blob: 65327ee0936b314fe38fffee3ffb5f882d8883ac [file] [log] [blame]
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -08001#ifndef __IPC_NAMESPACE_H__
2#define __IPC_NAMESPACE_H__
3
4#include <linux/err.h>
Pierre Peiffered2ddbf2008-02-08 04:18:57 -08005#include <linux/idr.h>
6#include <linux/rwsem.h>
Nadia Derbeyb6b337a2008-04-29 01:00:42 -07007#include <linux/notifier.h>
Serge E. Hallynb0e77592011-03-23 16:43:24 -07008#include <linux/nsproxy.h>
Al Viro435d5f42014-10-31 22:56:04 -04009#include <linux/ns_common.h>
Nadia Derbeyb6b337a2008-04-29 01:00:42 -070010
Serge E. Hallynb5154982011-03-23 16:43:23 -070011struct user_namespace;
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -080012
Pierre Peiffered2ddbf2008-02-08 04:18:57 -080013struct ipc_ids {
14 int in_use;
15 unsigned short seq;
Davidlohr Buesod9a605e2013-09-11 14:26:24 -070016 struct rw_semaphore rwsem;
Pierre Peiffered2ddbf2008-02-08 04:18:57 -080017 struct idr ipcs_idr;
Stanislav Kinsbursky03f59562013-01-04 15:34:50 -080018 int next_id;
Pierre Peiffered2ddbf2008-02-08 04:18:57 -080019};
20
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -080021struct ipc_namespace {
Serge E. Hallyn7eafd7c2009-04-06 19:01:10 -070022 atomic_t count;
Pierre Peiffered2ddbf2008-02-08 04:18:57 -080023 struct ipc_ids ids[3];
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -080024
25 int sem_ctls[4];
26 int used_sems;
27
Mathias Krause9bf76ca2013-11-03 12:36:28 +010028 unsigned int msg_ctlmax;
29 unsigned int msg_ctlmnb;
30 unsigned int msg_ctlmni;
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -080031 atomic_t msg_bytes;
32 atomic_t msg_hdrs;
33
34 size_t shm_ctlmax;
35 size_t shm_ctlall;
Robin Holtd69f3ba2013-04-30 19:15:54 -070036 unsigned long shm_tot;
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -080037 int shm_ctlmni;
Vasiliy Kulikovb34a6b12011-07-26 16:08:48 -070038 /*
39 * Defines whether IPC_RMID is forced for _all_ shm segments regardless
40 * of shmctl()
41 */
42 int shm_rmid_forced;
Nadia Derbeyb6b337a2008-04-29 01:00:42 -070043
Nadia Derbeyb6b337a2008-04-29 01:00:42 -070044 struct notifier_block ipcns_nb;
Serge E. Hallyn614b84c2009-04-06 19:01:08 -070045
46 /* The kern_mount of the mqueuefs sb. We take a ref on it */
47 struct vfsmount *mq_mnt;
48
49 /* # queues in this ns, protected by mq_lock */
50 unsigned int mq_queues_count;
51
52 /* next fields are set through sysctl */
53 unsigned int mq_queues_max; /* initialized to DFLT_QUEUESMAX */
54 unsigned int mq_msg_max; /* initialized to DFLT_MSGMAX */
55 unsigned int mq_msgsize_max; /* initialized to DFLT_MSGSIZEMAX */
KOSAKI Motohirocef01842012-05-31 16:26:33 -070056 unsigned int mq_msg_default;
57 unsigned int mq_msgsize_default;
Serge E. Hallyn614b84c2009-04-06 19:01:08 -070058
Serge E. Hallynb5154982011-03-23 16:43:23 -070059 /* user_ns which owns the ipc ns */
60 struct user_namespace *user_ns;
Eric W. Biedermanaba35662016-08-08 14:20:23 -050061 struct ucounts *ucounts;
Eric W. Biederman98f842e2011-06-15 10:21:48 -070062
Al Viro435d5f42014-10-31 22:56:04 -040063 struct ns_common ns;
Kees Cook3859a272016-10-28 01:22:25 -070064} __randomize_layout;
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -080065
66extern struct ipc_namespace init_ipc_ns;
Serge E. Hallyn7eafd7c2009-04-06 19:01:10 -070067extern spinlock_t mq_lock;
Nadia Derbeyb6b337a2008-04-29 01:00:42 -070068
Serge E. Hallyn614b84c2009-04-06 19:01:08 -070069#ifdef CONFIG_SYSVIPC
Vasiliy Kulikovb34a6b12011-07-26 16:08:48 -070070extern void shm_destroy_orphaned(struct ipc_namespace *ns);
Nadia Derbeyb6b337a2008-04-29 01:00:42 -070071#else /* CONFIG_SYSVIPC */
Vasiliy Kulikovb34a6b12011-07-26 16:08:48 -070072static inline void shm_destroy_orphaned(struct ipc_namespace *ns) {}
Nadia Derbeyb6b337a2008-04-29 01:00:42 -070073#endif /* CONFIG_SYSVIPC */
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -080074
Serge E. Hallyn614b84c2009-04-06 19:01:08 -070075#ifdef CONFIG_POSIX_MQUEUE
Serge E. Hallyn7eafd7c2009-04-06 19:01:10 -070076extern int mq_init_ns(struct ipc_namespace *ns);
Doug Ledford5b5c4d12012-05-31 16:26:30 -070077/*
78 * POSIX Message Queue default values:
79 *
80 * MIN_*: Lowest value an admin can set the maximum unprivileged limit to
81 * DFLT_*MAX: Default values for the maximum unprivileged limits
82 * DFLT_{MSG,MSGSIZE}: Default values used when the user doesn't supply
83 * an attribute to the open call and the queue must be created
84 * HARD_*: Highest value the maximums can be set to. These are enforced
85 * on CAP_SYS_RESOURCE apps as well making them inviolate (so make them
86 * suitably high)
87 *
88 * POSIX Requirements:
89 * Per app minimum openable message queues - 8. This does not map well
90 * to the fact that we limit the number of queues on a per namespace
91 * basis instead of a per app basis. So, make the default high enough
92 * that no given app should have a hard time opening 8 queues.
