⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 sys_ia32.c

📁 上传linux-jx2410的源代码
💻 C
📖 第 1 页 / 共 5 页
字号:
};struct semid_ds32 {	struct ipc_perm32 sem_perm;               /* permissions .. see ipc.h */	__kernel_time_t32 sem_otime;              /* last semop time */	__kernel_time_t32 sem_ctime;              /* last change time */	u32 sem_base;              /* ptr to first semaphore in array */	u32 sem_pending;          /* pending operations to be processed */	u32 sem_pending_last;    /* last pending operation */	u32 undo;                  /* undo requests on this array */	unsigned short  sem_nsems;              /* no. of semaphores in array */};struct semid64_ds32 {	struct ipc64_perm32 sem_perm;	__kernel_time_t32 sem_otime;	unsigned int __unused1;	__kernel_time_t32 sem_ctime;	unsigned int __unused2;	unsigned int sem_nsems;	unsigned int __unused3;	unsigned int __unused4;};struct msqid_ds32 {	struct ipc_perm32 msg_perm;	u32 msg_first;	u32 msg_last;	__kernel_time_t32 msg_stime;	__kernel_time_t32 msg_rtime;	__kernel_time_t32 msg_ctime;	u32 wwait;	u32 rwait;	unsigned short msg_cbytes;	unsigned short msg_qnum;	unsigned short msg_qbytes;	__kernel_ipc_pid_t32 msg_lspid;	__kernel_ipc_pid_t32 msg_lrpid;};struct msqid64_ds32 {	struct ipc64_perm32 msg_perm;	__kernel_time_t32 msg_stime;	unsigned int __unused1;	__kernel_time_t32 msg_rtime;	unsigned int __unused2;	__kernel_time_t32 msg_ctime;	unsigned int __unused3;	unsigned int msg_cbytes;	unsigned int msg_qnum;	unsigned int msg_qbytes;	__kernel_pid_t32 msg_lspid;	__kernel_pid_t32 msg_lrpid;	unsigned int __unused4;	unsigned int __unused5;};struct shmid_ds32 {	struct ipc_perm32 shm_perm;	int shm_segsz;	__kernel_time_t32 shm_atime;	__kernel_time_t32 shm_dtime;	__kernel_time_t32 shm_ctime;	__kernel_ipc_pid_t32 shm_cpid;	__kernel_ipc_pid_t32 shm_lpid;	unsigned short shm_nattch;};struct shmid64_ds32 {	struct ipc64_perm shm_perm;	__kernel_size_t32 shm_segsz;	__kernel_time_t32 shm_atime;	unsigned int __unused1;	__kernel_time_t32 shm_dtime;	unsigned int __unused2;	__kernel_time_t32 shm_ctime;	unsigned int __unused3;	__kernel_pid_t32 shm_cpid;	__kernel_pid_t32 shm_lpid;	unsigned int shm_nattch;	unsigned int __unused4;	unsigned int __unused5;};struct shminfo64_32 {	unsigned int shmmax;	unsigned int shmmin;	unsigned int shmmni;	unsigned int shmseg;	unsigned int shmall;	unsigned int __unused1;	unsigned int __unused2;	unsigned int __unused3;	unsigned int __unused4;};struct shm_info32 {	int used_ids;	u32 shm_tot, shm_rss, shm_swp;	u32 swap_attempts, swap_successes;};struct ipc_kludge {	struct msgbuf *msgp;	long msgtyp;};#define SEMOP		 1#define SEMGET		 2#define SEMCTL		 3#define MSGSND		11#define MSGRCV		12#define MSGGET		13#define MSGCTL		14#define SHMAT		21#define SHMDT		22#define SHMGET		23#define SHMCTL		24#define IPCOP_MASK(__x)	(1UL << (__x))static intipc_parse_version32 (int *cmd){	if (*cmd & IPC_64) {		*cmd ^= IPC_64;		return IPC_64;	} else {		return IPC_OLD;	}}static intsemctl32 (int first, int second, int third, void *uptr){	union semun fourth;	u32 pad;	int err = 0, err2;	struct semid64_ds s;	mm_segment_t old_fs;	int version = ipc_parse_version32(&third);	if (!uptr)		return -EINVAL;	if (get_user(pad, (u32 *)uptr))		return -EFAULT;	if (third == SETVAL)		fourth.val = (int)pad;	else		fourth.__pad = (void *)A(pad);	switch (third) {	      case IPC_INFO:	      case IPC_RMID:	      case IPC_SET:	      case SEM_INFO:	      case GETVAL:	      case GETPID:	      case GETNCNT:	      case GETZCNT:	      case GETALL:	      case SETVAL:	      case SETALL:		err = sys_semctl(first, second, third, fourth);		break;	      case IPC_STAT:	      case SEM_STAT:		fourth.__pad = &s;		old_fs = get_fs();		set_fs(KERNEL_DS);		err = sys_semctl(first, second, third, fourth);		set_fs(old_fs);		if (version == IPC_64) {			struct semid64_ds32 *usp64 = (struct semid64_ds32 *) A(pad);			if (!access_ok(VERIFY_WRITE, usp64, sizeof(*usp64))) {				err = -EFAULT;				break;			}			err2 = __put_user(s.sem_perm.key, &usp64->sem_perm.key);			err2 |= __put_user(s.sem_perm.uid, &usp64->sem_perm.uid);			err2 |= __put_user(s.sem_perm.gid, &usp64->sem_perm.gid);			err2 |= __put_user(s.sem_perm.cuid, &usp64->sem_perm.cuid);			err2 |= __put_user(s.sem_perm.cgid, &usp64->sem_perm.cgid);			err2 |= __put_user(s.sem_perm.mode, &usp64->sem_perm.mode);			err2 |= __put_user(s.sem_perm.seq, &usp64->sem_perm.seq);			err2 |= __put_user(s.sem_otime, &usp64->sem_otime);			err2 |= __put_user(s.sem_ctime, &usp64->sem_ctime);			err2 |= __put_user(s.sem_nsems, &usp64->sem_nsems);		} else {			struct semid_ds32 *usp32 = (struct semid_ds32 *) A(pad);			if (!access_ok(VERIFY_WRITE, usp32, sizeof(*usp32))) {				err = -EFAULT;				break;			}			err2 = __put_user(s.sem_perm.key, &usp32->sem_perm.key);			err2 |= __put_user(s.sem_perm.uid, &usp32->sem_perm.uid);			err2 |= __put_user(s.sem_perm.gid, &usp32->sem_perm.gid);			err2 |= __put_user(s.sem_perm.cuid, &usp32->sem_perm.cuid);			err2 |= __put_user(s.sem_perm.cgid, &usp32->sem_perm.cgid);			err2 |= __put_user(s.sem_perm.mode, &usp32->sem_perm.mode);			err2 |= __put_user(s.sem_perm.seq, &usp32->sem_perm.seq);			err2 |= __put_user(s.sem_otime, &usp32->sem_otime);			err2 |= __put_user(s.sem_ctime, &usp32->sem_ctime);			err2 |= __put_user(s.sem_nsems, &usp32->sem_nsems);		}		if (err2)		    err = -EFAULT;		break;	}	return err;}static intdo_sys32_msgsnd (int first, int second, int third, void *uptr){	struct msgbuf *p = kmalloc(second + sizeof(struct msgbuf) + 4, GFP_USER);	struct msgbuf32 *up = (struct msgbuf32 *)uptr;	mm_segment_t old_fs;	int err;	if (!p)		return -ENOMEM;	err = get_user(p->mtype, &up->mtype);	err |= copy_from_user(p->mtext, &up->mtext, second);	