Blame view
ipc/msgutil.c
3.67 KB
1da177e4c
|
1 |
/* |
f30c22695
|
2 |
* linux/ipc/msgutil.c |
1da177e4c
|
3 4 5 6 7 8 9 10 11 12 13 14 15 |
* Copyright (C) 1999, 2004 Manfred Spraul * * This file is released under GNU General Public Licence version 2 or * (at your option) any later version. * * See the file COPYING for more details. */ #include <linux/spinlock.h> #include <linux/init.h> #include <linux/security.h> #include <linux/slab.h> #include <linux/ipc.h> |
404015308
|
16 |
#include <linux/msg.h> |
614b84cf4
|
17 |
#include <linux/ipc_namespace.h> |
404015308
|
18 |
#include <linux/utsname.h> |
0bb80f240
|
19 |
#include <linux/proc_ns.h> |
1e3c941c5
|
20 |
#include <linux/uaccess.h> |
d6a2946a8
|
21 |
#include <linux/sched.h> |
1da177e4c
|
22 23 |
#include "util.h" |
7eafd7c74
|
24 |
DEFINE_SPINLOCK(mq_lock); |
614b84cf4
|
25 26 27 28 29 30 |
/* * The next 2 defines are here bc this is the only file * compiled when either CONFIG_SYSVIPC and CONFIG_POSIX_MQUEUE * and not CONFIG_IPC_NS. */ struct ipc_namespace init_ipc_ns = { |
a2e0602c3
|
31 |
.count = REFCOUNT_INIT(1), |
b515498f5
|
32 |
.user_ns = &init_user_ns, |
435d5f4bb
|
33 |
.ns.inum = PROC_IPC_INIT_INO, |
33c429405
|
34 35 36 |
#ifdef CONFIG_IPC_NS .ns.ops = &ipcns_operations, #endif |
614b84cf4
|
37 |
}; |
1da177e4c
|
38 |
struct msg_msgseg { |
1e3c941c5
|
39 |
struct msg_msgseg *next; |
1da177e4c
|
40 41 |
/* the next part of the message follows immediately */ }; |
4e9b45a19
|
42 43 |
#define DATALEN_MSG ((size_t)PAGE_SIZE-sizeof(struct msg_msg)) #define DATALEN_SEG ((size_t)PAGE_SIZE-sizeof(struct msg_msgseg)) |
1da177e4c
|
44 |
|
be5f4b335
|
45 |
|
4e9b45a19
|
46 |
static struct msg_msg *alloc_msg(size_t len) |
1da177e4c
|
47 48 49 |
{ struct msg_msg *msg; struct msg_msgseg **pseg; |
4e9b45a19
|
50 |
size_t alen; |
1da177e4c
|
51 |
|
3d8fa456d
|
52 |
alen = min(len, DATALEN_MSG); |
8c8d4d452
|
53 |
msg = kmalloc(sizeof(*msg) + alen, GFP_KERNEL_ACCOUNT); |
1da177e4c
|
54 |
if (msg == NULL) |
be5f4b335
|
55 |
return NULL; |
1da177e4c
|
56 57 58 |
msg->next = NULL; msg->security = NULL; |
be5f4b335
|
59 60 61 62 |
len -= alen; pseg = &msg->next; while (len > 0) { struct msg_msgseg *seg; |
d6a2946a8
|
63 64 |
cond_resched(); |
be5f4b335
|
65 |
alen = min(len, DATALEN_SEG); |
8c8d4d452
|
66 |
seg = kmalloc(sizeof(*seg) + alen, GFP_KERNEL_ACCOUNT); |
be5f4b335
|
67 68 69 70 71 72 73 74 75 76 77 78 79 80 |
if (seg == NULL) goto out_err; *pseg = seg; seg->next = NULL; pseg = &seg->next; len -= alen; } return msg; out_err: free_msg(msg); return NULL; } |
4e9b45a19
|
81 |
struct msg_msg *load_msg(const void __user *src, size_t len) |
be5f4b335
|
82 83 84 |
{ struct msg_msg *msg; struct msg_msgseg *seg; |
2b3097a29
|
85 |
int err = -EFAULT; |
4e9b45a19
|
86 |
size_t alen; |
be5f4b335
|
87 88 89 90 91 92 |
msg = alloc_msg(len); if (msg == NULL) return ERR_PTR(-ENOMEM); alen = min(len, DATALEN_MSG); |
2b3097a29
|
93 |
if (copy_from_user(msg + 1, src, alen)) |
1da177e4c
|
94 |
goto out_err; |
1da177e4c
|
95 |
|
da085d459
|
96 97 98 |
for (seg = msg->next; seg != NULL; seg = seg->next) { len -= alen; src = (char __user *)src + alen; |
3d8fa456d
|
99 |
alen = min(len, DATALEN_SEG); |
2b3097a29
|
100 |
if (copy_from_user(seg + 1, src, alen)) |
1da177e4c
|
101 |
goto out_err; |
1da177e4c
|
102 103 104 105 106 107 108 109 110 111 112 113 |
} err = security_msg_msg_alloc(msg); if (err) goto out_err; return msg; out_err: free_msg(msg); return ERR_PTR(err); } |
4a674f34b
|
114 115 116 117 |
#ifdef CONFIG_CHECKPOINT_RESTORE struct msg_msg *copy_msg(struct msg_msg *src, struct msg_msg *dst) { struct msg_msgseg *dst_pseg, *src_pseg; |
4e9b45a19
|
118 119 |
size_t len = src->m_ts; size_t alen; |
4a674f34b
|
120 |
|
4a674f34b
|
121 122 |
if (src->m_ts > dst->m_ts) return ERR_PTR(-EINVAL); |
3d8fa456d
|
123 |
alen = min(len, DATALEN_MSG); |
4a674f34b
|
124 |
memcpy(dst + 1, src + 1, alen); |
da085d459
|
125 126 127 128 129 |
for (dst_pseg = dst->next, src_pseg = src->next; src_pseg != NULL; dst_pseg = dst_pseg->next, src_pseg = src_pseg->next) { len -= alen; |
3d8fa456d
|
130 |
alen = min(len, DATALEN_SEG); |
4a674f34b
|
131 |
memcpy(dst_pseg + 1, src_pseg + 1, alen); |
4a674f34b
|
132 133 134 135 136 137 138 |
} dst->m_type = src->m_type; dst->m_ts = src->m_ts; return dst; } |
51eeacaa0
|
139 140 141 142 143 |
#else struct msg_msg *copy_msg(struct msg_msg *src, struct msg_msg *dst) { return ERR_PTR(-ENOSYS); } |
4a674f34b
|
144 |
#endif |
4e9b45a19
|
145 |
int store_msg(void __user *dest, struct msg_msg *msg, size_t len) |
1da177e4c
|
146 |
{ |
4e9b45a19
|
147 |
size_t alen; |
1da177e4c
|
148 |
struct msg_msgseg *seg; |
3d8fa456d
|
149 |
alen = min(len, DATALEN_MSG); |
1da177e4c
|
150 151 |
if (copy_to_user(dest, msg + 1, alen)) return -1; |
da085d459
|
152 153 154 |
for (seg = msg->next; seg != NULL; seg = seg->next) { len -= alen; dest = (char __user *)dest + alen; |
3d8fa456d
|
155 |
alen = min(len, DATALEN_SEG); |
1da177e4c
|
156 157 |
if (copy_to_user(dest, seg + 1, alen)) return -1; |
1da177e4c
|
158 159 160 161 162 163 164 165 166 167 168 169 170 171 |
} return 0; } void free_msg(struct msg_msg *msg) { struct msg_msgseg *seg; security_msg_msg_free(msg); seg = msg->next; kfree(msg); while (seg != NULL) { struct msg_msgseg *tmp = seg->next; |
d6a2946a8
|
172 173 |
cond_resched(); |
1da177e4c
|
174 175 176 177 |
kfree(seg); seg = tmp; } } |