93 * Minimum maximum for HARD_MSGMAX - 32767. I bumped this to 65536.
94 * Minimum maximum for HARD_MSGSIZEMAX - POSIX is silent on this. However,
95 * we have run into a situation where running applications in the wild
96 * require this to be at least 5MB, and preferably 10MB, so I set the
97 * value to 16MB in hopes that this user is the worst of the bunch and
98 * the new maximum will handle anyone else. I may have to revisit this
99 * in the future.
100 */
Doug Ledford5b5c4d12012-05-31 16:26:30 -0700101#define DFLT_QUEUESMAX 256
Doug Ledford5b5c4d12012-05-31 16:26:30 -0700102#define MIN_MSGMAX 1
KOSAKI Motohiroe6315bb2012-05-31 16:26:31 -0700103#define DFLT_MSG 10U
104#define DFLT_MSGMAX 10
Doug Ledford5b5c4d12012-05-31 16:26:30 -0700105#define HARD_MSGMAX 65536
106#define MIN_MSGSIZEMAX 128
107#define DFLT_MSGSIZE 8192U
KOSAKI Motohiroe6315bb2012-05-31 16:26:31 -0700108#define DFLT_MSGSIZEMAX 8192
Doug Ledford5b5c4d12012-05-31 16:26:30 -0700109#define HARD_MSGSIZEMAX (16*1024*1024)
Serge E. Hallyn614b84c2009-04-06 19:01:08 -0700110#else
Serge E. Hallyn7eafd7c2009-04-06 19:01:10 -0700111static inline int mq_init_ns(struct ipc_namespace *ns) { return 0; }
Serge E. Hallyn614b84c2009-04-06 19:01:08 -0700112#endif
113
114#if defined(CONFIG_IPC_NS)
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -0800115extern struct ipc_namespace *copy_ipcs(unsigned long flags,
Eric W. Biedermanbcf58e72012-07-26 04:02:49 -0700116 struct user_namespace *user_ns, struct ipc_namespace *ns);
117
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -0800118static inline struct ipc_namespace *get_ipc_ns(struct ipc_namespace *ns)
119{
120 if (ns)
Serge E. Hallyn7eafd7c2009-04-06 19:01:10 -0700121 atomic_inc(&ns->count);
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -0800122 return ns;
123}
124
Serge E. Hallyn7eafd7c2009-04-06 19:01:10 -0700125extern void put_ipc_ns(struct ipc_namespace *ns);
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -0800126#else
127static inline struct ipc_namespace *copy_ipcs(unsigned long flags,
Eric W. Biedermanbcf58e72012-07-26 04:02:49 -0700128 struct user_namespace *user_ns, struct ipc_namespace *ns)
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -0800129{
130 if (flags & CLONE_NEWIPC)
131 return ERR_PTR(-EINVAL);
132
Eric W. Biedermanbcf58e72012-07-26 04:02:49 -0700133 return ns;
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -0800134}
135
136static inline struct ipc_namespace *get_ipc_ns(struct ipc_namespace *ns)
137{
138 return ns;
139}
140
141static inline void put_ipc_ns(struct ipc_namespace *ns)
142{
143}
144#endif
Serge E. Hallynbdc8e5f2009-04-06 19:01:11 -0700145
146#ifdef CONFIG_POSIX_MQUEUE_SYSCTL
147
148struct ctl_table_header;
149extern struct ctl_table_header *mq_register_sysctl_table(void);
150
151#else /* CONFIG_POSIX_MQUEUE_SYSCTL */
152
153static inline struct ctl_table_header *mq_register_sysctl_table(void)
154{
155 return NULL;
156}
157
158#endif /* CONFIG_POSIX_MQUEUE_SYSCTL */
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -0800159#endif