blob: 0fcf8e719b7647fe7e59141c153b2485c95c4399 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * linux/ipc/util.h
4 * Copyright (C) 1999 Christoph Rohland
5 *
Christian Kujau624dffc2006-01-15 02:43:54 +01006 * ipc helper functions (c) 1999 Manfred Spraul <manfred@colorfullife.com>
Kirill Korotaev73ea4132006-10-02 02:18:20 -07007 * namespaces support. 2006 OpenVZ, SWsoft Inc.
8 * Pavel Emelianov <xemul@openvz.org>
Linus Torvalds1da177e2005-04-16 15:20:36 -07009 */
10
11#ifndef _IPC_UTIL_H
12#define _IPC_UTIL_H
13
Johannes Weiner232086b2009-06-20 02:23:29 +020014#include <linux/unistd.h>
Nadia Derbey023a5352007-10-18 23:40:51 -070015#include <linux/err.h>
Davidlohr Bueso15df03c82017-11-17 15:31:18 -080016#include <linux/ipc_namespace.h>
Nadia Derbey7ca7e562007-10-18 23:40:48 -070017
Waiman Long5ac893b2019-05-14 15:46:29 -070018/*
19 * The IPC ID contains 2 separate numbers - index and sequence number.
20 * By default,
21 * bits 0-14: index (32k, 15 bits)
22 * bits 15-30: sequence number (64k, 16 bits)
23 *
24 * When IPCMNI extension mode is turned on, the composition changes:
25 * bits 0-23: index (16M, 24 bits)
26 * bits 24-30: sequence number (128, 7 bits)
27 */
28#define IPCMNI_SHIFT 15
29#define IPCMNI_EXTEND_SHIFT 24
Manfred Spraul99db46e2019-05-14 15:46:36 -070030#define IPCMNI_EXTEND_MIN_CYCLE (RADIX_TREE_MAP_SIZE * RADIX_TREE_MAP_SIZE)
Waiman Long5ac893b2019-05-14 15:46:29 -070031#define IPCMNI (1 << IPCMNI_SHIFT)
32#define IPCMNI_EXTEND (1 << IPCMNI_EXTEND_SHIFT)
33
34#ifdef CONFIG_SYSVIPC_SYSCTL
35extern int ipc_mni;
36extern int ipc_mni_shift;
Manfred Spraul99db46e2019-05-14 15:46:36 -070037extern int ipc_min_cycle;
Waiman Long5ac893b2019-05-14 15:46:29 -070038
Manfred Spraul3278a2c2019-05-14 15:46:33 -070039#define ipcmni_seq_shift() ipc_mni_shift
Waiman Long5ac893b2019-05-14 15:46:29 -070040#define IPCMNI_IDX_MASK ((1 << ipc_mni_shift) - 1)
41
42#else /* CONFIG_SYSVIPC_SYSCTL */
43
44#define ipc_mni IPCMNI
Manfred Spraul99db46e2019-05-14 15:46:36 -070045#define ipc_min_cycle ((int)RADIX_TREE_MAP_SIZE)
Manfred Spraul3278a2c2019-05-14 15:46:33 -070046#define ipcmni_seq_shift() IPCMNI_SHIFT
Waiman Long5ac893b2019-05-14 15:46:29 -070047#define IPCMNI_IDX_MASK ((1 << IPCMNI_SHIFT) - 1)
48#endif /* CONFIG_SYSVIPC_SYSCTL */
Linus Torvalds1da177e2005-04-16 15:20:36 -070049
Davidlohr Buesoeae04d22018-08-21 22:01:56 -070050void sem_init(void);
51void msg_init(void);
Manfred Spraul239521f2014-01-27 17:07:04 -080052void shm_init(void);
Linus Torvalds1da177e2005-04-16 15:20:36 -070053
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -080054struct ipc_namespace;
Eric W. Biederman03f1fc02018-03-23 00:22:05 -050055struct pid_namespace;
Pavel Emelyanovae5e1b22008-02-08 04:18:22 -080056
Serge E. Hallyn614b84c2009-04-06 19:01:08 -070057#ifdef CONFIG_POSIX_MQUEUE
Serge E. Hallyn7eafd7c2009-04-06 19:01:10 -070058extern void mq_clear_sbinfo(struct ipc_namespace *ns);
59extern void mq_put_mnt(struct ipc_namespace *ns);
Serge E. Hallyn614b84c2009-04-06 19:01:08 -070060#else
Serge E. Hallyn7eafd7c2009-04-06 19:01:10 -070061static inline void mq_clear_sbinfo(struct ipc_namespace *ns) { }
62static inline void mq_put_mnt(struct ipc_namespace *ns) { }
Serge E. Hallyn614b84c2009-04-06 19:01:08 -070063#endif
64
65#ifdef CONFIG_SYSVIPC
Davidlohr Buesoeae04d22018-08-21 22:01:56 -070066void sem_init_ns(struct ipc_namespace *ns);
67void msg_init_ns(struct ipc_namespace *ns);
