public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH 4/4] ipc/sem.c: rewrite undo list locking
@ 2008-05-24 16:06 Manfred Spraul
  2008-05-30  9:04 ` Nadia Derbey
  0 siblings, 1 reply; 2+ messages in thread
From: Manfred Spraul @ 2008-05-24 16:06 UTC (permalink / raw)
  To: linux-kernel

The attached patch:
- reverses the locking order of ulp->lock and sem_lock:
  Previously, it was first ulp->lock, then inside sem_lock.
  Now it's the other way around.
- converts the undo structure to rcu.

Benefits:
- With the old locking order, IPC_RMID could not kfree the undo structures.
  The stale entries remained in the linked lists and were released later.
- The patch fixes a a race in semtimedop(): if both IPC_RMID and a semget() that
  recreates exactly the same id happen between find_alloc_undo() and sem_lock,
  then semtimedop() would access already kfree'd memory.

Signed-Off-By: Manfred Spraul <manfred@colorfullife.com>
---
 include/linux/sem.h |    6 ++-
 ipc/sem.c           |  145 ++++++++++++++++++++++++++++++++-------------------
 2 files changed, 96 insertions(+), 55 deletions(-)

diff --git a/include/linux/sem.h b/include/linux/sem.h
index d425993..1b191c1 100644
--- a/include/linux/sem.h
+++ b/include/linux/sem.h
@@ -78,6 +78,7 @@ struct  seminfo {
 
 #ifdef __KERNEL__
 #include <asm/atomic.h>
+#include <linux/rcupdate.h>
 
 struct task_struct;
 
@@ -114,7 +115,10 @@ struct sem_queue {
  * when the process exits.
  */
 struct sem_undo {
-	struct list_head	list_proc;	/* per-process list: all undos from one process */
+	struct list_head	list_proc;	/* per-process list: all undos from one process. */
+						/* rcu protected */
+	struct rcu_head		rcu;		/* rcu struct for sem_undo() */
+	struct sem_undo_list	*ulp;		/* sem_undo_list for the process */
 	struct list_head	list_id;	/* per semaphore array list: all undos for one array */
 	int			semid;		/* semaphore set identifier */
 	short *			semadj;		/* array of adjustments, one per semaphore */
diff --git a/ipc/sem.c b/ipc/sem.c
index 38996c0..d0b2217 100644
--- a/ipc/sem.c
+++ b/ipc/sem.c
@@ -502,27 +502,35 @@ static int count_semzcnt (struct sem_array * sma, ushort semnum)
 	return semzcnt;
 }
 
+void free_un(struct rcu_head *head)
+{
+	struct sem_undo *un = container_of(head, struct sem_undo, rcu);
+	kfree(un);
+}
+
 /* Free a semaphore set. freeary() is called with sem_ids.rw_mutex locked
  * as a writer and the spinlock for this semaphore set hold. sem_ids.rw_mutex
  * remains locked on exit.
  */
 static void freeary(struct ipc_namespace *ns, struct kern_ipc_perm *ipcp)
 {
-	struct sem_undo *un;
-	struct sem_queue *q, *t;
+	struct sem_undo *un, *tu;
+	struct sem_queue *q, *tq;
 	struct sem_array *sma = container_of(ipcp, struct sem_array, sem_perm);
 
-	/* Invalidate the existing undo structures for this semaphore set.
-	 * (They will be freed without any further action in exit_sem()
-	 * or during the next semop.)
-	 */
+	/* Free the existing undo structures for this semaphore set.  */
 	assert_spin_locked(&sma->sem_perm.lock);
-	list_for_each_entry(un, &sma->list_id, list_id)
+	list_for_each_entry_safe(un, tu, &sma->list_id, list_id) {
+		list_del(&un->list_id);
+		spin_lock(&un->ulp->lock);
 		un->semid = -1;
+		list_del_rcu(&un->list_proc);
+		spin_unlock(&un->ulp->lock);
+		call_rcu(&un->rcu, free_un);
+	}
 
 	/* Wake up all pending processes and let them fail with EIDRM. */
-
-	list_for_each_entry_safe(q, t, &sma->sem_pending, list) {
+	list_for_each_entry_safe(q, tq, &sma->sem_pending, list) {
 		list_del(&q->list);
 
 		q->status = IN_WAKEUP;
@@ -946,16 +954,11 @@ static inline int get_undo_list(struct sem_undo_list **undo_listp)
 
 static struct sem_undo *lookup_undo(struct sem_undo_list *ulp, int semid)
 {
-	struct sem_undo *walk, *tmp;
+	struct sem_undo *walk;
 
-	assert_spin_locked(&ulp->lock);
-	list_for_each_entry_safe(walk, tmp, &ulp->list_proc, list_proc) {
+	list_for_each_entry_rcu(walk, &ulp->list_proc, list_proc) {
 		if(walk->semid==semid)
 			return walk;
-		if(walk->semid==-1) {
-			list_del(&walk->list_proc);
-			kfree(walk);
-		}
 	}
 	return NULL;
 }
@@ -968,6 +971,8 @@ static struct sem_undo *lookup_undo(struct sem_undo_list *ulp, int semid)
  * The function looks up (and if not present creates) the undo structure.
  * The size of the undo structure depends on the size of the semaphore
  * array, thus the alloc path is not that straightforward.
+ * Lifetime-rules: sem_undo is rcu-protected, on success, the function
+ * performs a rcu_read_lock().
  */
 static struct sem_undo *find_alloc_undo(struct ipc_namespace *ns, int semid)
 {
@@ -981,11 +986,13 @@ static struct sem_undo *find_alloc_undo(struct ipc_namespace *ns, int semid)
 	if (error)
 		return ERR_PTR(error);
 
+	rcu_read_lock();
 	spin_lock(&ulp->lock);
 	un = lookup_undo(ulp, semid);
 	spin_unlock(&ulp->lock);
 	if (likely(un!=NULL))
 		goto out;
+	rcu_read_unlock();
 
 	/* no undo structure around - allocate one. */
 	/* step 1: figure out the size of the semaphore array */
@@ -1003,38 +1010,36 @@ static struct sem_undo *find_alloc_undo(struct ipc_namespace *ns, int semid)
 		return ERR_PTR(-ENOMEM);
 	}
 
-	/* step 3: Acquire the lock on the undo list pointer */
-	spin_lock(&ulp->lock);
-
-	/* step 4: check for races: someone else allocated the undo struct,
-	 *         semaphore array was destroyed.
-	 */
-	un = lookup_undo(ulp, semid);
-	if (un) {
-		spin_unlock(&ulp->lock);
-		kfree(new);
-		sem_putref(sma);
-		goto out;
-	}
+	/* step 3: Acquire the lock on semaphore array */
 	sem_lock_and_putref(sma);
 	if (sma->sem_perm.deleted) {
 		sem_unlock(sma);
-		spin_unlock(&ulp->lock);
 		kfree(new);
 		un = ERR_PTR(-EIDRM);
 		goto out;
 	}
+	spin_lock(&ulp->lock);
+
+	/* step 4: check for races: did someone else allocate the undo struct? */
+	un = lookup_undo(ulp, semid);
+	if (un) {
+		kfree(new);
+		goto success;
+	}
 	/* step 5: initialize & link new undo structure */
 	new->semadj = (short *) &new[1];
+	new->ulp = ulp;
 	new->semid = semid;
 	assert_spin_locked(&ulp->lock);
-	list_add(&new->list_proc, &ulp->list_proc);
+	list_add_rcu(&new->list_proc, &ulp->list_proc);
 	assert_spin_locked(&sma->sem_perm.lock);
 	list_add(&new->list_id, &sma->list_id);
+	un = new;
 
-	sem_unlock(sma);
+success:
 	spin_unlock(&ulp->lock);
-	un = new;
+	rcu_read_lock();
+	sem_unlock(sma);
 out:
 	return un;
 }
@@ -1101,6 +1106,8 @@ asmlinkage long sys_semtimedop(int semid, struct sembuf __user *tsops,
 
 	sma = sem_lock_check(ns, semid);
 	if (IS_ERR(sma)) {
+		if (un)
+			rcu_read_unlock();
 		error = PTR_ERR(sma);
 		goto out_free;
 	}
@@ -1109,10 +1116,26 @@ asmlinkage long sys_semtimedop(int semid, struct sembuf __user *tsops,
 	 * semid identifiers are not unique - find_alloc_undo may have
 	 * allocated an undo structure, it was invalidated by an RMID
 	 * and now a new array with received the same id. Check and fail.
+	 * This case can be detected checking un->semid. The existance of
+	 * "un" itself is guaranteed by rcu.
 	 */
 	error = -EIDRM;
-	if (un && un->semid == -1)
-		goto out_unlock_free;
+	if (un) {
+		if(un->semid == -1) {
+			rcu_read_unlock();
+			goto out_unlock_free;
+		} else {
+			/*
+			 * rcu lock can be released, "un" cannot disappear:
+			 * - sem_lock is acquired, thus IPC_RMID is
+			 *   impossible.
+			 * - exit_sem is impossible, it always operates on
+			 *   current (or a dead task).
+			 */
+			
+			rcu_read_unlock();
+		}
+	}
 
