blob: 959c10eb9cc112d4cac87efc5713d1a467797ef8 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * linux/ipc/util.h
4 * Copyright (C) 1999 Christoph Rohland
5 *
Christian Kujau624dffc2006-01-15 02:43:54 +01006 * ipc helper functions (c) 1999 Manfred Spraul <manfred@colorfullife.com>
Kirill Korotaev73ea4132006-10-02 02:18:20 -07007 * namespaces support. 2006 OpenVZ, SWsoft Inc.
8 * Pavel Emelianov <xemul@openvz.org>
Linus Torvalds1da177e2005-04-16 15:20:36 -07009 */
10
11#ifndef _IPC_UTIL_H
12#define _IPC_UTIL_H
13
Johannes Weiner232086b2009-06-20 02:23:29 +020014#include <linux/unistd.h>
Nadia Derbey023a5352007-10-18 23:40:51 -070015#include <linux/err.h>
Davidlohr Bueso15df03c2017-11-17 15:31:18 -080016#include <linux/ipc_namespace.h>
Nadia Derbey7ca7e562007-10-18 23:40:48 -070017
Eric W. Biedermanf83a3962018-03-22 21:45:50 -050018#define IPCMNI 32768 /* <= MAX_INT limit for ipc arrays (including sysctl changes) */
Linus Torvalds1da177e2005-04-16 15:20:36 -070019#define SEQ_MULTIPLIER (IPCMNI)
20
Guillaume Knispel0cfb6ae2017-09-08 16:17:55 -070021int sem_init(void);
22int msg_init(void);
Manfred Spraul239521f2014-01-27 17:07:04 -080023void shm_init(void);
Linus Torvalds1da177e2005-04-16 15:20:36 -070024
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -080025struct ipc_namespace;
26
Serge E. Hallyn614b84c2009-04-06 19:01:08 -070027#ifdef CONFIG_POSIX_MQUEUE
Serge E. Hallyn7eafd7c2009-04-06 19:01:10 -070028extern void mq_clear_sbinfo(struct ipc_namespace *ns);
29extern void mq_put_mnt(struct ipc_namespace *ns);
Serge E. Hallyn614b84c2009-04-06 19:01:08 -070030#else
Serge E. Hallyn7eafd7c2009-04-06 19:01:10 -070031static inline void mq_clear_sbinfo(struct ipc_namespace *ns) { }
32static inline void mq_put_mnt(struct ipc_namespace *ns) { }
Serge E. Hallyn614b84c2009-04-06 19:01:08 -070033#endif
34
35#ifdef CONFIG_SYSVIPC
Guillaume Knispel0cfb6ae2017-09-08 16:17:55 -070036int sem_init_ns(struct ipc_namespace *ns);
37int msg_init_ns(struct ipc_namespace *ns);
38int shm_init_ns(struct ipc_namespace *ns);
Kirill Korotaev73ea4132006-10-02 02:18:20 -070039
40void sem_exit_ns(struct ipc_namespace *ns);
41void msg_exit_ns(struct ipc_namespace *ns);
42void shm_exit_ns(struct ipc_namespace *ns);
Serge E. Hallyn614b84c2009-04-06 19:01:08 -070043#else
Guillaume Knispel0cfb6ae2017-09-08 16:17:55 -070044static inline int sem_init_ns(struct ipc_namespace *ns) { return 0; }
45static inline int msg_init_ns(struct ipc_namespace *ns) { return 0; }
46static inline int shm_init_ns(struct ipc_namespace *ns) { return 0; }
Serge E. Hallyn614b84c2009-04-06 19:01:08 -070047
48static inline void sem_exit_ns(struct ipc_namespace *ns) { }
49static inline void msg_exit_ns(struct ipc_namespace *ns) { }
50static inline void shm_exit_ns(struct ipc_namespace *ns) { }
51#endif
Kirill Korotaev73ea4132006-10-02 02:18:20 -070052
Nadia Derbey7748dbf2007-10-18 23:40:49 -070053/*
54 * Structure that holds the parameters needed by the ipc operations
55 * (see after)
56 */
57struct ipc_params {
58 key_t key;
59 int flg;
60 union {
61 size_t size; /* for shared memories */
62 int nsems; /* for semaphores */
63 } u; /* holds the getnew() specific param */
64};
65
66/*
67 * Structure that holds some ipc operations. This structure is used to unify
68 * the calls to sys_msgget(), sys_semget(), sys_shmget()
69 * . routine to call to create a new ipc object. Can be one of newque,
70 * newary, newseg
Nadia Derbeyf4566f02007-10-18 23:40:53 -070071 * . routine to call to check permissions for a new ipc object.
Nadia Derbey7748dbf2007-10-18 23:40:49 -070072 * Can be one of security_msg_associate, security_sem_associate,
73 * security_shm_associate
74 * . routine to call for an extra check if needed
75 */
76struct ipc_ops {
Paul McQuade46c0a8c2014-06-06 14:37:37 -070077 int (*getnew)(struct ipc_namespace *, struct ipc_params *);
78 int (*associate)(struct kern_ipc_perm *, int);
79 int (*more_checks)(struct kern_ipc_perm *, struct ipc_params *);
Nadia Derbey7748dbf2007-10-18 23:40:49 -070080};
81
Mike Waychisonae781772005-09-06 15:17:09 -070082struct seq_file;
Pierre Peiffered2ddbf2008-02-08 04:18:57 -080083struct ipc_ids;
Cedric Le Goater7d69a1f2007-07-15 23:40:58 -070084
Guillaume Knispel0cfb6ae2017-09-08 16:17:55 -070085int ipc_init_ids(struct ipc_ids *);
Mike Waychisonae781772005-09-06 15:17:09 -070086#ifdef CONFIG_PROC_FS
87void __init ipc_init_proc_interface(const char *path, const char *header,
Kirill Korotaev73ea4132006-10-02 02:18:20 -070088 int ids, int (*show)(struct seq_file *, void *));
Mike Waychisonae781772005-09-06 15:17:09 -070089#else
90#define ipc_init_proc_interface(path, header, ids, show) do {} while (0)
91#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -070092
Kirill Korotaev73ea4132006-10-02 02:18:20 -070093#define IPC_SEM_IDS 0
94#define IPC_MSG_IDS 1
95#define IPC_SHM_IDS 2
96
Nadia Derbeyce621f52007-10-18 23:40:52 -070097#define ipcid_to_idx(id) ((id) % SEQ_MULTIPLIER)
Stanislav Kinsbursky03f59562013-01-04 15:34:50 -080098#define ipcid_to_seqx(id) ((id) / SEQ_MULTIPLIER)
Davidlohr Buesodaf948c2014-01-27 17:07:09 -080099#define IPCID_SEQ_MAX min_t(int, INT_MAX/SEQ_MULTIPLIER, USHRT_MAX)
Nadia Derbeyce621f52007-10-18 23:40:52 -0700100
Davidlohr Buesod9a605e2013-09-11 14:26:24 -0700101/* must be called with ids->rwsem acquired for writing */
Nadia Derbey7ca7e562007-10-18 23:40:48 -0700102int ipc_addid(struct ipc_ids *, struct kern_ipc_perm *, int);
Nadia Derbey3e148c72007-10-18 23:40:54 -0700103
Linus Torvalds1da177e2005-04-16 15:20:36 -0700104/* must be called with both locks acquired. */
Nadia Derbey7ca7e562007-10-18 23:40:48 -0700105void ipc_rmid(struct ipc_ids *, struct kern_ipc_perm *);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700106
Guillaume Knispel0cfb6ae2017-09-08 16:17:55 -0700107/* must be called with both locks acquired. */
108void ipc_set_key_private(struct ipc_ids *, struct kern_ipc_perm *);
109
Nadia Derbeyf4566f02007-10-18 23:40:53 -0700110/* must be called with ipcp locked */
Serge E. Hallynb0e77592011-03-23 16:43:24 -0700111int ipcperms(struct ipc_namespace *ns, struct kern_ipc_perm *ipcp, short flg);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700112
Davidlohr Bueso15df03c2017-11-17 15:31:18 -0800113/**
114 * ipc_get_maxid - get the last assigned id
115 * @ids: ipc identifier set
116 *
117 * Called with ipc_ids.rwsem held for reading.
