Skip to content

Commit

Permalink
---
Browse files Browse the repository at this point in the history
yaml
---
r: 191397
b: refs/heads/master
c: 32bd7eb
h: refs/heads/master
i:
  191395: 8ea2ebe
v: v3
  • Loading branch information
Li Zefan authored and Ingo Molnar committed Apr 2, 2010
1 parent 71bf9e2 commit f0b226e
Show file tree
Hide file tree
Showing 8 changed files with 3 additions and 43 deletions.
2 changes: 1 addition & 1 deletion [refs]
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
---
refs/heads/master: c9494727cf293ae2ec66af57547a3e79c724fec2
refs/heads/master: 32bd7eb5a7f4596c8440dd9440322fe9e686634d
3 changes: 1 addition & 2 deletions trunk/init/Kconfig
Original file line number Diff line number Diff line change
Expand Up @@ -604,8 +604,7 @@ config RT_GROUP_SCHED
default n
help
This feature lets you explicitly allocate real CPU bandwidth
to users or control groups (depending on the "Basis for grouping tasks"
setting below. If enabled, it will also make it impossible to
to task groups. If enabled, it will also make it impossible to
schedule realtime tasks for non-root users until you allocate
realtime bandwidth for them.
See Documentation/scheduler/sched-rt-group.txt for more information.
Expand Down
1 change: 0 additions & 1 deletion trunk/kernel/capability.c
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,6 @@
#include <linux/syscalls.h>
#include <linux/pid_namespace.h>
#include <asm/uaccess.h>
#include "cred-internals.h"

/*
* Leveraged for setting/resetting capabilities
Expand Down
21 changes: 0 additions & 21 deletions trunk/kernel/cred-internals.h

This file was deleted.

3 changes: 0 additions & 3 deletions trunk/kernel/cred.c
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,6 @@
#include <linux/init_task.h>
#include <linux/security.h>
#include <linux/cn_proc.h>
#include "cred-internals.h"

#if 0
#define kdebug(FMT, ...) \
Expand Down Expand Up @@ -557,8 +556,6 @@ int commit_creds(struct cred *new)
atomic_dec(&old->user->processes);
alter_cred_subscribers(old, -2);

sched_switch_user(task);

/* send notifications */
if (new->uid != old->uid ||
new->euid != old->euid ||
Expand Down
1 change: 0 additions & 1 deletion trunk/kernel/exit.c
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,6 @@
#include <asm/unistd.h>
#include <asm/pgtable.h>
#include <asm/mmu_context.h>
#include "cred-internals.h"

static void exit_mm(struct task_struct * tsk);

Expand Down
5 changes: 0 additions & 5 deletions trunk/kernel/sched_debug.c
Original file line number Diff line number Diff line change
Expand Up @@ -173,11 +173,6 @@ void print_cfs_rq(struct seq_file *m, int cpu, struct cfs_rq *cfs_rq)
task_group_path(tg, path, sizeof(path));

SEQ_printf(m, "\ncfs_rq[%d]:%s\n", cpu, path);
#elif defined(CONFIG_USER_SCHED) && defined(CONFIG_FAIR_GROUP_SCHED)
{
uid_t uid = cfs_rq->tg->uid;
SEQ_printf(m, "\ncfs_rq[%d] for UID: %u\n", cpu, uid);
}
#else
SEQ_printf(m, "\ncfs_rq[%d]:\n", cpu);
#endif
Expand Down
10 changes: 1 addition & 9 deletions trunk/kernel/user.c
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,6 @@
#include <linux/interrupt.h>
#include <linux/module.h>
#include <linux/user_namespace.h>
#include "cred-internals.h"

struct user_namespace init_user_ns = {
.kref = {
Expand Down Expand Up @@ -137,9 +136,7 @@ struct user_struct *alloc_uid(struct user_namespace *ns, uid_t uid)
struct hlist_head *hashent = uidhashentry(ns, uid);
struct user_struct *up, *new;

/* Make uid_hash_find() + uids_user_create() + uid_hash_insert()
* atomic.
*/
/* Make uid_hash_find() + uid_hash_insert() atomic. */
spin_lock_irq(&uidhash_lock);
up = uid_hash_find(uid, hashent);
spin_unlock_irq(&uidhash_lock);
Expand All @@ -161,11 +158,6 @@ struct user_struct *alloc_uid(struct user_namespace *ns, uid_t uid)
spin_lock_irq(&uidhash_lock);
up = uid_hash_find(uid, hashent);
if (up) {
/* This case is not possible when CONFIG_USER_SCHED
* is defined, since we serialize alloc_uid() using
* uids_mutex. Hence no need to call
* sched_destroy_user() or remove_user_sysfs_dir().
*/
key_put(new->uid_keyring);
key_put(new->session_keyring);
kmem_cache_free(uid_cachep, new);
Expand Down

0 comments on commit f0b226e

Please sign in to comment.