📄 sys.c
字号:
/*
* linux/kernel/sys.c
*
* Copyright (C) 1991, 1992 Linus Torvalds
*/
#include <linux/config.h>
#include <linux/errno.h>
#include <linux/sched.h>
#include <linux/kernel.h>
#include <linux/times.h>
#include <linux/utsname.h>
#include <linux/param.h>
#include <linux/resource.h>
#include <linux/signal.h>
#include <linux/string.h>
#include <linux/ptrace.h>
#include <linux/stat.h>
#include <linux/mman.h>
#include <asm/segment.h>
#include <asm/io.h>
/*
* this indicates wether you can reboot with ctrl-alt-del: the default is yes
*/
static int C_A_D = 1;
extern void adjust_clock(void);
#define PZERO 15
static int proc_sel(struct task_struct *p, int which, int who)
{
switch (which) {
case PRIO_PROCESS:
if (!who && p == current)
return 1;
return(p->pid == who);
case PRIO_PGRP:
if (!who)
who = current->pgrp;
return(p->pgrp == who);
case PRIO_USER:
if (!who)
who = current->uid;
return(p->uid == who);
}
return 0;
}
asmlinkage int sys_setpriority(int which, int who, int niceval)
{
struct task_struct **p;
int error = ESRCH;
int priority;
if (which > 2 || which < 0)
return -EINVAL;
if ((priority = PZERO - niceval) <= 0)
priority = 1;
for(p = &LAST_TASK; p > &FIRST_TASK; --p) {
if (!*p || !proc_sel(*p, which, who))
continue;
if ((*p)->uid != current->euid &&
(*p)->uid != current->uid && !suser()) {
error = EPERM;
continue;
}
if (error == ESRCH)
error = 0;
if (priority > (*p)->priority && !suser())
error = EACCES;
else
(*p)->priority = priority;
}
return -error;
}
asmlinkage int sys_getpriority(int which, int who)
{
struct task_struct **p;
int max_prio = 0;
if (which > 2 || which < 0)
return -EINVAL;
for(p = &LAST_TASK; p > &FIRST_TASK; --p) {
if (!*p || !proc_sel(*p, which, who))
continue;
if ((*p)->priority > max_prio)
max_prio = (*p)->priority;
}
return(max_prio ? max_prio : -ESRCH);
}
asmlinkage int sys_profil(void)
{
return -ENOSYS;
}
asmlinkage int sys_ftime(void)
{
return -ENOSYS;
}
asmlinkage int sys_break(void)
{
return -ENOSYS;
}
asmlinkage int sys_stty(void)
{
return -ENOSYS;
}
asmlinkage int sys_gtty(void)
{
return -ENOSYS;
}
asmlinkage int sys_prof(void)
{
return -ENOSYS;
}
asmlinkage unsigned long save_v86_state(struct vm86_regs * regs)
{
unsigned long stack;
if (!current->vm86_info) {
printk("no vm86_info: BAD\n");
do_exit(SIGSEGV);
}
memcpy_tofs(&(current->vm86_info->regs),regs,sizeof(*regs));
put_fs_long(current->screen_bitmap,&(current->vm86_info->screen_bitmap));
stack = current->tss.esp0;
current->tss.esp0 = current->saved_kernel_stack;
current->saved_kernel_stack = 0;
return stack;
}
static void mark_screen_rdonly(struct task_struct * tsk)
{
unsigned long tmp;
unsigned long *pg_table;
if ((tmp = tsk->tss.cr3) != 0) {
tmp = *(unsigned long *) tmp;
if (tmp & PAGE_PRESENT) {
tmp &= PAGE_MASK;
pg_table = (0xA0000 >> PAGE_SHIFT) + (unsigned long *) tmp;
tmp = 32;
while (tmp--) {
if (PAGE_PRESENT & *pg_table)
*pg_table &= ~PAGE_RW;
pg_table++;
}
}
}
}
asmlinkage int sys_vm86(struct vm86_struct * v86)
{
struct vm86_struct info;
struct pt_regs * pt_regs = (struct pt_regs *) &v86;
if (current->saved_kernel_stack)
return -EPERM;
memcpy_fromfs(&info,v86,sizeof(info));
/*
* make sure the vm86() system call doesn't try to do anything silly
*/
info.regs.__null_ds = 0;
info.regs.__null_es = 0;
info.regs.__null_fs = 0;
info.regs.__null_gs = 0;
/*
* The eflags register is also special: we cannot trust that the user
* has set it up safely, so this makes sure interrupt etc flags are
* inherited from protected mode.
*/
info.regs.eflags &= 0x00000dd5;
info.regs.eflags |= ~0x00000dd5 & pt_regs->eflags;
info.regs.eflags |= VM_MASK;
current->saved_kernel_stack = current->tss.esp0;
current->tss.esp0 = (unsigned long) pt_regs;
current->vm86_info = v86;
current->screen_bitmap = info.screen_bitmap;
if (info.flags & VM86_SCREEN_BITMAP)
mark_screen_rdonly(current);
__asm__ __volatile__("movl %0,%%esp\n\t"
"pushl $ret_from_sys_call\n\t"
"ret"
: /* no outputs */
:"g" ((long) &(info.regs)),"a" (info.regs.eax));
return 0;
}
extern void hard_reset_now(void);
/*
* Reboot system call: for obvious reasons only root may call it,
* and even root needs to set up some magic numbers in the registers
* so that some mistake won't make this reboot the whole machine.
* You can also set the meaning of the ctrl-alt-del-key here.
*
* reboot doesn't sync: do that yourself before calling this.
*/
asmlinkage int sys_reboot(int magic, int magic_too, int flag)
{
if (!suser())
return -EPERM;
if (magic != 0xfee1dead || magic_too != 672274793)
return -EINVAL;
if (flag == 0x01234567)
hard_reset_now();
else if (flag == 0x89ABCDEF)
C_A_D = 1;
else if (!flag)
C_A_D = 0;
else
return -EINVAL;
return (0);
}
/*
* This function gets called by ctrl-alt-del - ie the keyboard interrupt.
* As it's called within an interrupt, it may NOT sync: the only choice
* is wether to reboot at once, or just ignore the ctrl-alt-del.
*/
void ctrl_alt_del(void)
{
if (C_A_D)
hard_reset_now();
else
send_sig(SIGINT,task[1],1);
}
/*
* This is done BSD-style, with no consideration of the saved gid, except
* that if you set the effective gid, it sets the saved gid too. This
* makes it possible for a setgid program to completely drop its privileges,
* which is often a useful assertion to make when you are doing a security
* audit over a program.
*
* The general idea is that a program which uses just setregid() will be
* 100% compatible with BSD. A program which uses just setgid() will be
* 100% compatible with POSIX w/ Saved ID's.
*/
asmlinkage int sys_setregid(gid_t rgid, gid_t egid)
{
int old_rgid = current->gid;
if (rgid != (gid_t) -1) {
if ((current->egid==rgid) ||
(old_rgid == rgid) ||
suser())
current->gid = rgid;
else
return(-EPERM);
}
if (egid != (gid_t) -1) {
if ((old_rgid == egid) ||
(current->egid == egid) ||
suser()) {
current->egid = egid;
current->sgid = egid;
} else {
current->gid = old_rgid;
return(-EPERM);
}
}
return 0;
}
/*
* setgid() is implemeneted like SysV w/ SAVED_IDS
*/
asmlinkage int sys_setgid(gid_t gid)
{
if (suser())
current->gid = current->egid = current->sgid = gid;
else if ((gid == current->gid) || (gid == current->sgid))
current->egid = gid;
else
return -EPERM;
return 0;
}
asmlinkage int sys_acct(void)
{
return -ENOSYS;
}
asmlinkage int sys_phys(void)
{
return -ENOSYS;
}
asmlinkage int sys_lock(void)
{
return -ENOSYS;
}
asmlinkage int sys_mpx(void)
{
return -ENOSYS;
}
asmlinkage int sys_ulimit(void)
{
return -ENOSYS;
}
asmlinkage int sys_old_syscall(void)
{
return -ENOSYS;
}
/*
* Unprivileged users may change the real user id to the effective uid
* or vice versa. (BSD-style)
*
* When you set the effective uid, it sets the saved uid too. This
* makes it possible for a setuid program to completely drop its privileges,
* which is often a useful assertion to make when you are doing a security
* audit over a program.
*
* The general idea is that a program which uses just setreuid() will be
* 100% compatible with BSD. A program which uses just setuid() will be
* 100% compatible with POSIX w/ Saved ID's.
*/
asmlinkage int sys_setreuid(uid_t ruid, uid_t euid)
{
int old_ruid = current->uid;
if (ruid != (uid_t) -1) {
if ((current->euid==ruid) ||
(old_ruid == ruid) ||
suser())
current->uid = ruid;
else
return(-EPERM);
}
if (euid != (uid_t) -1) {
if ((old_ruid == euid) ||
(current->euid == euid) ||
suser()) {
current->euid = euid;
current->suid = euid;
} else {
current->uid = old_ruid;
return(-EPERM);
}
}
return 0;
}
/*
* setuid() is implemeneted like SysV w/ SAVED_IDS
*
* Note that SAVED_ID's is deficient in that a setuid root program
* like sendmail, for example, cannot set its uid to be a normal
* user and then switch back, because if you're root, setuid() sets
* the saved uid too. If you don't like this, blame the bright people
* in the POSIX commmittee and/or USG. Note that the BSD-style setreuid()
* will allow a root program to temporarily drop privileges and be able to
* regain them by swapping the real and effective uid.
*/
asmlinkage int sys_setuid(uid_t uid)
{
if (suser())
current->uid = current->euid = current->suid = uid;
else if ((uid == current->uid) || (uid == current->suid))
current->euid = uid;
else
return -EPERM;
return(0);
}
asmlinkage int sys_times(struct tms * tbuf)
{
if (tbuf) {
int error = verify_area(VERIFY_WRITE,tbuf,sizeof *tbuf);
if (error)
return error;
put_fs_long(current->utime,(unsigned long *)&tbuf->tms_utime);
put_fs_long(current->stime,(unsigned long *)&tbuf->tms_stime);
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -