diff options
author | Davidlohr Bueso <dave@stgolabs.net> | 2017-06-08 14:47:34 +0100 |
---|---|---|
committer | James Morris <james.l.morris@oracle.com> | 2017-06-09 13:29:45 +1000 |
commit | 381f20fceba8ea540aef5241a9099f4552700d0c (patch) | |
tree | c7ec84b6670ee3fc33a23d87668a8644aba60157 /crypto/chacha20poly1305.c | |
parent | 47b2c3fff4932e6fc17ce13d51a43c6969714e20 (diff) | |
download | linux-stable-381f20fceba8ea540aef5241a9099f4552700d0c.tar.gz linux-stable-381f20fceba8ea540aef5241a9099f4552700d0c.tar.bz2 linux-stable-381f20fceba8ea540aef5241a9099f4552700d0c.zip |
security: use READ_ONCE instead of deprecated ACCESS_ONCE
With the new standardized functions, we can replace all ACCESS_ONCE()
calls across relevant security/keyrings/.
ACCESS_ONCE() does not work reliably on non-scalar types. For example
gcc 4.6 and 4.7 might remove the volatile tag for such accesses during
the SRA (scalar replacement of aggregates) step:
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=58145
Update the new calls regardless of if it is a scalar type, this is
cleaner than having three alternatives.
Signed-off-by: Davidlohr Bueso <dbueso@suse.de>
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: James Morris <james.l.morris@oracle.com>
Diffstat (limited to 'crypto/chacha20poly1305.c')
0 files changed, 0 insertions, 0 deletions