aboutsummaryrefslogtreecommitdiff
path: root/scripts/patch-kernel
diff options
context:
space:
mode:
authorWill Deacon <will.deacon@arm.com>2012-08-16 18:55:44 +0100
committerBen Hutchings <ben@decadent.org.uk>2012-09-19 15:05:04 +0100
commit7a5030928317b47b27ceb66f678424caf45e7ccc (patch)
treed756e17dda0c09d5ac9f9ecb1b305e09338b4aec /scripts/patch-kernel
parentb81e4a32ad041cc78fc55c8363453d7636ab4028 (diff)
ARM: 7496/1: hw_breakpoint: don't rely on dfsr to show watchpoint access type
commit bf8801145c01ab600f8df66e8c879ac642fa5846 upstream. From ARM debug architecture v7.1 onwards, a watchpoint exception causes the DFAR to be updated with the faulting data address. However, DFSR.WnR takes an UNKNOWN value and therefore cannot be used in general to determine the access type that triggered the watchpoint. This patch forbids watchpoints without an overflow handler from specifying a specific access type (load/store). Those with overflow handlers must be able to handle false positives potentially triggered by a watchpoint of a different access type on the same address. For SIGTRAP-based handlers (i.e. ptrace), this should have no impact. Signed-off-by: Will Deacon <will.deacon@arm.com> Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk> Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Diffstat (limited to 'scripts/patch-kernel')
0 files changed, 0 insertions, 0 deletions