📄 do_int86.c
字号:
/* The kernel call implemented in this file: * m_type: SYS_INT86 * * The parameters for this kernel call are: * m1_p1: INT86_REG86 */#include "../../system.h"#include <minix/type.h>#include <minix/endpoint.h>#include <minix/portio.h>#include <ibm/int86.h>#include "proto.h"struct reg86u reg86;/*===========================================================================* * do_int86 * *===========================================================================*/PUBLIC int do_int86(m_ptr)register message *m_ptr; /* pointer to request message */{ vir_bytes caller_vir; phys_bytes caller_phys, kernel_phys; caller_vir = (vir_bytes) m_ptr->INT86_REG86; caller_phys = umap_local(proc_addr(who_p), D, caller_vir, sizeof(reg86)); if (0 == caller_phys) return(EFAULT); kernel_phys = vir2phys(®86); phys_copy(caller_phys, kernel_phys, (phys_bytes) sizeof(reg86)); level0(int86); /* Copy results back to the caller */ phys_copy(kernel_phys, caller_phys, (phys_bytes) sizeof(reg86)); /* The BIOS call eats interrupts. Call get_randomness to generate some * entropy. Normally, get_randomness is called from an interrupt handler. * Figuring out the exact source is too complicated. CLOCK_IRQ is normally * not very random. */ lock(0, "do_int86"); get_randomness(CLOCK_IRQ); unlock(0); return(OK);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -