arm/ftrace: Fix BE text poking
The __patch_text() function already applies __opcode_to_mem_*(), so
when __opcode_to_mem_*() is not the identity (BE*), it is applied
twice, wrecking the instruction.
Fixes: 42e51f187f86 ("arm/ftrace: Use __patch_text()")
Reported-by: Dmitry Osipenko <digetx@gmail.com>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Tested-by: Dmitry Osipenko <digetx@gmail.com>
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions