On 04/26, Jacob Shin wrote:
>
> @@ -518,12 +518,10 @@ int parse_events_add_breakpoint(struct list_head 
> **list, int *idx,
>       if (parse_breakpoint_type(type, &attr))
>               return -EINVAL;
>
> -     /*
> -      * We should find a nice way to override the access length
> -      * Provide some defaults for now
> -      */
>       if (attr.bp_type == HW_BREAKPOINT_X)
>               attr.bp_len = sizeof(long);
> +     else if (len)
> +             attr.bp_len = len;
>       else
>               attr.bp_len = HW_BREAKPOINT_LEN_4;

Stupid question... So X86_FEATURE_BPEXT only works for r/w? I mean, it
doesn't allow to specify the mask for an execute breakpoint?

Otherwise the code above should be probably updated, say,

        if (!len) {
                len = attr.bp_type == HW_BREAKPOINT_X ?
                        sizeof(long) : HW_BREAKPOINT_LEN_4;
        }
        attr.bp_len = len;

Oleg.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to