diff options
author | Thomas Gleixner <tglx@linutronix.de> | 2019-04-14 18:00:08 +0200 |
---|---|---|
committer | Borislav Petkov <bp@suse.de> | 2019-04-17 15:41:48 +0200 |
commit | 117ed45485413b1977bfc638c32bf5b01d53c62b (patch) | |
tree | d50257ffb645531d5f7469dc9ecf2be9f48c0a10 /arch/x86/include | |
parent | 18b7a6bef62de1d598fbff23b52114b7775ecf00 (diff) |
x86/irq/64: Remove stack overflow debug code
All stack types on x86 64-bit have guard pages now.
So there is no point in executing probabilistic overflow checks as the
guard pages are a accurate and reliable overflow prevention.
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Borislav Petkov <bp@suse.de>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Josh Poimboeuf <jpoimboe@redhat.com>
Cc: Nicolai Stange <nstange@suse.de>
Cc: Sean Christopherson <sean.j.christopherson@intel.com>
Cc: x86-ml <x86@kernel.org>
Link: https://lkml.kernel.org/r/20190414160146.466354762@linutronix.de
Diffstat (limited to 'arch/x86/include')
0 files changed, 0 insertions, 0 deletions