linux32.c

来自「linux-2.4.29操作系统的源码」· C语言 代码 · 共 2,612 行 · 第 1/5 页

C
2,612
字号
asmlinkage int sys32_setsockopt(int fd, int level, int optname,				char *optval, int optlen){	if (level == SOL_SOCKET && optname == SO_ATTACH_FILTER)		return do_set_attach_filter(fd, level, optname,					    optval, optlen);	if (level == SOL_ICMPV6 && optname == ICMPV6_FILTER)		return do_set_icmpv6_filter(fd, level, optname,					    optval, optlen);	return sys_setsockopt(fd, level, optname, optval, optlen);}static inline int get_flock(struct flock *kfl, struct flock32 *ufl){	int err;	if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)))		return -EFAULT;	err = __get_user(kfl->l_type, &ufl->l_type);	err |= __get_user(kfl->l_whence, &ufl->l_whence);	err |= __get_user(kfl->l_start, &ufl->l_start);	err |= __get_user(kfl->l_len, &ufl->l_len);	err |= __get_user(kfl->l_pid, &ufl->l_pid);	return err;}static inline int put_flock(struct flock *kfl, struct flock32 *ufl){	int err;	if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)))		return -EFAULT;	err = __put_user(kfl->l_type, &ufl->l_type);	err |= __put_user(kfl->l_whence, &ufl->l_whence);	err |= __put_user(kfl->l_start, &ufl->l_start);	err |= __put_user(kfl->l_len, &ufl->l_len);	err |= __put_user(0, &ufl->l_sysid);	err |= __put_user(kfl->l_pid, &ufl->l_pid);	return err;}extern asmlinkage longsys_fcntl(unsigned int fd, unsigned int cmd, unsigned long arg);asmlinkage longsys32_fcntl(unsigned int fd, unsigned int cmd, unsigned long arg){	switch (cmd) {	case F_GETLK:	case F_SETLK:	case F_SETLKW:		{			struct flock f;			mm_segment_t old_fs;			long ret;			if (get_flock(&f, (struct flock32 *)arg))				return -EFAULT;			old_fs = get_fs(); set_fs (KERNEL_DS);			ret = sys_fcntl(fd, cmd, (unsigned long)&f);			set_fs (old_fs);			if (put_flock(&f, (struct flock32 *)arg))				return -EFAULT;			return ret;		}	default:		return sys_fcntl(fd, cmd, (unsigned long)arg);	}}asmlinkage longsys32_fcntl64(unsigned int fd, unsigned int cmd, unsigned long arg){	switch (cmd) {	case F_GETLK64:		return sys_fcntl(fd, F_GETLK, arg);	case F_SETLK64:		return sys_fcntl(fd, F_SETLK, arg);	case F_SETLKW64:		return sys_fcntl(fd, F_SETLKW, arg);	}	return sys32_fcntl(fd, cmd, arg);}struct msgbuf32 { s32 mtype; char mtext[1]; };struct ipc_perm32{	key_t    	  key;        __kernel_uid_t32  uid;        __kernel_gid_t32  gid;        __kernel_uid_t32  cuid;        __kernel_gid_t32  cgid;        __kernel_mode_t32 mode;        unsigned short  seq;};struct ipc64_perm32 {	key_t key;	__kernel_uid_t32 uid;	__kernel_gid_t32 gid;	__kernel_uid_t32 cuid;	__kernel_gid_t32 cgid;	__kernel_mode_t32 mode; 	unsigned short seq;	unsigned short __pad1;	unsigned int __unused1;	unsigned int __unused2;};struct semid_ds32 {        struct ipc_perm32 sem_perm;               /* permissions .. see ipc.h */        __kernel_time_t32 sem_otime;              /* last semop time */        __kernel_time_t32 sem_ctime;              /* last change time */        u32 sem_base;              /* ptr to first semaphore in array */        u32 sem_pending;          /* pending operations to be processed */        u32 sem_pending_last;    /* last pending operation */        u32 undo;                  /* undo requests on this array */        unsigned short  sem_nsems;              /* no. of semaphores in array */};struct semid64_ds32 {	struct ipc64_perm32 sem_perm;	__kernel_time_t32 sem_otime;	__kernel_time_t32 sem_ctime;	