68void shm_init_ns(struct ipc_namespace *ns);
Kirill Korotaev73ea4132006-10-02 02:18:20 -070069
70void sem_exit_ns(struct ipc_namespace *ns);
71void msg_exit_ns(struct ipc_namespace *ns);
72void shm_exit_ns(struct ipc_namespace *ns);
Serge E. Hallyn614b84c2009-04-06 19:01:08 -070073#else
Davidlohr Buesoeae04d22018-08-21 22:01:56 -070074static inline void sem_init_ns(struct ipc_namespace *ns) { }
75static inline void msg_init_ns(struct ipc_namespace *ns) { }
76static inline void shm_init_ns(struct ipc_namespace *ns) { }
Serge E. Hallyn614b84c2009-04-06 19:01:08 -070077
78static inline void sem_exit_ns(struct ipc_namespace *ns) { }
79static inline void msg_exit_ns(struct ipc_namespace *ns) { }
80static inline void shm_exit_ns(struct ipc_namespace *ns) { }
81#endif
Kirill Korotaev73ea4132006-10-02 02:18:20 -070082
Nadia Derbey7748dbf2007-10-18 23:40:49 -070083/*
84 * Structure that holds the parameters needed by the ipc operations
85 * (see after)
86 */
87struct ipc_params {
88 key_t key;
89 int flg;
90 union {
91 size_t size; /* for shared memories */
92 int nsems; /* for semaphores */
93 } u; /* holds the getnew() specific param */
94};
95
96/*
97 * Structure that holds some ipc operations. This structure is used to unify
98 * the calls to sys_msgget(), sys_semget(), sys_shmget()
99 * . routine to call to create a new ipc object. Can be one of newque,
100 * newary, newseg
Nadia Derbeyf4566f02007-10-18 23:40:53 -0700101 * . routine to call to check permissions for a new ipc object.
Nadia Derbey7748dbf2007-10-18 23:40:49 -0700102 * Can be one of security_msg_associate, security_sem_associate,
103 * security_shm_associate
104 * . routine to call for an extra check if needed
105 */
106struct ipc_ops {
Paul McQuade46c0a8c2014-06-06 14:37:37 -0700107 int (*getnew)(struct ipc_namespace *, struct ipc_params *);
108 int (*associate)(struct kern_ipc_perm *, int);
109 int (*more_checks)(struct kern_ipc_perm *, struct ipc_params *);
Nadia Derbey7748dbf2007-10-18 23:40:49 -0700110};
111
Mike Waychisonae781772005-09-06 15:17:09 -0700112struct seq_file;
Pierre Peiffered2ddbf2008-02-08 04:18:57 -0800113struct ipc_ids;
Cedric Le Goater7d69a1f2007-07-15 23:40:58 -0700114
Davidlohr Buesoeae04d22018-08-21 22:01:56 -0700115void ipc_init_ids(struct ipc_ids *ids);
Mike Waychisonae781772005-09-06 15:17:09 -0700116#ifdef CONFIG_PROC_FS
117void __init ipc_init_proc_interface(const char *path, const char *header,
Kirill Korotaev73ea4132006-10-02 02:18:20 -0700118 int ids, int (*show)(struct seq_file *, void *));
Eric W. Biederman03f1fc02018-03-23 00:22:05 -0500119struct pid_namespace *ipc_seq_pid_ns(struct seq_file *);
Mike Waychisonae781772005-09-06 15:17:09 -0700120#else
121#define ipc_init_proc_interface(path, header, ids, show) do {} while (0)
122#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700123
Kirill Korotaev73ea4132006-10-02 02:18:20 -0700124#define IPC_SEM_IDS 0
125#define IPC_MSG_IDS 1
126#define IPC_SHM_IDS 2
127
Waiman Long5ac893b2019-05-14 15:46:29 -0700128#define ipcid_to_idx(id) ((id) & IPCMNI_IDX_MASK)
Manfred Spraul3278a2c2019-05-14 15:46:33 -0700129#define ipcid_to_seqx(id) ((id) >> ipcmni_seq_shift())
130#define ipcid_seq_max() (INT_MAX >> ipcmni_seq_shift())
Nadia Derbeyce621f52007-10-18 23:40:52 -0700131
Davidlohr Buesod9a605e2013-09-11 14:26:24 -0700132/* must be called with ids->rwsem acquired for writing */
