Skip to content
Snippets Groups Projects
Commit 63ba9257 authored by Arve Hjønnevåg's avatar Arve Hjønnevåg
Browse files

ARM: etm: Don't limit tracing to only non-secure code.


On some systems kernel code is considered secure, and this code
already limits tracing to the kernel text segment which results
in no trace data.

Change-Id: I098a0753e874859446d098e1ee209f67fc13cd5d
Signed-off-by: default avatarArve Hjønnevåg <arve@android.com>
parent 8b920599
No related branches found
No related tags found
No related merge requests found
...@@ -55,7 +55,7 @@ static inline bool trace_isrunning(struct tracectx *t) ...@@ -55,7 +55,7 @@ static inline bool trace_isrunning(struct tracectx *t)
static int etm_setup_address_range(struct tracectx *t, int n, static int etm_setup_address_range(struct tracectx *t, int n,
unsigned long start, unsigned long end, int exclude, int data) unsigned long start, unsigned long end, int exclude, int data)
{ {
u32 flags = ETMAAT_ARM | ETMAAT_IGNCONTEXTID | ETMAAT_NSONLY | \ u32 flags = ETMAAT_ARM | ETMAAT_IGNCONTEXTID | ETMAAT_IGNSECURITY |
ETMAAT_NOVALCMP; ETMAAT_NOVALCMP;
if (n < 1 || n > t->ncmppairs) if (n < 1 || n > t->ncmppairs)
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment