Re: [PATCH] sample/hw_breakpoint: avoid sample hw_breakpoint recursion for arm/arm64

2019-10-01 Thread Will Deacon
On Mon, Sep 23, 2019 at 04:09:35PM +0800, wangxu wrote: > From: Wang Xu > > For x86/ppc, hw_breakpoint is triggered after the instruction is > executed. > > For arm/arm64, which is triggered before the instruction executed. > Arm/arm64 skips the instruction by using single step. But it only >

RE: [PATCH] sample/hw_breakpoint: avoid sample hw_breakpoint recursion for arm/arm64

2019-09-26 Thread wangxu (AE)
...@linutronix.de; rfont...@redhat.com; alli...@lohutok.net; linux-kernel@vger.kernel.org Subject: Re: [PATCH] sample/hw_breakpoint: avoid sample hw_breakpoint recursion for arm/arm64 On Mon, Sep 23, 2019 at 04:09:35PM +0800, wangxu wrote: > From: Wang Xu > > For x86/ppc, hw_breakpoint is

Re: [PATCH] sample/hw_breakpoint: avoid sample hw_breakpoint recursion for arm/arm64

2019-09-26 Thread Peter Zijlstra
On Mon, Sep 23, 2019 at 04:09:35PM +0800, wangxu wrote: > From: Wang Xu > > For x86/ppc, hw_breakpoint is triggered after the instruction is > executed. > > For arm/arm64, which is triggered before the instruction executed. > Arm/arm64 skips the instruction by using single step. But it only >

[PATCH] sample/hw_breakpoint: avoid sample hw_breakpoint recursion for arm/arm64

2019-09-23 Thread wangxu
From: Wang Xu For x86/ppc, hw_breakpoint is triggered after the instruction is executed. For arm/arm64, which is triggered before the instruction executed. Arm/arm64 skips the instruction by using single step. But it only supports default overflow_handler. This patch provides a chance to avoid