]>
Commit | Line | Data |
---|---|---|
34f192c6 IM |
1 | /* |
2 | * linux/kernel/futex_compat.c | |
3 | * | |
4 | * Futex compatibililty routines. | |
5 | * | |
6 | * Copyright 2006, Red Hat, Inc., Ingo Molnar | |
7 | */ | |
8 | ||
9 | #include <linux/linkage.h> | |
10 | #include <linux/compat.h> | |
b488893a | 11 | #include <linux/nsproxy.h> |
34f192c6 IM |
12 | #include <linux/futex.h> |
13 | ||
14 | #include <asm/uaccess.h> | |
15 | ||
e3f2ddea IM |
16 | |
17 | /* | |
18 | * Fetch a robust-list pointer. Bit 0 signals PI futexes: | |
19 | */ | |
20 | static inline int | |
21 | fetch_robust_entry(compat_uptr_t *uentry, struct robust_list __user **entry, | |
1dcc41bb | 22 | compat_uptr_t __user *head, unsigned int *pi) |
e3f2ddea IM |
23 | { |
24 | if (get_user(*uentry, head)) | |
25 | return -EFAULT; | |
26 | ||
27 | *entry = compat_ptr((*uentry) & ~1); | |
28 | *pi = (unsigned int)(*uentry) & 1; | |
29 | ||
30 | return 0; | |
31 | } | |
32 | ||
8481664d | 33 | static void __user *futex_uaddr(struct robust_list __user *entry, |
3c5fd9c7 DM |
34 | compat_long_t futex_offset) |
35 | { | |
36 | compat_uptr_t base = ptr_to_compat(entry); | |
37 | void __user *uaddr = compat_ptr(base + futex_offset); | |
38 | ||
39 | return uaddr; | |
40 | } | |
41 | ||
34f192c6 IM |
42 | /* |
43 | * Walk curr->robust_list (very carefully, it's a userspace list!) | |
44 | * and mark any locks found there dead, and notify any waiters. | |
45 | * | |
46 | * We silently return on any sign of list-walking problem. | |
47 | */ | |
48 | void compat_exit_robust_list(struct task_struct *curr) | |
49 | { | |
50 | struct compat_robust_list_head __user *head = curr->compat_robust_list; | |
9f96cb1e | 51 | struct robust_list __user *entry, *next_entry, *pending; |
4c115e95 DH |
52 | unsigned int limit = ROBUST_LIST_LIMIT, pi, pip; |
53 | unsigned int uninitialized_var(next_pi); | |
9f96cb1e | 54 | compat_uptr_t uentry, next_uentry, upending; |
34f192c6 | 55 | compat_long_t futex_offset; |
9f96cb1e | 56 | int rc; |
34f192c6 | 57 | |
a0c1e907 TG |
58 | if (!futex_cmpxchg_enabled) |
59 | return; | |
60 | ||
34f192c6 IM |
61 | /* |
62 | * Fetch the list head (which was registered earlier, via | |
63 | * sys_set_robust_list()): | |
64 | */ | |
e3f2ddea | 65 | if (fetch_robust_entry(&uentry, &entry, &head->list.next, &pi)) |
34f192c6 | 66 | return; |
34f192c6 IM |
67 | /* |
68 | * Fetch the relative futex offset: | |
69 | */ | |
70 | if (get_user(futex_offset, &head->futex_offset)) | |
71 | return; | |
72 | /* | |
73 | * Fetch any possibly pending lock-add first, and handle it | |
74 | * if it exists: | |
75 | */ | |
e3f2ddea | 76 | if (fetch_robust_entry(&upending, &pending, |
ce2c6b53 | 77 | &head->list_op_pending, &pip)) |
34f192c6 | 78 | return; |
34f192c6 | 79 | |
9f96cb1e | 80 | next_entry = NULL; /* avoid warning with gcc */ |
179c85ea | 81 | while (entry != (struct robust_list __user *) &head->list) { |
9f96cb1e MS |
82 | /* |
83 | * Fetch the next entry in the list before calling | |
84 | * handle_futex_death: | |
85 | */ | |
86 | rc = fetch_robust_entry(&next_uentry, &next_entry, | |
87 | (compat_uptr_t __user *)&entry->next, &next_pi); | |
34f192c6 IM |
88 | /* |
89 | * A pending lock might already be on the list, so | |
90 | * dont process it twice: | |
91 | */ | |
3c5fd9c7 DM |
92 | if (entry != pending) { |
93 | void __user *uaddr = futex_uaddr(entry, futex_offset); | |
34f192c6 | 94 | |
3c5fd9c7 DM |
95 | if (handle_futex_death(uaddr, curr, pi)) |
96 | return; | |
97 | } | |
9f96cb1e | 98 | if (rc) |
34f192c6 | 99 | return; |
9f96cb1e MS |
100 | uentry = next_uentry; |
101 | entry = next_entry; | |
102 | pi = next_pi; | |
34f192c6 IM |
103 | /* |
104 | * Avoid excessively long or circular lists: | |
105 | */ | |
