📄 sys_ia32.c
字号:
};struct semid_ds32 { struct ipc_perm32 sem_perm; /* permissions .. see ipc.h */ __kernel_time_t32 sem_otime; /* last semop time */ __kernel_time_t32 sem_ctime; /* last change time */ u32 sem_base; /* ptr to first semaphore in array */ u32 sem_pending; /* pending operations to be processed */ u32 sem_pending_last; /* last pending operation */ u32 undo; /* undo requests on this array */ unsigned short sem_nsems; /* no. of semaphores in array */};struct semid64_ds32 { struct ipc64_perm32 sem_perm; __kernel_time_t32 sem_otime; unsigned int __unused1; __kernel_time_t32 sem_ctime; unsigned int __unused2; unsigned int sem_nsems; unsigned int __unused3; unsigned int __unused4;};struct msqid_ds32 { struct ipc_perm32 msg_perm; u32 msg_first; u32 msg_last; __kernel_time_t32 msg_stime; __kernel_time_t32 msg_rtime; __kernel_time_t32 msg_ctime; u32 wwait; u32 rwait; unsigned short msg_cbytes; unsigned short msg_qnum; unsigned short msg_qbytes; __kernel_ipc_pid_t32 msg_lspid; __kernel_ipc_pid_t32 msg_lrpid;};struct msqid64_ds32 { struct ipc64_perm32 msg_perm; __kernel_time_t32 msg_stime; unsigned int __unused1; __kernel_time_t32 msg_rtime; unsigned int __unused2; __kernel_time_t32 msg_ctime; unsigned int __unused3; unsigned int msg_cbytes; unsigned int msg_qnum; unsigned int msg_qbytes; __kernel_pid_t32 msg_lspid; __kernel_pid_t32 msg_lrpid; unsigned int __unused4; unsigned int __unused5;};struct shmid_ds32 { struct ipc_perm32 shm_perm; int shm_segsz; __kernel_time_t32 shm_atime; __kernel_time_t32 shm_dtime; __kernel_time_t32 shm_ctime; __kernel_ipc_pid_t32 shm_cpid; __kernel_ipc_pid_t32 shm_lpid; unsigned short shm_nattch;};struct shmid64_ds32 { struct ipc64_perm shm_perm; __kernel_size_t32 shm_segsz; __kernel_time_t32 shm_atime; unsigned int __unused1; __kernel_time_t32 shm_dtime; unsigned int __unused2; __kernel_time_t32 shm_ctime; unsigned int __unused3; __kernel_pid_t32 shm_cpid; __kernel_pid_t32 shm_lpid; unsigned int shm_nattch; unsigned int __unused4; unsigned int __unused5;};struct shminfo64_32 { unsigned int shmmax; unsigned int shmmin; unsigned int shmmni; unsigned int shmseg; unsigned int shmall; unsigned int __unused1; unsigned int __unused2; unsigned int __unused3; unsigned int __unused4;};struct shm_info32 { int used_ids; u32 shm_tot, shm_rss, shm_swp; u32 swap_attempts, swap_successes;};struct ipc_kludge { struct msgbuf *msgp; long msgtyp;};#define SEMOP 1#define SEMGET 2#define SEMCTL 3#define MSGSND 11#define MSGRCV 12#define MSGGET 13#define MSGCTL 14#define SHMAT 21#define SHMDT 22#define SHMGET 23#define SHMCTL 24#define IPCOP_MASK(__x) (1UL << (__x))static intipc_parse_version32 (int *cmd){ if (*cmd & IPC_64) { *cmd ^= IPC_64; return IPC_64; } else { return IPC_OLD; }}static intsemctl32 (int first, int second, int third, void *uptr){ union semun fourth; u32 pad; int err = 0, err2; struct semid64_ds s; mm_segment_t old_fs; int version = ipc_parse_version32(&third); if (!uptr) return -EINVAL; if (get_user(pad, (u32 *)uptr)) return -EFAULT; if (third == SETVAL) fourth.val = (int)pad; else fourth.__pad = (void *)A(pad); switch (third) { case IPC_INFO: case IPC_RMID: case IPC_SET: case SEM_INFO: case GETVAL: case GETPID: case GETNCNT: case GETZCNT: case GETALL: case SETVAL: case SETALL: err = sys_semctl(first, second, third, fourth); break; case IPC_STAT: case SEM_STAT: fourth.__pad = &s; old_fs = get_fs(); set_fs(KERNEL_DS); err = sys_semctl(first, second, third, fourth); set_fs(old_fs); if (version == IPC_64) { struct semid64_ds32 *usp64 = (struct semid64_ds32 *) A(pad); if (!access_ok(VERIFY_WRITE, usp64, sizeof(*usp64))) { err = -EFAULT; break; } err2 = __put_user(s.sem_perm.key, &usp64->sem_perm.key); err2 |= __put_user(s.sem_perm.uid, &usp64->sem_perm.uid); err2 |= __put_user(s.sem_perm.gid, &usp64->sem_perm.gid); err2 |= __put_user(s.sem_perm.cuid, &usp64->sem_perm.cuid); err2 |= __put_user(s.sem_perm.cgid, &usp64->sem_perm.cgid); err2 |= __put_user(s.sem_perm.mode, &usp64->sem_perm.mode); err2 |= __put_user(s.sem_perm.seq, &usp64->sem_perm.seq); err2 |= __put_user(s.sem_otime, &usp64->sem_otime); err2 |= __put_user(s.sem_ctime, &usp64->sem_ctime); err2 |= __put_user(s.sem_nsems, &usp64->sem_nsems); } else { struct semid_ds32 *usp32 = (struct semid_ds32 *) A(pad); if (!access_ok(VERIFY_WRITE, usp32, sizeof(*usp32))) { err = -EFAULT; break; } err2 = __put_user(s.sem_perm.key, &usp32->sem_perm.key); err2 |= __put_user(s.sem_perm.uid, &usp32->sem_perm.uid); err2 |= __put_user(s.sem_perm.gid, &usp32->sem_perm.gid); err2 |= __put_user(s.sem_perm.cuid, &usp32->sem_perm.cuid); err2 |= __put_user(s.sem_perm.cgid, &usp32->sem_perm.cgid); err2 |= __put_user(s.sem_perm.mode, &usp32->sem_perm.mode); err2 |= __put_user(s.sem_perm.seq, &usp32->sem_perm.seq); err2 |= __put_user(s.sem_otime, &usp32->sem_otime); err2 |= __put_user(s.sem_ctime, &usp32->sem_ctime); err2 |= __put_user(s.sem_nsems, &usp32->sem_nsems); } if (err2) err = -EFAULT; break; } return err;}static intdo_sys32_msgsnd (int first, int second, int third, void *uptr){ struct msgbuf *p = kmalloc(second + sizeof(struct msgbuf) + 4, GFP_USER); struct msgbuf32 *up = (struct msgbuf32 *)uptr; mm_segment_t old_fs; int err; if (!p) return -ENOMEM; err = get_user(p->mtype, &up->mtype); err |= copy_from_user(p->mtext, &up->mtext, second); if (err) goto out; old_fs = get_fs(); set_fs(KERNEL_DS); err = sys_msgsnd(first, p, second, third); set_fs(old_fs); out: kfree(p); return err;}static intdo_sys32_msgrcv (int first, int second, int msgtyp, int third, int version, void *uptr){ struct msgbuf32 *up; struct msgbuf *p; mm_segment_t old_fs; int err; if (!version) { struct ipc_kludge *uipck = (struct ipc_kludge *)uptr; struct ipc_kludge ipck; err = -EINVAL; if (!uptr) goto out; err = -EFAULT; if (copy_from_user(&ipck, uipck, sizeof(struct ipc_kludge))) goto out; uptr = (void *)A(ipck.msgp); msgtyp = ipck.msgtyp; } err = -ENOMEM; p = kmalloc(second + sizeof(struct msgbuf) + 4, GFP_USER); if (!p) goto out; old_fs = get_fs(); set_fs(KERNEL_DS); err = sys_msgrcv(first, p, second + 4, msgtyp, third); set_fs(old_fs); if (err < 0) goto free_then_out; up = (struct msgbuf32 *)uptr; if (put_user(p->mtype, &up->mtype) || copy_to_user(&up->mtext, p->mtext, err)) err = -EFAULT;free_then_out: kfree(p);out: return err;}static intmsgctl32 (int first, int second, void *uptr){ int err = -EINVAL, err2; struct msqid_ds m; struct msqid64_ds m64; struct msqid_ds32 *up32 = (struct msqid_ds32 *)uptr; struct msqid64_ds32 *up64 = (struct msqid64_ds32 *)uptr; mm_segment_t old_fs; int version = ipc_parse_version32(&second); switch (second) { case IPC_INFO: case IPC_RMID: case MSG_INFO: err = sys_msgctl(first, second, (struct msqid_ds *)uptr); break; case IPC_SET: if (version == IPC_64) { err = get_user(m.msg_perm.uid, &up64->msg_perm.uid); err |= get_user(m.msg_perm.gid, &up64->msg_perm.gid); err |= get_user(m.msg_perm.mode, &up64->msg_perm.mode); err |= get_user(m.msg_qbytes, &up64->msg_qbytes); } else { err = get_user(m.msg_perm.uid, &up32->msg_perm.uid); err |= get_user(m.msg_perm.gid, &up32->msg_perm.gid); err |= get_user(m.msg_perm.mode, &up32->msg_perm.mode); err |= get_user(m.msg_qbytes, &up32->msg_qbytes); } if (err) break; old_fs = get_fs(); set_fs(KERNEL_DS); err = sys_msgctl(first, second, &m); set_fs(old_fs); break; case IPC_STAT: case MSG_STAT: old_fs = get_fs(); set_fs(KERNEL_DS); err = sys_msgctl(first, second, (void *) &m64); set_fs(old_fs); if (version == IPC_64) { if (!access_ok(VERIFY_WRITE, up64, sizeof(*up64))) { err = -EFAULT; break; } err2 = __put_user(m64.msg_perm.key, &up64->msg_perm.key); err2 |= __put_user(m64.msg_perm.uid, &up64->msg_perm.uid); err2 |= __put_user(m64.msg_perm.gid, &up64->msg_perm.gid); err2 |= __put_user(m64.msg_perm.cuid, &up64->msg_perm.cuid); err2 |= __put_user(m64.msg_perm.cgid, &up64->msg_perm.cgid); err2 |= __put_user(m64.msg_perm.mode, &up64->msg_perm.mode); err2 |= __put_user(m64.msg_perm.seq, &up64->msg_perm.seq); err2 |= __put_user(m64.msg_stime, &up64->msg_stime); err2 |= __put_user(m64.msg_rtime, &up64->msg_rtime); err2 |= __put_user(m64.msg_ctime, &up64->msg_ctime); err2 |= __put_user(m64.msg_cbytes, &up64->msg_cbytes); err2 |= __put_user(m64.msg_qnum, &up64->msg_qnum); err2 |= __put_user(m64.msg_qbytes, &up64->msg_qbytes); err2 |= __put_user(m64.msg_lspid, &up64->msg_lspid); err2 |= __put_user(m64.msg_lrpid, &up64->msg_lrpid); if (err2) err = -EFAULT; } else { if (!access_ok(VERIFY_WRITE, up32, sizeof(*up32))) { err = -EFAULT; break; } err2 = __put_user(m64.msg_perm.key, &up32->msg_perm.key); err2 |= __put_user(m64.msg_perm.uid, &up32->msg_perm.uid); err2 |= __put_user(m64.msg_perm.gid, &up32->msg_perm.gid); err2 |= __put_user(m64.msg_perm.cuid, &up32->msg_perm.cuid); err2 |= __put_user(m64.msg_perm.cgid, &up32->msg_perm.cgid); err2 |= __put_user(m64.msg_perm.mode, &up32->msg_perm.mode); err2 |= __put_user(m64.msg_perm.seq, &up32->msg_perm.seq); err2 |= __put_user(m64.msg_stime, &up32->msg_stime); err2 |= __put_user(m64.msg_rtime, &up32->msg_rtime); err2 |= __put_user(m64.msg_ctime, &up32->msg_ctime); err2 |= __put_user(m64.msg_cbytes, &up32->msg_cbytes); err2 |= __put_user(m64.msg_qnum, &up32->msg_qnum); err2 |= __put_user(m64.msg_qbytes, &up32->msg_qbytes); err2 |= __put_user(m64.msg_lspid, &up32->msg_lspid); err2 |= __put_user(m64.msg_lrpid, &up32->msg_lrpid); if (err2) err = -EFAULT; } break; } return err;}static intshmat32 (int first, int second, int third, int version, void *uptr){ unsigned long raddr; u32 *uaddr = (u32 *)A((u32)third); int err; if (version == 1) return -EINVAL; /* iBCS2 emulator entry point: unsupported */ err = sys_shmat(first, uptr, second, &raddr); if (err) return err; return put_user(raddr, uaddr);}static intshmctl32 (int first, int second, void *uptr){ int err = -EFAULT, err2; struct shmid_ds s; struct shmid64_ds s64; struct shmid_ds32 *up32 = (struct shmid_ds32 *)uptr; struct shmid64_ds32 *up64 = (struct shmid64_ds32 *)uptr; mm_segment_t old_fs; struct shm_info32 *uip = (struct shm_info32 *)uptr; struct shm_info si; int version = ipc_parse_version32(&second); struct