aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/net_dropmonitor.py
diff options
context:
space:
mode:
authorSuzuki K Poulose <[email protected]>2024-04-12 15:26:59 +0100
committerSuzuki K Poulose <[email protected]>2024-04-22 11:23:47 +0100
commit1e7ba33fa591de1cf60afffcabb45600b3607025 (patch)
tree0c9508f0382105fdf1a4e0ae3017271d728e00b1 /tools/perf/scripts/python/net_dropmonitor.py
parent965edae4e6a2bca1f6e56d2c56d992417a53bba4 (diff)
coresight: etm4x: Do not hardcode IOMEM access for register restore
When we restore the register state for ETM4x, while coming back from CPU idle, we hardcode IOMEM access. This is wrong and could blow up for an ETM with system instructions access (and for ETE). Fixes: f5bd523690d2 ("coresight: etm4x: Convert all register accesses") Reported-by: Yabin Cui <[email protected]> Reviewed-by: Mike Leach <[email protected]> Signed-off-by: Suzuki K Poulose <[email protected]> Tested-by: Yabin Cui <[email protected]> Link: https://lore.kernel.org/r/[email protected]
Diffstat (limited to 'tools/perf/scripts/python/net_dropmonitor.py')
0 files changed, 0 insertions, 0 deletions