|
@@ -260,8 +260,8 @@ static void merge_queues(struct sem_array *sma)
|
|
|
|
|
|
static void sem_rcu_free(struct rcu_head *head)
|
|
|
{
|
|
|
- struct ipc_rcu *p = container_of(head, struct ipc_rcu, rcu);
|
|
|
- struct sem_array *sma = ipc_rcu_to_struct(p);
|
|
|
+ struct kern_ipc_perm *p = container_of(head, struct kern_ipc_perm, rcu);
|
|
|
+ struct sem_array *sma = container_of(p, struct sem_array, sem_perm);
|
|
|
|
|
|
security_sem_free(sma);
|
|
|
ipc_rcu_free(head);
|
|
@@ -438,7 +438,7 @@ static inline struct sem_array *sem_obtain_object_check(struct ipc_namespace *ns
|
|
|
static inline void sem_lock_and_putref(struct sem_array *sma)
|
|
|
{
|
|
|
sem_lock(sma, NULL, -1);
|
|
|
- ipc_rcu_putref(sma, sem_rcu_free);
|
|
|
+ ipc_rcu_putref(&sma->sem_perm, sem_rcu_free);
|
|
|
}
|
|
|
|
|
|
static inline void sem_rmid(struct ipc_namespace *ns, struct sem_array *s)
|
|
@@ -469,20 +469,20 @@ static int newary(struct ipc_namespace *ns, struct ipc_params *params)
|
|
|
if (ns->used_sems + nsems > ns->sc_semmns)
|
|
|
return -ENOSPC;
|
|
|
|
|
|
+ BUILD_BUG_ON(offsetof(struct sem_array, sem_perm) != 0);
|
|
|
+
|
|
|
size = sizeof(*sma) + nsems * sizeof(sma->sems[0]);
|
|
|
- sma = ipc_rcu_alloc(size);
|
|
|
+ sma = container_of(ipc_rcu_alloc(size), struct sem_array, sem_perm);
|
|
|
if (!sma)
|
|
|
return -ENOMEM;
|
|
|
|
|
|
- memset(sma, 0, size);
|
|
|
-
|
|
|
sma->sem_perm.mode = (semflg & S_IRWXUGO);
|
|
|
sma->sem_perm.key = key;
|
|
|
|
|
|
sma->sem_perm.security = NULL;
|
|
|
retval = security_sem_alloc(sma);
|
|
|
if (retval) {
|
|
|
- ipc_rcu_putref(sma, ipc_rcu_free);
|
|
|
+ ipc_rcu_putref(&sma->sem_perm, ipc_rcu_free);
|
|
|
return retval;
|
|
|
}
|
|
|
|
|
@@ -502,7 +502,7 @@ static int newary(struct ipc_namespace *ns, struct ipc_params *params)
|
|
|
|
|
|
id = ipc_addid(&sem_ids(ns), &sma->sem_perm, ns->sc_semmni);
|
|
|
if (id < 0) {
|
|
|
- ipc_rcu_putref(sma, sem_rcu_free);
|
|
|
+ ipc_rcu_putref(&sma->sem_perm, sem_rcu_free);
|
|
|
return id;
|
|
|
}
|
|
|
ns->used_sems += nsems;
|
|
@@ -1122,7 +1122,7 @@ static void freeary(struct ipc_namespace *ns, struct kern_ipc_perm *ipcp)
|
|
|
|
|
|
wake_up_q(&wake_q);
|
|
|
ns->used_sems -= sma->sem_nsems;
|
|
|
- ipc_rcu_putref(sma, sem_rcu_free);
|
|
|
+ ipc_rcu_putref(&sma->sem_perm, sem_rcu_free);
|
|
|
}
|
|
|
|
|
|
static unsigned long copy_semid_to_user(void __user *buf, struct semid64_ds *in, int version)
