MAINTAINERS: add crypto headers to crypto entry
[linux-2.6-block.git] / ipc / namespace.c
CommitLineData
ae5e1b22
PE
1/*
2 * linux/ipc/namespace.c
3 * Copyright (C) 2006 Pavel Emelyanov <xemul@openvz.org> OpenVZ, SWsoft Inc.
4 */
5
6#include <linux/ipc.h>
7#include <linux/msg.h>
8#include <linux/ipc_namespace.h>
9#include <linux/rcupdate.h>
10#include <linux/nsproxy.h>
11#include <linux/slab.h>
7eafd7c7
SH
12#include <linux/fs.h>
13#include <linux/mount.h>
b515498f 14#include <linux/user_namespace.h>
0bb80f24 15#include <linux/proc_ns.h>
ae5e1b22
PE
16
17#include "util.h"
18
aba35661
EB
19static struct ucounts *inc_ipc_namespaces(struct user_namespace *ns)
20{
21 return inc_ucount(ns, current_euid(), UCOUNT_IPC_NAMESPACES);
22}
23
24static void dec_ipc_namespaces(struct ucounts *ucounts)
25{
26 dec_ucount(ucounts, UCOUNT_IPC_NAMESPACES);
27}
28
bcf58e72 29static struct ipc_namespace *create_ipc_ns(struct user_namespace *user_ns,
b0e77598 30 struct ipc_namespace *old_ns)
ae5e1b22 31{
ae5e1b22 32 struct ipc_namespace *ns;
aba35661 33 struct ucounts *ucounts;
7eafd7c7 34 int err;
ae5e1b22 35
df75e774 36 err = -ENOSPC;
aba35661
EB
37 ucounts = inc_ipc_namespaces(user_ns);
38 if (!ucounts)
39 goto fail;
40
41 err = -ENOMEM;
ae5e1b22
PE
42 ns = kmalloc(sizeof(struct ipc_namespace), GFP_KERNEL);
43 if (ns == NULL)
aba35661 44 goto fail_dec;
ae5e1b22 45
6344c433 46 err = ns_alloc_inum(&ns->ns);
aba35661
EB
47 if (err)
48 goto fail_free;
33c42940 49 ns->ns.ops = &ipcns_operations;
98f842e6 50
7eafd7c7 51 atomic_set(&ns->count, 1);
b236017a 52 ns->user_ns = get_user_ns(user_ns);
aba35661 53 ns->ucounts = ucounts;
b236017a 54
7eafd7c7 55 err = mq_init_ns(ns);
aba35661
EB
56 if (err)
57 goto fail_put;
4d89dc6a 58
ed2ddbf8
PP
59 sem_init_ns(ns);
60 msg_init_ns(ns);
61 shm_init_ns(ns);
ae5e1b22 62
ae5e1b22 63 return ns;
aba35661
EB
64
65fail_put:
66 put_user_ns(ns->user_ns);
67 ns_free_inum(&ns->ns);
68fail_free:
69 kfree(ns);
70fail_dec:
71 dec_ipc_namespaces(ucounts);
72fail:
73 return ERR_PTR(err);
ae5e1b22
PE
74}
75
b0e77598 76struct ipc_namespace *copy_ipcs(unsigned long flags,
bcf58e72 77 struct user_namespace *user_ns, struct ipc_namespace *ns)
ae5e1b22 78{
ae5e1b22 79 if (!(flags & CLONE_NEWIPC))
64424289 80 return get_ipc_ns(ns);
bcf58e72 81 return create_ipc_ns(user_ns, ns);
ae5e1b22
PE
82}
83
01b8b07a
PP
84/*
85 * free_ipcs - free all ipcs of one type
86 * @ns: the namespace to remove the ipcs from
87 * @ids: the table of ipcs to free
88 * @free: the function called to free each individual ipc
89 *
90 * Called for each kind of ipc when an ipc_namespace exits.
91 */
92void free_ipcs(struct ipc_namespace *ns, struct ipc_ids *ids,
93 void (*free)(struct ipc_namespace *, struct kern_ipc_perm *))
94{
95 struct kern_ipc_perm *perm;
96 int next_id;
97 int total, in_use;
98
d9a605e4 99 down_write(&ids->rwsem);
01b8b07a
PP
100
101 in_use = ids->in_use;
102
103 for (total = 0, next_id = 0; total < in_use; next_id++) {
104 perm = idr_find(&ids->ipcs_idr, next_id);
105 if (perm == NULL)
106 continue;
32a27500
DB
107 rcu_read_lock();
108 ipc_lock_object(perm);
01b8b07a
PP
109 free(ns, perm);
110 total++;
111 }
d9a605e4 112 up_write(&ids->rwsem);
01b8b07a
PP
113}
114
b4188def
AD
115static void free_ipc_ns(struct ipc_namespace *ns)
116{
b4188def
AD
117 sem_exit_ns(ns);
118 msg_exit_ns(ns);
119 shm_exit_ns(ns);
b4188def 120
aba35661 121 dec_ipc_namespaces(ns->ucounts);
b515498f 122 put_user_ns(ns->user_ns);
6344c433 123 ns_free_inum(&ns->ns);
be4d250a 124 kfree(ns);
b4188def
AD
125}
126
7eafd7c7
SH
127/*
128 * put_ipc_ns - drop a reference to an ipc namespace.
129 * @ns: the namespace to put
130 *
131 * If this is the last task in the namespace exiting, and
132 * it is dropping the refcount to 0, then it can race with
133 * a task in another ipc namespace but in a mounts namespace
134 * which has this ipcns's mqueuefs mounted, doing some action
135 * with one of the mqueuefs files. That can raise the refcount.
136 * So dropping the refcount, and raising the refcount when
137 * accessing it through the VFS, are protected with mq_lock.
138 *
139 * (Clearly, a task raising the refcount on its own ipc_ns
140 * needn't take mq_lock since it can't race with the last task
141 * in the ipcns exiting).
142 */
143void put_ipc_ns(struct ipc_namespace *ns)
ae5e1b22 144{
7eafd7c7
SH
145 if (atomic_dec_and_lock(&ns->count, &mq_lock)) {
146 mq_clear_sbinfo(ns);
147 spin_unlock(&mq_lock);
148 mq_put_mnt(ns);
149 free_ipc_ns(ns);
150 }
151}
a00eaf11 152
3c041184
AV
153static inline struct ipc_namespace *to_ipc_ns(struct ns_common *ns)
154{
155 return container_of(ns, struct ipc_namespace, ns);
156}
157
64964528 158static struct ns_common *ipcns_get(struct task_struct *task)
a00eaf11
EB
159{
160 struct ipc_namespace *ns = NULL;
161 struct nsproxy *nsproxy;
162
728dba3a
EB
163 task_lock(task);
164 nsproxy = task->nsproxy;
a00eaf11
EB
165 if (nsproxy)
166 ns = get_ipc_ns(nsproxy->ipc_ns);
728dba3a 167 task_unlock(task);
a00eaf11 168
3c041184 169 return ns ? &ns->ns : NULL;
a00eaf11
EB
170}
171
64964528 172static void ipcns_put(struct ns_common *ns)
a00eaf11 173{
3c041184 174 return put_ipc_ns(to_ipc_ns(ns));
a00eaf11
EB
175}
176
64964528 177static int ipcns_install(struct nsproxy *nsproxy, struct ns_common *new)
a00eaf11 178{
3c041184 179 struct ipc_namespace *ns = to_ipc_ns(new);
5e4a0847 180 if (!ns_capable(ns->user_ns, CAP_SYS_ADMIN) ||
c7b96acf 181 !ns_capable(current_user_ns(), CAP_SYS_ADMIN))
142e1d1d
EB
182 return -EPERM;
183
a00eaf11
EB
184 /* Ditch state from the old ipc namespace */
185 exit_sem(current);
186 put_ipc_ns(nsproxy->ipc_ns);
187 nsproxy->ipc_ns = get_ipc_ns(ns);
188 return 0;
189}
190
bcac25a5
AV
191static struct user_namespace *ipcns_owner(struct ns_common *ns)
192{
193 return to_ipc_ns(ns)->user_ns;
194}
195
a00eaf11
EB
196const struct proc_ns_operations ipcns_operations = {
197 .name = "ipc",
198 .type = CLONE_NEWIPC,
199 .get = ipcns_get,
200 .put = ipcns_put,
201 .install = ipcns_install,
bcac25a5 202 .owner = ipcns_owner,
a00eaf11 203};