diff options
| author | 2010-07-15 08:51:58 +0800 | |
|---|---|---|
| committer | 2010-08-02 06:40:53 +0300 | |
| commit | c19b8bd60e19308d5583ef200ddcc782d85d9543 (patch) | |
| tree | ac58a35ca5f79a4bf5f36445ecc8e7d2c10178b4 /tools/perf/scripts/python/syscall-counts.py | |
| parent | KVM: x86: Call mask notifiers from pic (diff) | |
| download | wireguard-linux-c19b8bd60e19308d5583ef200ddcc782d85d9543.tar.xz wireguard-linux-c19b8bd60e19308d5583ef200ddcc782d85d9543.zip | |
KVM: x86 emulator: fix xchg instruction emulation
If the destination is a memory operand and the memory cannot
map to a valid page, the xchg instruction emulation and locked
instruction will not work on io regions and stuck in endless
loop. We should emulate exchange as write to fix it.
Signed-off-by: Wei Yongjun <yjwei@cn.fujitsu.com>
Acked-by: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts.py')
0 files changed, 0 insertions, 0 deletions