Nadia Derbey7ca7e562007-10-18 23:40:48 -0700133int ipc_addid(struct ipc_ids *, struct kern_ipc_perm *, int);
Nadia Derbey3e148c72007-10-18 23:40:54 -0700134
Linus Torvalds1da177e2005-04-16 15:20:36 -0700135/* must be called with both locks acquired. */
Nadia Derbey7ca7e562007-10-18 23:40:48 -0700136void ipc_rmid(struct ipc_ids *, struct kern_ipc_perm *);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700137
Guillaume Knispel0cfb6ae2017-09-08 16:17:55 -0700138/* must be called with both locks acquired. */
139void ipc_set_key_private(struct ipc_ids *, struct kern_ipc_perm *);
140
Nadia Derbeyf4566f02007-10-18 23:40:53 -0700141/* must be called with ipcp locked */
Serge E. Hallynb0e77592011-03-23 16:43:24 -0700142int ipcperms(struct ipc_namespace *ns, struct kern_ipc_perm *ipcp, short flg);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700143
Davidlohr Bueso15df03c82017-11-17 15:31:18 -0800144/**
Manfred Spraul27c331a2018-08-21 22:02:00 -0700145 * ipc_get_maxidx - get the highest assigned index
Davidlohr Bueso15df03c82017-11-17 15:31:18 -0800146 * @ids: ipc identifier set
147 *
148 * Called with ipc_ids.rwsem held for reading.
149 */
Manfred Spraul27c331a2018-08-21 22:02:00 -0700150static inline int ipc_get_maxidx(struct ipc_ids *ids)
Davidlohr Bueso15df03c82017-11-17 15:31:18 -0800151{
152 if (ids->in_use == 0)
153 return -1;
154
Waiman Long5ac893b2019-05-14 15:46:29 -0700155 if (ids->in_use == ipc_mni)
156 return ipc_mni - 1;
Davidlohr Bueso15df03c82017-11-17 15:31:18 -0800157
Manfred Spraul27c331a2018-08-21 22:02:00 -0700158 return ids->max_idx;
Davidlohr Bueso15df03c82017-11-17 15:31:18 -0800159}
160
Linus Torvalds1da177e2005-04-16 15:20:36 -0700161/*
162 * For allocation that need to be freed by RCU.
163 * Objects are reference counted, they start with reference count 1.
164 * getref increases the refcount, the putref call that reduces the recount
165 * to 0 schedules the rcu destruction. Caller must guarantee locking.
Manfred Spraul62b49c92017-07-12 14:35:34 -0700166 *
167 * refcount is initialized by ipc_addid(), before that point call_rcu()
168 * must be used.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700169 */
Manfred Spraul2a9d6482018-08-21 22:02:04 -0700170bool ipc_rcu_getref(struct kern_ipc_perm *ptr);
Manfred Sprauldba4cdd2017-07-12 14:34:41 -0700171void ipc_rcu_putref(struct kern_ipc_perm *ptr,
172 void (*func)(struct rcu_head *head));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700173
Davidlohr Bueso55b7ae52015-06-30 14:58:42 -0700174struct kern_ipc_perm *ipc_obtain_object_idr(struct ipc_ids *ids, int id);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700175
176void kernel_to_ipc64_perm(struct kern_ipc_perm *in, struct ipc64_perm *out);
177void ipc64_perm_to_ipc_perm(struct ipc64_perm *in, struct ipc_perm *out);
Eric W. Biederman1efdb692012-02-07 16:54:11 -0800178int ipc_update_perm(struct ipc64_perm *in, struct kern_ipc_perm *out);
Manfred Spraul4241c1a2018-08-21 22:01:34 -0700179struct kern_ipc_perm *ipcctl_obtain_check(struct ipc_namespace *ns,
Davidlohr Bueso444d0f62013-04-30 19:15:24 -0700180 struct ipc_ids *ids, int id, int cmd,
181 struct ipc64_perm *perm, int extra_perm);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700182
Eric W. Biederman03f1fc02018-03-23 00:22:05 -0500183static inline void ipc_update_pid(struct pid **pos, struct pid *pid)
184{
185 struct pid *old = *pos;
186 if (old != pid) {
187 *pos = get_pid(pid);
188 put_pid(old);
