mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-11 12:28:41 +08:00
4a674f34ba
This patch is required for checkpoint/restore in userspace. c/r requires some way to get all pending IPC messages without deleting them from the queue (checkpoint can fail and in this case tasks will be resumed, so queue have to be valid). To achive this, new operation flag MSG_COPY for sys_msgrcv() system call was introduced. If this flag was specified, then mtype is interpreted as number of the message to copy. If MSG_COPY is set, then kernel will allocate dummy message with passed size, and then use new copy_msg() helper function to copy desired message (instead of unlinking it from the queue). Notes: 1) Return -ENOSYS if MSG_COPY is specified, but CONFIG_CHECKPOINT_RESTORE is not set. Signed-off-by: Stanislav Kinsbursky <skinsbursky@parallels.com> Cc: Serge Hallyn <serge.hallyn@canonical.com> Cc: "Eric W. Biederman" <ebiederm@xmission.com> Cc: Pavel Emelyanov <xemul@parallels.com> Cc: Al Viro <viro@zeniv.linux.org.uk> Cc: KOSAKI Motohiro <kosaki.motohiro@jp.fujitsu.com> Cc: Michael Kerrisk <mtk.manpages@gmail.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
185 lines
3.5 KiB
C
185 lines
3.5 KiB
C
/*
|
|
* linux/ipc/msgutil.c
|
|
* Copyright (C) 1999, 2004 Manfred Spraul
|
|
*
|
|
* This file is released under GNU General Public Licence version 2 or
|
|
* (at your option) any later version.
|
|
*
|
|
* See the file COPYING for more details.
|
|
*/
|
|
|
|
#include <linux/spinlock.h>
|
|
#include <linux/init.h>
|
|
#include <linux/security.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/ipc.h>
|
|
#include <linux/msg.h>
|
|
#include <linux/ipc_namespace.h>
|
|
#include <linux/utsname.h>
|
|
#include <linux/proc_fs.h>
|
|
#include <asm/uaccess.h>
|
|
|
|
#include "util.h"
|
|
|
|
DEFINE_SPINLOCK(mq_lock);
|
|
|
|
/*
|
|
* The next 2 defines are here bc this is the only file
|
|
* compiled when either CONFIG_SYSVIPC and CONFIG_POSIX_MQUEUE
|
|
* and not CONFIG_IPC_NS.
|
|
*/
|
|
struct ipc_namespace init_ipc_ns = {
|
|
.count = ATOMIC_INIT(1),
|
|
.user_ns = &init_user_ns,
|
|
.proc_inum = PROC_IPC_INIT_INO,
|
|
};
|
|
|
|
atomic_t nr_ipc_ns = ATOMIC_INIT(1);
|
|
|
|
struct msg_msgseg {
|
|
struct msg_msgseg* next;
|
|
/* the next part of the message follows immediately */
|
|
};
|
|
|
|
#define DATALEN_MSG (PAGE_SIZE-sizeof(struct msg_msg))
|
|
#define DATALEN_SEG (PAGE_SIZE-sizeof(struct msg_msgseg))
|
|
|
|
struct msg_msg *load_msg(const void __user *src, int len)
|
|
{
|
|
struct msg_msg *msg;
|
|
struct msg_msgseg **pseg;
|
|
int err;
|
|
int alen;
|
|
|
|
alen = len;
|
|
if (alen > DATALEN_MSG)
|
|
alen = DATALEN_MSG;
|
|
|
|
msg = kmalloc(sizeof(*msg) + alen, GFP_KERNEL);
|
|
if (msg == NULL)
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
msg->next = NULL;
|
|
msg->security = NULL;
|
|
|
|
if (copy_from_user(msg + 1, src, alen)) {
|
|
err = -EFAULT;
|
|
goto out_err;
|
|
}
|
|
|
|
len -= alen;
|
|
src = ((char __user *)src) + alen;
|
|
pseg = &msg->next;
|
|
while (len > 0) {
|
|
struct msg_msgseg *seg;
|
|
alen = len;
|
|
if (alen > DATALEN_SEG)
|
|
alen = DATALEN_SEG;
|
|
seg = kmalloc(sizeof(*seg) + alen,
|
|
GFP_KERNEL);
|
|
if (seg == NULL) {
|
|
err = -ENOMEM;
|
|
goto out_err;
|
|
}
|
|
*pseg = seg;
|
|
seg->next = NULL;
|
|
if (copy_from_user(seg + 1, src, alen)) {
|
|
err = -EFAULT;
|
|
goto out_err;
|
|
}
|
|
pseg = &seg->next;
|
|
len -= alen;
|
|
src = ((char __user *)src) + alen;
|
|
}
|
|
|
|
err = security_msg_msg_alloc(msg);
|
|
if (err)
|
|
goto out_err;
|
|
|
|
return msg;
|
|
|
|
out_err:
|
|
free_msg(msg);
|
|
return ERR_PTR(err);
|
|
}
|
|
#ifdef CONFIG_CHECKPOINT_RESTORE
|
|
struct msg_msg *copy_msg(struct msg_msg *src, struct msg_msg *dst)
|
|
{
|
|
struct msg_msgseg *dst_pseg, *src_pseg;
|
|
int len = src->m_ts;
|
|
int alen;
|
|
|
|
BUG_ON(dst == NULL);
|
|
if (src->m_ts > dst->m_ts)
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
alen = len;
|
|
if (alen > DATALEN_MSG)
|
|
alen = DATALEN_MSG;
|
|
|
|
dst->next = NULL;
|
|
dst->security = NULL;
|
|
|
|
memcpy(dst + 1, src + 1, alen);
|
|
|
|
len -= alen;
|
|
dst_pseg = dst->next;
|
|
src_pseg = src->next;
|
|
while (len > 0) {
|
|
alen = len;
|
|
if (alen > DATALEN_SEG)
|
|
alen = DATALEN_SEG;
|
|
memcpy(dst_pseg + 1, src_pseg + 1, alen);
|
|
dst_pseg = dst_pseg->next;
|
|
len -= alen;
|
|
src_pseg = src_pseg->next;
|
|
}
|
|
|
|
dst->m_type = src->m_type;
|
|
dst->m_ts = src->m_ts;
|
|
|
|
return dst;
|
|
}
|
|
#endif
|
|
int store_msg(void __user *dest, struct msg_msg *msg, int len)
|
|
{
|
|
int alen;
|
|
struct msg_msgseg *seg;
|
|
|
|
alen = len;
|
|
if (alen > DATALEN_MSG)
|
|
alen = DATALEN_MSG;
|
|
if (copy_to_user(dest, msg + 1, alen))
|
|
return -1;
|
|
|
|
len -= alen;
|
|
dest = ((char __user *)dest) + alen;
|
|
seg = msg->next;
|
|
while (len > 0) {
|
|
alen = len;
|
|
if (alen > DATALEN_SEG)
|
|
alen = DATALEN_SEG;
|
|
if (copy_to_user(dest, seg + 1, alen))
|
|
return -1;
|
|
len -= alen;
|
|
dest = ((char __user *)dest) + alen;
|
|
seg = seg->next;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
void free_msg(struct msg_msg *msg)
|
|
{
|
|
struct msg_msgseg *seg;
|
|
|
|
security_msg_msg_free(msg);
|
|
|
|
seg = msg->next;
|
|
kfree(msg);
|
|
while (seg != NULL) {
|
|
struct msg_msgseg *tmp = seg->next;
|
|
kfree(seg);
|
|
seg = tmp;
|
|
}
|
|
}
|