if (err)		goto out;	old_fs = get_fs();	set_fs(KERNEL_DS);	err = sys_msgsnd(first, p, second, third);	set_fs(old_fs);  out:	kfree(p);	return err;}static intdo_sys32_msgrcv (int first, int second, int msgtyp, int third, int version, void *uptr){	struct msgbuf32 *up;	struct msgbuf *p;	mm_segment_t old_fs;	int err;	if (!version) {		struct ipc_kludge *uipck = (struct ipc_kludge *)uptr;		struct ipc_kludge ipck;		err = -EINVAL;		if (!uptr)			goto out;		err = -EFAULT;		if (copy_from_user(&ipck, uipck, sizeof(struct ipc_kludge)))			goto out;		uptr = (void *)A(ipck.msgp);		msgtyp = ipck.msgtyp;	}	err = -ENOMEM;	p = kmalloc(second + sizeof(struct msgbuf) + 4, GFP_USER);	if (!p)		goto out;	old_fs = get_fs();	set_fs(KERNEL_DS);	err = sys_msgrcv(first, p, second + 4, msgtyp, third);	set_fs(old_fs);	if (err < 0)		goto free_then_out;	up = (struct msgbuf32 *)uptr;	if (put_user(p->mtype, &up->mtype) || copy_to_user(&up->mtext, p->mtext, err))		err = -EFAULT;free_then_out:	kfree(p);out:	return err;}static intmsgctl32 (int first, int second, void *uptr){	int err = -EINVAL, err2;	struct msqid_ds m;	struct msqid64_ds m64;	struct msqid_ds32 *up32 = (struct msqid_ds32 *)uptr;	struct msqid64_ds32 *up64 = (struct msqid64_ds32 *)uptr;	mm_segment_t old_fs;	int version = ipc_parse_version32(&second);	switch (second) {	      case IPC_INFO:	      case IPC_RMID:	      case MSG_INFO:		err = sys_msgctl(first, second, (struct msqid_ds *)uptr);		break;	      case IPC_SET:		if (version == IPC_64) {			err = get_user(m.msg_perm.uid, &up64->msg_perm.uid);			err |= get_user(m.msg_perm.gid, &up64->msg_perm.gid);			err |= get_user(m.msg_perm.mode, &up64->msg_perm.mode);			err |= get_user(m.msg_qbytes, &up64->msg_qbytes);		} else {			err = get_user(m.msg_perm.uid, &up32->msg_perm.uid);			err |= get_user(m.msg_perm.gid, &up32->msg_perm.gid);			err |= get_user(m.msg_perm.mode, &up32->msg_perm.mode);			err |= get_user(m.msg_qbytes, &up32->msg_qbytes);		}		if (err)			break;		old_fs = get_fs();		set_fs(KERNEL_DS);		err = sys_msgctl(first, second, &m);		set_fs(old_fs);		break;	      case IPC_STAT:	      case MSG_STAT:		old_fs = get_fs();		set_fs(KERNEL_DS);		err = sys_msgctl(first, second, (void *) &m64);		set_fs(old_fs);		if (version == IPC_64) {			if (!access_ok(VERIFY_WRITE, up64, sizeof(*up64))) {				err = -EFAULT;				break;			}			err2 = __put_user(m64.msg_perm.key, &up64->msg_perm.key);			err2 |= __put_user(m64.msg_perm.uid, &up64->msg_perm.uid);			err2 |= __put_user(m64.msg_perm.gid, &up64->msg_perm.gid);			err2 |= __put_user(m64.msg_perm.cuid, &up64->msg_perm.cuid);			err2 |= __put_user(m64.msg_perm.cgid, &up64->msg_perm.cgid);			err2 |= __put_user(m64.msg_perm.mode, &up64->msg_perm.mode);			err2 |= __put_user(m64.msg_perm.seq, &up64->msg_perm.seq);			err2 |= __put_user(m64.msg_stime, &up64->msg_stime);			err2 |= __put_user(m64.msg_rtime, &up64->msg_rtime);			err2 |= __put_user(m64.msg_ctime, &up64->msg_ctime);			err2 |= __put_user(m64.msg_cbytes, &up64->msg_cbytes);			err2 |= __put_user(m64.msg_qnum, &up64->msg_qnum);			err2 |= __put_user(m64.msg_qbytes, &up64->msg_qbytes);			err2 |= __put_user(m64.msg_lspid, &up64->msg_lspid);			err2 |= __put_user(m64.msg_lrpid, &up64->msg_lrpid);			if (err2)				err = -EFAULT;		} else {			if (!access_ok(VERIFY_WRITE, up32, sizeof(*up32))) {				err = -EFAULT;				break;			}			err2 = __put_user(m64.msg_perm.key, &up32->msg_perm.key);			err2 |= __put_user(m64.msg_perm.uid, &up32->msg_perm.uid);			err2 |= __put_user(m64.msg_perm.gid, &up32->msg_perm.gid);			err2 |= __put_user(m64.msg_perm.cuid, &up32->msg_perm.cuid);			err2 |= __put_user(m64.msg_perm.cgid, &up32->msg_perm.cgid);			err2 |= __put_user(m64.msg_perm.mode, &up32->msg_perm.mode);			err2 |= __put_user(m64.msg_perm.seq, &up32->msg_perm.seq);			err2 |= __put_user(m64.msg_stime, &up32->msg_stime);			err2 |= __put_user(m64.msg_rtime, &up32->msg_rtime);			err2 |= __put_user(m64.msg_ctime, &up32->msg_ctime);			err2 |= __put_user(m64.msg_cbytes, &up32->msg_cbytes);			err2 |= __put_user(m64.msg_qnum, &up32->msg_qnum);			err2 |= __put_user(m64.msg_qbytes, &up32->msg_qbytes);			err2 |= __put_user(m64.msg_lspid, &up32->msg_lspid);			err2 |= __put_user(m64.msg_lrpid, &up32->msg_lrpid);			if (err2)				err = -EFAULT;		}		break;	}	return err;}static intshmat32 (int first, int second, int third, int version, void *uptr){	unsigned long raddr;	u32 *uaddr = (u32 *)A((u32)third);	int err;	if (version == 1)		return -EINVAL;	/* iBCS2 emulator entry point: unsupported */	err = sys_shmat(first, uptr, second, &raddr);	if (err)		return err;	return put_user(raddr, uaddr);}static intshmctl32 (int first, int second, void *uptr){	int err = -EFAULT, err2;	struct shmid_ds s;	struct shmid64_ds s64;	struct shmid_ds32 *up32 = (struct shmid_ds32 *)uptr;	struct shmid64_ds32 *up64 = (struct shmid64_ds32 *)uptr;	mm_segment_t old_fs;	struct shm_info32 *uip = (struct shm_info32 *)uptr;	struct shm_info si;	int version = ipc_parse_version32(&second);	struct shminfo64 smi;	struct shminfo *usi32 = (struct shminfo *) uptr;	struct shminfo64_32 *usi64 = (struct shminfo64_32 *) uptr;	switch (second) {	      case IPC_INFO:		old_fs = get_fs();		set_fs(KERNEL_DS);		err = sys_shmctl(first, second, (struct shmid_ds *)&smi);		set_fs(old_fs);		if (version == IPC_64) {			if (!access_ok(VERIFY_WRITE, usi64, sizeof(*usi64))) {				err = -EFAULT;				break;			}			err2 = __put_user(smi.shmmax, &usi64->shmmax);			err2 |= __put_user(smi.shmmin, &usi64->shmmin);			err2 |= __put_user(smi.shmmni, &usi64->shmmni);			err2 |= __put_user(smi.shmseg, &usi64->shmseg);			err2 |= __put_user(smi.shmall, &usi64->shmall);		} else {			if (!access_ok(VERIFY_WRITE, usi32, sizeof(*usi32))) {				err = -EFAULT;				break;			}			err2 = __put_user(smi.shmmax, &usi32->shmmax);			err2 |= __put_user(smi.shmmin, &usi32->shmmin);			err2 |= __put_user(smi.shmmni, &usi32->shmmni);			err2 |= __put_user(smi.shmseg, &usi32->shmseg);			err2 |= __put_user(smi.shmall, &usi32->shmall);		}		if (err2)			err = -EFAULT;		break;	      case IPC_RMID:	      case SHM_LOCK:	      case SHM_UNLOCK:		err = sys_shmctl(first, second, (struct shmid_ds *)uptr);		break;	      case IPC_SET:		if (version == IPC_64) {			err = get_user(s.shm_perm.uid, &up64->shm_perm.uid);			err |= get_user(s.shm_perm.gid, &up64->shm_perm.gid);			err |= get_user(s.shm_perm.mode, &up64->shm_perm.mode);		} else {			err = get_user(s.shm_perm.uid, &up32->shm_perm.uid);			err |= get_user(s.shm_perm.gid, &up32->shm_perm.gid);			err |= get_user(s.shm_perm.mode, &up32->shm_perm.mode);		}		if (err)			break;		old_fs = get_fs();		set_fs(KERNEL_DS);		err = sys_shmctl(first, second, &s);		set_fs(old_fs);		break;	      case IPC_STAT:	      case SHM_STAT:		old_fs = get_fs();		set_fs(KERNEL_DS);		err = sys_shmctl(first, second, (void *) &s64);		set_fs(old_fs);		if (err < 0)			break;		if (version == IPC_64) {			if (!access_ok(VERIFY_WRITE, up64, sizeof(*up64))) {				err = -EFAULT;				break;			}			err2 = __put_user(s64.shm_perm.key, &up64->shm_perm.key);			err2 |= __put_user(s64.shm_perm.uid, &up64->shm_perm.uid);			err2 |= __put_user(s64.shm_perm.gid, &up64->shm_perm.gid);			err2 |= __put_user(s64.shm_perm.cuid, &up64->shm_perm.cuid);			err2 |= __put_user(s64.shm_perm.cgid, &up64->shm_perm.cgid);			err2 |= __put_user(s64.shm_perm.mode, &up64->shm_perm.mode);			err2 |= __put_user(s64.shm_perm.seq, &up64->shm_perm.seq);			err2 |= __put_user(s64.shm_atime, &up64->shm_atime);			err2 |= __put_user(s64.shm_dtime, &up64->shm_dtime);			err2 |= __put_user(s64.shm_ctime, &up64->shm_ctime);			err2 |= __put_user(s64.shm_segsz, &up64->shm_segsz);			err2 |= __put_user(s64.shm_nattch, &up64->shm_nattch);			err2 |= __put_user(s64.shm_cpid, &up64->shm_cpid);			err2 |= __put_user(s64.shm_lpid, &up64->shm_lpid);		} else {			if (!access_ok(VERIFY_WRITE, up32, sizeof(*up32))) {				err = -EFAULT;				break;			}			err2 = __put_user(s64.shm_perm.key, &up32->shm_perm.key);			err2 |= __put_user(s64.shm_perm.uid, &up32->shm_perm.uid);			err2 |= __put_user(s64.shm_perm.gid, &up32->shm_perm.gid);			err2 |= __put_user(s64.shm_perm.cuid, &up32->shm_perm.cuid);			err2 |= __put_user(s64.shm_perm.cgid, &up32->shm_perm.cgid);			err2 |= __put_user(s64.shm_perm.mode, &up32->shm_perm.mode);			err2 |= __put_user(s64.shm_perm.seq, &up32->shm_perm.seq);			err2 |= __put_user(s64.shm_atime, &up32->shm_atime);			err2 |= __put_user(s64.shm_dtime, &up32->shm_dtime);			err2 |= __put_user(s64.shm_ctime, &up32->shm_ctime);			err2 |= __put_user

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -