]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * linux/ipc/msg.c | |
5a06a363 | 3 | * Copyright (C) 1992 Krishna Balasubramanian |
1da177e4 LT |
4 | * |
5 | * Removed all the remaining kerneld mess | |
6 | * Catch the -EFAULT stuff properly | |
7 | * Use GFP_KERNEL for messages as in 1.2 | |
8 | * Fixed up the unchecked user space derefs | |
9 | * Copyright (C) 1998 Alan Cox & Andi Kleen | |
10 | * | |
11 | * /proc/sysvipc/msg support (c) 1999 Dragos Acostachioaie <dragos@iname.com> | |
12 | * | |
13 | * mostly rewritten, threaded and wake-one semantics added | |
14 | * MSGMAX limit removed, sysctl's added | |
624dffcb | 15 | * (c) 1999 Manfred Spraul <manfred@colorfullife.com> |
073115d6 SG |
16 | * |
17 | * support for audit of ipc object properties and permission changes | |
18 | * Dustin Kirkland <dustin.kirkland@us.ibm.com> | |
1e786937 KK |
19 | * |
20 | * namespaces support | |
21 | * OpenVZ, SWsoft Inc. | |
22 | * Pavel Emelianov <xemul@openvz.org> | |
1da177e4 LT |
23 | */ |
24 | ||
c59ede7b | 25 | #include <linux/capability.h> |
1da177e4 LT |
26 | #include <linux/msg.h> |
27 | #include <linux/spinlock.h> | |
28 | #include <linux/init.h> | |
f7bf3df8 | 29 | #include <linux/mm.h> |
1da177e4 LT |
30 | #include <linux/proc_fs.h> |
31 | #include <linux/list.h> | |
32 | #include <linux/security.h> | |
33 | #include <linux/sched.h> | |
34 | #include <linux/syscalls.h> | |
35 | #include <linux/audit.h> | |
19b4946c | 36 | #include <linux/seq_file.h> |
3e148c79 | 37 | #include <linux/rwsem.h> |
1e786937 | 38 | #include <linux/nsproxy.h> |
ae5e1b22 | 39 | #include <linux/ipc_namespace.h> |
5f921ae9 | 40 | |
1da177e4 LT |
41 | #include <asm/current.h> |
42 | #include <asm/uaccess.h> | |
43 | #include "util.h" | |
44 | ||
5a06a363 IM |
45 | /* |
46 | * one msg_receiver structure for each sleeping receiver: | |
47 | */ | |
1da177e4 | 48 | struct msg_receiver { |
5a06a363 IM |
49 | struct list_head r_list; |
50 | struct task_struct *r_tsk; | |
1da177e4 | 51 | |
5a06a363 IM |
52 | int r_mode; |
53 | long r_msgtype; | |
54 | long r_maxsize; | |
1da177e4 | 55 | |
80491eb9 | 56 | struct msg_msg *volatile r_msg; |
1da177e4 LT |
57 | }; |
58 | ||
59 | /* one msg_sender for each sleeping sender */ | |
60 | struct msg_sender { | |
5a06a363 IM |
61 | struct list_head list; |
62 | struct task_struct *tsk; | |
1da177e4 LT |
63 | }; |
64 | ||
65 | #define SEARCH_ANY 1 | |
66 | #define SEARCH_EQUAL 2 | |
67 | #define SEARCH_NOTEQUAL 3 | |
68 | #define SEARCH_LESSEQUAL 4 | |
8ac6ed58 | 69 | #define SEARCH_NUMBER 5 |
1da177e4 | 70 | |
ed2ddbf8 | 71 | #define msg_ids(ns) ((ns)->ids[IPC_MSG_IDS]) |
1da177e4 | 72 | |
1e786937 | 73 | #define msg_unlock(msq) ipc_unlock(&(msq)->q_perm) |
1e786937 | 74 | |
01b8b07a | 75 | static void freeque(struct ipc_namespace *, struct kern_ipc_perm *); |
7748dbfa | 76 | static int newque(struct ipc_namespace *, struct ipc_params *); |
1da177e4 | 77 | #ifdef CONFIG_PROC_FS |
19b4946c | 78 | static int sysvipc_msg_proc_show(struct seq_file *s, void *it); |
1da177e4 LT |
79 | #endif |
80 | ||
f7bf3df8 ND |
81 | /* |
82 | * Scale msgmni with the available lowmem size: the memory dedicated to msg | |
83 | * queues should occupy at most 1/MSG_MEM_SCALE of lowmem. | |
4d89dc6a ND |
84 | * Also take into account the number of nsproxies created so far. |
85 | * This should be done staying within the (MSGMNI , IPCMNI/nr_ipc_ns) range. | |
f7bf3df8 | 86 | */ |
b6b337ad | 87 | void recompute_msgmni(struct ipc_namespace *ns) |
f7bf3df8 ND |
88 | { |
89 | struct sysinfo i; | |
90 | unsigned long allowed; | |
4d89dc6a | 91 | int nb_ns; |
f7bf3df8 ND |
92 | |
93 | si_meminfo(&i); | |
94 | allowed = (((i.totalram - i.totalhigh) / MSG_MEM_SCALE) * i.mem_unit) | |
95 | / MSGMNB; | |
4d89dc6a ND |
96 | nb_ns = atomic_read(&nr_ipc_ns); |
97 | allowed /= nb_ns; | |
f7bf3df8 ND |
98 | |
99 | if (allowed < MSGMNI) { | |
100 | ns->msg_ctlmni = MSGMNI; | |
dfcceb26 | 101 | return; |
f7bf3df8 ND |
102 | } |
103 | ||
4d89dc6a ND |
104 | if (allowed > IPCMNI / nb_ns) { |
105 | ns->msg_ctlmni = IPCMNI / nb_ns; | |
dfcceb26 | 106 | return; |
f7bf3df8 ND |
107 | } |
108 | ||
109 | ns->msg_ctlmni = allowed; | |
f7bf3df8 ND |
110 | } |
111 | ||
ed2ddbf8 | 112 | void msg_init_ns(struct ipc_namespace *ns) |
1e786937 | 113 | { |
1e786937 KK |
114 | ns->msg_ctlmax = MSGMAX; |
115 | ns->msg_ctlmnb = MSGMNB; | |
f7bf3df8 ND |
116 | |
117 | recompute_msgmni(ns); | |
118 | ||
3ac88a41 KK |
119 | atomic_set(&ns->msg_bytes, 0); |
120 | atomic_set(&ns->msg_hdrs, 0); | |
