diff options
author | Mark Brown <[email protected]> | 2022-03-07 18:08:59 +0000 |
---|---|---|
committer | Will Deacon <[email protected]> | 2022-03-07 21:40:52 +0000 |
commit | f2c281204b47309534f26dc63cee2a130c2b497b (patch) | |
tree | a958791bf1f12cf21b72ac0ffe877bc4f2034b4a /lib/test_fortify/write_overflow-memcpy.c | |
parent | b8fc780137b4b2d7b84d75488b429fd882e0dd3b (diff) |
arm64: cpufeature: Warn if we attempt to read a zero width field
Add a WARN_ON_ONCE() when extracting a field if no width is specified. This
should never happen outside of development since it will be triggered with
or without the feature so long as the relevant ID register is present. If
the warning triggers hope that the field was the standard 4 bits wide and
soldier on.
Suggested-by: Marc Zyngier <[email protected]>
Signed-off-by: Mark Brown <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Will Deacon <[email protected]>
Diffstat (limited to 'lib/test_fortify/write_overflow-memcpy.c')
0 files changed, 0 insertions, 0 deletions