seccomp: Use atomic operations that are present in kernel 3.4.

Signed-off-by: Robert Sesek <rsesek@google.com>
This commit is contained in:
Robert Sesek 2014-08-18 19:14:51 -04:00 committed by Iliyan Malchev
parent 6756f10b76
commit e8c64bc644

View file

@ -245,7 +245,7 @@ static inline void seccomp_assign_mode(struct task_struct *task,
* Make sure TIF_SECCOMP cannot be set before the mode (and
* filter) is set.
*/
smp_mb__before_atomic();
smp_mb();
set_tsk_thread_flag(task, TIF_SECCOMP);
}
@ -335,8 +335,8 @@ static inline void seccomp_sync_threads(void)
* allows a put before the assignment.)
*/
put_seccomp_filter(thread);
smp_store_release(&thread->seccomp.filter,
caller->seccomp.filter);
smp_mb();
ACCESS_ONCE(thread->seccomp.filter) = caller->seccomp.filter;
/*
* Opt the other thread into seccomp if needed.
* As threads are considered to be trust-realm