From e8c64bc6444679d81e052ce04e20034dbc19d320 Mon Sep 17 00:00:00 2001
From: Robert Sesek <rsesek@google.com>
Date: Mon, 18 Aug 2014 19:14:51 -0400
Subject: [PATCH] seccomp: Use atomic operations that are present in kernel
 3.4.

Signed-off-by: Robert Sesek <rsesek@google.com>
---
 kernel/seccomp.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/kernel/seccomp.c b/kernel/seccomp.c
index e35c742a05d5..829a2cae2764 100644
--- a/kernel/seccomp.c
+++ b/kernel/seccomp.c
@@ -245,7 +245,7 @@ static inline void seccomp_assign_mode(struct task_struct *task,
 	 * Make sure TIF_SECCOMP cannot be set before the mode (and
 	 * filter) is set.
 	 */
-	smp_mb__before_atomic();
+	smp_mb();
 	set_tsk_thread_flag(task, TIF_SECCOMP);
 }
 
@@ -335,8 +335,8 @@ static inline void seccomp_sync_threads(void)
 		 * allows a put before the assignment.)
 		 */
 		put_seccomp_filter(thread);
-		smp_store_release(&thread->seccomp.filter,
-				  caller->seccomp.filter);
+		smp_mb();
+		ACCESS_ONCE(thread->seccomp.filter) = caller->seccomp.filter;
 		/*
 		 * Opt the other thread into seccomp if needed.
 		 * As threads are considered to be trust-realm
-- 
GitLab