Blame view

ipc/namespace.c 4.26 KB
ae5e1b22f   Pavel Emelyanov   namespaces: move ...
1
2
3
4
5
6
7
8
9
10
11
  /*
   * linux/ipc/namespace.c
   * Copyright (C) 2006 Pavel Emelyanov <xemul@openvz.org> OpenVZ, SWsoft Inc.
   */
  
  #include <linux/ipc.h>
  #include <linux/msg.h>
  #include <linux/ipc_namespace.h>
  #include <linux/rcupdate.h>
  #include <linux/nsproxy.h>
  #include <linux/slab.h>
7eafd7c74   Serge E. Hallyn   namespaces: ipc n...
12
13
  #include <linux/fs.h>
  #include <linux/mount.h>
b515498f5   Serge E. Hallyn   userns: add a use...
14
  #include <linux/user_namespace.h>
a00eaf11a   Eric W. Biederman   ns proc: Add supp...
15
  #include <linux/proc_fs.h>
ae5e1b22f   Pavel Emelyanov   namespaces: move ...
16
17
  
  #include "util.h"
b0e77598f   Serge E. Hallyn   userns: user name...
18
19
  static struct ipc_namespace *create_ipc_ns(struct task_struct *tsk,
  					   struct ipc_namespace *old_ns)
ae5e1b22f   Pavel Emelyanov   namespaces: move ...
20
  {
ae5e1b22f   Pavel Emelyanov   namespaces: move ...
21
  	struct ipc_namespace *ns;
7eafd7c74   Serge E. Hallyn   namespaces: ipc n...
22
  	int err;
ae5e1b22f   Pavel Emelyanov   namespaces: move ...
23

ae5e1b22f   Pavel Emelyanov   namespaces: move ...
24
25
  	ns = kmalloc(sizeof(struct ipc_namespace), GFP_KERNEL);
  	if (ns == NULL)
ed2ddbf88   Pierre Peiffer   IPC: make struct ...
26
  		return ERR_PTR(-ENOMEM);
ae5e1b22f   Pavel Emelyanov   namespaces: move ...
27

7eafd7c74   Serge E. Hallyn   namespaces: ipc n...
28
29
30
31
32
33
  	atomic_set(&ns->count, 1);
  	err = mq_init_ns(ns);
  	if (err) {
  		kfree(ns);
  		return ERR_PTR(err);
  	}
4d89dc6ab   Nadia Derbey   ipc: scale msgmni...
34
  	atomic_inc(&nr_ipc_ns);
ed2ddbf88   Pierre Peiffer   IPC: make struct ...
35
36
37
  	sem_init_ns(ns);
  	msg_init_ns(ns);
  	shm_init_ns(ns);
ae5e1b22f   Pavel Emelyanov   namespaces: move ...
38

e2c284d8a   Nadia Derbey   ipc: recompute ms...
39
40
41
42
43
44
  	/*
  	 * msgmni has already been computed for the new ipc ns.
  	 * Thus, do the ipcns creation notification before registering that
  	 * new ipcns in the chain.
  	 */
  	ipcns_notify(IPCNS_CREATED);
b6b337ad1   Nadia Derbey   ipc: recompute ms...
45
  	register_ipcns_notifier(ns);
b0e77598f   Serge E. Hallyn   userns: user name...
46
  	ns->user_ns = get_user_ns(task_cred_xxx(tsk, user)->user_ns);
b515498f5   Serge E. Hallyn   userns: add a use...
47

ae5e1b22f   Pavel Emelyanov   namespaces: move ...
48
  	return ns;
ae5e1b22f   Pavel Emelyanov   namespaces: move ...
49
  }
b0e77598f   Serge E. Hallyn   userns: user name...
50
51
  struct ipc_namespace *copy_ipcs(unsigned long flags,
  				struct task_struct *tsk)
ae5e1b22f   Pavel Emelyanov   namespaces: move ...
52
  {
b0e77598f   Serge E. Hallyn   userns: user name...
53
  	struct ipc_namespace *ns = tsk->nsproxy->ipc_ns;
ae5e1b22f   Pavel Emelyanov   namespaces: move ...
54
  	if (!(flags & CLONE_NEWIPC))
64424289d   Alexey Dobriyan   ipcns: remove use...
55
  		return get_ipc_ns(ns);
b0e77598f   Serge E. Hallyn   userns: user name...
56
  	return create_ipc_ns(tsk, ns);
ae5e1b22f   Pavel Emelyanov   namespaces: move ...
57
  }
01b8b07a5   Pierre Peiffer   IPC: consolidate ...
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
  /*
   * free_ipcs - free all ipcs of one type
   * @ns:   the namespace to remove the ipcs from
   * @ids:  the table of ipcs to free
   * @free: the function called to free each individual ipc
   *
   * Called for each kind of ipc when an ipc_namespace exits.
   */
  void free_ipcs(struct ipc_namespace *ns, struct ipc_ids *ids,
  	       void (*free)(struct ipc_namespace *, struct kern_ipc_perm *))
  {
  	struct kern_ipc_perm *perm;
  	int next_id;
  	int total, in_use;
  
