mirror of
https://github.com/followmsi/android_kernel_google_msm.git
synced 2024-11-06 23:17:41 +00:00
seccomp: Use atomic operations that are present in kernel 3.4.
Signed-off-by: Robert Sesek <rsesek@google.com>
This commit is contained in:
parent
6756f10b76
commit
e8c64bc644
1 changed files with 3 additions and 3 deletions
|
@ -245,7 +245,7 @@ static inline void seccomp_assign_mode(struct task_struct *task,
|
|||
* Make sure TIF_SECCOMP cannot be set before the mode (and
|
||||
* filter) is set.
|
||||
*/
|
||||
smp_mb__before_atomic();
|
||||
smp_mb();
|
||||
set_tsk_thread_flag(task, TIF_SECCOMP);
|
||||
}
|
||||
|
||||
|
@ -335,8 +335,8 @@ static inline void seccomp_sync_threads(void)
|
|||
* allows a put before the assignment.)
|
||||
*/
|
||||
put_seccomp_filter(thread);
|
||||
smp_store_release(&thread->seccomp.filter,
|
||||
caller->seccomp.filter);
|
||||
smp_mb();
|
||||
ACCESS_ONCE(thread->seccomp.filter) = caller->seccomp.filter;
|
||||
/*
|
||||
* Opt the other thread into seccomp if needed.
|
||||
* As threads are considered to be trust-realm
|
||||
|
|
Loading…
Reference in a new issue