106 | if (!--limit) | |
107 | break; | |
108 | ||
109 | cond_resched(); | |
110 | } | |
3c5fd9c7 DM |
111 | if (pending) { |
112 | void __user *uaddr = futex_uaddr(pending, futex_offset); | |
113 | ||
114 | handle_futex_death(uaddr, curr, pip); | |
115 | } | |
34f192c6 IM |
116 | } |
117 | ||
118 | asmlinkage long | |
119 | compat_sys_set_robust_list(struct compat_robust_list_head __user *head, | |
120 | compat_size_t len) | |
121 | { | |
a0c1e907 TG |
122 | if (!futex_cmpxchg_enabled) |
123 | return -ENOSYS; | |
124 | ||
34f192c6 IM |
125 | if (unlikely(len != sizeof(*head))) |
126 | return -EINVAL; | |
127 | ||
128 | current->compat_robust_list = head; | |
129 | ||
130 | return 0; | |
131 | } | |
132 | ||
133 | asmlinkage long | |
ba46df98 | 134 | compat_sys_get_robust_list(int pid, compat_uptr_t __user *head_ptr, |
34f192c6 IM |
135 | compat_size_t __user *len_ptr) |
136 | { | |
ba46df98 | 137 | struct compat_robust_list_head __user *head; |
34f192c6 | 138 | unsigned long ret; |
c69e8d9c | 139 | const struct cred *cred = current_cred(), *pcred; |
34f192c6 | 140 | |
a0c1e907 TG |
141 | if (!futex_cmpxchg_enabled) |
142 | return -ENOSYS; | |
143 | ||
34f192c6 IM |
144 | if (!pid) |
145 | head = current->compat_robust_list; | |
146 | else { | |
147 | struct task_struct *p; | |
148 | ||
149 | ret = -ESRCH; | |
f409adf5 | 150 | rcu_read_lock(); |
228ebcbe | 151 | p = find_task_by_vpid(pid); |
34f192c6 IM |
152 | if (!p) |
153 | goto err_unlock; | |
154 | ret = -EPERM; | |
c69e8d9c | 155 | pcred = __task_cred(p); |
b0e77598 SH |
156 | /* If victim is in different user_ns, then uids are not |
157 | comparable, so we must have CAP_SYS_PTRACE */ | |
158 | if (cred->user->user_ns != pcred->user->user_ns) { | |
159 | if (!ns_capable(pcred->user->user_ns, CAP_SYS_PTRACE)) | |
160 | goto err_unlock; | |
161 | goto ok; | |
162 | } | |
163 | /* If victim is in same user_ns, then uids are comparable */ | |
c69e8d9c DH |
164 | if (cred->euid != pcred->euid && |
165 | cred->euid != pcred->uid && | |
b0e77598 | 166 | !ns_capable(pcred->user->user_ns, CAP_SYS_PTRACE)) |
34f192c6 | 167 | goto err_unlock; |
b0e77598 | 168 | ok: |
34f192c6 | 169 | head = p->compat_robust_list; |
f409adf5 | 170 | rcu_read_unlock(); |
34f192c6 IM |
171 | } |
172 | ||
173 | if (put_user(sizeof(*head), len_ptr)) | |
174 | return -EFAULT; | |
175 | return put_user(ptr_to_compat(head), head_ptr); | |
176 | ||
177 | err_unlock: | |
f409adf5 | 178 | rcu_read_unlock(); |
34f192c6 IM |
179 | |
180 | return ret; | |
181 | } | |
182 | ||
8f17d3a5 | 183 | asmlinkage long compat_sys_futex(u32 __user *uaddr, int op, u32 val, |
34f192c6 | 184 | struct compat_timespec __user *utime, u32 __user *uaddr2, |
8f17d3a5 | 185 | u32 val3) |
34f192c6 | 186 | { |
c19384b5 PP |
187 | struct timespec ts; |
188 | ktime_t t, *tp = NULL; | |
34f192c6 | 189 | int val2 = 0; |
f0ede66f | 190 | int cmd = op & FUTEX_CMD_MASK; |
34f192c6 | 191 | |
cd689985 | 192 | if (utime && (cmd == FUTEX_WAIT || cmd == FUTEX_LOCK_PI || |
4dc88029 DG |
193 | cmd == FUTEX_WAIT_BITSET || |
194 | cmd == FUTEX_WAIT_REQUEUE_PI)) { | |
c19384b5 | 195 | if (get_compat_timespec(&ts, utime)) |
34f192c6 | 196 | return -EFAULT; |
c19384b5 | 197 | if (!timespec_valid(&ts)) |
9741ef96 | 198 | return -EINVAL; |
c19384b5 PP |
199 | |
200 | t = timespec_to_ktime(ts); | |
f0ede66f | 201 | if (cmd == FUTEX_WAIT) |
5a7780e7 | 202 | t = ktime_add_safe(ktime_get(), t); |
c19384b5 | 203 | tp = &t; |
34f192c6 | 204 | } |
4dc88029 DG |
205 | if (cmd == FUTEX_REQUEUE || cmd == FUTEX_CMP_REQUEUE || |
206 | cmd == FUTEX_CMP_REQUEUE_PI || cmd == FUTEX_WAKE_OP) | |
34f192c6 IM |
207 | val2 = (int) (unsigned long) utime; |
208 | ||
c19384b5 | 209 | return do_futex(uaddr, op, val, tp, uaddr2, val2, val3); |
34f192c6 | 210 | } |