  	down_write(&ids->rw_mutex);
  
  	in_use = ids->in_use;
  
  	for (total = 0, next_id = 0; total < in_use; next_id++) {
  		perm = idr_find(&ids->ipcs_idr, next_id);
  		if (perm == NULL)
  			continue;
  		ipc_lock_by_ptr(perm);
  		free(ns, perm);
  		total++;
  	}
  	up_write(&ids->rw_mutex);
  }
b4188def4   Alexey Dobriyan   ipcns: make free_...
87
88
89
90
91
92
93
94
95
96
97
98
99
100
  static void free_ipc_ns(struct ipc_namespace *ns)
  {
  	/*
  	 * Unregistering the hotplug notifier at the beginning guarantees
  	 * that the ipc namespace won't be freed while we are inside the
  	 * callback routine. Since the blocking_notifier_chain_XXX routines
  	 * hold a rw lock on the notifier list, unregister_ipcns_notifier()
  	 * won't take the rw lock before blocking_notifier_call_chain() has
  	 * released the rd lock.
  	 */
  	unregister_ipcns_notifier(ns);
  	sem_exit_ns(ns);
  	msg_exit_ns(ns);
  	shm_exit_ns(ns);
b4188def4   Alexey Dobriyan   ipcns: make free_...
101
102
103
104
105
106
107
  	atomic_dec(&nr_ipc_ns);
  
  	/*
  	 * Do the ipcns removal notification after decrementing nr_ipc_ns in
  	 * order to have a correct value when recomputing msgmni.
  	 */
  	ipcns_notify(IPCNS_REMOVED);
b515498f5   Serge E. Hallyn   userns: add a use...
108
  	put_user_ns(ns->user_ns);
be4d250ab   Xiaotian Feng   ipcns: fix use af...
109
  	kfree(ns);
b4188def4   Alexey Dobriyan   ipcns: make free_...
110
  }
7eafd7c74   Serge E. Hallyn   namespaces: ipc n...
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
  /*
   * put_ipc_ns - drop a reference to an ipc namespace.
   * @ns: the namespace to put
   *
   * If this is the last task in the namespace exiting, and
   * it is dropping the refcount to 0, then it can race with
   * a task in another ipc namespace but in a mounts namespace
   * which has this ipcns's mqueuefs mounted, doing some action
   * with one of the mqueuefs files.  That can raise the refcount.
   * So dropping the refcount, and raising the refcount when
   * accessing it through the VFS, are protected with mq_lock.
   *
   * (Clearly, a task raising the refcount on its own ipc_ns
   * needn't take mq_lock since it can't race with the last task
   * in the ipcns exiting).
   */
  void put_ipc_ns(struct ipc_namespace *ns)
ae5e1b22f   Pavel Emelyanov   namespaces: move ...
128
  {
7eafd7c74   Serge E. Hallyn   namespaces: ipc n...
129
130
131
132
133
134
135
  	if (atomic_dec_and_lock(&ns->count, &mq_lock)) {
  		mq_clear_sbinfo(ns);
  		spin_unlock(&mq_lock);
  		mq_put_mnt(ns);
  		free_ipc_ns(ns);
  	}
  }
a00eaf11a   Eric W. Biederman   ns proc: Add supp...
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
  
  static void *ipcns_get(struct task_struct *task)
  {
  	struct ipc_namespace *ns = NULL;
  	struct nsproxy *nsproxy;
  
  	rcu_read_lock();
  	nsproxy = task_nsproxy(task);
  	if (nsproxy)
  		ns = get_ipc_ns(nsproxy->ipc_ns);
  	rcu_read_unlock();
  
  	return ns;
  }
  
  static void ipcns_put(void *ns)
  {
  	return put_ipc_ns(ns);
  }
  
  static int ipcns_install(struct nsproxy *nsproxy, void *ns)
  {
  	/* Ditch state from the old ipc namespace */
  	exit_sem(current);
  	put_ipc_ns(nsproxy->ipc_ns);
  	nsproxy->ipc_ns = get_ipc_ns(ns);
  	return 0;
  }
  
  const struct proc_ns_operations ipcns_operations = {
  	.name		= "ipc",
  	.type		= CLONE_NEWIPC,
  	.get		= ipcns_get,
  	.put		= ipcns_put,
  	.install	= ipcns_install,
  };