aboutsummaryrefslogtreecommitdiffstats
path: root/tools/lib/traceevent/event-parse.c
diff options
context:
space:
mode:
authorFlorian Fainelli <f.fainelli@gmail.com>2018-12-03 11:11:36 -0800
committerArnaldo Carvalho de Melo <acme@redhat.com>2018-12-17 14:56:27 -0300
commit24f967337f6d6bce931425769c0f5ff5cf2d212e (patch)
treef3a196081abb5c5ae911b00e6aa2a2c4d5920b44 /tools/lib/traceevent/event-parse.c
parenta7ee4d625ede4f62146ff3bb2aeee074e4cf5fa1 (diff)
downloadkernel_replicant_linux-24f967337f6d6bce931425769c0f5ff5cf2d212e.tar.gz
kernel_replicant_linux-24f967337f6d6bce931425769c0f5ff5cf2d212e.tar.bz2
kernel_replicant_linux-24f967337f6d6bce931425769c0f5ff5cf2d212e.zip
perf tests ARM: Disable breakpoint tests 32-bit
The breakpoint tests on the ARM 32-bit kernel are broken in several ways. The breakpoint length requested does not necessarily match whether the function address has the Thumb bit (bit 0) set or not, and this does matter to the ARM kernel hw_breakpoint infrastructure. See [1] for background. [1]: https://lkml.org/lkml/2018/11/15/205 As Will indicated, the overflow handling would require single-stepping which is not supported at the moment. Just disable those tests for the ARM 32-bit platforms and update the comment above to explain these limitations. Co-developed-by: Will Deacon <will.deacon@arm.com> Signed-off-by: Florian Fainelli <f.fainelli@gmail.com> Signed-off-by: Will Deacon <will.deacon@arm.com> Acked-by: Jiri Olsa <jolsa@redhat.com> Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com> Cc: Namhyung Kim <namhyung@kernel.org> Cc: Peter Zijlstra <peterz@infradead.org> Link: http://lkml.kernel.org/r/20181203191138.2419-1-f.fainelli@gmail.com Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Diffstat (limited to 'tools/lib/traceevent/event-parse.c')
0 files changed, 0 insertions, 0 deletions