blob: fd393124e507f15f6d366a0f41e4808b81c64934 [file] [log] [blame]
Serge E. Hallyn4865ecf2006-10-02 02:18:14 -07001/*
2 * Copyright (C) 2004 IBM Corporation
3 *
4 * Author: Serge Hallyn <serue@us.ibm.com>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License as
8 * published by the Free Software Foundation, version 2 of the
9 * License.
10 */
11
Paul Gortmaker9984de12011-05-23 14:51:41 -040012#include <linux/export.h>
Serge E. Hallyn4865ecf2006-10-02 02:18:14 -070013#include <linux/uts.h>
14#include <linux/utsname.h>
Cedric Le Goater467e9f42007-07-15 23:41:06 -070015#include <linux/err.h>
Robert P. J. Day1aeb2722008-04-29 00:59:25 -070016#include <linux/slab.h>
Serge E. Hallyn59607db2011-03-23 16:43:16 -070017#include <linux/user_namespace.h>
David Howells0bb80f22013-04-12 01:50:06 +010018#include <linux/proc_ns.h>
Serge E. Hallyn4865ecf2006-10-02 02:18:14 -070019
Alexey Dobriyan4c2a7e72009-06-17 16:27:54 -070020static struct uts_namespace *create_uts_ns(void)
21{
22 struct uts_namespace *uts_ns;
23
24 uts_ns = kmalloc(sizeof(struct uts_namespace), GFP_KERNEL);
25 if (uts_ns)
26 kref_init(&uts_ns->kref);
27 return uts_ns;
28}
29
Serge E. Hallyn4865ecf2006-10-02 02:18:14 -070030/*
Serge E. Hallyn071df102006-10-02 02:18:17 -070031 * Clone a new ns copying an original utsname, setting refcount to 1
32 * @old_ns: namespace to clone
Yuanhan Liubf531532013-02-27 17:05:30 -080033 * Return ERR_PTR(-ENOMEM) on error (failure to kmalloc), new ns otherwise
Serge E. Hallyn071df102006-10-02 02:18:17 -070034 */
Eric W. Biedermanbcf58e72012-07-26 04:02:49 -070035static struct uts_namespace *clone_uts_ns(struct user_namespace *user_ns,
Serge E. Hallynbb96a6f2011-03-23 16:43:18 -070036 struct uts_namespace *old_ns)
Serge E. Hallyn071df102006-10-02 02:18:17 -070037{
38 struct uts_namespace *ns;
Eric W. Biederman98f842e2011-06-15 10:21:48 -070039 int err;
Serge E. Hallyn071df102006-10-02 02:18:17 -070040
Alexey Dobriyan4c2a7e72009-06-17 16:27:54 -070041 ns = create_uts_ns();
Cedric Le Goater467e9f42007-07-15 23:41:06 -070042 if (!ns)
43 return ERR_PTR(-ENOMEM);
44
Eric W. Biederman98f842e2011-06-15 10:21:48 -070045 err = proc_alloc_inum(&ns->proc_inum);
46 if (err) {
47 kfree(ns);
48 return ERR_PTR(err);
49 }
50
Alexey Dobriyanefc63c42007-09-18 22:46:27 -070051 down_read(&uts_sem);
Cedric Le Goater467e9f42007-07-15 23:41:06 -070052 memcpy(&ns->name, &old_ns->name, sizeof(ns->name));
Eric W. Biedermanbcf58e72012-07-26 04:02:49 -070053 ns->user_ns = get_user_ns(user_ns);
Alexey Dobriyanefc63c42007-09-18 22:46:27 -070054 up_read(&uts_sem);
Serge E. Hallyn071df102006-10-02 02:18:17 -070055 return ns;
56}
57
58/*
Serge E. Hallyn4865ecf2006-10-02 02:18:14 -070059 * Copy task tsk's utsname namespace, or clone it if flags
60 * specifies CLONE_NEWUTS. In latter case, changes to the
61 * utsname of this process won't be seen by parent, and vice
62 * versa.