118 */
119static inline int ipc_get_maxid(struct ipc_ids *ids)
120{
121 if (ids->in_use == 0)
122 return -1;
123
124 if (ids->in_use == IPCMNI)
125 return IPCMNI - 1;
126
127 return ids->max_id;
128}
129
Linus Torvalds1da177e2005-04-16 15:20:36 -0700130/*
131 * For allocation that need to be freed by RCU.
132 * Objects are reference counted, they start with reference count 1.
133 * getref increases the refcount, the putref call that reduces the recount
134 * to 0 schedules the rcu destruction. Caller must guarantee locking.
Manfred Spraul62b49c92017-07-12 14:35:34 -0700135 *
136 * refcount is initialized by ipc_addid(), before that point call_rcu()
137 * must be used.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700138 */
Manfred Sprauldba4cdd2017-07-12 14:34:41 -0700139int ipc_rcu_getref(struct kern_ipc_perm *ptr);
140void ipc_rcu_putref(struct kern_ipc_perm *ptr,
141 void (*func)(struct rcu_head *head));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700142
Nadia Derbey023a5352007-10-18 23:40:51 -0700143struct kern_ipc_perm *ipc_lock(struct ipc_ids *, int);
Davidlohr Bueso55b7ae52015-06-30 14:58:42 -0700144struct kern_ipc_perm *ipc_obtain_object_idr(struct ipc_ids *ids, int id);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700145
146void kernel_to_ipc64_perm(struct kern_ipc_perm *in, struct ipc64_perm *out);
147void ipc64_perm_to_ipc_perm(struct ipc64_perm *in, struct ipc_perm *out);
Eric W. Biederman1efdb692012-02-07 16:54:11 -0800148int ipc_update_perm(struct ipc64_perm *in, struct kern_ipc_perm *out);
Davidlohr Bueso444d0f62013-04-30 19:15:24 -0700149struct kern_ipc_perm *ipcctl_pre_down_nolock(struct ipc_namespace *ns,
150 struct ipc_ids *ids, int id, int cmd,
151 struct ipc64_perm *perm, int extra_perm);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700152
Will Deaconc1d7e012012-07-30 14:42:46 -0700153#ifndef CONFIG_ARCH_WANT_IPC_PARSE_VERSION
Paul McQuade46c0a8c2014-06-06 14:37:37 -0700154/* On IA-64, we always use the "64-bit version" of the IPC structures. */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700155# define ipc_parse_version(cmd) IPC_64
156#else
Manfred Spraul239521f2014-01-27 17:07:04 -0800157int ipc_parse_version(int *cmd);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700158#endif
159
160extern void free_msg(struct msg_msg *msg);
Mathias Krause4e9b45a2013-11-12 15:11:47 -0800161extern struct msg_msg *load_msg(const void __user *src, size_t len);
Stanislav Kinsbursky4a674f32013-01-04 15:34:55 -0800162extern struct msg_msg *copy_msg(struct msg_msg *src, struct msg_msg *dst);
Mathias Krause4e9b45a2013-11-12 15:11:47 -0800163extern int store_msg(void __user *dest, struct msg_msg *msg, size_t len);
Nadia Derbey7748dbf2007-10-18 23:40:49 -0700164
Nadia Derbey1b531f22007-10-18 23:40:55 -0700165static inline int ipc_checkid(struct kern_ipc_perm *ipcp, int uid)
Nadia Derbey023a5352007-10-18 23:40:51 -0700166{
Davidlohr Bueso7bb4def2013-04-30 19:15:14 -0700167 return uid / SEQ_MULTIPLIER != ipcp->seq;