189 }
190}
191
Arnd Bergmann275f2212018-12-31 22:22:40 +0100192#ifdef CONFIG_ARCH_WANT_IPC_PARSE_VERSION
Manfred Spraul239521f2014-01-27 17:07:04 -0800193int ipc_parse_version(int *cmd);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700194#endif
195
196extern void free_msg(struct msg_msg *msg);
Mathias Krause4e9b45a2013-11-12 15:11:47 -0800197extern struct msg_msg *load_msg(const void __user *src, size_t len);
Stanislav Kinsbursky4a674f32013-01-04 15:34:55 -0800198extern struct msg_msg *copy_msg(struct msg_msg *src, struct msg_msg *dst);
Mathias Krause4e9b45a2013-11-12 15:11:47 -0800199extern int store_msg(void __user *dest, struct msg_msg *msg, size_t len);
Nadia Derbey7748dbf2007-10-18 23:40:49 -0700200
Manfred Spraul27c331a2018-08-21 22:02:00 -0700201static inline int ipc_checkid(struct kern_ipc_perm *ipcp, int id)
Nadia Derbey023a5352007-10-18 23:40:51 -0700202{
Manfred Spraul27c331a2018-08-21 22:02:00 -0700203 return ipcid_to_seqx(id) != ipcp->seq;
Nadia Derbey023a5352007-10-18 23:40:51 -0700204}
205
Davidlohr Bueso1ca70032013-07-08 16:01:10 -0700206static inline void ipc_lock_object(struct kern_ipc_perm *perm)
207{
208 spin_lock(&perm->lock);
209}
210
211static inline void ipc_unlock_object(struct kern_ipc_perm *perm)
212{
213 spin_unlock(&perm->lock);
214}
215
216static inline void ipc_assert_locked_object(struct kern_ipc_perm *perm)
217{
218 assert_spin_locked(&perm->lock);
219}
220
Nadia Derbey023a5352007-10-18 23:40:51 -0700221static inline void ipc_unlock(struct kern_ipc_perm *perm)
222{
Davidlohr Buesocf9d5d72013-07-08 16:01:11 -0700223 ipc_unlock_object(perm);
Nadia Derbey023a5352007-10-18 23:40:51 -0700224 rcu_read_unlock();
225}
226
Rafael Aquini0f3d2b02014-01-27 17:07:01 -0800227/*
228 * ipc_valid_object() - helper to sort out IPC_RMID races for codepaths
229 * where the respective ipc_ids.rwsem is not being held down.
230 * Checks whether the ipc object is still around or if it's gone already, as
231 * ipc_rmid() may have already freed the ID while the ipc lock was spinning.
232 * Needs to be called with kern_ipc_perm.lock held -- exception made for one
233 * checkpoint case at sys_semtimedop() as noted in code commentary.
234 */
235static inline bool ipc_valid_object(struct kern_ipc_perm *perm)
236{
Rafael Aquini72a8ff22014-01-27 17:07:02 -0800237 return !perm->deleted;
Rafael Aquini0f3d2b02014-01-27 17:07:01 -0800238}
239
Davidlohr Bueso4d2bff52013-04-30 19:15:19 -0700240struct kern_ipc_perm *ipc_obtain_object_check(struct ipc_ids *ids, int id);
Pavel Emelyanovb2d75cd2008-02-08 04:18:54 -0800241int ipcget(struct ipc_namespace *ns, struct ipc_ids *ids,
Mathias Krauseeb66ec42014-06-06 14:37:36 -0700242 const struct ipc_ops *ops, struct ipc_params *params);
Alexey Dobriyan665c7742009-06-17 16:27:57 -0700243void free_ipcs(struct ipc_namespace *ns, struct ipc_ids *ids,
244 void (*free)(struct ipc_namespace *, struct kern_ipc_perm *));
Al Viro553f7702017-07-08 22:52:47 -0400245
Waiman Long8c81ddd2018-10-30 15:07:24 -0700246static inline int sem_check_semmni(struct ipc_namespace *ns) {
247 /*
Waiman Long5ac893b2019-05-14 15:46:29 -0700248 * Check semmni range [0, ipc_mni]
Waiman Long8c81ddd2018-10-30 15:07:24 -0700249 * semmni is the last element of sem_ctls[4] array
250 */
Waiman Long5ac893b2019-05-14 15:46:29 -0700251 return ((ns->sem_ctls[3] < 0) || (ns->sem_ctls[3] > ipc_mni))
Waiman Long8c81ddd2018-10-30 15:07:24 -0700252 ? -ERANGE : 0;
