diff options
| author | Wei Yongjun <[email protected]> | 2010-06-17 17:33:55 +0800 |
|---|---|---|
| committer | Avi Kivity <[email protected]> | 2010-08-01 10:46:55 +0300 |
| commit | 7d5993d63f2bac75b89e171a7098044ec4bc701f (patch) | |
| tree | 88d4b4d97662b147d01094983a31071e9e0ea33e /tools/perf/scripts/python/syscall-counts-by-pid.py | |
| parent | 6045be5dea7f7905433585e524f884b711e3796a (diff) | |
KVM: x86 emulator: fix group3 instruction decoding
Group 3 instruction with ModRM reg field as 001 is
defined as test instruction under AMD arch, and
emulate_grp3() is ready for emulate it, so fix the
decoding.
static inline int emulate_grp3(...)
{
...
switch (c->modrm_reg) {
case 0 ... 1: /* test */
emulate_2op_SrcV("test", c->src, c->dst, ctxt->eflags);
...
}
Signed-off-by: Wei Yongjun <[email protected]>
Signed-off-by: Avi Kivity <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts-by-pid.py')
0 files changed, 0 insertions, 0 deletions