sys.c 47.0 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6
/*
 *  linux/kernel/sys.c
 *
 *  Copyright (C) 1991, 1992  Linus Torvalds
 */

7
#include <linux/export.h>
L
Linus Torvalds 已提交
8 9 10 11 12 13 14
#include <linux/mm.h>
#include <linux/utsname.h>
#include <linux/mman.h>
#include <linux/reboot.h>
#include <linux/prctl.h>
#include <linux/highuid.h>
#include <linux/fs.h>
15
#include <linux/kmod.h>
16
#include <linux/perf_event.h>
17
#include <linux/resource.h>
18 19
#include <linux/kernel.h>
#include <linux/kexec.h>
L
Linus Torvalds 已提交
20
#include <linux/workqueue.h>
21
#include <linux/capability.h>
L
Linus Torvalds 已提交
22 23 24 25 26 27 28 29
#include <linux/device.h>
#include <linux/key.h>
#include <linux/times.h>
#include <linux/posix-timers.h>
#include <linux/security.h>
#include <linux/dcookies.h>
#include <linux/suspend.h>
#include <linux/tty.h>
30
#include <linux/signal.h>
M
Matt Helsley 已提交
31
#include <linux/cn_proc.h>
32
#include <linux/getcpu.h>
33
#include <linux/task_io_accounting_ops.h>
34
#include <linux/seccomp.h>
M
Mark Lord 已提交
35
#include <linux/cpu.h>
36
#include <linux/personality.h>
37
#include <linux/ptrace.h>
38
#include <linux/fs_struct.h>
39
#include <linux/gfp.h>
40
#include <linux/syscore_ops.h>
41 42
#include <linux/version.h>
#include <linux/ctype.h>
L
Linus Torvalds 已提交
43 44 45

#include <linux/compat.h>
#include <linux/syscalls.h>
46
#include <linux/kprobes.h>
47
#include <linux/user_namespace.h>
L
Linus Torvalds 已提交
48

49
#include <linux/kmsg_dump.h>
50 51
/* Move somewhere else to avoid recompiling? */
#include <generated/utsrelease.h>
52

L
Linus Torvalds 已提交
53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74
#include <asm/uaccess.h>
#include <asm/io.h>
#include <asm/unistd.h>

#ifndef SET_UNALIGN_CTL
# define SET_UNALIGN_CTL(a,b)	(-EINVAL)
#endif
#ifndef GET_UNALIGN_CTL
# define GET_UNALIGN_CTL(a,b)	(-EINVAL)
#endif
#ifndef SET_FPEMU_CTL
# define SET_FPEMU_CTL(a,b)	(-EINVAL)
#endif
#ifndef GET_FPEMU_CTL
# define GET_FPEMU_CTL(a,b)	(-EINVAL)
#endif
#ifndef SET_FPEXC_CTL
# define SET_FPEXC_CTL(a,b)	(-EINVAL)
#endif
#ifndef GET_FPEXC_CTL
# define GET_FPEXC_CTL(a,b)	(-EINVAL)
#endif
75 76 77 78 79 80
#ifndef GET_ENDIAN
# define GET_ENDIAN(a,b)	(-EINVAL)
#endif
#ifndef SET_ENDIAN
# define SET_ENDIAN(a,b)	(-EINVAL)
#endif
81 82 83 84 85 86
#ifndef GET_TSC_CTL
# define GET_TSC_CTL(a)		(-EINVAL)
#endif
#ifndef SET_TSC_CTL
# define SET_TSC_CTL(a)		(-EINVAL)
#endif
L
Linus Torvalds 已提交
87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114

/*
 * this is where the system-wide overflow UID and GID are defined, for
 * architectures that now have 32-bit UID/GID but didn't in the past
 */

int overflowuid = DEFAULT_OVERFLOWUID;
int overflowgid = DEFAULT_OVERFLOWGID;

EXPORT_SYMBOL(overflowuid);
EXPORT_SYMBOL(overflowgid);

/*
 * the same as above, but for filesystems which can only store a 16-bit
 * UID and GID. as such, this is needed on all architectures
 */

int fs_overflowuid = DEFAULT_FS_OVERFLOWUID;
int fs_overflowgid = DEFAULT_FS_OVERFLOWUID;

EXPORT_SYMBOL(fs_overflowuid);
EXPORT_SYMBOL(fs_overflowgid);

/*
 * this indicates whether you can reboot with ctrl-alt-del: the default is yes
 */

int C_A_D = 1;
115 116
struct pid *cad_pid;
EXPORT_SYMBOL(cad_pid);
L
Linus Torvalds 已提交
117

118 119 120 121 122 123
/*
 * If set, this is used for preparing the system to power off.
 */

void (*pm_power_off_prepare)(void);

124 125 126 127 128 129 130 131 132 133
/*
 * Returns true if current's euid is same as p's uid or euid,
 * or has CAP_SYS_NICE to p's user_ns.
 *
 * Called with rcu_read_lock, creds are safe
 */
static bool set_one_prio_perm(struct task_struct *p)
{
	const struct cred *cred = current_cred(), *pcred = __task_cred(p);

134
	if (pcred->user_ns == cred->user_ns &&
135 136 137
	    (pcred->uid  == cred->euid ||
	     pcred->euid == cred->euid))
		return true;
138
	if (ns_capable(pcred->user_ns, CAP_SYS_NICE))
139 140 141 142
		return true;
	return false;
}

143 144 145 146
/*
 * set the priority of a task
 * - the caller must hold the RCU read lock
 */
L
Linus Torvalds 已提交
147 148 149 150
static int set_one_prio(struct task_struct *p, int niceval, int error)
{
	int no_nice;

151
	if (!set_one_prio_perm(p)) {
L
Linus Torvalds 已提交
152 153 154
		error = -EPERM;
		goto out;
	}
M
Matt Mackall 已提交
155
	if (niceval < task_nice(p) && !can_nice(p, niceval)) {
L
Linus Torvalds 已提交
156 157 158 159 160 161 162 163 164 165 166 167 168 169 170
		error = -EACCES;
		goto out;
	}
	no_nice = security_task_setnice(p, niceval);
	if (no_nice) {
		error = no_nice;
		goto out;
	}
	if (error == -ESRCH)
		error = 0;
	set_user_nice(p, niceval);
out:
	return error;
}

171
SYSCALL_DEFINE3(setpriority, int, which, int, who, int, niceval)
L
Linus Torvalds 已提交
172 173 174
{
	struct task_struct *g, *p;
	struct user_struct *user;
175
	const struct cred *cred = current_cred();
L
Linus Torvalds 已提交
176
	int error = -EINVAL;
177
	struct pid *pgrp;
178
	kuid_t uid;
L
Linus Torvalds 已提交
179

180
	if (which > PRIO_USER || which < PRIO_PROCESS)
L
Linus Torvalds 已提交
181 182 183 184 185 186 187 188 189
		goto out;

	/* normalize: avoid signed division (rounding problems) */
	error = -ESRCH;
	if (niceval < -20)
		niceval = -20;
	if (niceval > 19)
		niceval = 19;

190
	rcu_read_lock();
L
Linus Torvalds 已提交
191 192 193
	read_lock(&tasklist_lock);
	switch (which) {
		case PRIO_PROCESS:
194
			if (who)
195
				p = find_task_by_vpid(who);
196 197
			else
				p = current;
L
Linus Torvalds 已提交
198 199 200 201
			if (p)
				error = set_one_prio(p, niceval, error);
			break;
		case PRIO_PGRP:
202
			if (who)
203
				pgrp = find_vpid(who);
204 205
			else
				pgrp = task_pgrp(current);
206
			do_each_pid_thread(pgrp, PIDTYPE_PGID, p) {
L
Linus Torvalds 已提交
207
				error = set_one_prio(p, niceval, error);
208
			} while_each_pid_thread(pgrp, PIDTYPE_PGID, p);
L
Linus Torvalds 已提交
209 210
			break;
		case PRIO_USER:
211
			uid = make_kuid(cred->user_ns, who);
212
			user = cred->user;
L
Linus Torvalds 已提交
213
			if (!who)
214 215
				uid = cred->uid;
			else if (!uid_eq(uid, cred->uid) &&
216
				 !(user = find_user(uid)))
217
				goto out_unlock;	/* No processes for this user */
L
Linus Torvalds 已提交
218

219
			do_each_thread(g, p) {
220
				if (uid_eq(task_uid(p), uid))
L
Linus Torvalds 已提交
221
					error = set_one_prio(p, niceval, error);
222
			} while_each_thread(g, p);
223
			if (!uid_eq(uid, cred->uid))
L
Linus Torvalds 已提交
224 225 226 227 228
				free_uid(user);		/* For find_user() */
			break;
	}
out_unlock:
	read_unlock(&tasklist_lock);
229
	rcu_read_unlock();
L
Linus Torvalds 已提交
230 231 232 233 234 235 236 237 238 239
out:
	return error;
}

/*
 * Ugh. To avoid negative return values, "getpriority()" will
 * not return the normal nice-value, but a negated value that
 * has been offset by 20 (ie it returns 40..1 instead of -20..19)
 * to stay compatible.
 */
240
SYSCALL_DEFINE2(getpriority, int, which, int, who)
L
Linus Torvalds 已提交
241 242 243
{
	struct task_struct *g, *p;
	struct user_struct *user;
244
	const struct cred *cred = current_cred();
L
Linus Torvalds 已提交
245
	long niceval, retval = -ESRCH;
246
	struct pid *pgrp;
247
	kuid_t uid;
L
Linus Torvalds 已提交
248

249
	if (which > PRIO_USER || which < PRIO_PROCESS)
L
Linus Torvalds 已提交
250 251
		return -EINVAL;