 	error = -EFBIG;
 	if (max >= sma->sem_nsems)
@@ -1240,7 +1263,6 @@ int copy_semundo(unsigned long clone_flags, struct task_struct *tsk)
 void exit_sem(struct task_struct *tsk)
 {
 	struct sem_undo_list *ulp;
-	struct sem_undo *un, *tmp;
 
 	ulp= tsk->sysvsem.undo_list;
 	if (!ulp)
@@ -1250,28 +1272,47 @@ void exit_sem(struct task_struct *tsk)
 	if (!atomic_dec_and_test(&ulp->refcnt))
 		return;
 
-	spin_lock(&ulp->lock);
-
-	list_for_each_entry_safe(un, tmp, &ulp->list_proc, list_proc) {
+	for (;;) {
   		struct sem_array *sma;
+		struct sem_undo *un;
+		int semid;
 		int i;
 
-		if(un->semid == -1)
-			goto free;
+		rcu_read_lock();
+		un =list_entry(rcu_dereference(ulp->list_proc.next),
+					struct sem_undo, list_proc);
+		if (&un->list_proc == &ulp->list_proc)
+			semid = -1;
+		 else
+			semid = un->semid;
+		rcu_read_unlock();
 
-		sma = sem_lock(tsk->nsproxy->ipc_ns, un->semid);
-		if (IS_ERR(sma))
-			goto free;
+		if(semid == -1)
+			break;
 
-		if (un->semid == -1)
-			goto unlock_free;
+		sma = sem_lock_check(tsk->nsproxy->ipc_ns, un->semid);
 
-		BUG_ON(sem_checkid(sma, un->semid));
+		/* exit_sem raced with IPC_RMID, nothing to do */
+		if (IS_ERR(sma))
+			continue;
+
+		un = lookup_undo(ulp, semid);
+		if (un == NULL) {
+			/* exit_sem raced with IPC_RMID+semget() that created
+			 * exactly the same semid. Nothing to do.
+			 */
+			sem_unlock(sma);
+			continue;
+		}
 
-		/* remove un from sma->list_id */
+		/* remove un from the linked lists */
 		assert_spin_locked(&sma->sem_perm.lock);
 		list_del(&un->list_id);
 
+		spin_lock(&ulp->lock);
+		list_del_rcu(&un->list_proc);
+		spin_unlock(&ulp->lock);
+
 		/* perform adjustments registered in un */
 		for (i = 0; i < sma->sem_nsems; i++) {
 			struct sem * semaphore = &sma->sem_base[i];
@@ -1300,14 +1341,10 @@ void exit_sem(struct task_struct *tsk)
 		sma->sem_otime = get_seconds();
 		/* maybe some queued-up processes were waiting for this */
 		update_queue(sma);
-unlock_free:
 		sem_unlock(sma);
-free:
-		assert_spin_locked(&ulp->lock);
-		list_del(&un->list_proc);
-		kfree(un);
+
+		call_rcu(&un->rcu, free_un);
 	}
-	spin_unlock(&ulp->lock);
 	kfree(ulp);
 }
 
-- 
1.5.4.1


^ permalink raw reply related	[flat|nested] 2+ messages in thread

* Re: [PATCH 4/4] ipc/sem.c: rewrite undo list locking
  2008-05-24 16:06 [PATCH 4/4] ipc/sem.c: rewrite undo list locking Manfred Spraul
@ 2008-05-30  9:04 ` Nadia Derbey
  0 siblings, 0 replies; 2+ messages in thread
From: Nadia Derbey @ 2008-05-30  9:04 UTC (permalink / raw)
  To: Manfred Spraul; +Cc: linux-kernel

Manfred Spraul wrote:
> The attached patch:
> - reverses the locking order of ulp->lock and sem_lock:
>   Previously, it was first ulp->lock, then inside sem_lock.
>   Now it's the other way around.
> - converts the undo structure to rcu.
> 
> Benefits:
> - With the old locking order, IPC_RMID could not kfree the undo structures.
>   The stale entries remained in the linked lists and were released later.
> - The patch fixes a a race in semtimedop(): if both IPC_RMID and a semget() that
>   recreates exactly the same id happen between find_alloc_undo() and sem_lock,
>   then semtimedop() would access already kfree'd memory.
> 
> Signed-Off-By: Manfred Spraul <manfred@colorfullife.com>

Reviewed-by: Nadia Derbey <Nadia.Derbey@bull.net>

2 comments embedded.


> ---
>  include/linux/sem.h |    6 ++-
>  ipc/sem.c           |  145 ++++++++++++++++++++++++++++++++-------------------
>  2 files changed, 96 insertions(+), 55 deletions(-)
> 
> diff --git a/include/linux/sem.h b/include/linux/sem.h
> index d425993..1b191c1 100644
> --- a/include/linux/sem.h
> +++ b/include/linux/sem.h
> @@ -78,6 +78,7 @@ struct  seminfo {
>  
>  #ifdef __KERNEL__
>  #include <asm/atomic.h>
> +#include <linux/rcupdate.h>
>  
>  struct task_struct;
>  
> @@ -114,7 +115,10 @@ struct sem_queue {
>   * when the process exits.
>   */
>  struct sem_undo {
> -	struct list_head	list_proc;	/* per-process list: all undos from one process */
> +	struct list_head	list_proc;	/* per-process list: all undos from one process. */
> +						/* rcu protected */
> +	struct rcu_head		rcu;		/* rcu struct for sem_undo() */
> +	struct sem_undo_list	*ulp;		/* sem_undo_list for the process */
>  	struct list_head	list_id;	/* per semaphore array list: all undos for one array */
>  	int			semid;		/* semaphore set identifier */
>  	short *			semadj;		/* array of adjustments, one per semaphore */
> diff --git a/ipc/sem.c b/ipc/sem.c
> index 38996c0..d0b2217 100644
> --- a/ipc/sem.c
> +++ b/ipc/sem.c
> @@ -502,27 +502,35 @@ static int count_semzcnt (struct sem_array * sma, ushort semnum)
>  	return semzcnt;
>  }
>  
> +void free_un(struct rcu_head *head)
> +{
> +	struct sem_undo *un = container_of(head, struct sem_undo, rcu);
> +	kfree(un);
> +}
> +
>  /* Free a semaphore set. freeary() is called with sem_ids.rw_mutex locked
>   * as a writer and the spinlock for this semaphore set hold. sem_ids.rw_mutex
>   * remains locked on exit.
>   */
>  static void freeary(struct ipc_namespace *ns, struct kern_ipc_perm *ipcp)
>  {
> -	struct sem_undo *un;
> -	struct sem_queue *q, *t;
> +	struct sem_undo *un, *tu;
> +	struct sem_queue *q, *tq;
>  	struct sem_array *sma = container_of(ipcp, struct sem_array, sem_perm);
>  
> -	/* Invalidate the existing undo structures for this semaphore set.
> -	 * (They will be freed without any further action in exit_sem()
> -	 * or during the next semop.)
> -	 */
> +	/* Free the existing undo structures for this semaphore set.  */
>  	assert_spin_locked(&sma->sem_perm.lock);
> -	list_for_each_entry(un, &sma->list_id, list_id)
> +	list_for_each_entry_safe(un, tu, &sma->list_id, list_id) {
> +		list_del(&un->list_id);
> +		spin_lock(&un->ulp->lock);
>  		un->semid = -1;
> +		list_del_rcu(&un->list_proc);
> +		spin_unlock(&un->ulp->lock);
> +		call_rcu(&un->rcu, free_un);
> +	}
>  
>  	/* Wake up all pending processes and let them fail with EIDRM. */
> -
> -	list_for_each_entry_safe(q, t, &sma->sem_pending, list) {
> +	list_for_each_entry_safe(q, tq, &sma->sem_pending, list) {
>  		list_del(&q->list);
>  
>  		q->status = IN_WAKEUP;
> @@ -946,16 +954,11 @@ static inline int get_undo_list(struct sem_undo_list **undo_listp)
>  
>  static struct sem_undo *lookup_undo(struct sem_undo_list *ulp, int semid)
>  {
> -	struct sem_undo *walk, *tmp;
> +	struct sem_undo *walk;
>  
> -	assert_spin_locked(&ulp->lock);
> -	list_for_each_entry_safe(walk, tmp, &ulp->list_proc, list_proc) {
> +	list_for_each_entry_rcu(walk, &ulp->list_proc, list_proc) {
>  		if(walk->semid==semid)
>  			return walk;
> -		if(walk->semid==-1) {
> -			list_del(&walk->list_proc);
> -			kfree(walk);
> -		}
>  	}
>  	return NULL;
>  }
> @@ -968,6 +971,8 @@ static struct sem_undo *lookup_undo(struct sem_undo_list *ulp, int semid)
>   * The function looks up (and if not present creates) the undo structure.
>   * The size of the undo structure depends on the size of the semaphore
>   * array, thus the alloc path is not that straightforward.
> + * Lifetime-rules: sem_undo is rcu-protected, on success, the function
> + * performs a rcu_read_lock().
>   */
>  static struct sem_undo *find_alloc_undo(struct ipc_namespace *ns, int semid)
>  {
> @@ -981,11 +986,13 @@ static struct sem_undo *find_alloc_undo(struct ipc_namespace *ns, int semid)
>  	if (error)
>  		return ERR_PTR(error);
>  
> +	rcu_read_lock();
>  	spin_lock(&ulp->lock);
>  	un = lookup_undo(ulp, semid);
>  	spin_unlock(&ulp->lock);

Why are we locking the sem_undo_list: in the lookup, we are traversing 
the proc_list that is rcu_protected.

>  	if (likely(un!=NULL))
>  		goto out;
> +	rcu_read_unlock();
>  
>  	/* no undo structure around - allocate one. */
>  	/* step 1: figure out the size of the semaphore array */
> @@ -1003,38 +1010,36 @@ static struct sem_undo *find_alloc_undo(struct ipc_namespace *ns, int semid)
>  		return ERR_PTR(-ENOMEM);
>  	}
>  
> -	/* step 3: Acquire the lock on the undo list pointer */
> -	spin_lock(&ulp->lock);
> -
> -	/* step 4: check for races: someone else allocated the undo struct,
> -	 *         semaphore array was destroyed.
> -	 */
> -	un = lookup_undo(ulp, semid);
> -	if (un) {
> -		spin_unlock(&ulp->lock);
> -		kfree(new);
> -		sem_putref(sma);
> -		goto out;
> -	}
> +	/* step 3: Acquire the lock on semaphore array */
>  	sem_lock_and_putref(sma);
>  	if (sma->sem_perm.deleted) {
>  		sem_unlock(sma);
> -		spin_unlock(&ulp->lock);
>  		kfree(new);
>  		un = ERR_PTR(-EIDRM);
>  		goto out;
>  	}
> +	spin_lock(&ulp->lock);
> +
> +	/* step 4: check for races: did someone else allocate the undo struct? */
> +	un = lookup_undo(ulp, semid);
> +	if (un) {
> +		kfree(new);
> +		goto success;
> +	}
>  	/* step 5: initialize & link new undo structure */
>  	new->semadj = (short *) &new[1];
> +	new->ulp = ulp;
>  	new->semid = semid;
>  	assert_spin_locked(&ulp->lock);
> -	list_add(&new->list_proc, &ulp->list_proc);
> +	list_add_rcu(&new->list_proc, &ulp->list_proc);
>  	assert_spin_locked(&sma->sem_perm.lock);
>  	list_add(&new->list_id, &sma->list_id);
> +	un = new;
>  
> -	sem_unlock(sma);
> +success:
>  	spin_unlock(&ulp->lock);
> -	un = new;
> +	rcu_read_lock();

Oh, I'm realizing that we should leave the routine with an rcu_read_lock?
Why not adding a comment everywhere find_alloc_undo() is called?

