Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openeuler
Kernel
提交
93d0955e
K
Kernel
项目概览
openeuler
/
Kernel
1 年多 前同步成功
通知
8
Star
0
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
DevOps
流水线
流水线任务
计划
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
K
Kernel
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
DevOps
DevOps
流水线
流水线任务
计划
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
流水线任务
提交
Issue看板
提交
93d0955e
编写于
5月 12, 2021
作者:
I
Ingo Molnar
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
locking: Fix comment typos
A few snuck through. Signed-off-by:
N
Ingo Molnar
<
mingo@kernel.org
>
上级
88b06399
变更
2
隐藏空白更改
内联
并排
Showing
2 changed file
with
7 addition
and
7 deletion
+7
-7
include/linux/lockdep_types.h
include/linux/lockdep_types.h
+1
-1
kernel/futex.c
kernel/futex.c
+6
-6
未找到文件。
include/linux/lockdep_types.h
浏览文件 @
93d0955e
...
...
@@ -52,7 +52,7 @@ enum lockdep_lock_type {
* NR_LOCKDEP_CACHING_CLASSES ... Number of classes
* cached in the instance of lockdep_map
*
* Currently main class (subclass == 0) and si
gn
le depth subclass
* Currently main class (subclass == 0) and si
ng
le depth subclass
* are cached in lockdep_map. This optimization is mainly targeting
* on rq->lock. double_rq_lock() acquires this highly competitive with
* single depth.
...
...
kernel/futex.c
浏览文件 @
93d0955e
...
...
@@ -1874,7 +1874,7 @@ futex_proxy_trylock_atomic(u32 __user *pifutex, struct futex_hash_bucket *hb1,
* If the caller intends to requeue more than 1 waiter to pifutex,
* force futex_lock_pi_atomic() to set the FUTEX_WAITERS bit now,
* as we have means to handle the possible fault. If not, don't set
* the bit unecessarily as it will force the subsequent unlock to enter
* the bit un
n
ecessarily as it will force the subsequent unlock to enter
* the kernel.
*/
top_waiter
=
futex_top_waiter
(
hb1
,
key1
);
...
...
@@ -2103,7 +2103,7 @@ static int futex_requeue(u32 __user *uaddr1, unsigned int flags,
continue
;
/*
* FUTEX_WAIT_REQEUE_PI and FUTEX_CMP_REQUEUE_PI should always
* FUTEX_WAIT_REQ
U
EUE_PI and FUTEX_CMP_REQUEUE_PI should always
* be paired with each other and no other futex ops.
*
* We should never be requeueing a futex_q with a pi_state,
...
...
@@ -2318,7 +2318,7 @@ static int unqueue_me(struct futex_q *q)
}
/*
* PI futexes can not be requeued and must remove themsel
f
from the
* PI futexes can not be requeued and must remove themsel
ves
from the
* hash bucket. The hash bucket lock (i.e. lock_ptr) is held.
*/
static
void
unqueue_me_pi
(
struct
futex_q
*
q
)
...
...
@@ -2903,7 +2903,7 @@ static int futex_lock_pi(u32 __user *uaddr, unsigned int flags,
*/
res
=
fixup_owner
(
uaddr
,
&
q
,
!
ret
);
/*
* If fixup_owner() returned an error, prop
ro
gate that. If it acquired
* If fixup_owner() returned an error, prop
a
gate that. If it acquired
* the lock, clear our -ETIMEDOUT or -EINTR.
*/
if
(
res
)
...
...
@@ -3280,7 +3280,7 @@ static int futex_wait_requeue_pi(u32 __user *uaddr, unsigned int flags,
*/
res
=
fixup_owner
(
uaddr2
,
&
q
,
!
ret
);
/*
* If fixup_owner() returned an error, prop
ro
gate that. If it
* If fixup_owner() returned an error, prop
a
gate that. If it
* acquired the lock, clear -ETIMEDOUT or -EINTR.
*/
if
(
res
)
...
...
@@ -3678,7 +3678,7 @@ void futex_exec_release(struct task_struct *tsk)
{
/*
* The state handling is done for consistency, but in the case of
* exec() there is no way to prevent futher damage as the PID stays
* exec() there is no way to prevent fu
r
ther damage as the PID stays
* the same. But for the unlikely and arguably buggy case that a
* futex is held on exec(), this provides at least as much state
* consistency protection which is possible.
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录