|
|
@@ -1362,7 +1362,7 @@ static int semctl_main(struct ipc_namespace *ns, int semid, int semnum,
|
|
|
goto out_unlock;
|
|
|
}
|
|
|
if (nsems > SEMMSL_FAST) {
|
|
|
- if (!ipc_rcu_getref(sma)) {
|
|
|
+ if (!ipc_rcu_getref(&sma->sem_perm)) {
|
|
|
err = -EIDRM;
|
|
|
goto out_unlock;
|
|
|
}
|
|
@@ -1370,7 +1370,7 @@ static int semctl_main(struct ipc_namespace *ns, int semid, int semnum,
|
|
|
rcu_read_unlock();
|
|
|
sem_io = ipc_alloc(sizeof(ushort)*nsems);
|
|
|
if (sem_io == NULL) {
|
|
|
- ipc_rcu_putref(sma, sem_rcu_free);
|
|
|
+ ipc_rcu_putref(&sma->sem_perm, sem_rcu_free);
|
|
|
return -ENOMEM;
|
|
|
}
|
|
|
|
|
@@ -1395,7 +1395,7 @@ static int semctl_main(struct ipc_namespace *ns, int semid, int semnum,
|
|
|
int i;
|
|
|
struct sem_undo *un;
|
|
|
|
|
|
- if (!ipc_rcu_getref(sma)) {
|
|
|
+ if (!ipc_rcu_getref(&sma->sem_perm)) {
|
|
|
err = -EIDRM;
|
|
|
goto out_rcu_wakeup;
|
|
|
}
|
|
@@ -1404,20 +1404,20 @@ static int semctl_main(struct ipc_namespace *ns, int semid, int semnum,
|
|
|
if (nsems > SEMMSL_FAST) {
|
|
|
sem_io = ipc_alloc(sizeof(ushort)*nsems);
|
|
|
if (sem_io == NULL) {
|
|
|
- ipc_rcu_putref(sma, sem_rcu_free);
|
|
|
+ ipc_rcu_putref(&sma->sem_perm, sem_rcu_free);
|
|
|
return -ENOMEM;
|
|
|
}
|
|
|
}
|
|
|
|
|
|
if (copy_from_user(sem_io, p, nsems*sizeof(ushort))) {
|
|
|
- ipc_rcu_putref(sma, sem_rcu_free);
|
|
|
+ ipc_rcu_putref(&sma->sem_perm, sem_rcu_free);
|
|
|
err = -EFAULT;
|
|
|
goto out_free;
|
|
|
}
|
|
|
|
|
|
for (i = 0; i < nsems; i++) {
|
|
|
if (sem_io[i] > SEMVMX) {
|
|
|
- ipc_rcu_putref(sma, sem_rcu_free);
|
|
|
+ ipc_rcu_putref(&sma->sem_perm, sem_rcu_free);
|
|
|
err = -ERANGE;
|
|
|
goto out_free;
|
|
|
}
|
|
@@ -1699,7 +1699,7 @@ static struct sem_undo *find_alloc_undo(struct ipc_namespace *ns, int semid)
|
|
|
}
|
|
|
|
|
|
nsems = sma->sem_nsems;
|
|
|
- if (!ipc_rcu_getref(sma)) {
|
|
|
+ if (!ipc_rcu_getref(&sma->sem_perm)) {
|
|
|
rcu_read_unlock();
|
|
|
un = ERR_PTR(-EIDRM);
|
|
|
goto out;
|
|
@@ -1709,7 +1709,7 @@ static struct sem_undo *find_alloc_undo(struct ipc_namespace *ns, int semid)
|
|
|
/* step 2: allocate new undo structure */
|
|
|
new = kzalloc(sizeof(struct sem_undo) + sizeof(short)*nsems, GFP_KERNEL);
|
|
|
if (!new) {
|
|
|
- ipc_rcu_putref(sma, sem_rcu_free);
|
|
|
+ ipc_rcu_putref(&sma->sem_perm, sem_rcu_free);
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
}
|
|
|
|