Nadia Derbey023a5352007-10-18 23:40:51 -0700168}
169
Davidlohr Bueso1ca70032013-07-08 16:01:10 -0700170static inline void ipc_lock_object(struct kern_ipc_perm *perm)
171{
172 spin_lock(&perm->lock);
173}
174
175static inline void ipc_unlock_object(struct kern_ipc_perm *perm)
176{
177 spin_unlock(&perm->lock);
178}
179
180static inline void ipc_assert_locked_object(struct kern_ipc_perm *perm)
181{
182 assert_spin_locked(&perm->lock);
183}
184
Nadia Derbey023a5352007-10-18 23:40:51 -0700185static inline void ipc_unlock(struct kern_ipc_perm *perm)
186{
Davidlohr Buesocf9d5d72013-07-08 16:01:11 -0700187 ipc_unlock_object(perm);
Nadia Derbey023a5352007-10-18 23:40:51 -0700188 rcu_read_unlock();
189}
190
Rafael Aquini0f3d2b02014-01-27 17:07:01 -0800191/*
192 * ipc_valid_object() - helper to sort out IPC_RMID races for codepaths
193 * where the respective ipc_ids.rwsem is not being held down.
194 * Checks whether the ipc object is still around or if it's gone already, as
195 * ipc_rmid() may have already freed the ID while the ipc lock was spinning.
196 * Needs to be called with kern_ipc_perm.lock held -- exception made for one
197 * checkpoint case at sys_semtimedop() as noted in code commentary.
198 */
199static inline bool ipc_valid_object(struct kern_ipc_perm *perm)
200{
Rafael Aquini72a8ff22014-01-27 17:07:02 -0800201 return !perm->deleted;
Rafael Aquini0f3d2b02014-01-27 17:07:01 -0800202}
203
Davidlohr Bueso4d2bff52013-04-30 19:15:19 -0700204struct kern_ipc_perm *ipc_obtain_object_check(struct ipc_ids *ids, int id);
Pavel Emelyanovb2d75cd2008-02-08 04:18:54 -0800205int ipcget(struct ipc_namespace *ns, struct ipc_ids *ids,
Mathias Krauseeb66ec42014-06-06 14:37:36 -0700206 const struct ipc_ops *ops, struct ipc_params *params);
Alexey Dobriyan665c7742009-06-17 16:27:57 -0700207void free_ipcs(struct ipc_namespace *ns, struct ipc_ids *ids,
208 void (*free)(struct ipc_namespace *, struct kern_ipc_perm *));
Al Viro553f7702017-07-08 22:52:47 -0400209
210#ifdef CONFIG_COMPAT
211#include <linux/compat.h>
212struct compat_ipc_perm {
213 key_t key;
214 __compat_uid_t uid;
215 __compat_gid_t gid;
216 __compat_uid_t cuid;
217 __compat_gid_t cgid;
218 compat_mode_t mode;
219 unsigned short seq;
220};
221
Al Viroc0ebccb2017-07-09 10:03:23 -0400222void to_compat_ipc_perm(struct compat_ipc_perm *, struct ipc64_perm *);
223void to_compat_ipc64_perm(struct compat_ipc64_perm *, struct ipc64_perm *);
224int get_compat_ipc_perm(struct ipc64_perm *, struct compat_ipc_perm __user *);
225int get_compat_ipc64_perm(struct ipc64_perm *,
226 struct compat_ipc64_perm __user *);
227
Al Viro553f7702017-07-08 22:52:47 -0400228static inline int compat_ipc_parse_version(int *cmd)
229{
230#ifdef CONFIG_ARCH_WANT_COMPAT_IPC_PARSE_VERSION
231 int version = *cmd & IPC_64;
232 *cmd &= ~IPC_64;
233 return version;
234#else
235 return IPC_64;
236#endif
237}
238#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700239#endif