]> git.ipfire.org Git - thirdparty/kernel/stable.git/blame - ipc/msgutil.c
treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 464
[thirdparty/kernel/stable.git] / ipc / msgutil.c
CommitLineData
8e8ccf43 1// SPDX-License-Identifier: GPL-2.0-or-later
1da177e4 2/*
f30c2269 3 * linux/ipc/msgutil.c
1da177e4 4 * Copyright (C) 1999, 2004 Manfred Spraul
1da177e4
LT
5 */
6
7#include <linux/spinlock.h>
8#include <linux/init.h>
9#include <linux/security.h>
10#include <linux/slab.h>
11#include <linux/ipc.h>
40401530 12#include <linux/msg.h>
614b84cf 13#include <linux/ipc_namespace.h>
40401530 14#include <linux/utsname.h>
0bb80f24 15#include <linux/proc_ns.h>
1e3c941c 16#include <linux/uaccess.h>
d6a2946a 17#include <linux/sched.h>
1da177e4
LT
18
19#include "util.h"
20
7eafd7c7
SH
21DEFINE_SPINLOCK(mq_lock);
22
614b84cf
SH
23/*
24 * The next 2 defines are here bc this is the only file
25 * compiled when either CONFIG_SYSVIPC and CONFIG_POSIX_MQUEUE
26 * and not CONFIG_IPC_NS.
27 */
28struct ipc_namespace init_ipc_ns = {
a2e0602c 29 .count = REFCOUNT_INIT(1),
b515498f 30 .user_ns = &init_user_ns,
435d5f4b 31 .ns.inum = PROC_IPC_INIT_INO,
33c42940
AV
32#ifdef CONFIG_IPC_NS
33 .ns.ops = &ipcns_operations,
34#endif
614b84cf
SH
35};
36
1da177e4 37struct msg_msgseg {
1e3c941c 38 struct msg_msgseg *next;
1da177e4
LT
39 /* the next part of the message follows immediately */
40};
41
4e9b45a1
MK
42#define DATALEN_MSG ((size_t)PAGE_SIZE-sizeof(struct msg_msg))
43#define DATALEN_SEG ((size_t)PAGE_SIZE-sizeof(struct msg_msgseg))
1da177e4 44
be5f4b33 45
4e9b45a1 46static struct msg_msg *alloc_msg(size_t len)
1da177e4
LT
47{
48 struct msg_msg *msg;
49 struct msg_msgseg **pseg;
4e9b45a1 50 size_t alen;
1da177e4 51
3d8fa456 52 alen = min(len, DATALEN_MSG);
8c8d4d45 53 msg = kmalloc(sizeof(*msg) + alen, GFP_KERNEL_ACCOUNT);
1da177e4 54 if (msg == NULL)
be5f4b33 55 return NULL;
1da177e4
LT
56
57 msg->next = NULL;
58 msg->security = NULL;
59
be5f4b33
PH
60 len -= alen;
61 pseg = &msg->next;
62 while (len > 0) {
63 struct msg_msgseg *seg;
d6a2946a
LR
64
65 cond_resched();
66
be5f4b33 67 alen = min(len, DATALEN_SEG);
8c8d4d45 68 seg = kmalloc(sizeof(*seg) + alen, GFP_KERNEL_ACCOUNT);
be5f4b33
PH
69 if (seg == NULL)
70 goto out_err;
71 *pseg = seg;
72 seg->next = NULL;
73 pseg = &seg->next;
74 len -= alen;
75 }
76
77 return msg;
78
79out_err:
80 free_msg(msg);
81 return NULL;
82}
83
4e9b45a1 84struct msg_msg *load_msg(const void __user *src, size_t len)
be5f4b33
PH
85{
86 struct msg_msg *msg;
87 struct msg_msgseg *seg;
2b3097a2 88 int err = -EFAULT;
4e9b45a1 89 size_t alen;
be5f4b33
PH
90
91 msg = alloc_msg(len);
92 if (msg == NULL)
93 return ERR_PTR(-ENOMEM);
94
95 alen = min(len, DATALEN_MSG);
2b3097a2 96 if (copy_from_user(msg + 1, src, alen))
1da177e4 97 goto out_err;
1da177e4 98
da085d45
PH
99 for (seg = msg->next; seg != NULL; seg = seg->next) {
100 len -= alen;
101 src = (char __user *)src + alen;
3d8fa456 102 alen = min(len, DATALEN_SEG);
2b3097a2 103 if (copy_from_user(seg + 1, src, alen))
1da177e4 104 goto out_err;
1da177e4
LT
105 }
106
107 err = security_msg_msg_alloc(msg);
108 if (err)
109 goto out_err;
110
111 return msg;
112
113out_err:
114 free_msg(msg);
115 return ERR_PTR(err);
116}
4a674f34
SK
117#ifdef CONFIG_CHECKPOINT_RESTORE
118struct msg_msg *copy_msg(struct msg_msg *src, struct msg_msg *dst)
119{
120 struct msg_msgseg *dst_pseg, *src_pseg;
4e9b45a1
MK
121 size_t len = src->m_ts;
122 size_t alen;
4a674f34 123
4a674f34
SK
124 if (src->m_ts > dst->m_ts)
125 return ERR_PTR(-EINVAL);
126
3d8fa456 127 alen = min(len, DATALEN_MSG);
4a674f34
SK
128 memcpy(dst + 1, src + 1, alen);
129
da085d45
PH
130 for (dst_pseg = dst->next, src_pseg = src->next;
131 src_pseg != NULL;
132 dst_pseg = dst_pseg->next, src_pseg = src_pseg->next) {
133
134 len -= alen;
3d8fa456 135 alen = min(len, DATALEN_SEG);
4a674f34 136 memcpy(dst_pseg + 1, src_pseg + 1, alen);
4a674f34
SK
137 }
138
139 dst->m_type = src->m_type;
140 dst->m_ts = src->m_ts;
141
142 return dst;
143}
51eeacaa
SK
144#else
145struct msg_msg *copy_msg(struct msg_msg *src, struct msg_msg *dst)
146{
147 return ERR_PTR(-ENOSYS);
148}
4a674f34 149#endif
4e9b45a1 150int store_msg(void __user *dest, struct msg_msg *msg, size_t len)
1da177e4 151{
4e9b45a1 152 size_t alen;
1da177e4
LT
153 struct msg_msgseg *seg;
154
3d8fa456 155 alen = min(len, DATALEN_MSG);
1da177e4
LT
156 if (copy_to_user(dest, msg + 1, alen))
157 return -1;
158
da085d45
PH
159 for (seg = msg->next; seg != NULL; seg = seg->next) {
160 len -= alen;
161 dest = (char __user *)dest + alen;
3d8fa456 162 alen = min(len, DATALEN_SEG);
1da177e4
LT
163 if (copy_to_user(dest, seg + 1, alen))
164 return -1;
1da177e4
LT
165 }
166 return 0;
167}
168
169void free_msg(struct msg_msg *msg)
170{
171 struct msg_msgseg *seg;
172
173 security_msg_msg_free(msg);
174
175 seg = msg->next;
176 kfree(msg);
177 while (seg != NULL) {
178 struct msg_msgseg *tmp = seg->next;
d6a2946a
LR
179
180 cond_resched();
1da177e4
LT
181 kfree(seg);
182 seg = tmp;
183 }
184}