253}
254
Al Viro553f7702017-07-08 22:52:47 -0400255#ifdef CONFIG_COMPAT
256#include <linux/compat.h>
257struct compat_ipc_perm {
258 key_t key;
259 __compat_uid_t uid;
260 __compat_gid_t gid;
261 __compat_uid_t cuid;
262 __compat_gid_t cgid;
263 compat_mode_t mode;
264 unsigned short seq;
265};
266
Al Viroc0ebccb2017-07-09 10:03:23 -0400267void to_compat_ipc_perm(struct compat_ipc_perm *, struct ipc64_perm *);
268void to_compat_ipc64_perm(struct compat_ipc64_perm *, struct ipc64_perm *);
269int get_compat_ipc_perm(struct ipc64_perm *, struct compat_ipc_perm __user *);
270int get_compat_ipc64_perm(struct ipc64_perm *,
271 struct compat_ipc64_perm __user *);
272
Al Viro553f7702017-07-08 22:52:47 -0400273static inline int compat_ipc_parse_version(int *cmd)
274{
Al Viro553f7702017-07-08 22:52:47 -0400275 int version = *cmd & IPC_64;
276 *cmd &= ~IPC_64;
277 return version;
Al Viro553f7702017-07-08 22:52:47 -0400278}
279#endif
Dominik Brodowski41f4f0e2018-03-20 19:48:14 +0100280
281/* for __ARCH_WANT_SYS_IPC */
282long ksys_semtimedop(int semid, struct sembuf __user *tsops,
283 unsigned int nsops,
Arnd Bergmann21fc5382018-04-13 13:58:00 +0200284 const struct __kernel_timespec __user *timeout);
Dominik Brodowski69894712018-03-20 19:53:58 +0100285long ksys_semget(key_t key, int nsems, int semflg);
Arnd Bergmann275f2212018-12-31 22:22:40 +0100286long ksys_old_semctl(int semid, int semnum, int cmd, unsigned long arg);
Dominik Brodowski3d656612018-03-20 20:06:04 +0100287long ksys_msgget(key_t key, int msgflg);
Arnd Bergmann275f2212018-12-31 22:22:40 +0100288long ksys_old_msgctl(int msqid, int cmd, struct msqid_ds __user *buf);
Dominik Brodowski078faac2018-03-20 21:25:57 +0100289long ksys_msgrcv(int msqid, struct msgbuf __user *msgp, size_t msgsz,
290 long msgtyp, int msgflg);
Dominik Brodowski31c213f2018-03-20 21:29:00 +0100291long ksys_msgsnd(int msqid, struct msgbuf __user *msgp, size_t msgsz,
292 int msgflg);
Dominik Brodowski65749e02018-03-20 20:07:53 +0100293long ksys_shmget(key_t key, size_t size, int shmflg);
Dominik Brodowskida1e27442018-03-20 20:09:48 +0100294long ksys_shmdt(char __user *shmaddr);
Arnd Bergmann275f2212018-12-31 22:22:40 +0100295long ksys_old_shmctl(int shmid, int cmd, struct shmid_ds __user *buf);
Dominik Brodowski41f4f0e2018-03-20 19:48:14 +0100296
297/* for CONFIG_ARCH_WANT_OLD_COMPAT_IPC */
Dominik Brodowski41f4f0e2018-03-20 19:48:14 +0100298long compat_ksys_semtimedop(int semid, struct sembuf __user *tsems,
299 unsigned int nsops,
Arnd Bergmann9afc5ee2018-07-13 12:52:28 +0200300 const struct old_timespec32 __user *timeout);
Arnd Bergmannb0d17572018-04-13 13:58:23 +0200301#ifdef CONFIG_COMPAT
Arnd Bergmann275f2212018-12-31 22:22:40 +0100302long compat_ksys_old_semctl(int semid, int semnum, int cmd, int arg);
303long compat_ksys_old_msgctl(int msqid, int cmd, void __user *uptr);
Dominik Brodowski078faac2018-03-20 21:25:57 +0100304long compat_ksys_msgrcv(int msqid, compat_uptr_t msgp, compat_ssize_t msgsz,
305 compat_long_t msgtyp, int msgflg);
Dominik Brodowski31c213f2018-03-20 21:29:00 +0100306long compat_ksys_msgsnd(int msqid, compat_uptr_t msgp,
307 compat_ssize_t msgsz, int msgflg);
Arnd Bergmann275f2212018-12-31 22:22:40 +0100308long compat_ksys_old_shmctl(int shmid, int cmd, void __user *uptr);
Dominik Brodowski41f4f0e2018-03-20 19:48:14 +0100309#endif /* CONFIG_COMPAT */
310
Linus Torvalds1da177e2005-04-16 15:20:36 -0700311#endif