Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openeuler
Kernel
提交
1b7e190b
K
Kernel
项目概览
openeuler
/
Kernel
1 年多 前同步成功
通知
8
Star
0
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
DevOps
流水线
流水线任务
计划
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
K
Kernel
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
DevOps
DevOps
流水线
流水线任务
计划
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
流水线任务
提交
Issue看板
提交
1b7e190b
编写于
7月 30, 2008
作者:
A
Al Viro
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
[PATCH] clean dup2() up a bit
Signed-off-by:
N
Al Viro
<
viro@zeniv.linux.org.uk
>
上级
1027abe8
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
27 addition
and
26 deletion
+27
-26
fs/fcntl.c
fs/fcntl.c
+27
-26
未找到文件。
fs/fcntl.c
浏览文件 @
1b7e190b
...
...
@@ -63,31 +63,35 @@ asmlinkage long sys_dup3(unsigned int oldfd, unsigned int newfd, int flags)
return
-
EINVAL
;
spin_lock
(
&
files
->
file_lock
);
if
(
!
(
file
=
fcheck
(
oldfd
)))
goto
out_unlock
;
get_file
(
file
);
/* We are now finished with oldfd */
err
=
expand_files
(
files
,
newfd
);
file
=
fcheck
(
oldfd
);
if
(
unlikely
(
!
file
))
goto
Ebadf
;
if
(
unlikely
(
err
<
0
))
{
if
(
err
==
-
EMFILE
)
err
=
-
EBADF
;
goto
out_
fput
;
goto
Ebadf
;
goto
out_
unlock
;
}
/* To avoid races with open() and dup(), we will mark the fd as
* in-use in the open-file bitmap throughout the entire dup2()
* process. This is quite safe: do_close() uses the fd array
* entry, not the bitmap, to decide what work needs to be
* done. --sct */
/* Doesn't work. open() might be there first. --AV */
/* Yes. It's a race. In user space. Nothing sane to do */
/*
* We need to detect attempts to do dup2() over allocated but still
* not finished descriptor. NB: OpenBSD avoids that at the price of
* extra work in their equivalent of fget() - they insert struct
* file immediately after grabbing descriptor, mark it larval if
* more work (e.g. actual opening) is needed and make sure that
* fget() treats larval files as absent. Potentially interesting,
* but while extra work in fget() is trivial, locking implications
* and amount of surgery on open()-related paths in VFS are not.
* FreeBSD fails with -EBADF in the same situation, NetBSD "solution"
* deadlocks in rather amusing ways, AFAICS. All of that is out of
* scope of POSIX or SUS, since neither considers shared descriptor
* tables and this condition does not arise without those.
*/
err
=
-
EBUSY
;
fdt
=
files_fdtable
(
files
);
tofree
=
fdt
->
fd
[
newfd
];
if
(
!
tofree
&&
FD_ISSET
(
newfd
,
fdt
->
open_fds
))
goto
out_
fput
;
goto
out_
unlock
;
get_file
(
file
);
rcu_assign_pointer
(
fdt
->
fd
[
newfd
],
file
);
FD_SET
(
newfd
,
fdt
->
open_fds
);
if
(
flags
&
O_CLOEXEC
)
...
...
@@ -98,17 +102,14 @@ asmlinkage long sys_dup3(unsigned int oldfd, unsigned int newfd, int flags)
if
(
tofree
)
filp_close
(
tofree
,
files
);
err
=
newfd
;
out:
return
err
;
out_unlock:
spin_unlock
(
&
files
->
file_lock
);
goto
out
;
out_fput:
return
newfd
;
Ebadf:
err
=
-
EBADF
;
out_unlock:
spin_unlock
(
&
files
->
file_lock
);
fput
(
file
);
goto
out
;
return
err
;
}
asmlinkage
long
sys_dup2
(
unsigned
int
oldfd
,
unsigned
int
newfd
)
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录