diff options
author | Peter Zijlstra <[email protected]> | 2020-01-24 22:08:45 +0100 |
---|---|---|
committer | Thomas Gleixner <[email protected]> | 2020-06-11 15:14:53 +0200 |
commit | ef882bfef933408360e4d9d0c2c83a1e2fc996f3 (patch) | |
tree | d233031a2e6ab642f4d7a7c9ddf9d10f5388323d /scripts/gcc-plugins/cyc_complexity_plugin.c | |
parent | 4979fb53ab0ed35eddd20a73c25a5597bc22a57f (diff) |
x86/int3: Avoid atomic instrumentation
Use arch_atomic_*() and __READ_ONCE() to ensure nothing untoward
creeps in and ruins things.
That is; this is the INT3 text poke handler, strictly limit the code
that runs in it, lest it inadvertenly hits yet another INT3.
Reported-by: Thomas Gleixner <[email protected]>
Signed-off-by: Peter Zijlstra (Intel) <[email protected]>
Signed-off-by: Thomas Gleixner <[email protected]>
Reviewed-by: Masami Hiramatsu <[email protected]>
Reviewed-by: Alexandre Chartre <[email protected]>
Acked-by: Andy Lutomirski <[email protected]>
Link: https://lkml.kernel.org/r/[email protected]
Diffstat (limited to 'scripts/gcc-plugins/cyc_complexity_plugin.c')
0 files changed, 0 insertions, 0 deletions