shminfo64 smi; struct shminfo *usi32 = (struct shminfo *) uptr; struct shminfo64_32 *usi64 = (struct shminfo64_32 *) uptr; switch (second) { case IPC_INFO: old_fs = get_fs(); set_fs(KERNEL_DS); err = sys_shmctl(first, second, (struct shmid_ds *)&smi); set_fs(old_fs); if (version == IPC_64) { if (!access_ok(VERIFY_WRITE, usi64, sizeof(*usi64))) { err = -EFAULT; break; } err2 = __put_user(smi.shmmax, &usi64->shmmax); err2 |= __put_user(smi.shmmin, &usi64->shmmin); err2 |= __put_user(smi.shmmni, &usi64->shmmni); err2 |= __put_user(smi.shmseg, &usi64->shmseg); err2 |= __put_user(smi.shmall, &usi64->shmall); } else { if (!access_ok(VERIFY_WRITE, usi32, sizeof(*usi32))) { err = -EFAULT; break; } err2 = __put_user(smi.shmmax, &usi32->shmmax); err2 |= __put_user(smi.shmmin, &usi32->shmmin); err2 |= __put_user(smi.shmmni, &usi32->shmmni); err2 |= __put_user(smi.shmseg, &usi32->shmseg); err2 |= __put_user(smi.shmall, &usi32->shmall); } if (err2) err = -EFAULT; break; case IPC_RMID: case SHM_LOCK: case SHM_UNLOCK: err = sys_shmctl(first, second, (struct shmid_ds *)uptr); break; case IPC_SET: if (version == IPC_64) { err = get_user(s.shm_perm.uid, &up64->shm_perm.uid); err |= get_user(s.shm_perm.gid, &up64->shm_perm.gid); err |= get_user(s.shm_perm.mode, &up64->shm_perm.mode); } else { err = get_user(s.shm_perm.uid, &up32->shm_perm.uid); err |= get_user(s.shm_perm.gid, &up32->shm_perm.gid); err |= get_user(s.shm_perm.mode, &up32->shm_perm.mode); } if (err) break; old_fs = get_fs(); set_fs(KERNEL_DS); err = sys_shmctl(first, second, &s); set_fs(old_fs); break; case IPC_STAT: case SHM_STAT: old_fs = get_fs(); set_fs(KERNEL_DS); err = sys_shmctl(first, second, (void *) &s64); set_fs(old_fs); if (err < 0) break; if (version == IPC_64) { if (!access_ok(VERIFY_WRITE, up64, sizeof(*up64))) { err = -EFAULT; break; } err2 = __put_user(s64.shm_perm.key, &up64->shm_perm.key); err2 |= __put_user(s64.shm_perm.uid, &up64->shm_perm.uid); err2 |= __put_user(s64.shm_perm.gid, &up64->shm_perm.gid); err2 |= __put_user(s64.shm_perm.cuid, &up64->shm_perm.cuid); err2 |= __put_user(s64.shm_perm.cgid, &up64->shm_perm.cgid); err2 |= __put_user(s64.shm_perm.mode, &up64->shm_perm.mode); err2 |= __put_user(s64.shm_perm.seq, &up64->shm_perm.seq); err2 |= __put_user(s64.shm_atime, &up64->shm_atime); err2 |= __put_user(s64.shm_dtime, &up64->shm_dtime); err2 |= __put_user(s64.shm_ctime, &up64->shm_ctime); err2 |= __put_user(s64.shm_segsz, &up64->shm_segsz); err2 |= __put_user(s64.shm_nattch, &up64->shm_nattch); err2 |= __put_user(s64.shm_cpid, &up64->shm_cpid); err2 |= __put_user(s64.shm_lpid, &up64->shm_lpid); } else { if (!access_ok(VERIFY_WRITE, up32, sizeof(*up32))) { err = -EFAULT; break; } err2 = __put_user(s64.shm_perm.key, &up32->shm_perm.key); err2 |= __put_user(s64.shm_perm.uid, &up32->shm_perm.uid); err2 |= __put_user(s64.shm_perm.gid, &up32->shm_perm.gid); err2 |= __put_user(s64.shm_perm.cuid, &up32->shm_perm.cuid); err2 |= __put_user(s64.shm_perm.cgid, &up32->shm_perm.cgid); err2 |= __put_user(s64.shm_perm.mode, &up32->shm_perm.mode); err2 |= __put_user(s64.shm_perm.seq, &up32->shm_perm.seq); err2 |= __put_user(s64.shm_atime, &up32->shm_atime); err2 |= __put_user(s64.shm_dtime, &up32->shm_dtime); err2 |= __put_user(s64.shm_ctime, &up32->shm_ctime); err2 |= __put_user
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -