Received: by 2002:ac0:aed5:0:0:0:0:0 with SMTP id t21csp2277134imb; Mon, 4 Mar 2019 00:32:10 -0800 (PST) X-Google-Smtp-Source: APXvYqw0TjLETmApn2grA7Uwa9ImdCkm90cUzepjVWVeZ32nKB5O5E52F889+VPn8FutnQxPL3xy X-Received: by 2002:a17:902:aa88:: with SMTP id d8mr2109852plr.61.1551688330616; Mon, 04 Mar 2019 00:32:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551688330; cv=none; d=google.com; s=arc-20160816; b=tsSzs4iFik2PtosPLDdgqc1zLkBw8Iw5AnVg+O52AqVuYqnH+DYVeKaPOl8znKJcOk 0dIwgHL6k0yRX9cHsJdiOlkkLvD8xdDLT4GGggbc0D+G/o3/hTmZDtsLkDyuappLw89e b2nCGxYeAn5XvcFBi2YVdTMlXxzGCQVHItb4OKMT5dMJyDRHOwGaDd9LbDBLmnBYA7tp v9VC/7va5itgGQhlGIKfCzAvlZfE1eUetPZg/d1dCP5z6fetYArMQtqwsMnB56Ui1Bit QVG0k7grrmsn5LMLdvlldECdon65O/r8xv9WJXMIeQ2HXmEJ6Owexrvl0bfgZo26S4On ggAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=PW53qiU1KuDng779gCfeNNmUB1zMtevDoJTJJlRQ9vo=; b=GGvTOKmNICRO9dEAEUlSK6R6MS76SZsgFjtPbizY7wS0Pw8G1kea359no4qIfbB9f0 3fKqtuviAWp25MZ6XyiJTaVwNcb8KmuVMjt+/e+gcpb0aAT6GWh3ZoUU7HhPn8fMohyK 327rBnq0Qbu9sZTxgdqr+QTgF6JCHQ5Q3mDkFa8wnJ9YpGFKCuTghEDBQDvAFdHufVPv GPOIdjoAX3QnGTje68jH+IIHZygMjdbIc0Bz++YFdqttc29wzKu3a+jDiptHHaeVRNHP xh8uWThDUecvIjAa10h6TlvfAvBQLeCtmPRBqw5lQbB3CyleCbC9/kJepqezQcOvdGfl m6bQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qxi6UFqE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ci1si5233713plb.352.2019.03.04.00.31.55; Mon, 04 Mar 2019 00:32:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qxi6UFqE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727610AbfCDIba (ORCPT + 99 others); Mon, 4 Mar 2019 03:31:30 -0500 Received: from mail.kernel.org ([198.145.29.99]:33264 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727911AbfCDIb0 (ORCPT ); Mon, 4 Mar 2019 03:31:26 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5FFC9208E4; Mon, 4 Mar 2019 08:31:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1551688285; bh=f7G41DJwiKagxMza1GqKVDMISw13Des8+fBCOY9qJjM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qxi6UFqEfyz8XCxeagDge6V4chuqNpG7TY4H/3B44SzFvsTixyxQsDmOL7kYcjR36 QStdGkJ7dYyA6FEqJ8H6Ydum3KshB8XrHaqet8X0tnOl79fvRxMQ4ZApUVI8USfvns ZUXJ32QlWHGkeqGzjOQAXfq955AT/jnCASQSLCxM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, RISC-V Patches , Linux RISC-V , Linux MIPS , Michael Clark , Paul Burton Subject: [PATCH 4.19 75/78] MIPS: fix truncation in __cmpxchg_small for short values Date: Mon, 4 Mar 2019 09:22:58 +0100 Message-Id: <20190304081628.949874227@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190304081625.508788074@linuxfoundation.org> References: <20190304081625.508788074@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Michael Clark commit 94ee12b507db8b5876e31c9d6c9d84f556a4b49f upstream. __cmpxchg_small erroneously uses u8 for load comparison which can be either char or short. This patch changes the local variable to u32 which is sufficiently sized, as the loaded value is already masked and shifted appropriately. Using an integer size avoids any unnecessary canonicalization from use of non native widths. This patch is part of a series that adapts the MIPS small word atomics code for xchg and cmpxchg on short and char to RISC-V. Cc: RISC-V Patches Cc: Linux RISC-V Cc: Linux MIPS Signed-off-by: Michael Clark [paul.burton@mips.com: - Fix varialble typo per Jonas Gorski. - Consolidate load variable with other declarations.] Signed-off-by: Paul Burton Fixes: 3ba7f44d2b19 ("MIPS: cmpxchg: Implement 1 byte & 2 byte cmpxchg()") Cc: stable@vger.kernel.org # v4.13+ Signed-off-by: Greg Kroah-Hartman --- arch/mips/kernel/cmpxchg.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) --- a/arch/mips/kernel/cmpxchg.c +++ b/arch/mips/kernel/cmpxchg.c @@ -54,10 +54,9 @@ unsigned long __xchg_small(volatile void unsigned long __cmpxchg_small(volatile void *ptr, unsigned long old, unsigned long new, unsigned int size) { - u32 mask, old32, new32, load32; + u32 mask, old32, new32, load32, load; volatile u32 *ptr32; unsigned int shift; - u8 load; /* Check that ptr is naturally aligned */ WARN_ON((unsigned long)ptr & (size - 1));