diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2018-02-07 01:15:42 -0500 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2018-02-07 01:15:42 -0500 |
commit | a2e5790d841658485d642196dbb0927303d6c22f (patch) | |
tree | b3d28c9bcb7da6880806146fd22a88a7ee7f733e /kernel/futex.c | |
parent | ab2d92ad881da11331280aedf612d82e61cb6d41 (diff) | |
parent | 60c3e026d73ccabb075fb70ba02f8512ab40cf2c (diff) |
Merge branch 'akpm' (patches from Andrew)
Merge misc updates from Andrew Morton:
- kasan updates
- procfs
- lib/bitmap updates
- other lib/ updates
- checkpatch tweaks
- rapidio
- ubsan
- pipe fixes and cleanups
- lots of other misc bits
* emailed patches from Andrew Morton <akpm@linux-foundation.org>: (114 commits)
Documentation/sysctl/user.txt: fix typo
MAINTAINERS: update ARM/QUALCOMM SUPPORT patterns
MAINTAINERS: update various PALM patterns
MAINTAINERS: update "ARM/OXNAS platform support" patterns
MAINTAINERS: update Cortina/Gemini patterns
MAINTAINERS: remove ARM/CLKDEV SUPPORT file pattern
MAINTAINERS: remove ANDROID ION pattern
mm: docs: add blank lines to silence sphinx "Unexpected indentation" errors
mm: docs: fix parameter names mismatch
mm: docs: fixup punctuation
pipe: read buffer limits atomically
pipe: simplify round_pipe_size()
pipe: reject F_SETPIPE_SZ with size over UINT_MAX
pipe: fix off-by-one error when checking buffer limits
pipe: actually allow root to exceed the pipe buffer limits
pipe, sysctl: remove pipe_proc_fn()
pipe, sysctl: drop 'min' parameter from pipe-max-size converter
kasan: rework Kconfig settings
crash_dump: is_kdump_kernel can be boolean
kernel/mutex: mutex_is_locked can be boolean
...
Diffstat (limited to 'kernel/futex.c')
-rw-r--r-- | kernel/futex.c | 20 |
1 files changed, 1 insertions, 19 deletions
diff --git a/kernel/futex.c b/kernel/futex.c index 7f719d110908..1f450e092c74 100644 --- a/kernel/futex.c +++ b/kernel/futex.c | |||
@@ -862,24 +862,6 @@ static void put_pi_state(struct futex_pi_state *pi_state) | |||
862 | } | 862 | } |
863 | } | 863 | } |
864 | 864 | ||
865 | /* | ||
866 | * Look up the task based on what TID userspace gave us. | ||
867 | * We dont trust it. | ||
868 | */ | ||
869 | static struct task_struct *futex_find_get_task(pid_t pid) | ||
870 | { | ||
871 | struct task_struct *p; | ||
872 | |||
873 | rcu_read_lock(); | ||
874 | p = find_task_by_vpid(pid); | ||
875 | if (p) | ||
876 | get_task_struct(p); | ||
877 | |||
878 | rcu_read_unlock(); | ||
879 | |||
880 | return p; | ||
881 | } | ||
882 | |||
883 | #ifdef CONFIG_FUTEX_PI | 865 | #ifdef CONFIG_FUTEX_PI |
884 | 866 | ||
885 | /* | 867 | /* |
@@ -1183,7 +1165,7 @@ static int attach_to_pi_owner(u32 uval, union futex_key *key, | |||
1183 | */ | 1165 | */ |
1184 | if (!pid) | 1166 | if (!pid) |
1185 | return -ESRCH; | 1167 | return -ESRCH; |
1186 | p = futex_find_get_task(pid); | 1168 | p = find_get_task_by_vpid(pid); |
1187 | if (!p) | 1169 | if (!p) |
1188 | return -ESRCH; | 1170 | return -ESRCH; |
1189 | 1171 | ||