msgutil.c 3.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195
  1. // SPDX-License-Identifier: GPL-2.0-or-later
  2. /*
  3. * linux/ipc/msgutil.c
  4. * Copyright (C) 1999, 2004 Manfred Spraul
  5. */
  6. #include <linux/spinlock.h>
  7. #include <linux/init.h>
  8. #include <linux/security.h>
  9. #include <linux/slab.h>
  10. #include <linux/ipc.h>
  11. #include <linux/msg.h>
  12. #include <linux/ipc_namespace.h>
  13. #include <linux/utsname.h>
  14. #include <linux/proc_ns.h>
  15. #include <linux/uaccess.h>
  16. #include <linux/sched.h>
  17. #include "util.h"
  18. DEFINE_SPINLOCK(mq_lock);
  19. /*
  20. * The next 2 defines are here bc this is the only file
  21. * compiled when either CONFIG_SYSVIPC and CONFIG_POSIX_MQUEUE
  22. * and not CONFIG_IPC_NS.
  23. */
  24. struct ipc_namespace init_ipc_ns = {
  25. .ns.count = REFCOUNT_INIT(1),
  26. .user_ns = &init_user_ns,
  27. .ns.inum = PROC_IPC_INIT_INO,
  28. #ifdef CONFIG_IPC_NS
  29. .ns.ops = &ipcns_operations,
  30. #endif
  31. };
  32. struct msg_msgseg {
  33. struct msg_msgseg *next;
  34. /* the next part of the message follows immediately */
  35. };
  36. #define DATALEN_MSG ((size_t)PAGE_SIZE-sizeof(struct msg_msg))
  37. #define DATALEN_SEG ((size_t)PAGE_SIZE-sizeof(struct msg_msgseg))
  38. static kmem_buckets *msg_buckets __ro_after_init;
  39. static int __init init_msg_buckets(void)
  40. {
  41. msg_buckets = kmem_buckets_create("msg_msg", SLAB_ACCOUNT,
  42. sizeof(struct msg_msg),
  43. DATALEN_MSG, NULL);
  44. return 0;
  45. }
  46. subsys_initcall(init_msg_buckets);
  47. static struct msg_msg *alloc_msg(size_t len)
  48. {
  49. struct msg_msg *msg;
  50. struct msg_msgseg **pseg;
  51. size_t alen;
  52. alen = min(len, DATALEN_MSG);
  53. msg = kmem_buckets_alloc(msg_buckets, sizeof(*msg) + alen, GFP_KERNEL);
  54. if (msg == NULL)
  55. return NULL;
  56. msg->next = NULL;
  57. msg->security = NULL;
  58. len -= alen;
  59. pseg = &msg->next;
  60. while (len > 0) {
  61. struct msg_msgseg *seg;
  62. cond_resched();
  63. alen = min(len, DATALEN_SEG);
  64. seg = kmalloc(sizeof(*seg) + alen, GFP_KERNEL_ACCOUNT);
  65. if (seg == NULL)
  66. goto out_err;
  67. *pseg = seg;
  68. seg->next = NULL;
  69. pseg = &seg->next;
  70. len -= alen;
  71. }
  72. return msg;
  73. out_err:
  74. free_msg(msg);
  75. return NULL;
  76. }
  77. struct msg_msg *load_msg(const void __user *src, size_t len)
  78. {
  79. struct msg_msg *msg;
  80. struct msg_msgseg *seg;
  81. int err = -EFAULT;
  82. size_t alen;
  83. msg = alloc_msg(len);
  84. if (msg == NULL)
  85. return ERR_PTR(-ENOMEM);
  86. alen = min(len, DATALEN_MSG);
  87. if (copy_from_user(msg + 1, src, alen))
  88. goto out_err;
  89. for (seg = msg->next; seg != NULL; seg = seg->next) {
  90. len -= alen;
  91. src = (char __user *)src + alen;
  92. alen = min(len, DATALEN_SEG);
  93. if (copy_from_user(seg + 1, src, alen))
  94. goto out_err;
  95. }
  96. err = security_msg_msg_alloc(msg);
  97. if (err)
  98. goto out_err;
  99. return msg;
  100. out_err:
  101. free_msg(msg);
  102. return ERR_PTR(err);
  103. }
  104. #ifdef CONFIG_CHECKPOINT_RESTORE
  105. struct msg_msg *copy_msg(struct msg_msg *src, struct msg_msg *dst)
  106. {
  107. struct msg_msgseg *dst_pseg, *src_pseg;
  108. size_t len = src->m_ts;
  109. size_t alen;
  110. if (src->m_ts > dst->m_ts)
  111. return ERR_PTR(-EINVAL);
  112. alen = min(len, DATALEN_MSG);
  113. memcpy(dst + 1, src + 1, alen);
  114. for (dst_pseg = dst->next, src_pseg = src->next;
  115. src_pseg != NULL;
  116. dst_pseg = dst_pseg->next, src_pseg = src_pseg->next) {
  117. len -= alen;
  118. alen = min(len, DATALEN_SEG);
  119. memcpy(dst_pseg + 1, src_pseg + 1, alen);
  120. }
  121. dst->m_type = src->m_type;
  122. dst->m_ts = src->m_ts;
  123. return dst;
  124. }
  125. #else
  126. struct msg_msg *copy_msg(struct msg_msg *src, struct msg_msg *dst)
  127. {
  128. return ERR_PTR(-ENOSYS);
  129. }
  130. #endif
  131. int store_msg(void __user *dest, struct msg_msg *msg, size_t len)
  132. {
  133. size_t alen;
  134. struct msg_msgseg *seg;
  135. alen = min(len, DATALEN_MSG);
  136. if (copy_to_user(dest, msg + 1, alen))
  137. return -1;
  138. for (seg = msg->next; seg != NULL; seg = seg->next) {
  139. len -= alen;
  140. dest = (char __user *)dest + alen;
  141. alen = min(len, DATALEN_SEG);
  142. if (copy_to_user(dest, seg + 1, alen))
  143. return -1;
  144. }
  145. return 0;
  146. }
  147. void free_msg(struct msg_msg *msg)
  148. {
  149. struct msg_msgseg *seg;
  150. security_msg_msg_free(msg);
  151. seg = msg->next;
  152. kfree(msg);
  153. while (seg != NULL) {
  154. struct msg_msgseg *tmp = seg->next;
  155. cond_resched();
  156. kfree(seg);
  157. seg = tmp;
  158. }
  159. }