252
	rcu_read_lock();
L
Linus Torvalds 已提交
253 254 255
	read_lock(&tasklist_lock);
	switch (which) {
		case PRIO_PROCESS:
256
			if (who)
257
				p = find_task_by_vpid(who);
258 259
			else
				p = current;
L
Linus Torvalds 已提交
260 261 262 263 264 265 266
			if (p) {
				niceval = 20 - task_nice(p);
				if (niceval > retval)
					retval = niceval;
			}
			break;
		case PRIO_PGRP:
267
			if (who)
268
				pgrp = find_vpid(who);
269 270
			else
				pgrp = task_pgrp(current);
271
			do_each_pid_thread(pgrp, PIDTYPE_PGID, p) {
L
Linus Torvalds 已提交
272 273 274
				niceval = 20 - task_nice(p);
				if (niceval > retval)
					retval = niceval;
275
			} while_each_pid_thread(pgrp, PIDTYPE_PGID, p);
L
Linus Torvalds 已提交
276 277
			break;
		case PRIO_USER:
278
			uid = make_kuid(cred->user_ns, who);
279
			user = cred->user;
L
Linus Torvalds 已提交
280
			if (!who)
281 282
				uid = cred->uid;
			else if (!uid_eq(uid, cred->uid) &&
283
				 !(user = find_user(uid)))
284
				goto out_unlock;	/* No processes for this user */
L
Linus Torvalds 已提交
285

286
			do_each_thread(g, p) {
287
				if (uid_eq(task_uid(p), uid)) {
L
Linus Torvalds 已提交
288 289 290 291
					niceval = 20 - task_nice(p);
					if (niceval > retval)
						retval = niceval;
				}
292
			} while_each_thread(g, p);
293
			if (!uid_eq(uid, cred->uid))
L
Linus Torvalds 已提交
294 295 296 297 298
				free_uid(user);		/* for find_user() */
			break;
	}
out_unlock:
	read_unlock(&tasklist_lock);
299
	rcu_read_unlock();
L
Linus Torvalds 已提交
300 301 302 303

	return retval;
}

304 305 306 307 308 309 310 311
/**
 *	emergency_restart - reboot the system
 *
 *	Without shutting down any hardware or taking any locks
 *	reboot the system.  This is called when we know we are in
 *	trouble so this is our best effort to reboot.  This is
 *	safe to call in interrupt context.
 */
312 313
void emergency_restart(void)
{
314
	kmsg_dump(KMSG_DUMP_EMERG);
315 316 317 318
	machine_emergency_restart();
}
EXPORT_SYMBOL_GPL(emergency_restart);

319
void kernel_restart_prepare(char *cmd)
320
{
321
	blocking_notifier_call_chain(&reboot_notifier_list, SYS_RESTART, cmd);
322
	system_state = SYSTEM_RESTART;
323
	usermodehelper_disable();
324
	device_shutdown();
325
	syscore_shutdown();
326
}
327

328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358
/**
 *	register_reboot_notifier - Register function to be called at reboot time
 *	@nb: Info about notifier function to be called
 *
 *	Registers a function with the list of functions
 *	to be called at reboot time.
 *
 *	Currently always returns zero, as blocking_notifier_chain_register()
 *	always returns zero.
 */
int register_reboot_notifier(struct notifier_block *nb)
{
	return blocking_notifier_chain_register(&reboot_notifier_list, nb);
}
EXPORT_SYMBOL(register_reboot_notifier);

/**
 *	unregister_reboot_notifier - Unregister previously registered reboot notifier
 *	@nb: Hook to be unregistered
 *
 *	Unregisters a previously registered reboot
 *	notifier function.
 *
 *	Returns zero on success, or %-ENOENT on failure.
 */
int unregister_reboot_notifier(struct notifier_block *nb)
{
	return blocking_notifier_chain_unregister(&reboot_notifier_list, nb);
}
EXPORT_SYMBOL(unregister_reboot_notifier);

359 360 361
/**
 *	kernel_restart - reboot the system
 *	@cmd: pointer to buffer containing command to execute for restart
362
 *		or %NULL
363 364 365 366
 *
 *	Shutdown everything and perform a clean reboot.
 *	This is not safe to call in interrupt context.
 */
367 368 369
void kernel_restart(char *cmd)
{
	kernel_restart_prepare(cmd);
370
	if (!cmd)
371
		printk(KERN_EMERG "Restarting system.\n");
372
	else
373
		printk(KERN_EMERG "Restarting system with command '%s'.\n", cmd);
374
	kmsg_dump(KMSG_DUMP_RESTART);
375 376 377 378
	machine_restart(cmd);
}
EXPORT_SYMBOL_GPL(kernel_restart);

379
static void kernel_shutdown_prepare(enum system_states state)
380
{
381
	blocking_notifier_call_chain(&reboot_notifier_list,
382 383
		(state == SYSTEM_HALT)?SYS_HALT:SYS_POWER_OFF, NULL);
	system_state = state;
384
	usermodehelper_disable();
385 386
	device_shutdown();
}
387 388 389 390 391 392 393
/**
 *	kernel_halt - halt the system
 *
 *	Shutdown everything and perform a clean system halt.
 */
void kernel_halt(void)
{
394
	kernel_shutdown_prepare(SYSTEM_HALT);
395
	syscore_shutdown();
396
	printk(KERN_EMERG "System halted.\n");
397
	kmsg_dump(KMSG_DUMP_HALT);
398 399
	machine_halt();
}
400

401 402
EXPORT_SYMBOL_GPL(kernel_halt);

403 404 405 406 407 408 409
/**
 *	kernel_power_off - power_off the system
 *
 *	Shutdown everything and perform a clean system power_off.
 */
void kernel_power_off(void)
{
410
	kernel_shutdown_prepare(SYSTEM_POWER_OFF);
411 412
	if (pm_power_off_prepare)
		pm_power_off_prepare();
M
Mark Lord 已提交
413
	disable_nonboot_cpus();
414
	syscore_shutdown();
415
	printk(KERN_EMERG "Power down.\n");
416
	kmsg_dump(KMSG_DUMP_POWEROFF);
417 418 419
	machine_power_off();
}
EXPORT_SYMBOL_GPL(kernel_power_off);
T
Thomas Gleixner 已提交
420 421 422

static DEFINE_MUTEX(reboot_mutex);

L
Linus Torvalds 已提交
423 424 425 426 427 428 429 430
/*
 * Reboot system call: for obvious reasons only root may call it,
 * and even root needs to set up some magic numbers in the registers
 * so that some mistake won't make this reboot the whole machine.
 * You can also set the meaning of the ctrl-alt-del-key here.
 *
 * reboot doesn't sync: do that yourself before calling this.
 */
431 432
SYSCALL_DEFINE4(reboot, int, magic1, int, magic2, unsigned int, cmd,
		void __user *, arg)
L
Linus Torvalds 已提交
433 434
{
	char buffer[256];
435
	int ret = 0;
L
Linus Torvalds 已提交
436 437 438 439 440 441 442 443 444 445 446 447 448

	/* We only trust the superuser with rebooting the system. */
	if (!capable(CAP_SYS_BOOT))
		return -EPERM;

	/* For safety, we require "magic" arguments. */
	if (magic1 != LINUX_REBOOT_MAGIC1 ||
	    (magic2 != LINUX_REBOOT_MAGIC2 &&
	                magic2 != LINUX_REBOOT_MAGIC2A &&
			magic2 != LINUX_REBOOT_MAGIC2B &&
	                magic2 != LINUX_REBOOT_MAGIC2C))
		return -EINVAL;

449 450 451 452 453 454 455 456 457
	/*
	 * If pid namespaces are enabled and the current task is in a child
	 * pid_namespace, the command is handled by reboot_pid_ns() which will
	 * call do_exit().
	 */
	ret = reboot_pid_ns(task_active_pid_ns(current), cmd);
	if (ret)
		return ret;

458 459 460 461 462 463
	/* Instead of trying to make the power_off code look like
	 * halt when pm_power_off is not set do it the easy way.
	 */
	if ((cmd == LINUX_REBOOT_CMD_POWER_OFF) && !pm_power_off)
		cmd = LINUX_REBOOT_CMD_HALT;

T
Thomas Gleixner 已提交
464
	mutex_lock(&reboot_mutex);
L
Linus Torvalds 已提交
465 466
	switch (cmd) {
	case LINUX_REBOOT_CMD_RESTART:
467
		kernel_restart(NULL);
L
Linus Torvalds 已提交
468 469 470 471 472 473 474 475 476 477 478
		break;

	case LINUX_REBOOT_CMD_CAD_ON:
		C_A_D = 1;
		break;

	case LINUX_REBOOT_CMD_CAD_OFF:
		C_A_D = 0;
		break;

	case LINUX_REBOOT_CMD_HALT:
479
		kernel_halt();
L
Linus Torvalds 已提交
480
		do_exit(0);
481
		panic("cannot halt");
L
Linus Torvalds 已提交
482 483

	case LINUX_REBOOT_CMD_POWER_OFF:
484
		kernel_power_off();
L
Linus Torvalds 已提交
485 486 487 488 489
		do_exit(0);
		break;

	case LINUX_REBOOT_CMD_RESTART2:
		if (strncpy_from_user(&buffer[0], arg, sizeof(buffer) - 1) < 0) {
T
Thomas Gleixner 已提交
490 491
			ret = -EFAULT;
			break;
L
Linus Torvalds 已提交
492 493 494
		}
		buffer[sizeof(buffer) - 1] = '\0';

495
		kernel_restart(buffer);
L
Linus Torvalds 已提交
496 497
		break;

H
Huang Ying 已提交
498
#ifdef CONFIG_KEXEC
499
	case LINUX_REBOOT_CMD_KEXEC:
500 501
		ret = kernel_kexec();
		break;
H
Huang Ying 已提交
502
#endif
503

504
#ifdef CONFIG_HIBERNATION
L
Linus Torvalds 已提交
505
	case LINUX_REBOOT_CMD_SW_SUSPEND:
506 507
		ret = hibernate();
		break;
L
Linus Torvalds 已提交
508 509 510
#endif

	default:
511 512
		ret = -EINVAL;
		break;
L
Linus Torvalds 已提交
513
	}
T
Thomas Gleixner 已提交
514
	mutex_unlock(&reboot_mutex);
515
	return ret;
L
Linus Torvalds 已提交
516 517
}

518
static void deferred_cad(struct work_struct *dummy)
L
Linus Torvalds 已提交
519
{
520
	kernel_restart(NULL);
L
Linus Torvalds 已提交
521 522 523 524 525 526 527 528 529
}

