From: Sven Schnelle Date: Wed, 8 Jan 2025 14:27:02 +0000 (+0100) Subject: s390/stackleak: Use exrl instead of ex in __stackleak_poison() X-Git-Tag: v6.14-rc1~200^2~8 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=a88c26bb8e04ee5f2678225c0130a5fbc08eef85;p=thirdparty%2Fkernel%2Flinux.git s390/stackleak: Use exrl instead of ex in __stackleak_poison() exrl is present in all machines currently supported, therefore prefer it over ex. This saves one instruction and doesn't need an additional register to hold the address of the target instruction. Signed-off-by: Sven Schnelle Reviewed-by: Heiko Carstens Signed-off-by: Alexander Gordeev --- diff --git a/arch/s390/include/asm/processor.h b/arch/s390/include/asm/processor.h index 8761fd01a9f09..4f8d5592c2981 100644 --- a/arch/s390/include/asm/processor.h +++ b/arch/s390/include/asm/processor.h @@ -163,8 +163,7 @@ static __always_inline void __stackleak_poison(unsigned long erase_low, " la %[addr],256(%[addr])\n" " brctg %[tmp],0b\n" "1: stg %[poison],0(%[addr])\n" - " larl %[tmp],3f\n" - " ex %[count],0(%[tmp])\n" + " exrl %[count],3f\n" " j 4f\n" "2: stg %[poison],0(%[addr])\n" " j 4f\n"