1
Subject: x86: vdso: Remove bogus locking in update_vsyscall_tz()
2
From: Thomas Gleixner <tglx@linutronix.de>
3
Date: Tue, 28 Feb 2012 19:10:46 +0100
5
Changing the sequence count in update_vsyscall_tz() is completely
8
The vdso code copies the data unprotected. There is no point to change
9
this as sys_tz is nowhere protected at all. See sys_gettimeofday().
11
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
13
arch/x86/kernel/vsyscall_64.c | 5 -----
14
1 file changed, 5 deletions(-)
16
Index: linux-2.6/arch/x86/kernel/vsyscall_64.c
17
===================================================================
18
--- linux-2.6.orig/arch/x86/kernel/vsyscall_64.c
19
+++ linux-2.6/arch/x86/kernel/vsyscall_64.c
20
@@ -80,12 +80,7 @@ early_param("vsyscall", vsyscall_setup);
22
void update_vsyscall_tz(void)
24
- unsigned long flags;
26
- write_seqlock_irqsave(&vsyscall_gtod_data.lock, flags);
27
- /* sys_tz has changed */
28
vsyscall_gtod_data.sys_tz = sys_tz;
29
- write_sequnlock_irqrestore(&vsyscall_gtod_data.lock, flags);
32
void update_vsyscall(struct timespec *wall_time, struct timespec *wtm,