msgutil.c 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149
  1. /*
  2. * linux/ipc/msgutil.c
  3. * Copyright (C) 1999, 2004 Manfred Spraul
  4. *
  5. * This file is released under GNU General Public Licence version 2 or
  6. * (at your option) any later version.
  7. *
  8. * See the file COPYING for more details.
  9. */
  10. #include <linux/spinlock.h>
  11. #include <linux/init.h>
  12. #include <linux/security.h>
  13. #include <linux/slab.h>
  14. #include <linux/ipc.h>
  15. #include <linux/ipc_namespace.h>
  16. #include <asm/uaccess.h>
  17. #include "util.h"
  18. /*
  19. * The next 2 defines are here bc this is the only file
  20. * compiled when either CONFIG_SYSVIPC and CONFIG_POSIX_MQUEUE
  21. * and not CONFIG_IPC_NS.
  22. */
  23. struct ipc_namespace init_ipc_ns = {
  24. .kref = {
  25. /* It's not for this patch to change, but should this be 1? */
  26. .refcount = ATOMIC_INIT(2),
  27. },
  28. #ifdef CONFIG_POSIX_MQUEUE
  29. .mq_mnt = NULL,
  30. .mq_queues_count = 0,
  31. .mq_queues_max = DFLT_QUEUESMAX,
  32. .mq_msg_max = DFLT_MSGMAX,
  33. .mq_msgsize_max = DFLT_MSGSIZEMAX,
  34. #endif
  35. };
  36. atomic_t nr_ipc_ns = ATOMIC_INIT(1);
  37. struct msg_msgseg {
  38. struct msg_msgseg* next;
  39. /* the next part of the message follows immediately */
  40. };
  41. #define DATALEN_MSG (PAGE_SIZE-sizeof(struct msg_msg))
  42. #define DATALEN_SEG (PAGE_SIZE-sizeof(struct msg_msgseg))
  43. struct msg_msg *load_msg(const void __user *src, int len)
  44. {
  45. struct msg_msg *msg;
  46. struct msg_msgseg **pseg;
  47. int err;
  48. int alen;
  49. alen = len;
  50. if (alen > DATALEN_MSG)
  51. alen = DATALEN_MSG;
  52. msg = kmalloc(sizeof(*msg) + alen, GFP_KERNEL);
  53. if (msg == NULL)
  54. return ERR_PTR(-ENOMEM);
  55. msg->next = NULL;
  56. msg->security = NULL;
  57. if (copy_from_user(msg + 1, src, alen)) {
  58. err = -EFAULT;
  59. goto out_err;
  60. }
  61. len -= alen;
  62. src = ((char __user *)src) + alen;
  63. pseg = &msg->next;
  64. while (len > 0) {
  65. struct msg_msgseg *seg;
  66. alen = len;
  67. if (alen > DATALEN_SEG)
  68. alen = DATALEN_SEG;
  69. seg = kmalloc(sizeof(*seg) + alen,
  70. GFP_KERNEL);
  71. if (seg == NULL) {
  72. err = -ENOMEM;
  73. goto out_err;
  74. }
  75. *pseg = seg;
  76. seg->next = NULL;
  77. if (copy_from_user(seg + 1, src, alen)) {
  78. err = -EFAULT;
  79. goto out_err;
  80. }
  81. pseg = &seg->next;
  82. len -= alen;
  83. src = ((char __user *)src) + alen;
  84. }
  85. err = security_msg_msg_alloc(msg);
  86. if (err)
  87. goto out_err;
  88. return msg;
  89. out_err:
  90. free_msg(msg);
  91. return ERR_PTR(err);
  92. }
  93. int store_msg(void __user *dest, struct msg_msg *msg, int len)
  94. {
  95. int alen;
  96. struct msg_msgseg *seg;
  97. alen = len;
  98. if (alen > DATALEN_MSG)
  99. alen = DATALEN_MSG;
  100. if (copy_to_user(dest, msg + 1, alen))
  101. return -1;
  102. len -= alen;
  103. dest = ((char __user *)dest) + alen;
  104. seg = msg->next;
  105. while (len > 0) {
  106. alen = len;
  107. if (alen > DATALEN_SEG)
  108. alen = DATALEN_SEG;
  109. if (copy_to_user(dest, seg + 1, alen))
  110. return -1;
  111. len -= alen;
  112. dest = ((char __user *)dest) + alen;
  113. seg = seg->next;
  114. }
  115. return 0;
  116. }
  117. void free_msg(struct msg_msg *msg)
  118. {
  119. struct msg_msgseg *seg;
  120. security_msg_msg_free(msg);
  121. seg = msg->next;
  122. kfree(msg);
  123. while (seg != NULL) {
  124. struct msg_msgseg *tmp = seg->next;
  125. kfree(seg);
  126. seg = tmp;
  127. }
  128. }