From e8c64bc6444679d81e052ce04e20034dbc19d320 Mon Sep 17 00:00:00 2001 From: Robert Sesek <rsesek@google.com> Date: Mon, 18 Aug 2014 19:14:51 -0400 Subject: [PATCH] seccomp: Use atomic operations that are present in kernel 3.4. Signed-off-by: Robert Sesek <rsesek@google.com> --- kernel/seccomp.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/kernel/seccomp.c b/kernel/seccomp.c index e35c742a05d5..829a2cae2764 100644 --- a/kernel/seccomp.c +++ b/kernel/seccomp.c @@ -245,7 +245,7 @@ static inline void seccomp_assign_mode(struct task_struct *task, * Make sure TIF_SECCOMP cannot be set before the mode (and * filter) is set. */ - smp_mb__before_atomic(); + smp_mb(); set_tsk_thread_flag(task, TIF_SECCOMP); } @@ -335,8 +335,8 @@ static inline void seccomp_sync_threads(void) * allows a put before the assignment.) */ put_seccomp_filter(thread); - smp_store_release(&thread->seccomp.filter, - caller->seccomp.filter); + smp_mb(); + ACCESS_ONCE(thread->seccomp.filter) = caller->seccomp.filter; /* * Opt the other thread into seccomp if needed. * As threads are considered to be trust-realm -- GitLab