ed2ddbf8 | 121 | ipc_init_ids(&ns->ids[IPC_MSG_IDS]); |
1e786937 KK |
122 | } |
123 | ||
ae5e1b22 | 124 | #ifdef CONFIG_IPC_NS |
1e786937 KK |
125 | void msg_exit_ns(struct ipc_namespace *ns) |
126 | { | |
01b8b07a | 127 | free_ipcs(ns, &msg_ids(ns), freeque); |
7d6feeb2 | 128 | idr_destroy(&ns->ids[IPC_MSG_IDS].ipcs_idr); |
1e786937 | 129 | } |
ae5e1b22 | 130 | #endif |
1e786937 | 131 | |
5a06a363 | 132 | void __init msg_init(void) |
1da177e4 | 133 | { |
ed2ddbf8 | 134 | msg_init_ns(&init_ipc_ns); |
dfcceb26 ND |
135 | |
136 | printk(KERN_INFO "msgmni has been set to %d\n", | |
137 | init_ipc_ns.msg_ctlmni); | |
138 | ||
19b4946c MW |
139 | ipc_init_proc_interface("sysvipc/msg", |
140 | " key msqid perms cbytes qnum lspid lrpid uid gid cuid cgid stime rtime ctime\n", | |
1e786937 | 141 | IPC_MSG_IDS, sysvipc_msg_proc_show); |
1da177e4 LT |
142 | } |
143 | ||
3e148c79 ND |
144 | /* |
145 | * msg_lock_(check_) routines are called in the paths where the rw_mutex | |
146 | * is not held. | |
147 | */ | |
023a5355 ND |
148 | static inline struct msg_queue *msg_lock(struct ipc_namespace *ns, int id) |
149 | { | |
03f02c76 ND |
150 | struct kern_ipc_perm *ipcp = ipc_lock(&msg_ids(ns), id); |
151 | ||
b1ed88b4 PP |
152 | if (IS_ERR(ipcp)) |
153 | return (struct msg_queue *)ipcp; | |
154 | ||
03f02c76 | 155 | return container_of(ipcp, struct msg_queue, q_perm); |
023a5355 ND |
156 | } |
157 | ||
158 | static inline struct msg_queue *msg_lock_check(struct ipc_namespace *ns, | |
159 | int id) | |
160 | { | |
03f02c76 ND |
161 | struct kern_ipc_perm *ipcp = ipc_lock_check(&msg_ids(ns), id); |
162 | ||
b1ed88b4 PP |
163 | if (IS_ERR(ipcp)) |
164 | return (struct msg_queue *)ipcp; | |
165 | ||
03f02c76 | 166 | return container_of(ipcp, struct msg_queue, q_perm); |
023a5355 ND |
167 | } |
168 | ||
7ca7e564 ND |
169 | static inline void msg_rmid(struct ipc_namespace *ns, struct msg_queue *s) |
170 | { | |
171 | ipc_rmid(&msg_ids(ns), &s->q_perm); | |
172 | } | |
173 | ||
f4566f04 ND |
174 | /** |
175 | * newque - Create a new msg queue | |
176 | * @ns: namespace | |
177 | * @params: ptr to the structure that contains the key and msgflg | |
178 | * | |
3e148c79 | 179 | * Called with msg_ids.rw_mutex held (writer) |
f4566f04 | 180 | */ |
7748dbfa | 181 | static int newque(struct ipc_namespace *ns, struct ipc_params *params) |
1da177e4 | 182 | { |
1da177e4 | 183 | struct msg_queue *msq; |
5a06a363 | 184 | int id, retval; |
7748dbfa ND |
185 | key_t key = params->key; |
186 | int msgflg = params->flg; | |
1da177e4 | 187 | |
5a06a363 IM |
188 | msq = ipc_rcu_alloc(sizeof(*msq)); |
189 | if (!msq) | |
1da177e4 LT |
190 | return -ENOMEM; |
191 | ||
5a06a363 | 192 | msq->q_perm.mode = msgflg & S_IRWXUGO; |
1da177e4 LT |
193 | msq->q_perm.key = key; |
194 | ||
195 | msq->q_perm.security = NULL; | |
196 | retval = security_msg_queue_alloc(msq); | |
197 | if (retval) { | |
198 | ipc_rcu_putref(msq); | |
199 | return retval; | |
200 | } | |
201 | ||
dbfcd91f | 202 | /* ipc_addid() locks msq upon success. */ |
1e786937 | 203 | id = ipc_addid(&msg_ids(ns), &msq->q_perm, ns->msg_ctlmni); |
283bb7fa | 204 | if (id < 0) { |
1da177e4 LT |
205 | security_msg_queue_free(msq); |
206 | ipc_rcu_putref(msq); | |
283bb7fa | 207 | return id; |
1da177e4 LT |
208 | } |
209 | ||
210 | msq->q_stime = msq->q_rtime = 0; | |
211 | msq->q_ctime = get_seconds(); | |
212 | msq->q_cbytes = msq->q_qnum = 0; | |
1e786937 | 213 | msq->q_qbytes = ns->msg_ctlmnb; |
1da177e4 LT |
214 | msq->q_lspid = msq->q_lrpid = 0; |
215 | INIT_LIST_HEAD(&msq->q_messages); | |
216 | INIT_LIST_HEAD(&msq->q_receivers); | |
217 | INIT_LIST_HEAD(&msq->q_senders); | |
7ca7e564 | 218 | |
cf9d5d78 | 219 | ipc_unlock_object(&msq->q_perm); |
dbfcd91f | 220 | rcu_read_unlock(); |
1da177e4 | 221 | |
7ca7e564 | 222 | return msq->q_perm.id; |
1da177e4 LT |
223 | } |
224 | ||
5a06a363 | 225 | static inline void ss_add(struct msg_queue *msq, struct msg_sender *mss) |
1da177e4 | 226 | { |
5a06a363 IM |
227 | mss->tsk = current; |
228 | current->state = TASK_INTERRUPTIBLE; | |
229 | list_add_tail(&mss->list, &msq->q_senders); | |
1da177e4 LT |
230 | } |
231 | ||
5a06a363 | 232 | static inline void ss_del(struct msg_sender *mss) |
1da177e4 | 233 | { |
5a06a363 | 234 | if (mss->list.next != NULL) |
1da177e4 LT |
235 | list_del(&mss->list); |
236 | } | |
237 | ||
5a06a363 | 238 | static void ss_wakeup(struct list_head *h, int kill) |
1da177e4 | 239 | { |
41239fe8 | 240 | struct msg_sender *mss, *t; |
1da177e4 | 241 | |
41239fe8 | 242 | list_for_each_entry_safe(mss, t, h, list) { |