63 */
Serge E. Hallynbb96a6f2011-03-23 16:43:18 -070064struct uts_namespace *copy_utsname(unsigned long flags,
Eric W. Biedermanbcf58e72012-07-26 04:02:49 -070065 struct user_namespace *user_ns, struct uts_namespace *old_ns)
Serge E. Hallyn4865ecf2006-10-02 02:18:14 -070066{
Serge E. Hallyn071df102006-10-02 02:18:17 -070067 struct uts_namespace *new_ns;
Serge E. Hallyn4865ecf2006-10-02 02:18:14 -070068
Badari Pulavartye3222c42007-05-08 00:25:21 -070069 BUG_ON(!old_ns);
Serge E. Hallyn4865ecf2006-10-02 02:18:14 -070070 get_uts_ns(old_ns);
71
Serge E. Hallyn071df102006-10-02 02:18:17 -070072 if (!(flags & CLONE_NEWUTS))
Badari Pulavartye3222c42007-05-08 00:25:21 -070073 return old_ns;
Serge E. Hallyn071df102006-10-02 02:18:17 -070074
Eric W. Biedermanbcf58e72012-07-26 04:02:49 -070075 new_ns = clone_uts_ns(user_ns, old_ns);
Serge E. Hallyn071df102006-10-02 02:18:17 -070076
Serge E. Hallyn071df102006-10-02 02:18:17 -070077 put_uts_ns(old_ns);
Badari Pulavartye3222c42007-05-08 00:25:21 -070078 return new_ns;
Serge E. Hallyn4865ecf2006-10-02 02:18:14 -070079}
80
81void free_uts_ns(struct kref *kref)
82{
83 struct uts_namespace *ns;
84
85 ns = container_of(kref, struct uts_namespace, kref);
Serge E. Hallyn59607db2011-03-23 16:43:16 -070086 put_user_ns(ns->user_ns);
Eric W. Biederman98f842e2011-06-15 10:21:48 -070087 proc_free_inum(ns->proc_inum);
Serge E. Hallyn4865ecf2006-10-02 02:18:14 -070088 kfree(ns);
89}
Eric W. Biederman34482e82010-03-07 18:43:27 -080090
91static void *utsns_get(struct task_struct *task)
92{
93 struct uts_namespace *ns = NULL;
94 struct nsproxy *nsproxy;
95
96 rcu_read_lock();
97 nsproxy = task_nsproxy(task);
98 if (nsproxy) {
99 ns = nsproxy->uts_ns;
100 get_uts_ns(ns);
101 }
102 rcu_read_unlock();
103
104 return ns;
105}
106
107static void utsns_put(void *ns)
108{
109 put_uts_ns(ns);
110}
111
Eric W. Biederman142e1d12012-07-26 01:13:20 -0700112static int utsns_install(struct nsproxy *nsproxy, void *new)
Eric W. Biederman34482e82010-03-07 18:43:27 -0800113{
Eric W. Biederman142e1d12012-07-26 01:13:20 -0700114 struct uts_namespace *ns = new;
115
Eric W. Biederman5e4a0842012-12-14 07:55:36 -0800116 if (!ns_capable(ns->user_ns, CAP_SYS_ADMIN) ||
Eric W. Biedermanc7b96ac2013-03-20 12:49:49 -0700117 !ns_capable(current_user_ns(), CAP_SYS_ADMIN))
Eric W. Biederman142e1d12012-07-26 01:13:20 -0700118 return -EPERM;
119
Eric W. Biederman34482e82010-03-07 18:43:27 -0800120 get_uts_ns(ns);
121 put_uts_ns(nsproxy->uts_ns);
122 nsproxy->uts_ns = ns;
123 return 0;
124}
125
Eric W. Biederman98f842e2011-06-15 10:21:48 -0700126static unsigned int utsns_inum(void *vp)
127{
128 struct uts_namespace *ns = vp;
129
130 return ns->proc_inum;
131}
132
Eric W. Biederman34482e82010-03-07 18:43:27 -0800133const struct proc_ns_operations utsns_operations = {
134 .name = "uts",
135 .type = CLONE_NEWUTS,
136 .get = utsns_get,
137 .put = utsns_put,
138 .install = utsns_install,
Eric W. Biederman98f842e2011-06-15 10:21:48 -0700139 .inum = utsns_inum,
Eric W. Biederman34482e82010-03-07 18:43:27 -0800140};