diff options
author | Heiko Carstens <heiko.carstens@de.ibm.com> | 2012-05-29 08:11:21 (GMT) |
---|---|---|
committer | Martin Schwidefsky <schwidefsky@de.ibm.com> | 2012-05-30 07:07:57 (GMT) |
commit | bf3db85311292eeacc9a9a8f38a0a4065a43a2fc (patch) | |
tree | 3061cba9ea7ba20905ebb202a81c6da76debfe6d /crypto/internal.h | |
parent | 6b894a409e8c0fcbd0ea30f5b013e33b9c4b28a1 (diff) | |
download | linux-fsl-qoriq-bf3db85311292eeacc9a9a8f38a0a4065a43a2fc.tar.xz |
s390/cmpxchg: fix 1 and 2 byte memory accesses
When accessing a 1 or 2 byte memory operand we cannot use the
passed address since the compare and swap instruction only works
for 4 byte aligned memory operands.
Hence we calculate an aligned address so that compare and swap works
correctly. However we don't pass the calculated address to the inline
assembly. This results in incorrect memory accesses and in a
specification exception if used on non 4 byte aligned memory operands.
Since this didn't happen until now, there don't seem to be
too many users of cmpxchg on unaligned addresses.
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Diffstat (limited to 'crypto/internal.h')
0 files changed, 0 insertions, 0 deletions