5a06a363 IM |
243 | if (kill) |
244 | mss->list.next = NULL; | |
1da177e4 LT |
245 | wake_up_process(mss->tsk); |
246 | } | |
247 | } | |
248 | ||
5a06a363 | 249 | static void expunge_all(struct msg_queue *msq, int res) |
1da177e4 | 250 | { |
41239fe8 | 251 | struct msg_receiver *msr, *t; |
5a06a363 | 252 | |
41239fe8 | 253 | list_for_each_entry_safe(msr, t, &msq->q_receivers, r_list) { |
1da177e4 LT |
254 | msr->r_msg = NULL; |
255 | wake_up_process(msr->r_tsk); | |
256 | smp_mb(); | |
257 | msr->r_msg = ERR_PTR(res); | |
258 | } | |
259 | } | |
5a06a363 IM |
260 | |
261 | /* | |
262 | * freeque() wakes up waiters on the sender and receiver waiting queue, | |
f4566f04 ND |
263 | * removes the message queue from message queue ID IDR, and cleans up all the |
264 | * messages associated with this queue. | |
1da177e4 | 265 | * |
3e148c79 ND |
266 | * msg_ids.rw_mutex (writer) and the spinlock for this message queue are held |
267 | * before freeque() is called. msg_ids.rw_mutex remains locked on exit. | |
1da177e4 | 268 | */ |
01b8b07a | 269 | static void freeque(struct ipc_namespace *ns, struct kern_ipc_perm *ipcp) |
1da177e4 | 270 | { |
41239fe8 | 271 | struct msg_msg *msg, *t; |
01b8b07a | 272 | struct msg_queue *msq = container_of(ipcp, struct msg_queue, q_perm); |
1da177e4 | 273 | |
5a06a363 IM |
274 | expunge_all(msq, -EIDRM); |
275 | ss_wakeup(&msq->q_senders, 1); | |
7ca7e564 | 276 | msg_rmid(ns, msq); |
1da177e4 | 277 | msg_unlock(msq); |
5a06a363 | 278 | |
41239fe8 | 279 | list_for_each_entry_safe(msg, t, &msq->q_messages, m_list) { |
3ac88a41 | 280 | atomic_dec(&ns->msg_hdrs); |
1da177e4 LT |
281 | free_msg(msg); |
282 | } | |
3ac88a41 | 283 | atomic_sub(msq->q_cbytes, &ns->msg_bytes); |
1da177e4 LT |
284 | security_msg_queue_free(msq); |
285 | ipc_rcu_putref(msq); | |
286 | } | |
287 | ||
f4566f04 | 288 | /* |
3e148c79 | 289 | * Called with msg_ids.rw_mutex and ipcp locked. |
f4566f04 | 290 | */ |
03f02c76 | 291 | static inline int msg_security(struct kern_ipc_perm *ipcp, int msgflg) |
7748dbfa | 292 | { |
03f02c76 ND |
293 | struct msg_queue *msq = container_of(ipcp, struct msg_queue, q_perm); |
294 | ||
295 | return security_msg_queue_associate(msq, msgflg); | |
7748dbfa ND |
296 | } |
297 | ||
e48fbb69 | 298 | SYSCALL_DEFINE2(msgget, key_t, key, int, msgflg) |
1da177e4 | 299 | { |
1e786937 | 300 | struct ipc_namespace *ns; |
7748dbfa ND |
301 | struct ipc_ops msg_ops; |
302 | struct ipc_params msg_params; | |
1e786937 KK |
303 | |
304 | ns = current->nsproxy->ipc_ns; | |
7ca7e564 | 305 | |
7748dbfa ND |
306 | msg_ops.getnew = newque; |
307 | msg_ops.associate = msg_security; | |
308 | msg_ops.more_checks = NULL; | |
309 | ||
310 | msg_params.key = key; | |
311 | msg_params.flg = msgflg; | |
5a06a363 | 312 | |
7748dbfa | 313 | return ipcget(ns, &msg_ids(ns), &msg_ops, &msg_params); |
1da177e4 LT |
314 | } |
315 | ||
5a06a363 IM |
316 | static inline unsigned long |
317 | copy_msqid_to_user(void __user *buf, struct msqid64_ds *in, int version) | |
1da177e4 LT |
318 | { |
319 | switch(version) { | |
320 | case IPC_64: | |
5a06a363 | 321 | return copy_to_user(buf, in, sizeof(*in)); |
1da177e4 | 322 | case IPC_OLD: |
5a06a363 | 323 | { |
1da177e4 LT |
324 | struct msqid_ds out; |
325 | ||
5a06a363 | 326 | memset(&out, 0, sizeof(out)); |
1da177e4 LT |
327 | |
328 | ipc64_perm_to_ipc_perm(&in->msg_perm, &out.msg_perm); | |
329 | ||
330 | out.msg_stime = in->msg_stime; | |
331 | out.msg_rtime = in->msg_rtime; | |
332 | out.msg_ctime = in->msg_ctime; | |
333 | ||
4be929be AD |
334 | if (in->msg_cbytes > USHRT_MAX) |
335 | out.msg_cbytes = USHRT_MAX; | |
1da177e4 LT |
336 | else |
337 | out.msg_cbytes = in->msg_cbytes; | |
338 | out.msg_lcbytes = in->msg_cbytes; | |
339 | ||
4be929be AD |
340 | if (in->msg_qnum > USHRT_MAX) |
341 | out.msg_qnum = USHRT_MAX; | |
1da177e4 LT |
342 | else |
343 | out.msg_qnum = in->msg_qnum; | |
344 | ||
4be929be AD |
345 | if (in->msg_qbytes > USHRT_MAX) |
346 | out.msg_qbytes = USHRT_MAX; | |
1da177e4 LT |
347 | else |
348 | out.msg_qbytes = in->msg_qbytes; | |
349 | out.msg_lqbytes = in->msg_qbytes; | |
350 | ||
351 | out.msg_lspid = in->msg_lspid; | |
352 | out.msg_lrpid = in->msg_lrpid; | |
353 | ||
5a06a363 IM |
354 | return copy_to_user(buf, &out, sizeof(out)); |
355 | } | |
1da177e4 LT |
356 | default: |
357 | return -EINVAL; | |
358 | } | |
359 | } | |
360 | ||
5a06a363 | 361 | static inline unsigned long |
016d7132 | 362 | copy_msqid_from_user(struct msqid64_ds *out, void __user *buf, int version) |
1da177e4 LT |
363 | { |
364 | switch(version) { | |
365 | case IPC_64: | |
016d7132 | 366 | if (copy_from_user(out, buf, sizeof(*out))) |
1da177e4 | 367 | return -EFAULT; |
1da177e4 | 368 | return 0; |
1da177e4 | 369 | case IPC_OLD: |
5a06a363 | 370 | { |
1da177e4 LT |
371 | struct msqid_ds tbuf_old; |
372 | ||
5a06a363 | 373 | if (copy_from_user(&tbuf_old, buf, sizeof(tbuf_old))) |
1da177e4 LT |
374 | return -EFAULT; |
375 | ||
016d7132 PP |
376 | out->msg_perm.uid = tbuf_old.msg_perm.uid; |
377 | out->msg_perm.gid = tbuf_old.msg_perm.gid; | |
378 | out->msg_perm.mode = tbuf_old.msg_perm.mode; | |
1da177e4 | 379 | |
5a06a363 | 380 | if (tbuf_old.msg_qbytes == 0) |
016d7132 | 381 | out->msg_qbytes = tbuf_old.msg_lqbytes; |
1da177e4 | 382 | else |
016d7132 | 383 | out->msg_qbytes = tbuf_old.msg_qbytes; |
1da177e4 LT |
384 | |
385 | return 0; | |
5a06a363 | 386 | } |
1da177e4 LT |
387 | default: |
388 | return -EINVAL; | |
389 | } | |
390 | } | |
391 | ||
a0d092fc PP |
392 | /* |
393 | * This function handles some msgctl commands which require the rw_mutex | |
394 | * to be held in write mode. | |
395 | * NOTE: no locks must be held, the rw_mutex is taken inside this function. | |
396 | */ | |
397 | static int msgctl_down(struct ipc_namespace *ns, int msqid, int cmd, | |
398 | struct msqid_ds __user *buf, int version) | |
1da177e4 | 399 | { |
1da177e4 | 400 | struct kern_ipc_perm *ipcp; |
f1970c48 | 401 | struct msqid64_ds uninitialized_var(msqid64); |
a0d092fc PP |
402 | struct msg_queue *msq; |
403 | int err; | |
404 | ||
405 | if (cmd == IPC_SET) { | |
016d7132 | 406 | if (copy_msqid_from_user(&msqid64, buf, version)) |
a0d092fc PP |
407 | return -EFAULT; |
408 | } | |
409 | ||
7b4cc5d8 DB |
410 | down_write(&msg_ids(ns).rw_mutex); |
411 | rcu_read_lock(); | |
412 | ||
15724ecb DB |
413 | ipcp = ipcctl_pre_down_nolock(ns, &msg_ids(ns), msqid, cmd, |
414 | &msqid64.msg_perm, msqid64.msg_qbytes); | |
7b4cc5d8 DB |
415 | if (IS_ERR(ipcp)) { |
416 | err = PTR_ERR(ipcp); | |
7b4cc5d8 DB |
417 | goto out_unlock1; |
418 | } | |
a0d092fc | 419 | |
a5f75e7f | 420 | msq = container_of(ipcp, struct msg_queue, q_perm); |
a0d092fc PP |
421 | |
422 | err = security_msg_queue_msgctl(msq, cmd); | |
423 | if (err) | |
15724ecb | 424 | goto out_unlock1; |
a0d092fc PP |
425 | |
426 | switch (cmd) { | |
427 | case IPC_RMID: | |
15724ecb | 428 | ipc_lock_object(&msq->q_perm); |
7b4cc5d8 | 429 | /* freeque unlocks the ipc object and rcu */ |
a0d092fc PP |
430 | freeque(ns, ipcp); |
431 | goto out_up; | |
432 | case IPC_SET: | |
016d7132 | 433 | if (msqid64.msg_qbytes > ns->msg_ctlmnb && |
a0d092fc PP |
434 | !capable(CAP_SYS_RESOURCE)) { |
435 | err = -EPERM; | |
15724ecb | 436 | goto out_unlock1; |
a0d092fc PP |
437 | } |
438 | ||
15724ecb | 439 | ipc_lock_object(&msq->q_perm); |
1efdb69b EB |
440 | err = ipc_update_perm(&msqid64.msg_perm, ipcp); |
441 | if (err) | |
7b4cc5d8 | 442 | goto out_unlock0; |
1efdb69b | 443 | |
016d7132 | 444 | msq->q_qbytes = msqid64.msg_qbytes; |
a0d092fc | 445 | |
a0d092fc PP |
446 | msq->q_ctime = get_seconds(); |
447 | /* sleeping receivers might be excluded by | |
448 | * stricter permissions. | |
449 | */ | |
450 | expunge_all(msq, -EAGAIN); | |
451 | /* sleeping senders might be able to send | |
452 | * due to a larger queue size. | |
453 | */ | |
454 | ss_wakeup(&msq->q_senders, 0); | |
455 | break; | |
456 | default: | |
457 | err = -EINVAL; | |
15724ecb | 458 | goto out_unlock1; |
a0d092fc | 459 | } |
7b4cc5d8 DB |
460 | |
461 | out_unlock0: | |
462 | ipc_unlock_object(&msq->q_perm); | |
463 | out_unlock1: | |
464 | rcu_read_unlock(); | |
a0d092fc PP |
465 | out_up: |
466 | up_write(&msg_ids(ns).rw_mutex); | |
467 | return err; | |
468 | } | |
469 | ||
2cafed30 DB |
470 | static int msgctl_nolock(struct ipc_namespace *ns, int msqid, |
471 | int cmd, int version, void __user *buf) | |
a0d092fc | 472 | { |
2cafed30 | 473 | int err; |
5a06a363 | 474 | struct msg_queue *msq; |
1da177e4 LT |
475 | |
476 | switch (cmd) { | |
5a06a363 IM |
477 | case IPC_INFO: |
478 | case MSG_INFO: | |
479 | { | |
1da177e4 LT |
480 | struct msginfo msginfo; |
481 | int max_id; | |
5a06a363 | 482 | |
1da177e4 LT |
483 | if (!buf) |
484 | return -EFAULT; | |
2cafed30 | 485 | |
5a06a363 IM |
486 | /* |
487 | * We must not return kernel stack data. | |
1da177e4 LT |
488 | * due to padding, it's not enough |
489 | * to set all member fields. | |
490 | */ | |
1da177e4 LT |
491 | err = security_msg_queue_msgctl(NULL, cmd); |
492 | if (err) | |
493 | return err; | |
494 | ||
5a06a363 | 495 | memset(&msginfo, 0, sizeof(msginfo)); |
1e786937 KK |
496 | msginfo.msgmni = ns->msg_ctlmni; |
497 | msginfo.msgmax = ns->msg_ctlmax; | |
498 | msginfo.msgmnb = ns->msg_ctlmnb; | |
1da177e4 LT |
499 | msginfo.msgssz = MSGSSZ; |
500 | msginfo.msgseg = MSGSEG; | |
3e148c79 | 501 | down_read(&msg_ids(ns).rw_mutex); |
1da177e4 | 502 | if (cmd == MSG_INFO) { |
1e786937 | 503 | msginfo.msgpool = msg_ids(ns).in_use; |
3ac88a41 KK |
504 | msginfo.msgmap = atomic_read(&ns->msg_hdrs); |
505 | msginfo.msgtql = atomic_read(&ns->msg_bytes); | |
1da177e4 LT |
506 | } else { |
507 | msginfo.msgmap = MSGMAP; | |
508 | msginfo.msgpool = MSGPOOL; | |
509 | msginfo.msgtql = MSGTQL; | |
510 | } | |
7ca7e564 | 511 | max_id = ipc_get_maxid(&msg_ids(ns)); |
3e148c79 | 512 | up_read(&msg_ids(ns).rw_mutex); |
5a06a363 | 513 | if (copy_to_user(buf, &msginfo, sizeof(struct msginfo))) |
1da177e4 | 514 | return -EFAULT; |
5a06a363 | 515 | return (max_id < 0) ? 0 : max_id; |
1da177e4 | 516 | } |
2cafed30 DB |
517 | |
518 | case MSG_STAT: | |
1da177e4 LT |
519 | case IPC_STAT: |
520 | { | |
521 | struct msqid64_ds tbuf; | |
522 | int success_return; | |
5a06a363 | 523 | |
1da177e4 LT |
524 | if (!buf) |
525 | return -EFAULT; | |
1da177e4 | 526 | |
5a06a363 | 527 | if (cmd == MSG_STAT) { |
023a5355 ND |
528 | msq = msg_lock(ns, msqid); |
529 | if (IS_ERR(msq)) | |
530 | return PTR_ERR(msq); | |
7ca7e564 | 531 | success_return = msq->q_perm.id; |
1da177e4 | 532 | } else { |
023a5355 ND |
533 | msq = msg_lock_check(ns, msqid); |
534 | if (IS_ERR(msq)) | |
535 | return PTR_ERR(msq); | |
1da177e4 LT |
536 | success_return = 0; |
537 | } | |
538 | err = -EACCES; | |
b0e77598 | 539 | if (ipcperms(ns, &msq->q_perm, S_IRUGO)) |
1da177e4 LT |
540 | goto out_unlock; |
541 | ||
542 | err = security_msg_queue_msgctl(msq, cmd); | |
543 | if (err) | |
544 | goto out_unlock; | |
545 | ||
023a5355 ND |
546 | memset(&tbuf, 0, sizeof(tbuf)); |
547 | ||
1da177e4 LT |
548 | kernel_to_ipc64_perm(&msq->q_perm, &tbuf.msg_perm); |
549 | tbuf.msg_stime = msq->q_stime; | |
550 | tbuf.msg_rtime = msq->q_rtime; | |
551 | tbuf.msg_ctime = msq->q_ctime; | |
552 | tbuf.msg_cbytes = msq->q_cbytes; | |
553 | tbuf.msg_qnum = msq->q_qnum; | |
554 | tbuf.msg_qbytes = msq->q_qbytes; | |
555 | tbuf.msg_lspid = msq->q_lspid; | |
556 | tbuf.msg_lrpid = msq->q_lrpid; | |
557 | msg_unlock(msq); | |
558 | if (copy_msqid_to_user(buf, &tbuf, version)) | |
559 | return -EFAULT; | |
560 | return success_return; | |
561 | } | |
2cafed30 | 562 | |
1da177e4 | 563 | default: |
2cafed30 | 564 | return -EINVAL; |
1da177e4 LT |
565 | } |
566 | ||
2cafed30 | 567 | return err; |
1da177e4 LT |
568 | out_unlock: |
569 | msg_unlock(msq); | |
570 | return err; | |
571 | } | |
572 | ||
2cafed30 DB |
573 | SYSCALL_DEFINE3(msgctl, int, msqid, int, cmd, struct msqid_ds __user *, buf) |
574 | { | |
575 | int version; | |
576 | struct ipc_namespace *ns; | |
577 | ||
578 | if (msqid < 0 || cmd < 0) | |
579 | return -EINVAL; | |
580 | ||
581 | version = ipc_parse_version(&cmd); | |
582 | ns = current->nsproxy->ipc_ns; | |
583 | ||
584 | switch (cmd) { | |
585 | case IPC_INFO: | |
586 | case MSG_INFO: | |
587 | case MSG_STAT: /* msqid is an index rather than a msg queue id */ | |
588 | case IPC_STAT: | |
589 | return msgctl_nolock(ns, msqid, cmd, version, buf); | |
590 | case IPC_SET: | |
591 | case IPC_RMID: | |
592 | return msgctl_down(ns, msqid, cmd, buf, version); | |
593 | default: | |
594 | return -EINVAL; | |
595 | } | |
596 | } | |
597 | ||
5a06a363 | 598 | static int testmsg(struct msg_msg *msg, long type, int mode) |
1da177e4 LT |
599 | { |
600 | switch(mode) | |
601 | { | |
602 | case SEARCH_ANY: | |
8ac6ed58 | 603 | case SEARCH_NUMBER: |
1da177e4 LT |
604 | return 1; |
605 | case SEARCH_LESSEQUAL: | |
5a06a363 | 606 | if (msg->m_type <=type) |
1da177e4 LT |
607 | return 1; |
608 | break; | |
609 | case SEARCH_EQUAL: | |
5a06a363 | 610 | if (msg->m_type == type) |
1da177e4 LT |
611 | return 1; |
612 | break; | |
613 | case SEARCH_NOTEQUAL: | |
5a06a363 | 614 | if (msg->m_type != type) |
1da177e4 LT |
615 | return 1; |
616 | break; | |
617 | } | |
618 | return 0; | |
619 | } | |
620 | ||
5a06a363 | 621 | static inline int pipelined_send(struct msg_queue *msq, struct msg_msg *msg) |
1da177e4 | 622 | { |
41239fe8 | 623 | struct msg_receiver *msr, *t; |
5a06a363 | 624 | |
41239fe8 | 625 | list_for_each_entry_safe(msr, t, &msq->q_receivers, r_list) { |
5a06a363 IM |
626 | if (testmsg(msg, msr->r_msgtype, msr->r_mode) && |
627 | !security_msg_queue_msgrcv(msq, msg, msr->r_tsk, | |
628 | msr->r_msgtype, msr->r_mode)) { | |
629 | ||
1da177e4 | 630 | list_del(&msr->r_list); |
5a06a363 | 631 | if (msr->r_maxsize < msg->m_ts) { |
1da177e4 LT |
632 | msr->r_msg = NULL; |
633 | wake_up_process(msr->r_tsk); | |
634 | smp_mb(); | |
635 | msr->r_msg = ERR_PTR(-E2BIG); | |
636 | } else { | |
637 | msr->r_msg = NULL; | |
b488893a | 638 | msq->q_lrpid = task_pid_vnr(msr->r_tsk); |
1da177e4 LT |
639 | msq->q_rtime = get_seconds(); |
640 | wake_up_process(msr->r_tsk); | |
641 | smp_mb(); | |
642 | msr->r_msg = msg; | |
5a06a363 | 643 | |
1da177e4 LT |
644 | return 1; |
645 | } | |
646 | } | |
647 | } | |
648 | return 0; | |
649 | } | |
650 | ||
651971cb | 651 | long do_msgsnd(int msqid, long mtype, void __user *mtext, |
652 | size_t msgsz, int msgflg) | |
1da177e4 LT |
653 | { |
654 | struct msg_queue *msq; | |
655 | struct msg_msg *msg; | |
1da177e4 | 656 | int err; |
1e786937 KK |
657 | struct ipc_namespace *ns; |
658 | ||
659 | ns = current->nsproxy->ipc_ns; | |
5a06a363 | 660 | |
1e786937 | 661 | if (msgsz > ns->msg_ctlmax || (long) msgsz < 0 || msqid < 0) |
1da177e4 | 662 | return -EINVAL; |
1da177e4 LT |
663 | if (mtype < 1) |
664 | return -EINVAL; | |
665 | ||
651971cb | 666 | msg = load_msg(mtext, msgsz); |
5a06a363 | 667 | if (IS_ERR(msg)) |
1da177e4 LT |
668 | return PTR_ERR(msg); |
669 | ||
670 | msg->m_type = mtype; | |
671 | msg->m_ts = msgsz; | |
672 | ||
023a5355 ND |
673 | msq = msg_lock_check(ns, msqid); |
674 | if (IS_ERR(msq)) { | |
675 | err = PTR_ERR(msq); | |
1da177e4 | 676 | goto out_free; |
023a5355 | 677 | } |
1da177e4 LT |
678 | |
679 | for (;;) { | |
680 | struct msg_sender s; | |
681 | ||
5a06a363 | 682 | err = -EACCES; |
b0e77598 | 683 | if (ipcperms(ns, &msq->q_perm, S_IWUGO)) |
1da177e4 LT |
684 | goto out_unlock_free; |
685 | ||
686 | err = security_msg_queue_msgsnd(msq, msg, msgflg); | |
687 | if (err) | |
688 | goto out_unlock_free; | |
689 | ||
5a06a363 | 690 | if (msgsz + msq->q_cbytes <= msq->q_qbytes && |
1da177e4 LT |
691 | 1 + msq->q_qnum <= msq->q_qbytes) { |
692 | break; | |
693 | } | |
694 | ||
695 | /* queue full, wait: */ | |
5a06a363 IM |
696 | if (msgflg & IPC_NOWAIT) { |
697 | err = -EAGAIN; | |
1da177e4 LT |
698 | goto out_unlock_free; |
699 | } | |
700 | ss_add(msq, &s); | |
6062a8dc RR |
701 | |
702 | if (!ipc_rcu_getref(msq)) { | |
703 | err = -EIDRM; | |
704 | goto out_unlock_free; | |
705 | } | |
706 | ||
1da177e4 LT |
707 | msg_unlock(msq); |
708 | schedule(); | |
709 | ||
710 | ipc_lock_by_ptr(&msq->q_perm); | |
711 | ipc_rcu_putref(msq); | |
712 | if (msq->q_perm.deleted) { | |
713 | err = -EIDRM; | |
714 | goto out_unlock_free; | |
715 | } | |
716 | ss_del(&s); | |
5a06a363 | 717 | |
1da177e4 | 718 | if (signal_pending(current)) { |
5a06a363 | 719 | err = -ERESTARTNOHAND; |
1da177e4 LT |
720 | goto out_unlock_free; |
721 | } | |
722 | } | |
723 | ||
b488893a | 724 | msq->q_lspid = task_tgid_vnr(current); |
1da177e4 LT |
725 | msq->q_stime = get_seconds(); |
726 | ||
5a06a363 | 727 | if (!pipelined_send(msq, msg)) { |
25985edc | 728 | /* no one is waiting for this message, enqueue it */ |
5a06a363 | 729 | list_add_tail(&msg->m_list, &msq->q_messages); |
1da177e4 LT |
730 | msq->q_cbytes += msgsz; |
731 | msq->q_qnum++; | |
3ac88a41 KK |
732 | atomic_add(msgsz, &ns->msg_bytes); |
733 | atomic_inc(&ns->msg_hdrs); | |
1da177e4 | 734 | } |
5a06a363 | 735 | |
1da177e4 LT |
736 | err = 0; |
737 | msg = NULL; | |
738 | ||
739 | out_unlock_free: | |
740 | msg_unlock(msq); | |
741 | out_free: | |
5a06a363 | 742 | if (msg != NULL) |
1da177e4 LT |
743 | free_msg(msg); |
744 | return err; | |
745 | } | |
746 | ||
e48fbb69 HC |
747 | SYSCALL_DEFINE4(msgsnd, int, msqid, struct msgbuf __user *, msgp, size_t, msgsz, |
748 | int, msgflg) | |
651971cb | 749 | { |
750 | long mtype; | |
751 | ||
752 | if (get_user(mtype, &msgp->mtype)) | |
753 | return -EFAULT; | |
754 | return do_msgsnd(msqid, mtype, msgp->mtext, msgsz, msgflg); | |
755 | } | |
756 | ||
5a06a363 | 757 | static inline int convert_mode(long *msgtyp, int msgflg) |
1da177e4 | 758 | { |
8ac6ed58 PH |
759 | if (msgflg & MSG_COPY) |
760 | return SEARCH_NUMBER; | |
5a06a363 | 761 | /* |
1da177e4 LT |
762 | * find message of correct type. |
763 | * msgtyp = 0 => get first. | |
764 | * msgtyp > 0 => get first message of matching type. | |
5a06a363 | 765 | * msgtyp < 0 => get message with least type must be < abs(msgtype). |
1da177e4 | 766 | */ |
5a06a363 | 767 | if (*msgtyp == 0) |
1da177e4 | 768 | return SEARCH_ANY; |
5a06a363 IM |
769 | if (*msgtyp < 0) { |
770 | *msgtyp = -*msgtyp; | |
1da177e4 LT |
771 | return SEARCH_LESSEQUAL; |
772 | } | |
5a06a363 | 773 | if (msgflg & MSG_EXCEPT) |
1da177e4 LT |
774 | return SEARCH_NOTEQUAL; |
775 | return SEARCH_EQUAL; | |
776 | } | |
777 | ||
f9dd87f4 SK |
778 | static long do_msg_fill(void __user *dest, struct msg_msg *msg, size_t bufsz) |
779 | { | |
780 | struct msgbuf __user *msgp = dest; | |
781 | size_t msgsz; | |
782 | ||
783 | if (put_user(msg->m_type, &msgp->mtype)) | |
784 | return -EFAULT; | |
785 | ||
786 | msgsz = (bufsz > msg->m_ts) ? msg->m_ts : bufsz; | |
787 | if (store_msg(msgp->mtext, msg, msgsz)) | |
788 | return -EFAULT; | |
789 | return msgsz; | |
790 | } | |
791 | ||
4a674f34 | 792 | #ifdef CONFIG_CHECKPOINT_RESTORE |
3fcfe786 SK |
793 | /* |
794 | * This function creates new kernel message structure, large enough to store | |
795 | * bufsz message bytes. | |
796 | */ | |
8ac6ed58 | 797 | static inline struct msg_msg *prepare_copy(void __user *buf, size_t bufsz) |
4a674f34 SK |
798 | { |
799 | struct msg_msg *copy; | |
800 | ||
4a674f34 SK |
801 | /* |
802 | * Create dummy message to copy real message to. | |
803 | */ | |
804 | copy = load_msg(buf, bufsz); | |
805 | if (!IS_ERR(copy)) | |
806 | copy->m_ts = bufsz; | |
807 | return copy; | |
808 | } | |
809 | ||
85398aa8 | 810 | static inline void free_copy(struct msg_msg *copy) |
4a674f34 | 811 | { |
85398aa8 | 812 | if (copy) |
4a674f34 SK |
813 | free_msg(copy); |
814 | } | |
815 | #else | |
8ac6ed58 | 816 | static inline struct msg_msg *prepare_copy(void __user *buf, size_t bufsz) |
b30efe27 SK |
817 | { |
818 | return ERR_PTR(-ENOSYS); | |
819 | } | |
820 | ||
85398aa8 SK |
821 | static inline void free_copy(struct msg_msg *copy) |
822 | { | |
823 | } | |
4a674f34 SK |
824 | #endif |
825 | ||
daaf74cf PH |
826 | static struct msg_msg *find_msg(struct msg_queue *msq, long *msgtyp, int mode) |
827 | { | |
828 | struct msg_msg *msg; | |
829 | long count = 0; | |
830 | ||
831 | list_for_each_entry(msg, &msq->q_messages, m_list) { | |
832 | if (testmsg(msg, *msgtyp, mode) && | |
833 | !security_msg_queue_msgrcv(msq, msg, current, | |
834 | *msgtyp, mode)) { | |
835 | if (mode == SEARCH_LESSEQUAL && msg->m_type != 1) { | |
836 | *msgtyp = msg->m_type - 1; | |
837 | } else if (mode == SEARCH_NUMBER) { | |
838 | if (*msgtyp == count) | |
839 | return msg; | |
840 | } else | |
841 | return msg; | |
842 | count++; | |
843 | } | |
844 | } | |
845 | ||
846 | return ERR_PTR(-EAGAIN); | |
847 | } | |
848 | ||
849 | ||
f9dd87f4 SK |
850 | long do_msgrcv(int msqid, void __user *buf, size_t bufsz, long msgtyp, |
851 | int msgflg, | |
852 | long (*msg_handler)(void __user *, struct msg_msg *, size_t)) | |
1da177e4 LT |
853 | { |
854 | struct msg_queue *msq; | |
855 | struct msg_msg *msg; | |
856 | int mode; | |
1e786937 | 857 | struct ipc_namespace *ns; |
85398aa8 | 858 | struct msg_msg *copy = NULL; |
1da177e4 | 859 | |
88b9e456 PH |
860 | ns = current->nsproxy->ipc_ns; |
861 | ||
f9dd87f4 | 862 | if (msqid < 0 || (long) bufsz < 0) |
1da177e4 | 863 | return -EINVAL; |
4a674f34 | 864 | if (msgflg & MSG_COPY) { |
8ac6ed58 | 865 | copy = prepare_copy(buf, min_t(size_t, bufsz, ns->msg_ctlmax)); |
4a674f34 SK |
866 | if (IS_ERR(copy)) |
867 | return PTR_ERR(copy); | |
868 | } | |
5a06a363 | 869 | mode = convert_mode(&msgtyp, msgflg); |
1da177e4 | 870 | |
023a5355 | 871 | msq = msg_lock_check(ns, msqid); |
4a674f34 | 872 | if (IS_ERR(msq)) { |
85398aa8 | 873 | free_copy(copy); |
023a5355 | 874 | return PTR_ERR(msq); |
4a674f34 | 875 | } |
1da177e4 LT |
876 | |
877 | for (;;) { | |
878 | struct msg_receiver msr_d; | |
1da177e4 LT |
879 | |
880 | msg = ERR_PTR(-EACCES); | |
b0e77598 | 881 | if (ipcperms(ns, &msq->q_perm, S_IRUGO)) |
1da177e4 LT |
882 | goto out_unlock; |
883 | ||
daaf74cf PH |
884 | msg = find_msg(msq, &msgtyp, mode); |
885 | ||
5a06a363 IM |
886 | if (!IS_ERR(msg)) { |
887 | /* | |
888 | * Found a suitable message. | |
889 | * Unlink it from the queue. | |
890 | */ | |
f9dd87f4 | 891 | if ((bufsz < msg->m_ts) && !(msgflg & MSG_NOERROR)) { |
1da177e4 LT |
892 | msg = ERR_PTR(-E2BIG); |
893 | goto out_unlock; | |
894 | } | |
3fcfe786 SK |
895 | /* |
896 | * If we are copying, then do not unlink message and do | |
897 | * not update queue parameters. | |
898 | */ | |
852028af PH |
899 | if (msgflg & MSG_COPY) { |
900 | msg = copy_msg(msg, copy); | |
4a674f34 | 901 | goto out_unlock; |
852028af | 902 | } |
1da177e4 LT |
903 | list_del(&msg->m_list); |
904 | msq->q_qnum--; | |
905 | msq->q_rtime = get_seconds(); | |
b488893a | 906 | msq->q_lrpid = task_tgid_vnr(current); |
1da177e4 | 907 | msq->q_cbytes -= msg->m_ts; |
3ac88a41 KK |
908 | atomic_sub(msg->m_ts, &ns->msg_bytes); |
909 | atomic_dec(&ns->msg_hdrs); | |
5a06a363 | 910 | ss_wakeup(&msq->q_senders, 0); |
1da177e4 LT |
911 | msg_unlock(msq); |
912 | break; | |
913 | } | |
914 | /* No message waiting. Wait for a message */ | |
915 | if (msgflg & IPC_NOWAIT) { | |
916 | msg = ERR_PTR(-ENOMSG); | |
917 | goto out_unlock; | |
918 | } | |
5a06a363 | 919 | list_add_tail(&msr_d.r_list, &msq->q_receivers); |
1da177e4 LT |
920 | msr_d.r_tsk = current; |
921 | msr_d.r_msgtype = msgtyp; | |
922 | msr_d.r_mode = mode; | |
5a06a363 | 923 | if (msgflg & MSG_NOERROR) |
1da177e4 | 924 | msr_d.r_maxsize = INT_MAX; |
5a06a363 | 925 | else |
f9dd87f4 | 926 | msr_d.r_maxsize = bufsz; |
1da177e4 LT |
927 | msr_d.r_msg = ERR_PTR(-EAGAIN); |
928 | current->state = TASK_INTERRUPTIBLE; | |
929 | msg_unlock(msq); | |
930 | ||
931 | schedule(); | |
932 | ||
933 | /* Lockless receive, part 1: | |
934 | * Disable preemption. We don't hold a reference to the queue | |
935 | * and getting a reference would defeat the idea of a lockless | |
936 | * operation, thus the code relies on rcu to guarantee the | |
25985edc | 937 | * existence of msq: |
1da177e4 LT |
938 | * Prior to destruction, expunge_all(-EIRDM) changes r_msg. |
939 | * Thus if r_msg is -EAGAIN, then the queue not yet destroyed. | |
940 | * rcu_read_lock() prevents preemption between reading r_msg | |
941 | * and the spin_lock() inside ipc_lock_by_ptr(). | |
942 | */ | |
943 | rcu_read_lock(); | |
944 | ||
945 | /* Lockless receive, part 2: | |
946 | * Wait until pipelined_send or expunge_all are outside of | |
947 | * wake_up_process(). There is a race with exit(), see | |
948 | * ipc/mqueue.c for the details. | |
949 | */ | |
5a06a363 | 950 | msg = (struct msg_msg*)msr_d.r_msg; |
1da177e4 LT |
951 | while (msg == NULL) { |
952 | cpu_relax(); | |
5a06a363 | 953 | msg = (struct msg_msg *)msr_d.r_msg; |
1da177e4 LT |
954 | } |
955 | ||
956 | /* Lockless receive, part 3: | |
957 | * If there is a message or an error then accept it without | |
958 | * locking. | |
959 | */ | |
5a06a363 | 960 | if (msg != ERR_PTR(-EAGAIN)) { |
1da177e4 LT |
961 | rcu_read_unlock(); |
962 | break; | |
963 | } | |
964 | ||
965 | /* Lockless receive, part 3: | |
966 | * Acquire the queue spinlock. | |
967 | */ | |
968 | ipc_lock_by_ptr(&msq->q_perm); | |
969 | rcu_read_unlock(); | |
970 | ||
971 | /* Lockless receive, part 4: | |
972 | * Repeat test after acquiring the spinlock. | |
973 | */ | |
974 | msg = (struct msg_msg*)msr_d.r_msg; | |
5a06a363 | 975 | if (msg != ERR_PTR(-EAGAIN)) |
1da177e4 LT |
976 | goto out_unlock; |
977 | ||
978 | list_del(&msr_d.r_list); | |
979 | if (signal_pending(current)) { | |
980 | msg = ERR_PTR(-ERESTARTNOHAND); | |
981 | out_unlock: | |
982 | msg_unlock(msq); | |
983 | break; | |
984 | } | |
985 | } | |
4a674f34 | 986 | if (IS_ERR(msg)) { |
85398aa8 | 987 | free_copy(copy); |
5a06a363 | 988 | return PTR_ERR(msg); |
4a674f34 | 989 | } |
1da177e4 | 990 | |
f9dd87f4 | 991 | bufsz = msg_handler(buf, msg, bufsz); |
1da177e4 | 992 | free_msg(msg); |
5a06a363 | 993 | |
f9dd87f4 | 994 | return bufsz; |
1da177e4 LT |
995 | } |
996 | ||
e48fbb69 HC |
997 | SYSCALL_DEFINE5(msgrcv, int, msqid, struct msgbuf __user *, msgp, size_t, msgsz, |
998 | long, msgtyp, int, msgflg) | |
651971cb | 999 | { |
f9dd87f4 | 1000 | return do_msgrcv(msqid, msgp, msgsz, msgtyp, msgflg, do_msg_fill); |
651971cb | 1001 | } |
1002 | ||
1da177e4 | 1003 | #ifdef CONFIG_PROC_FS |
19b4946c | 1004 | static int sysvipc_msg_proc_show(struct seq_file *s, void *it) |
1da177e4 | 1005 | { |
1efdb69b | 1006 | struct user_namespace *user_ns = seq_user_ns(s); |
19b4946c MW |
1007 | struct msg_queue *msq = it; |
1008 | ||
1009 | return seq_printf(s, | |
5a06a363 IM |
1010 | "%10d %10d %4o %10lu %10lu %5u %5u %5u %5u %5u %5u %10lu %10lu %10lu\n", |
1011 | msq->q_perm.key, | |
7ca7e564 | 1012 | msq->q_perm.id, |
5a06a363 IM |
1013 | msq->q_perm.mode, |
1014 | msq->q_cbytes, | |
1015 | msq->q_qnum, | |
1016 | msq->q_lspid, | |
1017 | msq->q_lrpid, | |
1efdb69b EB |
1018 | from_kuid_munged(user_ns, msq->q_perm.uid), |
1019 | from_kgid_munged(user_ns, msq->q_perm.gid), | |
1020 | from_kuid_munged(user_ns, msq->q_perm.cuid), | |
1021 | from_kgid_munged(user_ns, msq->q_perm.cgid), | |
5a06a363 IM |
1022 | msq->q_stime, |
1023 | msq->q_rtime, | |
1024 | msq->q_ctime); | |
1da177e4 LT |
1025 | } |
1026 | #endif |