> +	sem_unlock(sma);
>  out:
>  	return un;
>  }
> @@ -1101,6 +1106,8 @@ asmlinkage long sys_semtimedop(int semid, struct sembuf __user *tsops,
>  
>  	sma = sem_lock_check(ns, semid);
>  	if (IS_ERR(sma)) {
> +		if (un)
> +			rcu_read_unlock();
>  		error = PTR_ERR(sma);
>  		goto out_free;
>  	}
> @@ -1109,10 +1116,26 @@ asmlinkage long sys_semtimedop(int semid, struct sembuf __user *tsops,
>  	 * semid identifiers are not unique - find_alloc_undo may have
>  	 * allocated an undo structure, it was invalidated by an RMID
>  	 * and now a new array with received the same id. Check and fail.
> +	 * This case can be detected checking un->semid. The existance of
> +	 * "un" itself is guaranteed by rcu.
>  	 */
>  	error = -EIDRM;
> -	if (un && un->semid == -1)
> -		goto out_unlock_free;
> +	if (un) {
> +		if(un->semid == -1) {
> +			rcu_read_unlock();
> +			goto out_unlock_free;
> +		} else {
> +			/*
> +			 * rcu lock can be released, "un" cannot disappear:
> +			 * - sem_lock is acquired, thus IPC_RMID is
> +			 *   impossible.
> +			 * - exit_sem is impossible, it always operates on
> +			 *   current (or a dead task).
> +			 */
> +			
> +			rcu_read_unlock();
> +		}
> +	}
>  
>  	error = -EFBIG;
>  	if (max >= sma->sem_nsems)
> @@ -1240,7 +1263,6 @@ int copy_semundo(unsigned long clone_flags, struct task_struct *tsk)
>  void exit_sem(struct task_struct *tsk)
>  {
>  	struct sem_undo_list *ulp;
> -	struct sem_undo *un, *tmp;
>  
>  	ulp= tsk->sysvsem.undo_list;
>  	if (!ulp)
> @@ -1250,28 +1272,47 @@ void exit_sem(struct task_struct *tsk)
>  	if (!atomic_dec_and_test(&ulp->refcnt))
>  		return;
>  
> -	spin_lock(&ulp->lock);
> -
> -	list_for_each_entry_safe(un, tmp, &ulp->list_proc, list_proc) {
> +	for (;;) {
>    		struct sem_array *sma;
> +		struct sem_undo *un;
> +		int semid;
>  		int i;
>  
> -		if(un->semid == -1)
> -			goto free;
> +		rcu_read_lock();
> +		un =list_entry(rcu_dereference(ulp->list_proc.next),
> +					struct sem_undo, list_proc);
> +		if (&un->list_proc == &ulp->list_proc)
> +			semid = -1;
> +		 else
> +			semid = un->semid;
> +		rcu_read_unlock();
>  
> -		sma = sem_lock(tsk->nsproxy->ipc_ns, un->semid);
> -		if (IS_ERR(sma))
> -			goto free;
> +		if(semid == -1)
> +			break;
>  
> -		if (un->semid == -1)
> -			goto unlock_free;
> +		sma = sem_lock_check(tsk->nsproxy->ipc_ns, un->semid);
>  
> -		BUG_ON(sem_checkid(sma, un->semid));
> +		/* exit_sem raced with IPC_RMID, nothing to do */
> +		if (IS_ERR(sma))
> +			continue;
> +
> +		un = lookup_undo(ulp, semid);
> +		if (un == NULL) {
> +			/* exit_sem raced with IPC_RMID+semget() that created
> +			 * exactly the same semid. Nothing to do.
> +			 */
> +			sem_unlock(sma);
> +			continue;
> +		}
>  
> -		/* remove un from sma->list_id */
> +		/* remove un from the linked lists */
>  		assert_spin_locked(&sma->sem_perm.lock);
>  		list_del(&un->list_id);
>  
> +		spin_lock(&ulp->lock);
> +		list_del_rcu(&un->list_proc);
> +		spin_unlock(&ulp->lock);
> +
>  		/* perform adjustments registered in un */
>  		for (i = 0; i < sma->sem_nsems; i++) {
>  			struct sem * semaphore = &sma->sem_base[i];
> @@ -1300,14 +1341,10 @@ void exit_sem(struct task_struct *tsk)
>  		sma->sem_otime = get_seconds();
>  		/* maybe some queued-up processes were waiting for this */
>  		update_queue(sma);
> -unlock_free:
>  		sem_unlock(sma);
> -free:
> -		assert_spin_locked(&ulp->lock);
> -		list_del(&un->list_proc);
> -		kfree(un);
> +
> +		call_rcu(&un->rcu, free_un);
>  	}
> -	spin_unlock(&ulp->lock);
>  	kfree(ulp);
>  }
>  

Regards,
Nadia


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2008-05-30  9:04 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-05-24 16:06 [PATCH 4/4] ipc/sem.c: rewrite undo list locking Manfred Spraul
2008-05-30  9:04 ` Nadia Derbey

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox