]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - kernel/utsname.c
KVM: arm64: vgic-v3: Log which GICv3 system registers are trapped
[mirror_ubuntu-zesty-kernel.git] / kernel / utsname.c
CommitLineData
4865ecf1
SH
1/*
2 * Copyright (C) 2004 IBM Corporation
3 *
4 * Author: Serge Hallyn <serue@us.ibm.com>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License as
8 * published by the Free Software Foundation, version 2 of the
9 * License.
10 */
11
9984de1a 12#include <linux/export.h>
4865ecf1
SH
13#include <linux/uts.h>
14#include <linux/utsname.h>
467e9f4b 15#include <linux/err.h>
1aeb272c 16#include <linux/slab.h>
59607db3 17#include <linux/user_namespace.h>
0bb80f24 18#include <linux/proc_ns.h>
4865ecf1 19
f7af3d1c
EB
20static struct ucounts *inc_uts_namespaces(struct user_namespace *ns)
21{
22 return inc_ucount(ns, current_euid(), UCOUNT_UTS_NAMESPACES);
23}
24
25static void dec_uts_namespaces(struct ucounts *ucounts)
26{
27 dec_ucount(ucounts, UCOUNT_UTS_NAMESPACES);
28}
29
4c2a7e72
AD
30static struct uts_namespace *create_uts_ns(void)
31{
32 struct uts_namespace *uts_ns;
33
34 uts_ns = kmalloc(sizeof(struct uts_namespace), GFP_KERNEL);
35 if (uts_ns)
36 kref_init(&uts_ns->kref);
37 return uts_ns;
38}
39
071df104
SH
40/*
41 * Clone a new ns copying an original utsname, setting refcount to 1
42 * @old_ns: namespace to clone
bf531536 43 * Return ERR_PTR(-ENOMEM) on error (failure to kmalloc), new ns otherwise
071df104 44 */
bcf58e72 45static struct uts_namespace *clone_uts_ns(struct user_namespace *user_ns,
bb96a6f5 46 struct uts_namespace *old_ns)
071df104
SH
47{
48 struct uts_namespace *ns;
f7af3d1c 49 struct ucounts *ucounts;
98f842e6 50 int err;
071df104 51
df75e774 52 err = -ENOSPC;
f7af3d1c
EB
53 ucounts = inc_uts_namespaces(user_ns);
54 if (!ucounts)
55 goto fail;
56
57 err = -ENOMEM;
4c2a7e72 58 ns = create_uts_ns();
467e9f4b 59 if (!ns)
f7af3d1c 60 goto fail_dec;
467e9f4b 61
6344c433 62 err = ns_alloc_inum(&ns->ns);
f7af3d1c
EB
63 if (err)
64 goto fail_free;
98f842e6 65
f7af3d1c 66 ns->ucounts = ucounts;
33c42940
AV
67 ns->ns.ops = &utsns_operations;
68
efc63c4f 69 down_read(&uts_sem);
467e9f4b 70 memcpy(&ns->name, &old_ns->name, sizeof(ns->name));
bcf58e72 71 ns->user_ns = get_user_ns(user_ns);
efc63c4f 72 up_read(&uts_sem);
071df104 73 return ns;
f7af3d1c
EB
74
75fail_free:
76 kfree(ns);
77fail_dec:
78 dec_uts_namespaces(ucounts);
79fail:
80 return ERR_PTR(err);
071df104
SH
81}
82
4865ecf1
SH
83/*
84 * Copy task tsk's utsname namespace, or clone it if flags
85 * specifies CLONE_NEWUTS. In latter case, changes to the
86 * utsname of this process won't be seen by parent, and vice
87 * versa.
88 */
bb96a6f5 89struct uts_namespace *copy_utsname(unsigned long flags,
bcf58e72 90 struct user_namespace *user_ns, struct uts_namespace *old_ns)
4865ecf1 91{
071df104 92 struct uts_namespace *new_ns;
4865ecf1 93
e3222c4e 94 BUG_ON(!old_ns);
4865ecf1
SH
95 get_uts_ns(old_ns);
96
071df104 97 if (!(flags & CLONE_NEWUTS))
e3222c4e 98 return old_ns;
071df104 99
bcf58e72 100 new_ns = clone_uts_ns(user_ns, old_ns);
071df104 101
071df104 102 put_uts_ns(old_ns);
e3222c4e 103 return new_ns;
4865ecf1
SH
104}
105
106void free_uts_ns(struct kref *kref)
107{
108 struct uts_namespace *ns;
109
110 ns = container_of(kref, struct uts_namespace, kref);
f7af3d1c 111 dec_uts_namespaces(ns->ucounts);
59607db3 112 put_user_ns(ns->user_ns);
6344c433 113 ns_free_inum(&ns->ns);
4865ecf1
SH
114 kfree(ns);
115}
34482e89 116
3c041184
AV
117static inline struct uts_namespace *to_uts_ns(struct ns_common *ns)
118{
119 return container_of(ns, struct uts_namespace, ns);
120}
121
64964528 122static struct ns_common *utsns_get(struct task_struct *task)
34482e89
EB
123{
124 struct uts_namespace *ns = NULL;
125 struct nsproxy *nsproxy;
126
728dba3a
EB
127 task_lock(task);
128 nsproxy = task->nsproxy;
34482e89
EB
129 if (nsproxy) {
130 ns = nsproxy->uts_ns;
131 get_uts_ns(ns);
132 }
728dba3a 133 task_unlock(task);
34482e89 134
3c041184 135 return ns ? &ns->ns : NULL;
34482e89
EB
136}
137
64964528 138static void utsns_put(struct ns_common *ns)
34482e89 139{
3c041184 140 put_uts_ns(to_uts_ns(ns));
34482e89
EB
141}
142
64964528 143static int utsns_install(struct nsproxy *nsproxy, struct ns_common *new)
34482e89 144{
3c041184 145 struct uts_namespace *ns = to_uts_ns(new);
142e1d1d 146
5e4a0847 147 if (!ns_capable(ns->user_ns, CAP_SYS_ADMIN) ||
c7b96acf 148 !ns_capable(current_user_ns(), CAP_SYS_ADMIN))
142e1d1d
EB
149 return -EPERM;
150
34482e89
EB
151 get_uts_ns(ns);
152 put_uts_ns(nsproxy->uts_ns);
153 nsproxy->uts_ns = ns;
154 return 0;
155}
156
bcac25a5
AV
157static struct user_namespace *utsns_owner(struct ns_common *ns)
158{
159 return to_uts_ns(ns)->user_ns;
160}
161
34482e89
EB
162const struct proc_ns_operations utsns_operations = {
163 .name = "uts",
164 .type = CLONE_NEWUTS,
165 .get = utsns_get,
166 .put = utsns_put,
167 .install = utsns_install,
bcac25a5 168 .owner = utsns_owner,
34482e89 169};