/*
 * This function gets called by ctrl-alt-del - ie the keyboard interrupt.
 * As it's called within an interrupt, it may NOT sync: the only choice
 * is whether to reboot at once, or just ignore the ctrl-alt-del.
 */
void ctrl_alt_del(void)
{
530
	static DECLARE_WORK(cad_work, deferred_cad);
L
Linus Torvalds 已提交
531 532 533 534

	if (C_A_D)
		schedule_work(&cad_work);
	else
535
		kill_cad_pid(SIGINT, 1);
L
Linus Torvalds 已提交
536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555
}
	
/*
 * Unprivileged users may change the real gid to the effective gid
 * or vice versa.  (BSD-style)
 *
 * If you set the real gid at all, or set the effective gid to a value not
 * equal to the real gid, then the saved gid is set to the new effective gid.
 *
 * This makes it possible for a setgid program to completely drop its
 * privileges, which is often a useful assertion to make when you are doing
 * a security audit over a program.
 *
 * The general idea is that a program which uses just setregid() will be
 * 100% compatible with BSD.  A program which uses just setgid() will be
 * 100% compatible with POSIX with saved IDs. 
 *
 * SMP: There are not races, the GIDs are checked only by filesystem
 *      operations (as far as semantic preservation is concerned).
 */
556
SYSCALL_DEFINE2(setregid, gid_t, rgid, gid_t, egid)
L
Linus Torvalds 已提交
557
{
D
David Howells 已提交
558 559
	const struct cred *old;
	struct cred *new;
L
Linus Torvalds 已提交
560 561
	int retval;

D
David Howells 已提交
562 563 564 565 566 567
	new = prepare_creds();
	if (!new)
		return -ENOMEM;
	old = current_cred();

	retval = -EPERM;
L
Linus Torvalds 已提交
568
	if (rgid != (gid_t) -1) {
D
David Howells 已提交
569 570
		if (old->gid == rgid ||
		    old->egid == rgid ||
571
		    nsown_capable(CAP_SETGID))
D
David Howells 已提交
572
			new->gid = rgid;
L
Linus Torvalds 已提交
573
		else
D
David Howells 已提交
574
			goto error;
L
Linus Torvalds 已提交
575 576
	}
	if (egid != (gid_t) -1) {
D
David Howells 已提交
577 578 579
		if (old->gid == egid ||
		    old->egid == egid ||
		    old->sgid == egid ||
580
		    nsown_capable(CAP_SETGID))
D
David Howells 已提交
581
			new->egid = egid;
582
		else
D
David Howells 已提交
583
			goto error;
L
Linus Torvalds 已提交
584
	}
D
David Howells 已提交
585

L
Linus Torvalds 已提交
586
	if (rgid != (gid_t) -1 ||
D
David Howells 已提交
587 588 589 590 591 592 593 594 595
	    (egid != (gid_t) -1 && egid != old->gid))
		new->sgid = new->egid;
	new->fsgid = new->egid;

	return commit_creds(new);

error:
	abort_creds(new);
	return retval;
L
Linus Torvalds 已提交
596 597 598 599 600 601 602
}

/*
 * setgid() is implemented like SysV w/ SAVED_IDS 
 *
 * SMP: Same implicit races as above.
 */
603
SYSCALL_DEFINE1(setgid, gid_t, gid)
L
Linus Torvalds 已提交
604
{
D
David Howells 已提交
605 606
	const struct cred *old;
	struct cred *new;
L
Linus Torvalds 已提交
607 608
	int retval;

D
David Howells 已提交
609 610 611 612 613 614
	new = prepare_creds();
	if (!new)
		return -ENOMEM;
	old = current_cred();

	retval = -EPERM;
615
	if (nsown_capable(CAP_SETGID))
D
David Howells 已提交
616 617 618
		new->gid = new->egid = new->sgid = new->fsgid = gid;
	else if (gid == old->gid || gid == old->sgid)
		new->egid = new->fsgid = gid;
L
Linus Torvalds 已提交
619
	else
D
David Howells 已提交
620
		goto error;
L
Linus Torvalds 已提交
621

D
David Howells 已提交
622 623 624 625 626
	return commit_creds(new);

error:
	abort_creds(new);
	return retval;
L
Linus Torvalds 已提交
627
}
628

D
David Howells 已提交
629 630 631 632
/*
 * change the user struct in a credentials set to match the new UID
 */
static int set_user(struct cred *new)
L
Linus Torvalds 已提交
633 634 635
{
	struct user_struct *new_user;

636
	new_user = alloc_uid(new->uid);
L
Linus Torvalds 已提交
637 638 639
	if (!new_user)
		return -EAGAIN;

640 641 642 643 644 645 646
	/*
	 * We don't fail in case of NPROC limit excess here because too many
	 * poorly written programs don't check set*uid() return code, assuming
	 * it never fails if called by root.  We may still enforce NPROC limit
	 * for programs doing set*uid()+execve() by harmlessly deferring the
	 * failure to the execve() stage.
	 */
647
	if (atomic_read(&new_user->processes) >= rlimit(RLIMIT_NPROC) &&
648 649 650 651
			new_user != INIT_USER)
		current->flags |= PF_NPROC_EXCEEDED;
	else
		current->flags &= ~PF_NPROC_EXCEEDED;
L
Linus Torvalds 已提交
652

D
David Howells 已提交
653 654
	free_uid(new->user);
	new->user = new_user;
L
Linus Torvalds 已提交
655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672
	return 0;
}

/*
 * Unprivileged users may change the real uid to the effective uid
 * or vice versa.  (BSD-style)
 *
 * If you set the real uid at all, or set the effective uid to a value not
 * equal to the real uid, then the saved uid is set to the new effective uid.
 *
 * This makes it possible for a setuid program to completely drop its
 * privileges, which is often a useful assertion to make when you are doing
 * a security audit over a program.
 *
 * The general idea is that a program which uses just setreuid() will be
 * 100% compatible with BSD.  A program which uses just setuid() will be
 * 100% compatible with POSIX with saved IDs. 
 */
673
SYSCALL_DEFINE2(setreuid, uid_t, ruid, uid_t, euid)
L
Linus Torvalds 已提交
674
{
D
David Howells 已提交
675 676
	const struct cred *old;
	struct cred *new;
L
Linus Torvalds 已提交
677 678
	int retval;

D
David Howells 已提交
679 680 681 682 683 684
	new = prepare_creds();
	if (!new)
		return -ENOMEM;
	old = current_cred();

	retval = -EPERM;
L
Linus Torvalds 已提交
685
	if (ruid != (uid_t) -1) {
D
David Howells 已提交
686 687 688
		new->uid = ruid;
		if (old->uid != ruid &&
		    old->euid != ruid &&
689
		    !nsown_capable(CAP_SETUID))
D
David Howells 已提交
690
			goto error;
L
Linus Torvalds 已提交
691 692 693
	}

	if (euid != (uid_t) -1) {
D
David Howells 已提交
694 695 696 697
		new->euid = euid;
		if (old->uid != euid &&
		    old->euid != euid &&
		    old->suid != euid &&
698
		    !nsown_capable(CAP_SETUID))
D
David Howells 已提交
699
			goto error;
L
Linus Torvalds 已提交
700 701
	}

702 703 704 705 706
	if (new->uid != old->uid) {
		retval = set_user(new);
		if (retval < 0)
			goto error;
	}
L
Linus Torvalds 已提交
707
	if (ruid != (uid_t) -1 ||
D
David Howells 已提交
708 709 710
	    (euid != (uid_t) -1 && euid != old->uid))
		new->suid = new->euid;
	new->fsuid = new->euid;
L
Linus Torvalds 已提交
711

D
David Howells 已提交
712 713 714
	retval = security_task_fix_setuid(new, old, LSM_SETID_RE);
	if (retval < 0)
		goto error;
L
Linus Torvalds 已提交
715

D
David Howells 已提交
716
	return commit_creds(new);
L
Linus Torvalds 已提交
717

D
David Howells 已提交
718 719 720 721
error:
	abort_creds(new);
	return retval;
}
L
Linus Torvalds 已提交
722 723 724 725 726 727 728 729 730 731 732 733
		
/*
 * setuid() is implemented like SysV with SAVED_IDS 
 * 
 * Note that SAVED_ID's is deficient in that a setuid root program
 * like sendmail, for example, cannot set its uid to be a normal 
 * user and then switch back, because if you're root, setuid() sets
 * the saved uid too.  If you don't like this, blame the bright people
 * in the POSIX committee and/or USG.  Note that the BSD-style setreuid()
 * will allow a root program to temporarily drop privileges and be able to
 * regain them by swapping the real and effective uid.  
 */
734
SYSCALL_DEFINE1(setuid, uid_t, uid)
L
Linus Torvalds 已提交
735
{
D
David Howells 已提交
736 737
	const struct cred *old;
	struct cred *new;
L
Linus Torvalds 已提交
738 739
	int retval;

D
David Howells 已提交
740 741 742 743 744 745
	new = prepare_creds();
	if (!new)
		return -ENOMEM;
	old = current_cred();

	retval = -EPERM;
746
	if (nsown_capable(CAP_SETUID)) {
D
David Howells 已提交
747
		new->suid = new->uid = uid;
748 749 750 751
		if (uid != old->uid) {
			retval = set_user(new);
			if (retval < 0)
				goto error;
D
David Howells 已提交
752 753 754
		}
	} else if (uid != old->uid && uid != new->suid) {
		goto error;
L
Linus Torvalds 已提交
755 756
	}

D
David Howells 已提交
757 758 759 760 761
	new->fsuid = new->euid = uid;

	retval = security_task_fix_setuid(new, old, LSM_SETID_ID);
	if (retval < 0)
		goto error;
L
Linus Torvalds 已提交
762

D
David Howells 已提交
763
	return commit_creds(new);
L
Linus Torvalds 已提交
764

D
David Howells 已提交
765 766 767
error:
	abort_creds(new);
	return retval;
L
Linus Torvalds 已提交
768 769 770 771 772 773 774
}


/*
 * This function implements a generic ability to update ruid, euid,
 * and suid.  This allows you to implement the 4.4 compatible seteuid().
 */
775
SYSCALL_DEFINE3(setresuid, uid_t, ruid, uid_t, euid, uid_t, suid)
L
Linus Torvalds 已提交
776
{
D
David Howells 已提交
777 778
	const struct cred *old;
	struct cred *new;
L
Linus Torvalds 已提交
779 780
	int retval;

D
David Howells 已提交
781 782 783 784 785
	new = prepare_creds();
	if (!new)
		return -ENOMEM;

	old = current_cred();
L
Linus Torvalds 已提交
786

D
David Howells 已提交
787
	retval = -EPERM;
788
	if (!nsown_capable(CAP_SETUID)) {
D
David Howells 已提交
789 790 791 792 793 794 795 796 797
		if (ruid != (uid_t) -1 && ruid != old->uid &&
		    ruid != old->euid  && ruid != old->suid)
			goto error;
		if (euid != (uid_t) -1 && euid != old->uid &&
		    euid != old->euid  && euid != old->suid)
			goto error;
		if (suid != (uid_t) -1 && suid != old->uid &&
		    suid != old->euid  && suid != old->suid)
			goto error;
L
Linus Torvalds 已提交
798
	}
D
David Howells 已提交
799

L
Linus Torvalds 已提交
800
	if (ruid != (uid_t) -1) {
D
David Howells 已提交
801
		new->uid = ruid;
802 803 804 805 806
		if (ruid != old->uid) {
			retval = set_user(new);
			if (retval < 0)
				goto error;
		}
L
Linus Torvalds 已提交
807
	}
D
David Howells 已提交
808 809
	if (euid != (uid_t) -1)
		new->euid = euid;
L
Linus Torvalds 已提交
810
	if (suid != (uid_t) -1)
D
David Howells 已提交
811 812
		new->suid = suid;
	new->fsuid = new->euid;
L
Linus Torvalds 已提交
813

D
David Howells 已提交
814 815 816
	retval = security_task_fix_setuid(new, old, LSM_SETID_RES);
	if (retval < 0)
		goto error;
L
Linus Torvalds 已提交
817

D
David Howells 已提交
818
	return commit_creds(new);
L
Linus Torvalds 已提交
819

D
David Howells 已提交
820 821 822
error:
	abort_creds(new);
	return retval;
L
Linus Torvalds 已提交
823 824
}

825
SYSCALL_DEFINE3(getresuid, uid_t __user *, ruid, uid_t __user *, euid, uid_t __user *, suid)
L
Linus Torvalds 已提交
826
{
827
	const struct cred *cred = current_cred();
L
Linus Torvalds 已提交
828 829
	int retval;

830 831
	if (!(retval   = put_user(cred->uid,  ruid)) &&
	    !(retval   = put_user(cred->euid, euid)))
832
		retval = put_user(cred->suid, suid);
L
Linus Torvalds 已提交
833 834 835 836 837 838 839

	return retval;
}

/*
 * Same as above, but for rgid, egid, sgid.
 */
840
SYSCALL_DEFINE3(setresgid, gid_t, rgid, gid_t, egid, gid_t, sgid)
L
Linus Torvalds 已提交
841
{
D
David Howells 已提交
842 843
	const struct cred *old;
	struct cred *new;
L
Linus Torvalds 已提交
844 845
	int retval;

D
David Howells 已提交
846 847 848 849 850 851
	new = prepare_creds();
	if (!new)
		return -ENOMEM;
	old = current_cred();

	retval = -EPERM;
852
	if (!nsown_capable(CAP_SETGID)) {
D
David Howells 已提交
853 854 855 856 857 858 859 860 861
		if (rgid != (gid_t) -1 && rgid != old->gid &&
		    rgid != old->egid  && rgid != old->sgid)
			goto error;
		if (egid != (gid_t) -1 && egid != old->gid &&
		    egid != old->egid  && egid != old->sgid)
			goto error;
		if (sgid != (gid_t) -1 && sgid != old->gid &&
		    sgid != old->egid  && sgid != old->sgid)
			goto error;
L
Linus Torvalds 已提交
862
	}
D
David Howells 已提交
863

L
Linus Torvalds 已提交
864
	if (rgid != (gid_t) -1)
D
David Howells 已提交
865 866 867
		new->gid = rgid;
	if (egid != (gid_t) -1)
		new->egid = egid;
L
Linus Torvalds 已提交
868
	if (sgid != (gid_t) -1)
D
David Howells 已提交
869 870
		new->sgid = sgid;
	new->fsgid = new->egid;
L
Linus Torvalds 已提交
871

D
David Howells 已提交
872 873 874 875 876
	return commit_creds(new);

error:
	abort_creds(new);
	return retval;
L
Linus Torvalds 已提交
877 878
}

879
SYSCALL_DEFINE3(getresgid, gid_t __user *, rgid, gid_t __user *, egid, gid_t __user *, sgid)
L
Linus Torvalds 已提交
880
{
881
	const struct cred *cred = current_cred();
L
Linus Torvalds 已提交
882 883
	int retval;

884 885
	if (!(retval   = put_user(cred->gid,  rgid)) &&
	    !(retval   = put_user(cred->egid, egid)))
886
		retval = put_user(cred->sgid, sgid);
L
Linus Torvalds 已提交
887 888 889 890 891 892 893 894 895 896 897

	return retval;
}


/*
 * "setfsuid()" sets the fsuid - the uid used for filesystem checks. This
 * is used for "access()" and for the NFS daemon (letting nfsd stay at
 * whatever uid it wants to). It normally shadows "euid", except when
 * explicitly set by setfsuid() or for access..
 */
898
SYSCALL_DEFINE1(setfsuid, uid_t, uid)
L
Linus Torvalds 已提交
899
{
D
David Howells 已提交
900 901 902
	const struct cred *old;
	struct cred *new;
	uid_t old_fsuid;
L
Linus Torvalds 已提交
903

D
David Howells 已提交
904 905 906 907 908
	new = prepare_creds();
	if (!new)
		return current_fsuid();
	old = current_cred();
	old_fsuid = old->fsuid;
L
Linus Torvalds 已提交
909

D
David Howells 已提交
910 911
	if (uid == old->uid  || uid == old->euid  ||
	    uid == old->suid || uid == old->fsuid ||
912
	    nsown_capable(CAP_SETUID)) {
913
		if (uid != old_fsuid) {
D
David Howells 已提交
914 915 916
			new->fsuid = uid;
			if (security_task_fix_setuid(new, old, LSM_SETID_FS) == 0)
				goto change_okay;
L
Linus Torvalds 已提交
917 918 919
		}
	}

D
David Howells 已提交
920 921
	abort_creds(new);
	return old_fsuid;
L
Linus Torvalds 已提交
922

D
David Howells 已提交
923 924
change_okay:
	commit_creds(new);
L
Linus Torvalds 已提交
925 926 927 928
	return old_fsuid;
}

/*
929
 * Samma på svenska..
L
Linus Torvalds 已提交
930
 */
931
SYSCALL_DEFINE1(setfsgid, gid_t, gid)
L
Linus Torvalds 已提交
932
{
D
David Howells 已提交
933 934 935 936 937 938 939 940 941
	const struct cred *old;
	struct cred *new;
	gid_t old_fsgid;

	new = prepare_creds();
	if (!new)
		return current_fsgid();
	old = current_cred();
	old_fsgid = old->fsgid;
L
Linus Torvalds 已提交
942

D
David Howells 已提交
943 944
	if (gid == old->gid  || gid == old->egid  ||
	    gid == old->sgid || gid == old->fsgid ||
945
	    nsown_capable(CAP_SETGID)) {
946
		if (gid != old_fsgid) {
D
David Howells 已提交
947 948
			new->fsgid = gid;
			goto change_okay;
L
Linus Torvalds 已提交
949 950
		}
	}
D
David Howells 已提交
951 952 953 954 955 956

	abort_creds(new);
	return old_fsgid;

change_okay:
	commit_creds(new);
L
Linus Torvalds 已提交
957 958 959
	return old_fsgid;
}

960 961
void do_sys_times(struct tms *tms)
{
962
	cputime_t tgutime, tgstime, cutime, cstime;
963

964
	spin_lock_irq(&current->sighand->siglock);
965
	thread_group_times(current, &tgutime, &tgstime);
966 967 968
	cutime = current->signal->cutime;
	cstime = current->signal->cstime;
	spin_unlock_irq(&current->sighand->siglock);
969 970
	tms->tms_utime = cputime_to_clock_t(tgutime);
	tms->tms_stime = cputime_to_clock_t(tgstime);
971 972 973 974
	tms->tms_cutime = cputime_to_clock_t(cutime);
	tms->tms_cstime = cputime_to_clock_t(cstime);
}

975
SYSCALL_DEFINE1(times, struct tms __user *, tbuf)
L
Linus Torvalds 已提交
976 977 978
{
	if (tbuf) {
		struct tms tmp;
979 980

		do_sys_times(&tmp);
L
Linus Torvalds 已提交
981 982 983
		if (copy_to_user(tbuf, &tmp, sizeof(struct tms)))
			return -EFAULT;
	}
984
	force_successful_syscall_return();
L
Linus Torvalds 已提交
985 986 987 988 989 990 991 992 993 994 995 996 997 998 999
	return (long) jiffies_64_to_clock_t(get_jiffies_64());
}

/*
 * This needs some heavy checking ...
 * I just haven't the stomach for it. I also don't fully
 * understand sessions/pgrp etc. Let somebody who does explain it.
 *
 * OK, I think I have the protection semantics right.... this is really
 * only important on a multi-user system anyway, to make sure one user
 * can't send a signal to a process owned by another.  -TYT, 12/12/91
 *
 * Auch. Had to add the 'did_exec' flag to conform completely to POSIX.
 * LBT 04.03.94
 */
1000
SYSCALL_DEFINE2(setpgid, pid_t, pid, pid_t, pgid)
L
Linus Torvalds 已提交
1001 1002
{
	struct task_struct *p;
1003
	struct task_struct *group_leader = current->group_leader;
1004 1005
	struct pid *pgrp;
	int err;
L
Linus Torvalds 已提交
1006 1007

	if (!pid)
1008
		pid = task_pid_vnr(group_leader);
L
Linus Torvalds 已提交
1009 1010 1011 1012
	if (!pgid)
		pgid = pid;
	if (pgid < 0)
		return -EINVAL;
1013
	rcu_read_lock();
L
Linus Torvalds 已提交
1014 1015 1016 1017 1018 1019 1020

	/* From this point forward we keep holding onto the tasklist lock
	 * so that our parent does not change from under us. -DaveM
	 */
	write_lock_irq(&tasklist_lock);

	err = -ESRCH;
1021
	p = find_task_by_vpid(pid);
L
Linus Torvalds 已提交
1022 1023 1024 1025 1026 1027 1028
	if (!p)
		goto out;

	err = -EINVAL;
	if (!thread_group_leader(p))
		goto out;

1029
	if (same_thread_group(p->real_parent, group_leader)) {
L
Linus Torvalds 已提交
1030
		err = -EPERM;
1031
		if (task_session(p) != task_session(group_leader))
L
Linus Torvalds 已提交
1032 1033 1034 1035 1036 1037
			goto out;
		err = -EACCES;
		if (p->did_exec)
			goto out;
	} else {
		err = -ESRCH;
1038
		if (p != group_leader)
L
Linus Torvalds 已提交
1039 1040 1041 1042 1043 1044 1045
			goto out;
	}

	err = -EPERM;
	if (p->signal->leader)
		goto out;

1046
	pgrp = task_pid(p);
L
Linus Torvalds 已提交
1047
	if (pgid != pid) {
1048
		struct task_struct *g;
L
Linus Torvalds 已提交
1049

1050 1051
		pgrp = find_vpid(pgid);
		g = pid_task(pgrp, PIDTYPE_PGID);
1052
		if (!g || task_session(g) != task_session(group_leader))
1053
			goto out;
L
Linus Torvalds 已提交
1054 1055 1056 1057 1058 1059
	}

	err = security_task_setpgid(p, pgid);
	if (err)
		goto out;

1060
	if (task_pgrp(p) != pgrp)
1061
		change_pid(p, PIDTYPE_PGID, pgrp);
L
Linus Torvalds 已提交
1062 1063 1064 1065 1066

	err = 0;
out:
	/* All paths lead to here, thus we are safe. -DaveM */
	write_unlock_irq(&tasklist_lock);
1067
	rcu_read_unlock();
L
Linus Torvalds 已提交
1068 1069 1070
	return err;
}

1071
SYSCALL_DEFINE1(getpgid, pid_t, pid)
L
Linus Torvalds 已提交
1072
{
1073 1074 1075 1076 1077
	struct task_struct *p;
	struct pid *grp;
	int retval;

	rcu_read_lock();
1078
	if (!pid)
1079
		grp = task_pgrp(current);
1080
	else {
L
Linus Torvalds 已提交
1081
		retval = -ESRCH;
1082 1083 1084 1085 1086 1087 1088 1089 1090 1091
		p = find_task_by_vpid(pid);
		if (!p)
			goto out;
		grp = task_pgrp(p);
		if (!grp)
			goto out;

		retval = security_task_getpgid(p);
		if (retval)
			goto out;
L
Linus Torvalds 已提交
1092
	}
1093 1094 1095 1096
	retval = pid_vnr(grp);
out:
	rcu_read_unlock();
	return retval;
L
Linus Torvalds 已提交
1097 1098 1099 1100
}

#ifdef __ARCH_WANT_SYS_GETPGRP

1101
SYSCALL_DEFINE0(getpgrp)
L
Linus Torvalds 已提交
1102
{
1103
	return sys_getpgid(0);
L
Linus Torvalds 已提交
1104 1105 1106 1107
}

#endif

1108
SYSCALL_DEFINE1(getsid, pid_t, pid)
L
Linus Torvalds 已提交
1109
{
1110 1111 1112 1113 1114
	struct task_struct *p;
	struct pid *sid;
	int retval;

	rcu_read_lock();
1115
	if (!pid)
1116
		sid = task_session(current);
1117
	else {
L
Linus Torvalds 已提交
1118
		retval = -ESRCH;
1119 1120 1121 1122 1123 1124 1125 1126 1127 1128
		p = find_task_by_vpid(pid);
		if (!p)
			goto out;
		sid = task_session(p);
		if (!sid)
			goto out;

		retval = security_task_getsid(p);
		if (retval)
			goto out;
L
Linus Torvalds 已提交
1129
	}
1130 1131 1132 1133
	retval = pid_vnr(sid);
out:
	rcu_read_unlock();
	return retval;
L
Linus Torvalds 已提交
1134 1135
}

1136
SYSCALL_DEFINE0(setsid)
L
Linus Torvalds 已提交
1137
{
1138
	struct task_struct *group_leader = current->group_leader;
1139 1140
	struct pid *sid = task_pid(group_leader);
	pid_t session = pid_vnr(sid);
L
Linus Torvalds 已提交
1141 1142 1143
	int err = -EPERM;

	write_lock_irq(&tasklist_lock);
1144 1145 1146 1147
	/* Fail if I am already a session leader */
	if (group_leader->signal->leader)
		goto out;

1148 1149
	/* Fail if a process group id already exists that equals the
	 * proposed session id.
1150
	 */
1151
	if (pid_task(sid, PIDTYPE_PGID))
L
Linus Torvalds 已提交
1152 1153
		goto out;

1154
	group_leader->signal->leader = 1;
1155
	__set_special_pids(sid);
1156

A
Alan Cox 已提交
1157
	proc_clear_tty(group_leader);
1158

1159
	err = session;
L
Linus Torvalds 已提交
1160 1161
out:
	write_unlock_irq(&tasklist_lock);
1162
	if (err > 0) {
1163
		proc_sid_connector(group_leader);
1164 1165
		sched_autogroup_create_attach(group_leader);
	}
L
Linus Torvalds 已提交
1166 1167 1168 1169 1170
	return err;
}

DECLARE_RWSEM(uts_sem);

1171 1172
#ifdef COMPAT_UTS_MACHINE
#define override_architecture(name) \
1173
	(personality(current->personality) == PER_LINUX32 && \
1174 1175 1176 1177 1178 1179
	 copy_to_user(name->machine, COMPAT_UTS_MACHINE, \
		      sizeof(COMPAT_UTS_MACHINE)))
#else
#define override_architecture(name)	0
#endif

1180 1181 1182 1183 1184 1185 1186
/*
 * Work around broken programs that cannot handle "Linux 3.0".
 * Instead we map 3.x to 2.6.40+x, so e.g. 3.0 would be 2.6.40
 */
static int override_release(char __user *release, int len)
{
	int ret = 0;
1187
	char buf[65];
1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207

	if (current->personality & UNAME26) {
		char *rest = UTS_RELEASE;
		int ndots = 0;
		unsigned v;

		while (*rest) {
			if (*rest == '.' && ++ndots >= 3)
				break;
			if (!isdigit(*rest) && *rest != '.')
				break;
			rest++;
		}
		v = ((LINUX_VERSION_CODE >> 8) & 0xff) + 40;
		snprintf(buf, len, "2.6.%u%s", v, rest);
		ret = copy_to_user(release, buf, len);
	}
	return ret;
}

1208
SYSCALL_DEFINE1(newuname, struct new_utsname __user *, name)
L
Linus Torvalds 已提交
1209 1210 1211 1212
{
	int errno = 0;

	down_read(&uts_sem);
1213
	if (copy_to_user(name, utsname(), sizeof *name))
L
Linus Torvalds 已提交
1214 1215
		errno = -EFAULT;
	up_read(&uts_sem);
1216

1217 1218
	if (!errno && override_release(name->release, sizeof(name->release)))
		errno = -EFAULT;
1219 1220
	if (!errno && override_architecture(name))
		errno = -EFAULT;
L
Linus Torvalds 已提交
1221 1222 1223
	return errno;
}

C
Christoph Hellwig 已提交
1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239
#ifdef __ARCH_WANT_SYS_OLD_UNAME
/*
 * Old cruft
 */
SYSCALL_DEFINE1(uname, struct old_utsname __user *, name)
{
	int error = 0;

	if (!name)
		return -EFAULT;

	down_read(&uts_sem);
	if (copy_to_user(name, utsname(), sizeof(*name)))
		error = -EFAULT;
	up_read(&uts_sem);

1240 1241
	if (!error && override_release(name->release, sizeof(name->release)))
		error = -EFAULT;
C
Christoph Hellwig 已提交
1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275
	if (!error && override_architecture(name))
		error = -EFAULT;
	return error;
}

SYSCALL_DEFINE1(olduname, struct oldold_utsname __user *, name)
{
	int error;

	if (!name)
		return -EFAULT;
	if (!access_ok(VERIFY_WRITE, name, sizeof(struct oldold_utsname)))
		return -EFAULT;

	down_read(&uts_sem);
	error = __copy_to_user(&name->sysname, &utsname()->sysname,
			       __OLD_UTS_LEN);
	error |= __put_user(0, name->sysname + __OLD_UTS_LEN);
	error |= __copy_to_user(&name->nodename, &utsname()->nodename,
				__OLD_UTS_LEN);
	error |= __put_user(0, name->nodename + __OLD_UTS_LEN);
	error |= __copy_to_user(&name->release, &utsname()->release,
				__OLD_UTS_LEN);
	error |= __put_user(0, name->release + __OLD_UTS_LEN);
	error |= __copy_to_user(&name->version, &utsname()->version,
				__OLD_UTS_LEN);
	error |= __put_user(0, name->version + __OLD_UTS_LEN);
	error |= __copy_to_user(&name->machine, &utsname()->machine,
				__OLD_UTS_LEN);
	error |= __put_user(0, name->machine + __OLD_UTS_LEN);
	up_read(&uts_sem);

	if (!error && override_architecture(name))
		error = -EFAULT;
1276 1277
	if (!error && override_release(name->release, sizeof(name->release)))
		error = -EFAULT;
C
Christoph Hellwig 已提交
1278 1279 1280 1281
	return error ? -EFAULT : 0;
}
#endif

1282
SYSCALL_DEFINE2(sethostname, char __user *, name, int, len)
L
Linus Torvalds 已提交
1283 1284 1285 1286
{
	int errno;
	char tmp[__NEW_UTS_LEN];

1287
	if (!ns_capable(current->nsproxy->uts_ns->user_ns, CAP_SYS_ADMIN))
L
Linus Torvalds 已提交
1288
		return -EPERM;
1289

L
Linus Torvalds 已提交
1290 1291 1292 1293 1294
	if (len < 0 || len > __NEW_UTS_LEN)
		return -EINVAL;
	down_write(&uts_sem);
	errno = -EFAULT;
	if (!copy_from_user(tmp, name, len)) {
1295 1296 1297 1298
		struct new_utsname *u = utsname();

		memcpy(u->nodename, tmp, len);
		memset(u->nodename + len, 0, sizeof(u->nodename) - len);
L
Linus Torvalds 已提交
1299 1300
		errno = 0;
	}
L
Lucas De Marchi 已提交
1301
	uts_proc_notify(UTS_PROC_HOSTNAME);
L
Linus Torvalds 已提交
1302 1303 1304 1305 1306 1307
	up_write(&uts_sem);
	return errno;
}

#ifdef __ARCH_WANT_SYS_GETHOSTNAME

1308
SYSCALL_DEFINE2(gethostname, char __user *, name, int, len)
L
Linus Torvalds 已提交
1309 1310
{
	int i, errno;
1311
	struct new_utsname *u;
L
Linus Torvalds 已提交
1312 1313 1314 1315

	if (len < 0)
		return -EINVAL;
	down_read(&uts_sem);
1316 1317
	u = utsname();
	i = 1 + strlen(u->nodename);
L
Linus Torvalds 已提交
1318 1319 1320
	if (i > len)
		i = len;
	errno = 0;
1321
	if (copy_to_user(name, u->nodename, i))
L
Linus Torvalds 已提交
1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332
		errno = -EFAULT;
	up_read(&uts_sem);
	return errno;
}

#endif

/*
 * Only setdomainname; getdomainname can be implemented by calling
 * uname()
 */
1333
SYSCALL_DEFINE2(setdomainname, char __user *, name, int, len)
L
Linus Torvalds 已提交
1334 1335 1336 1337
{
	int errno;
	char tmp[__NEW_UTS_LEN];

1338
	if (!ns_capable(current->nsproxy->uts_ns->user_ns, CAP_SYS_ADMIN))
L
Linus Torvalds 已提交
1339 1340 1341 1342 1343 1344 1345
		return -EPERM;
	if (len < 0 || len > __NEW_UTS_LEN)
		return -EINVAL;

	down_write(&uts_sem);
	errno = -EFAULT;
	if (!copy_from_user(tmp, name, len)) {
1346 1347 1348 1349
		struct new_utsname *u = utsname();

		memcpy(u->domainname, tmp, len);
		memset(u->domainname + len, 0, sizeof(u->domainname) - len);
L
Linus Torvalds 已提交
1350 1351
		errno = 0;
	}
L
Lucas De Marchi 已提交
1352
	uts_proc_notify(UTS_PROC_DOMAINNAME);
L
Linus Torvalds 已提交
1353 1354 1355 1356
	up_write(&uts_sem);
	return errno;
}

1357
SYSCALL_DEFINE2(getrlimit, unsigned int, resource, struct rlimit __user *, rlim)
L
Linus Torvalds 已提交
1358
{
1359 1360 1361 1362 1363 1364 1365 1366
	struct rlimit value;
	int ret;

	ret = do_prlimit(current, resource, NULL, &value);
	if (!ret)
		ret = copy_to_user(rlim, &value, sizeof(*rlim)) ? -EFAULT : 0;

	return ret;
L
Linus Torvalds 已提交
1367 1368 1369 1370 1371 1372 1373 1374
}

#ifdef __ARCH_WANT_SYS_OLD_GETRLIMIT

/*
 *	Back compatibility for getrlimit. Needed for some apps.
 */
 
1375 1376
SYSCALL_DEFINE2(old_getrlimit, unsigned int, resource,
		struct rlimit __user *, rlim)
L
Linus Torvalds 已提交
1377 1378 1379 1380 1381 1382 1383 1384
{
	struct rlimit x;
	if (resource >= RLIM_NLIMITS)
		return -EINVAL;

	task_lock(current->group_leader);
	x = current->signal->rlim[resource];
	task_unlock(current->group_leader);
1385
	if (x.rlim_cur > 0x7FFFFFFF)
L
Linus Torvalds 已提交
1386
		x.rlim_cur = 0x7FFFFFFF;
1387
	if (x.rlim_max > 0x7FFFFFFF)
L
Linus Torvalds 已提交
1388 1389 1390 1391 1392 1393
		x.rlim_max = 0x7FFFFFFF;
	return copy_to_user(rlim, &x, sizeof(x))?-EFAULT:0;
}

#endif

1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426
static inline bool rlim64_is_infinity(__u64 rlim64)
{
#if BITS_PER_LONG < 64
	return rlim64 >= ULONG_MAX;
#else
	return rlim64 == RLIM64_INFINITY;
#endif
}

static void rlim_to_rlim64(const struct rlimit *rlim, struct rlimit64 *rlim64)
{
	if (rlim->rlim_cur == RLIM_INFINITY)
		rlim64->rlim_cur = RLIM64_INFINITY;
	else
		rlim64->rlim_cur = rlim->rlim_cur;
	if (rlim->rlim_max == RLIM_INFINITY)
		rlim64->rlim_max = RLIM64_INFINITY;
	else
		rlim64->rlim_max = rlim->rlim_max;
}

static void rlim64_to_rlim(const struct rlimit64 *rlim64, struct rlimit *rlim)
{
	if (rlim64_is_infinity(rlim64->rlim_cur))
		rlim->rlim_cur = RLIM_INFINITY;
	else
		rlim->rlim_cur = (unsigned long)rlim64->rlim_cur;
	if (rlim64_is_infinity(rlim64->rlim_max))
		rlim->rlim_max = RLIM_INFINITY;
	else
		rlim->rlim_max = (unsigned long)rlim64->rlim_max;
}

1427
/* make sure you are allowed to change @tsk limits before calling this */
1428 1429
int do_prlimit(struct task_struct *tsk, unsigned int resource,
		struct rlimit *new_rlim, struct rlimit *old_rlim)
L
Linus Torvalds 已提交
1430
{
1431
	struct rlimit *rlim;
1432
	int retval = 0;
L
Linus Torvalds 已提交
1433 1434 1435

	if (resource >= RLIM_NLIMITS)
		return -EINVAL;
1436 1437 1438 1439 1440 1441 1442
	if (new_rlim) {
		if (new_rlim->rlim_cur > new_rlim->rlim_max)
			return -EINVAL;
		if (resource == RLIMIT_NOFILE &&
				new_rlim->rlim_max > sysctl_nr_open)
			return -EPERM;
	}
L
Linus Torvalds 已提交
1443

1444 1445 1446 1447 1448 1449 1450
	/* protect tsk->signal and tsk->sighand from disappearing */
	read_lock(&tasklist_lock);
	if (!tsk->sighand) {
		retval = -ESRCH;
		goto out;
	}

1451
	rlim = tsk->signal->rlim + resource;
1452
	task_lock(tsk->group_leader);
1453
	if (new_rlim) {
1454 1455
		/* Keep the capable check against init_user_ns until
		   cgroups can contain all limits */
1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476
		if (new_rlim->rlim_max > rlim->rlim_max &&
				!capable(CAP_SYS_RESOURCE))
			retval = -EPERM;
		if (!retval)
			retval = security_task_setrlimit(tsk->group_leader,
					resource, new_rlim);
		if (resource == RLIMIT_CPU && new_rlim->rlim_cur == 0) {
			/*
			 * The caller is asking for an immediate RLIMIT_CPU
			 * expiry.  But we use the zero value to mean "it was
			 * never set".  So let's cheat and make it one second
			 * instead
			 */
			new_rlim->rlim_cur = 1;
		}
	}
	if (!retval) {
		if (old_rlim)
			*old_rlim = *rlim;
		if (new_rlim)
			*rlim = *new_rlim;
1477
	}
J
Jiri Slaby 已提交
1478
	task_unlock(tsk->group_leader);
L
Linus Torvalds 已提交
1479

1480 1481 1482 1483 1484 1485
	/*
	 * RLIMIT_CPU handling.   Note that the kernel fails to return an error
	 * code if it rejected the user's attempt to set RLIMIT_CPU.  This is a
	 * very long-standing error, and fixing it now risks breakage of
	 * applications, so we live with it
	 */
1486 1487 1488
	 if (!retval && new_rlim && resource == RLIMIT_CPU &&
			 new_rlim->rlim_cur != RLIM_INFINITY)
		update_rlimit_cpu(tsk, new_rlim->rlim_cur);
A
Andrew Morton 已提交
1489
out:
1490
	read_unlock(&tasklist_lock);
1491
	return retval;
L
Linus Torvalds 已提交
1492 1493
}

1494 1495 1496 1497 1498
/* rcu lock must be held */
static int check_prlimit_permission(struct task_struct *task)
{
	const struct cred *cred = current_cred(), *tcred;

1499 1500
	if (current == task)
		return 0;
1501

1502
	tcred = __task_cred(task);
1503
	if (cred->user_ns == tcred->user_ns &&
1504 1505 1506 1507 1508 1509 1510
	    (cred->uid == tcred->euid &&
	     cred->uid == tcred->suid &&
	     cred->uid == tcred->uid  &&
	     cred->gid == tcred->egid &&
	     cred->gid == tcred->sgid &&
	     cred->gid == tcred->gid))
		return 0;
1511
	if (ns_capable(tcred->user_ns, CAP_SYS_RESOURCE))
1512 1513 1514
		return 0;

	return -EPERM;
1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558
}

SYSCALL_DEFINE4(prlimit64, pid_t, pid, unsigned int, resource,
		const struct rlimit64 __user *, new_rlim,
		struct rlimit64 __user *, old_rlim)
{
	struct rlimit64 old64, new64;
	struct rlimit old, new;
	struct task_struct *tsk;
	int ret;

	if (new_rlim) {
		if (copy_from_user(&new64, new_rlim, sizeof(new64)))
			return -EFAULT;
		rlim64_to_rlim(&new64, &new);
	}

	rcu_read_lock();
	tsk = pid ? find_task_by_vpid(pid) : current;
	if (!tsk) {
		rcu_read_unlock();
		return -ESRCH;
	}
	ret = check_prlimit_permission(tsk);
	if (ret) {
		rcu_read_unlock();
		return ret;
	}
	get_task_struct(tsk);
	rcu_read_unlock();

	ret = do_prlimit(tsk, resource, new_rlim ? &new : NULL,
			old_rlim ? &old : NULL);

	if (!ret && old_rlim) {
		rlim_to_rlim64(&old, &old64);
		if (copy_to_user(old_rlim, &old64, sizeof(old64)))
			ret = -EFAULT;
	}

	put_task_struct(tsk);
	return ret;
}

J
Jiri Slaby 已提交
1559 1560 1561 1562 1563 1564
SYSCALL_DEFINE2(setrlimit, unsigned int, resource, struct rlimit __user *, rlim)
{
	struct rlimit new_rlim;

	if (copy_from_user(&new_rlim, rlim, sizeof(*rlim)))
		return -EFAULT;
1565
	return do_prlimit(current, resource, &new_rlim, NULL);
J
Jiri Slaby 已提交
1566 1567
}

