1 // SPDX-License-Identifier: GPL-2.0-or-later
4 * Copyright (C) 1999, 2004 Manfred Spraul
7 #include <linux/spinlock.h>
8 #include <linux/init.h>
9 #include <linux/security.h>
10 #include <linux/slab.h>
11 #include <linux/ipc.h>
12 #include <linux/msg.h>
13 #include <linux/ipc_namespace.h>
14 #include <linux/utsname.h>
15 #include <linux/proc_ns.h>
16 #include <linux/uaccess.h>
17 #include <linux/sched.h>
21 DEFINE_SPINLOCK(mq_lock);
24 * The next 2 defines are here bc this is the only file
25 * compiled when either CONFIG_SYSVIPC and CONFIG_POSIX_MQUEUE
26 * and not CONFIG_IPC_NS.
28 struct ipc_namespace init_ipc_ns = {
29 .count = REFCOUNT_INIT(1),
30 .user_ns = &init_user_ns,
31 .ns.inum = PROC_IPC_INIT_INO,
33 .ns.ops = &ipcns_operations,
38 struct msg_msgseg *next;
39 /* the next part of the message follows immediately */
42 #define DATALEN_MSG ((size_t)PAGE_SIZE-sizeof(struct msg_msg))
43 #define DATALEN_SEG ((size_t)PAGE_SIZE-sizeof(struct msg_msgseg))
46 static struct msg_msg *alloc_msg(size_t len)
49 struct msg_msgseg **pseg;
52 alen = min(len, DATALEN_MSG);
53 msg = kmalloc(sizeof(*msg) + alen, GFP_KERNEL_ACCOUNT);
63 struct msg_msgseg *seg;
67 alen = min(len, DATALEN_SEG);
68 seg = kmalloc(sizeof(*seg) + alen, GFP_KERNEL_ACCOUNT);
84 struct msg_msg *load_msg(const void __user *src, size_t len)
87 struct msg_msgseg *seg;
93 return ERR_PTR(-ENOMEM);
95 alen = min(len, DATALEN_MSG);
96 if (copy_from_user(msg + 1, src, alen))
99 for (seg = msg->next; seg != NULL; seg = seg->next) {
101 src = (char __user *)src + alen;
102 alen = min(len, DATALEN_SEG);
103 if (copy_from_user(seg + 1, src, alen))
107 err = security_msg_msg_alloc(msg);
117 #ifdef CONFIG_CHECKPOINT_RESTORE
118 struct msg_msg *copy_msg(struct msg_msg *src, struct msg_msg *dst)
120 struct msg_msgseg *dst_pseg, *src_pseg;
121 size_t len = src->m_ts;
124 if (src->m_ts > dst->m_ts)
125 return ERR_PTR(-EINVAL);
127 alen = min(len, DATALEN_MSG);
128 memcpy(dst + 1, src + 1, alen);
130 for (dst_pseg = dst->next, src_pseg = src->next;
132 dst_pseg = dst_pseg->next, src_pseg = src_pseg->next) {
135 alen = min(len, DATALEN_SEG);
136 memcpy(dst_pseg + 1, src_pseg + 1, alen);
139 dst->m_type = src->m_type;
140 dst->m_ts = src->m_ts;
145 struct msg_msg *copy_msg(struct msg_msg *src, struct msg_msg *dst)
147 return ERR_PTR(-ENOSYS);
150 int store_msg(void __user *dest, struct msg_msg *msg, size_t len)
153 struct msg_msgseg *seg;
155 alen = min(len, DATALEN_MSG);
156 if (copy_to_user(dest, msg + 1, alen))
159 for (seg = msg->next; seg != NULL; seg = seg->next) {
161 dest = (char __user *)dest + alen;
162 alen = min(len, DATALEN_SEG);
163 if (copy_to_user(dest, seg + 1, alen))
169 void free_msg(struct msg_msg *msg)
171 struct msg_msgseg *seg;
173 security_msg_msg_free(msg);
177 while (seg != NULL) {
178 struct msg_msgseg *tmp = seg->next;