unsigned int sem_nsems;	unsigned int __unused1;	unsigned int __unused2;};struct msqid_ds32{        struct ipc_perm32 msg_perm;        u32 msg_first;        u32 msg_last;        __kernel_time_t32 msg_stime;        __kernel_time_t32 msg_rtime;        __kernel_time_t32 msg_ctime;        u32 wwait;        u32 rwait;        unsigned short msg_cbytes;        unsigned short msg_qnum;        unsigned short msg_qbytes;        __kernel_ipc_pid_t32 msg_lspid;        __kernel_ipc_pid_t32 msg_lrpid;};struct msqid64_ds32 {	struct ipc64_perm32 msg_perm;	__kernel_time_t32 msg_stime;	unsigned int __unused1;	__kernel_time_t32 msg_rtime;	unsigned int __unused2;	__kernel_time_t32 msg_ctime;	unsigned int __unused3;	unsigned int msg_cbytes;	unsigned int msg_qnum;	unsigned int msg_qbytes;	__kernel_pid_t32 msg_lspid;	__kernel_pid_t32 msg_lrpid;	unsigned int __unused4;	unsigned int __unused5;};struct shmid_ds32 {        struct ipc_perm32       shm_perm;        int                     shm_segsz;        __kernel_time_t32       shm_atime;        __kernel_time_t32       shm_dtime;        __kernel_time_t32       shm_ctime;        __kernel_ipc_pid_t32    shm_cpid;        __kernel_ipc_pid_t32    shm_lpid;        unsigned short          shm_nattch;};struct shmid64_ds32 {	struct ipc64_perm32 shm_perm;	__kernel_size_t32 shm_segsz;	__kernel_time_t32 shm_atime;	__kernel_time_t32 shm_dtime;	__kernel_time_t32 shm_ctime;	__kernel_pid_t32 shm_cpid;	__kernel_pid_t32 shm_lpid;	unsigned int shm_nattch;	unsigned int __unused1;	unsigned int __unused2;};struct ipc_kludge32 {	u32 msgp;	s32 msgtyp;};static intdo_sys32_semctl(int first, int second, int third, void *uptr){	union semun fourth;	u32 pad;	int err, err2;	struct semid64_ds s;	mm_segment_t old_fs;	if (!uptr)		return -EINVAL;	err = -EFAULT;	if (get_user (pad, (u32 *)uptr))		return err;	if ((third & ~IPC_64) == SETVAL)		fourth.val = (int)pad;	else		fourth.__pad = (void *)A(pad);	switch (third & ~IPC_64) {	case IPC_INFO:	case IPC_RMID:	case IPC_SET:	case SEM_INFO:	case GETVAL:	case GETPID:	case GETNCNT:	case GETZCNT:	case GETALL:	case SETVAL:	case SETALL:		err = sys_semctl (first, second, third, fourth);		break;	case IPC_STAT:	case SEM_STAT:		fourth.__pad = &s;		old_fs = get_fs();		set_fs(KERNEL_DS);		err = sys_semctl(first, second, third | IPC_64, fourth);		set_fs(old_fs);		if (third & IPC_64) {			struct semid64_ds32 *usp64 = (struct semid64_ds32 *) A(pad);			if (!access_ok(VERIFY_WRITE, usp64, sizeof(*usp64))) {				err = -EFAULT;				break;			}			err2 = __put_user(s.sem_perm.key, &usp64->sem_perm.key);			err2 |= __put_user(s.sem_perm.uid, &usp64->sem_perm.uid);			err2 |= __put_user(s.sem_perm.gid, &usp64->sem_perm.gid);			err2 |= __put_user(s.sem_perm.cuid, &usp64->sem_perm.cuid);			err2 |= __put_user(s.sem_perm.cgid, &usp64->sem_perm.cgid);			err2 |= __put_user(s.sem_perm.mode, &usp64->sem_perm.mode);			err2 |= __put_user(s.sem_perm.seq, &usp64->sem_perm.seq);			err2 |= __put_user(s.sem_otime, &usp64->sem_otime);			err2 |= __put_user(s.sem_ctime, &usp64->sem_ctime);			err2 |= __put_user(s.sem_nsems, &usp64->sem_nsems);		} else {			struct semid_ds32 *usp32 = (struct semid_ds32 *) A(pad);			if (!access_ok(VERIFY_WRITE, usp32, sizeof(*usp32))) {				err = -EFAULT;				break;			}			err2 = __put_user(s.sem_perm.key, &usp32->sem_perm.key);			err2 |= __put_user(s.sem_perm.uid, &usp32->sem_perm.uid);			err2 |= __put_user(s.sem_perm.gid, &usp32->sem_perm.gid);			err2 |= __put_user(s.sem_perm.cuid, &usp32->sem_perm.cuid);			err2 |= __put_user(s.sem_perm.cgid, &usp32->sem_perm.cgid);			err2 |= __put_user(s.sem_perm.mode, &usp32->sem_perm.mode);			err2 |= __put_user(s.sem_perm.seq, &usp32->sem_perm.seq);			err2 |= __put_user(s.sem_otime, &usp32->sem_otime);			err2 |= __put_user(s.sem_ctime, &usp32->sem_ctime);			err2 |= __put_user(s.sem_nsems, &usp32->sem_nsems);		}		if (err2)			err = -EFAULT;		break;	default:		err = - EINVAL;		break;	}	return err;}static intdo_sys32_msgsnd (int first, int second, int third, void *uptr){	struct msgbuf32 *up = (struct msgbuf32 *)uptr;	struct msgbuf *p;	mm_segment_t old_fs;	int err;	if (second < 0)		return -EINVAL;	p = kmalloc (second + sizeof (struct msgbuf)				    + 4, GFP_USER);	if (!p)		return -ENOMEM;	err = get_user (p->mtype, &up->mtype);	if (err)		goto out;	err |= __copy_from_user (p->mtext, &up->mtext, second);	if (err)		goto out;	old_fs = get_fs ();	set_fs (KERNEL_DS);	err = sys_msgsnd (first, p, second, third);	set_fs (old_fs);out:	kfree (p);	return err;}static intdo_sys32_msgrcv (int first, int second, int msgtyp, int third,		 int version, void *uptr){	struct msgbuf32 *up;	struct msgbuf *p;	mm_segment_t old_fs;	int err;	if (!version) {		struct ipc_kludge32 *uipck = (struct ipc_kludge32 *)uptr;		struct ipc_kludge32 ipck;		err = -EINVAL;		if (!uptr)			goto out;		err = -EFAULT;		if (copy_from_user (&ipck, uipck, sizeof (struct ipc_kludge32)))			goto out;		uptr = (void *)AA(ipck.msgp);		msgtyp = ipck.msgtyp;	}	if (second < 0)		return -EINVAL;	err = -ENOMEM;	p = kmalloc (second + sizeof (struct msgbuf) + 4, GFP_USER);	if (!p)		goto out;	old_fs = get_fs ();	set_fs (KERNEL_DS);	err = sys_msgrcv (first, p, second + 4, msgtyp, third);	set_fs (old_fs);	if (err < 0)		goto free_then_out;	up = (struct msgbuf32 *)uptr;	if (put_user (p->mtype, &up->mtype) ||	    __copy_to_user (&up->mtext, p->mtext, err))		err = -EFAULT;free_then_out:	kfree (p);out:	return err;}static intdo_sys32_msgctl (int first, int second, void *uptr){	int err = -EINVAL, err2;	struct msqid64_ds m;	struct msqid_ds32 *up32 = (struct msqid_ds32 *)uptr;	struct msqid64_ds32 *up64 = (struct msqid64_ds32 *)uptr;	mm_segment_t old_fs;	switch (second & ~IPC_64) {	case IPC_INFO:	case IPC_RMID:	case MSG_INFO:		err = sys_msgctl (first, second, (struct msqid_ds *)uptr);		break;	case IPC_SET:		if (second & IPC_64) {			if (!access_ok(VERIFY_READ, up64, sizeof(*up64))) {				err = -EFAULT;				break;			}			err = __get_user(m.msg_perm.uid, &up64->msg_perm.uid);			err |= __get_user(m.msg_perm.gid, &up64->msg_perm.gid);			err |= __get_user(m.msg_perm.mode, &up64->msg_perm.mode);			err |= __get_user(m.msg_qbytes, &up64->msg_qbytes);		} else {			if (!access_ok(VERIFY_READ, up32, sizeof(*up32))) {				err = -EFAULT;				break;			}			err = __get_user(m.msg_perm.uid, &up32->msg_perm.uid);			err |= __get_user(m.msg_perm.gid, &up32->msg_perm.gid);			err |= __get_user(m.msg_perm.mode, &up32->msg_perm.mode);			err |= __get_user(m.msg_qbytes, &up32->msg_qbytes);		}		if (err)			break;		old_fs = get_fs();		set_fs(KERNEL_DS);		err = sys_msgctl(first, second | IPC_64, (struct msqid_ds *)&m);		set_fs(old_fs);		break;	case IPC_STAT:	case MSG_STAT:		old_fs = get_fs();		set_fs(KERNEL_DS);		err = sys_msgctl(first, second | IPC_64, (struct msqid_ds *)&m);		set_fs(old_fs);		if (second & IPC_64) {			if (!access_ok(VERIFY_WRITE, up64, sizeof(*up64))) {				err = -EFAULT;				break;			}			err2 = __put_user(m.msg_perm.key, &up64->msg_perm.key);			err2 |= __put_user(m.msg_perm.uid, &up64->msg_perm.uid);			err2 |= __put_user(m.msg_perm.gid, &up64->msg_perm.gid);			err2 |= __put_user(m.msg_perm.cuid, &up64->msg_perm.cuid);			err2 |= __put_user(m.msg_perm.cgid, &up64->msg_perm.cgid);			err2 |= __put_user(m.msg_perm.mode, &up64->msg_perm.mode);			err2 |= __put_user(m.msg_perm.seq, &up64->msg_perm.seq);			err2 |= __put_user(m.msg_stime, &up64->msg_stime);			err2 |= __put_user(m.msg_rtime, &up64->msg_rtime);			err2 |= __put_user(m.msg_ctime, &up64->msg_ctime);			err2 |= __put_user(m.msg_cbytes, &up64->msg_cbytes);			err2 |= __put_user(m.msg_qnum, &up64->msg_qnum);			err2 |= __put_user(m.msg_qbytes, &up64->msg_qbytes);			err2 |= __put_user(m.msg_lspid, &up64->msg_lspid);			err2 |= __put_user(m.msg_lrpid, &up64->msg_lrpid);			if (err2)				err = -EFAULT;		} else {			if (!access_ok(VERIFY_WRITE, up32, sizeof(*up32))) {				err = -EFAULT;				break;			}			err2 = __put_user(m.msg_perm.key, &up32->msg_perm.key);			err2 |= __put_user(m.msg_perm.uid, &up32->msg_perm.uid);			err2 |= __put_user(m.msg_perm.gid, &up32->msg_perm.gid);			err2 |= __put_user(m.msg_perm.cuid, &up32->msg_perm.cuid);			err2 |= __put_user(m.msg_perm.cgid, &up32->msg_perm.cgid);			err2 |= __put_user(m.msg_perm.mode, &up32->msg_perm.mode);			err2 |= __put_user(m.msg_perm.seq, &up32->msg_perm.seq);			err2 |= __put_user(m.msg_stime, &up32->msg_stime);			err2 |= __put_user(m.msg_rtime, &up32->msg_rtime);			err2 |= __put_user(m.msg_ctime, &up32->msg_ctime);			err2 |= __put_user(m.msg_cbytes, &up32->msg_cbytes);			err2 |= __put_user(m.msg_qnum, &up32->msg_qnum);			err2 |= __put_user(m.msg_qbytes, &up32->msg_qbytes);			err2 |= __put_user(m.msg_lspid, &up32->msg_lspid);			err2 |= __put_user(m.msg_lrpid, &up32->msg_lrpid);			if (err2)				err = -EFAULT;		}		break;	}	return err;}static intdo_sys32_shmat (int first, int second, int third, int version, void *uptr){	unsigned long raddr;	u32 *uaddr = (u32 *)A((u32)third);	int err = -EINVAL;	if (version == 1)		return err;	err = sys_shmat (first, uptr, second, &raddr);	if (err)		return err;	err = put_user (raddr, uaddr);	return err;}struct shm_info32 {	int used_ids;	u32 shm_tot, shm_rss, shm_swp;	u32 swap_attempts, swap_successes;};static intdo_sys32_shmctl (int first, int second, void *uptr){	struct shmid64_ds32 *up64 = (struct shmid64_ds32 *)uptr;	struct shmid_ds32 *up32 = (struct shmid_ds32 *)uptr;	struct shm_info32 *uip = (struct shm_info32 *)uptr;	int err = -EFAULT, err2;	struct shmid64_ds s64;	mm_segment_t old_fs;	struct shm_info si;	struct shmid_ds s;	switch (second & ~IPC_64) {	case IPC_INFO:		second = IPC_INFO; /* So that we don't have to translate it */	case IPC_RMID:	case SHM_LOCK:	case SHM_UNLOCK:		err = sys_shmctl(first, second, (struct shmid_ds *)uptr);		break;	case IPC_SET:		if (second & IPC_64) {			err = get_user(s.shm_perm.uid, &up64->shm_perm.uid);			err |= get_user(s.shm_perm.gid, &up64->shm_perm.gid);			err |= get_user(s.shm_perm.mode, &up64->shm_perm.mode);		} else {			err = get_user(s.shm_perm.uid, &up32->shm_perm.uid);			err |= get_user(s.shm_perm.gid, &up32->shm_perm.gid);			err |= get_user(s.shm_perm.mode, &up32->shm_perm.mode);		}		if (err)			break;		old_fs = get_fs();		set_fs(KERNEL_DS);		err = sys_shmctl(first, second & ~IPC_64, &s);		set_fs(old_fs);		break;

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?