L
Linus Torvalds 已提交
1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582
/*
 * It would make sense to put struct rusage in the task_struct,
 * except that would make the task_struct be *really big*.  After
 * task_struct gets moved into malloc'ed memory, it would
 * make sense to do this.  It will make moving the rest of the information
 * a lot simpler!  (Which we're not doing right now because we're not
 * measuring them yet).
 *
 * When sampling multiple threads for RUSAGE_SELF, under SMP we might have
 * races with threads incrementing their own counters.  But since word
 * reads are atomic, we either get new values or old values and we don't
 * care which for the sums.  We always take the siglock to protect reading
 * the c* fields from p->signal from races with exit.c updating those
 * fields when reaping, so a sample either gets all the additions of a
 * given child after it's reaped, or none so this sample is before reaping.
1583
 *
1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597
 * Locking:
 * We need to take the siglock for CHILDEREN, SELF and BOTH
 * for  the cases current multithreaded, non-current single threaded
 * non-current multithreaded.  Thread traversal is now safe with
 * the siglock held.
 * Strictly speaking, we donot need to take the siglock if we are current and
 * single threaded,  as no one else can take our signal_struct away, no one
 * else can  reap the  children to update signal->c* counters, and no one else
 * can race with the signal-> fields. If we do not take any lock, the
 * signal-> fields could be read out of order while another thread was just
 * exiting. So we should  place a read memory barrier when we avoid the lock.
 * On the writer side,  write memory barrier is implied in  __exit_signal
 * as __exit_signal releases  the siglock spinlock after updating the signal->
 * fields. But we don't do this yet to keep things simple.
1598
 *
L
Linus Torvalds 已提交
1599 1600
 */

1601
static void accumulate_thread_rusage(struct task_struct *t, struct rusage *r)
S
Sripathi Kodi 已提交
1602 1603 1604 1605 1606 1607 1608 1609 1610
{
	r->ru_nvcsw += t->nvcsw;
	r->ru_nivcsw += t->nivcsw;
	r->ru_minflt += t->min_flt;
	r->ru_majflt += t->maj_flt;
	r->ru_inblock += task_io_get_inblock(t);
	r->ru_oublock += task_io_get_oublock(t);
}

L
Linus Torvalds 已提交
1611 1612 1613 1614
static void k_getrusage(struct task_struct *p, int who, struct rusage *r)
{
	struct task_struct *t;
	unsigned long flags;
1615
	cputime_t tgutime, tgstime, utime, stime;
J
Jiri Pirko 已提交
1616
	unsigned long maxrss = 0;
L
Linus Torvalds 已提交
1617 1618

	memset((char *) r, 0, sizeof *r);
1619
	utime = stime = 0;
L
Linus Torvalds 已提交
1620

S
Sripathi Kodi 已提交
1621
	if (who == RUSAGE_THREAD) {
1622
		task_times(current, &utime, &stime);
1623
		accumulate_thread_rusage(p, r);
J
Jiri Pirko 已提交
1624
		maxrss = p->signal->maxrss;
S
Sripathi Kodi 已提交
1625 1626 1627
		goto out;
	}

1628
	if (!lock_task_sighand(p, &flags))
1629
		return;
O
Oleg Nesterov 已提交
1630

L
Linus Torvalds 已提交
1631
	switch (who) {
O
Oleg Nesterov 已提交
1632
		case RUSAGE_BOTH:
L
Linus Torvalds 已提交
1633 1634 1635 1636 1637 1638 1639
		case RUSAGE_CHILDREN:
			utime = p->signal->cutime;
			stime = p->signal->cstime;
			r->ru_nvcsw = p->signal->cnvcsw;
			r->ru_nivcsw = p->signal->cnivcsw;
			r->ru_minflt = p->signal->cmin_flt;
			r->ru_majflt = p->signal->cmaj_flt;
1640 1641
			r->ru_inblock = p->signal->cinblock;
			r->ru_oublock = p->signal->coublock;
J
Jiri Pirko 已提交
1642
			maxrss = p->signal->cmaxrss;
O
Oleg Nesterov 已提交
1643 1644 1645 1646

			if (who == RUSAGE_CHILDREN)
				break;

L
Linus Torvalds 已提交
1647
		case RUSAGE_SELF:
1648
			thread_group_times(p, &tgutime, &tgstime);
1649 1650
			utime += tgutime;
			stime += tgstime;
L
Linus Torvalds 已提交
1651 1652 1653 1654
			r->ru_nvcsw += p->signal->nvcsw;
			r->ru_nivcsw += p->signal->nivcsw;
			r->ru_minflt += p->signal->min_flt;
			r->ru_majflt += p->signal->maj_flt;
1655 1656
			r->ru_inblock += p->signal->inblock;
			r->ru_oublock += p->signal->oublock;
J
Jiri Pirko 已提交
1657 1658
			if (maxrss < p->signal->maxrss)
				maxrss = p->signal->maxrss;
L
Linus Torvalds 已提交
1659 1660
			t = p;
			do {
1661
				accumulate_thread_rusage(t, r);
L
Linus Torvalds 已提交
1662 1663 1664
				t = next_thread(t);
			} while (t != p);
			break;
O
Oleg Nesterov 已提交
1665

L
Linus Torvalds 已提交
1666 1667 1668
		default:
			BUG();
	}
1669 1670
	unlock_task_sighand(p, &flags);

S
Sripathi Kodi 已提交
1671
out:
O
Oleg Nesterov 已提交
1672 1673
	cputime_to_timeval(utime, &r->ru_utime);
	cputime_to_timeval(stime, &r->ru_stime);
J
Jiri Pirko 已提交
1674 1675 1676 1677 1678 1679 1680 1681 1682

	if (who != RUSAGE_CHILDREN) {
		struct mm_struct *mm = get_task_mm(p);
		if (mm) {
			setmax_mm_hiwater_rss(&maxrss, mm);
			mmput(mm);
		}
	}
	r->ru_maxrss = maxrss * (PAGE_SIZE / 1024); /* convert pages to KBs */
L
Linus Torvalds 已提交
1683 1684 1685 1686 1687 1688 1689 1690 1691
}

int getrusage(struct task_struct *p, int who, struct rusage __user *ru)
{
	struct rusage r;
	k_getrusage(p, who, &r);
	return copy_to_user(ru, &r, sizeof(r)) ? -EFAULT : 0;
}

1692
SYSCALL_DEFINE2(getrusage, int, who, struct rusage __user *, ru)
L
Linus Torvalds 已提交
1693
{
S
Sripathi Kodi 已提交
1694 1695
	if (who != RUSAGE_SELF && who != RUSAGE_CHILDREN &&
	    who != RUSAGE_THREAD)
L
Linus Torvalds 已提交
1696 1697 1698 1699
		return -EINVAL;
	return getrusage(current, who, ru);
}

1700
SYSCALL_DEFINE1(umask, int, mask)
L
Linus Torvalds 已提交
1701 1702 1703 1704
{
	mask = xchg(&current->fs->umask, mask & S_IRWXUGO);
	return mask;
}
1705

1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719
#ifdef CONFIG_CHECKPOINT_RESTORE
static int prctl_set_mm(int opt, unsigned long addr,
			unsigned long arg4, unsigned long arg5)
{
	unsigned long rlim = rlimit(RLIMIT_DATA);
	unsigned long vm_req_flags;
	unsigned long vm_bad_flags;
	struct vm_area_struct *vma;
	int error = 0;
	struct mm_struct *mm = current->mm;

	if (arg4 | arg5)
		return -EINVAL;

1720
	if (!capable(CAP_SYS_RESOURCE))
1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823
		return -EPERM;

	if (addr >= TASK_SIZE)
		return -EINVAL;

	down_read(&mm->mmap_sem);
	vma = find_vma(mm, addr);

	if (opt != PR_SET_MM_START_BRK && opt != PR_SET_MM_BRK) {
		/* It must be existing VMA */
		if (!vma || vma->vm_start > addr)
			goto out;
	}

	error = -EINVAL;
	switch (opt) {
	case PR_SET_MM_START_CODE:
	case PR_SET_MM_END_CODE:
		vm_req_flags = VM_READ | VM_EXEC;
		vm_bad_flags = VM_WRITE | VM_MAYSHARE;

		if ((vma->vm_flags & vm_req_flags) != vm_req_flags ||
		    (vma->vm_flags & vm_bad_flags))
			goto out;

		if (opt == PR_SET_MM_START_CODE)
			mm->start_code = addr;
		else
			mm->end_code = addr;
		break;

	case PR_SET_MM_START_DATA:
	case PR_SET_MM_END_DATA:
		vm_req_flags = VM_READ | VM_WRITE;
		vm_bad_flags = VM_EXEC | VM_MAYSHARE;

		if ((vma->vm_flags & vm_req_flags) != vm_req_flags ||
		    (vma->vm_flags & vm_bad_flags))
			goto out;

		if (opt == PR_SET_MM_START_DATA)
			mm->start_data = addr;
		else
			mm->end_data = addr;
		break;

	case PR_SET_MM_START_STACK:

#ifdef CONFIG_STACK_GROWSUP
		vm_req_flags = VM_READ | VM_WRITE | VM_GROWSUP;
#else
		vm_req_flags = VM_READ | VM_WRITE | VM_GROWSDOWN;
#endif
		if ((vma->vm_flags & vm_req_flags) != vm_req_flags)
			goto out;

		mm->start_stack = addr;
		break;

	case PR_SET_MM_START_BRK:
		if (addr <= mm->end_data)
			goto out;

		if (rlim < RLIM_INFINITY &&
		    (mm->brk - addr) +
		    (mm->end_data - mm->start_data) > rlim)
			goto out;

		mm->start_brk = addr;
		break;

	case PR_SET_MM_BRK:
		if (addr <= mm->end_data)
			goto out;

		if (rlim < RLIM_INFINITY &&
		    (addr - mm->start_brk) +
		    (mm->end_data - mm->start_data) > rlim)
			goto out;

		mm->brk = addr;
		break;

	default:
		error = -EINVAL;
		goto out;
	}

	error = 0;

out:
	up_read(&mm->mmap_sem);

	return error;
}
#else /* CONFIG_CHECKPOINT_RESTORE */
static int prctl_set_mm(int opt, unsigned long addr,
			unsigned long arg4, unsigned long arg5)
{
	return -EINVAL;
}
#endif

1824 1825
SYSCALL_DEFINE5(prctl, int, option, unsigned long, arg2, unsigned long, arg3,
		unsigned long, arg4, unsigned long, arg5)
L
Linus Torvalds 已提交
1826
{
1827 1828 1829
	struct task_struct *me = current;
	unsigned char comm[sizeof(me->comm)];
	long error;
L
Linus Torvalds 已提交
1830

D
David Howells 已提交
1831 1832
	error = security_task_prctl(option, arg2, arg3, arg4, arg5);
	if (error != -ENOSYS)
L
Linus Torvalds 已提交
1833 1834
		return error;

D
David Howells 已提交
1835
	error = 0;
L
Linus Torvalds 已提交
1836 1837
	switch (option) {
		case PR_SET_PDEATHSIG:
1838
			if (!valid_signal(arg2)) {
L
Linus Torvalds 已提交
1839 1840 1841
				error = -EINVAL;
				break;
			}
1842 1843
			me->pdeath_signal = arg2;
			error = 0;
L
Linus Torvalds 已提交
1844 1845
			break;
		case PR_GET_PDEATHSIG:
1846
			error = put_user(me->pdeath_signal, (int __user *)arg2);
L
Linus Torvalds 已提交
1847 1848
			break;
		case PR_GET_DUMPABLE:
1849
			error = get_dumpable(me->mm);
L
Linus Torvalds 已提交
1850 1851
			break;
		case PR_SET_DUMPABLE:
1852
			if (arg2 < 0 || arg2 > 1) {
L
Linus Torvalds 已提交
1853 1854 1855
				error = -EINVAL;
				break;
			}
1856 1857
			set_dumpable(me->mm, arg2);
			error = 0;
L
Linus Torvalds 已提交
1858 1859 1860
			break;

		case PR_SET_UNALIGN:
1861
			error = SET_UNALIGN_CTL(me, arg2);
L
Linus Torvalds 已提交
1862 1863
			break;
		case PR_GET_UNALIGN:
1864
			error = GET_UNALIGN_CTL(me, arg2);
L
Linus Torvalds 已提交
1865 1866
			break;
		case PR_SET_FPEMU:
1867
			error = SET_FPEMU_CTL(me, arg2);
L
Linus Torvalds 已提交
1868 1869
			break;
		case PR_GET_FPEMU:
1870
			error = GET_FPEMU_CTL(me, arg2);
L
Linus Torvalds 已提交
1871 1872
			break;
		case PR_SET_FPEXC:
1873
			error = SET_FPEXC_CTL(me, arg2);
L
Linus Torvalds 已提交
1874 1875
			break;
		case PR_GET_FPEXC:
1876
			error = GET_FPEXC_CTL(me, arg2);
L
Linus Torvalds 已提交
1877 1878 1879 1880 1881
			break;
		case PR_GET_TIMING:
			error = PR_TIMING_STATISTICAL;
			break;
		case PR_SET_TIMING:
1882
			if (arg2 != PR_TIMING_STATISTICAL)
L
Linus Torvalds 已提交
1883
				error = -EINVAL;
1884 1885
			else
				error = 0;
L
Linus Torvalds 已提交
1886 1887
			break;

1888 1889 1890 1891
		case PR_SET_NAME:
			comm[sizeof(me->comm)-1] = 0;
			if (strncpy_from_user(comm, (char __user *)arg2,
					      sizeof(me->comm) - 1) < 0)
L
Linus Torvalds 已提交
1892
				return -EFAULT;
1893
			set_task_comm(me, comm);
1894
			proc_comm_connector(me);
L
Linus Torvalds 已提交
1895
			return 0;
1896 1897 1898 1899
		case PR_GET_NAME:
			get_task_comm(comm, me);
			if (copy_to_user((char __user *)arg2, comm,
					 sizeof(comm)))
L
Linus Torvalds 已提交
1900 1901
				return -EFAULT;
			return 0;
1902
		case PR_GET_ENDIAN:
1903
			error = GET_ENDIAN(me, arg2);
1904 1905
			break;
		case PR_SET_ENDIAN:
1906
			error = SET_ENDIAN(me, arg2);
1907 1908
			break;

1909 1910 1911 1912 1913 1914
		case PR_GET_SECCOMP:
			error = prctl_get_seccomp();
			break;
		case PR_SET_SECCOMP:
			error = prctl_set_seccomp(arg2);
			break;
1915 1916 1917 1918 1919 1920
		case PR_GET_TSC:
			error = GET_TSC_CTL(arg2);
			break;
		case PR_SET_TSC:
			error = SET_TSC_CTL(arg2);
			break;
1921 1922
		case PR_TASK_PERF_EVENTS_DISABLE:
			error = perf_event_task_disable();
1923
			break;
1924 1925
		case PR_TASK_PERF_EVENTS_ENABLE:
			error = perf_event_task_enable();
1926
			break;
1927 1928 1929 1930 1931 1932 1933 1934 1935
		case PR_GET_TIMERSLACK:
			error = current->timer_slack_ns;
			break;
		case PR_SET_TIMERSLACK:
			if (arg2 <= 0)
				current->timer_slack_ns =
					current->default_timer_slack_ns;
			else
				current->timer_slack_ns = arg2;
1936
			error = 0;
1937
			break;
1938 1939 1940 1941
		case PR_MCE_KILL:
			if (arg4 | arg5)
				return -EINVAL;
			switch (arg2) {
1942
			case PR_MCE_KILL_CLEAR:
1943 1944 1945 1946
				if (arg3 != 0)
					return -EINVAL;
				current->flags &= ~PF_MCE_PROCESS;
				break;
1947
			case PR_MCE_KILL_SET:
1948
				current->flags |= PF_MCE_PROCESS;
1949
				if (arg3 == PR_MCE_KILL_EARLY)
1950
					current->flags |= PF_MCE_EARLY;
1951
				else if (arg3 == PR_MCE_KILL_LATE)
1952
					current->flags &= ~PF_MCE_EARLY;
1953 1954 1955 1956 1957
				else if (arg3 == PR_MCE_KILL_DEFAULT)
					current->flags &=
						~(PF_MCE_EARLY|PF_MCE_PROCESS);
				else
					return -EINVAL;
1958 1959 1960 1961 1962 1963
				break;
			default:
				return -EINVAL;
			}
			error = 0;
			break;
1964 1965 1966 1967 1968 1969 1970 1971 1972
		case PR_MCE_KILL_GET:
			if (arg2 | arg3 | arg4 | arg5)
				return -EINVAL;
			if (current->flags & PF_MCE_PROCESS)
				error = (current->flags & PF_MCE_EARLY) ?
					PR_MCE_KILL_EARLY : PR_MCE_KILL_LATE;
			else
				error = PR_MCE_KILL_DEFAULT;
			break;
1973 1974 1975
		case PR_SET_MM:
			error = prctl_set_mm(arg2, arg3, arg4, arg5);
			break;
1976 1977 1978 1979 1980 1981 1982 1983
		case PR_SET_CHILD_SUBREAPER:
			me->signal->is_child_subreaper = !!arg2;
			error = 0;
			break;
		case PR_GET_CHILD_SUBREAPER:
			error = put_user(me->signal->is_child_subreaper,
					 (int __user *) arg2);
			break;
L
Linus Torvalds 已提交
1984 1985 1986 1987 1988 1989
		default:
			error = -EINVAL;
			break;
	}
	return error;
}
1990

1991 1992
SYSCALL_DEFINE3(getcpu, unsigned __user *, cpup, unsigned __user *, nodep,
		struct getcpu_cache __user *, unused)
1993 1994 1995 1996 1997 1998 1999 2000 2001
{
	int err = 0;
	int cpu = raw_smp_processor_id();
	if (cpup)
		err |= put_user(cpu, cpup);
	if (nodep)
		err |= put_user(cpu_to_node(cpu), nodep);
	return err ? -EFAULT : 0;
}
2002 2003 2004

char poweroff_cmd[POWEROFF_CMD_PATH_LEN] = "/sbin/poweroff";

2005
static void argv_cleanup(struct subprocess_info *info)
2006
{
2007
	argv_free(info->argv);
2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034
}

/**
 * orderly_poweroff - Trigger an orderly system poweroff
 * @force: force poweroff if command execution fails
 *
 * This may be called from any context to trigger a system shutdown.
 * If the orderly shutdown fails, it will force an immediate shutdown.
 */
int orderly_poweroff(bool force)
{
	int argc;
	char **argv = argv_split(GFP_ATOMIC, poweroff_cmd, &argc);
	static char *envp[] = {
		"HOME=/",
		"PATH=/sbin:/bin:/usr/sbin:/usr/bin",
		NULL
	};
	int ret = -ENOMEM;
	struct subprocess_info *info;

	if (argv == NULL) {
		printk(KERN_WARNING "%s failed to allocate memory for \"%s\"\n",
		       __func__, poweroff_cmd);
		goto out;
	}

2035
	info = call_usermodehelper_setup(argv[0], argv, envp, GFP_ATOMIC);
2036 2037 2038 2039 2040
	if (info == NULL) {
		argv_free(argv);
		goto out;
	}

2041
	call_usermodehelper_setfns(info, NULL, argv_cleanup, NULL);
2042

2043
	ret = call_usermodehelper_exec(info, UMH_NO_WAIT);
2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059

  out:
	if (ret && force) {
		printk(KERN_WARNING "Failed to start orderly shutdown: "
		       "forcing the issue\n");

		/* I guess this should try to kick off some daemon to
		   sync and poweroff asap.  Or not even bother syncing
		   if we're doing an emergency shutdown? */
		emergency_sync();
		kernel_power_off();
	}

	return ret;
}
EXPORT_SYMBOL_GPL(orderly_poweroff);