diff options
author | Davidlohr Bueso <dave@stgolabs.net> | 2017-06-08 15:47:34 +0200 |
---|---|---|
committer | James Morris <james.l.morris@oracle.com> | 2017-06-09 05:29:45 +0200 |
commit | 381f20fceba8ea540aef5241a9099f4552700d0c (patch) | |
tree | c7ec84b6670ee3fc33a23d87668a8644aba60157 /crypto | |
parent | security/keys: add CONFIG_KEYS_COMPAT to Kconfig (diff) | |
download | linux-381f20fceba8ea540aef5241a9099f4552700d0c.tar.xz linux-381f20fceba8ea540aef5241a9099f4552700d0c.zip |
security: use READ_ONCE instead of deprecated ACCESS_ONCE
With the new standardized functions, we can replace all ACCESS_ONCE()
calls across relevant security/keyrings/.
ACCESS_ONCE() does not work reliably on non-scalar types. For example
gcc 4.6 and 4.7 might remove the volatile tag for such accesses during
the SRA (scalar replacement of aggregates) step:
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=58145
Update the new calls regardless of if it is a scalar type, this is
cleaner than having three alternatives.
Signed-off-by: Davidlohr Bueso <dbueso@suse.de>
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: James Morris <james.l.morris@oracle.com>
Diffstat (limited to 'crypto')
0 files changed, 0 insertions, 0 deletions