提交 e1fd1f49 编写于 作者: A Al Viro

get rid of union semop in sys_semctl(2) arguments

just have the bugger take unsigned long and deal with SETVAL
case (when we use an int member in the union) explicitly.
Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
上级 4b377bab
...@@ -60,21 +60,6 @@ asmlinkage long sys32_unimplemented(int r26, int r25, int r24, int r23, ...@@ -60,21 +60,6 @@ asmlinkage long sys32_unimplemented(int r26, int r25, int r24, int r23,
return -ENOSYS; return -ENOSYS;
} }
asmlinkage long sys32_semctl(int semid, int semnum, int cmd, union semun arg)
{
union semun u;
if (cmd == SETVAL) {
/* Ugh. arg is a union of int,ptr,ptr,ptr, so is 8 bytes.
* The int should be in the first 4, but our argument
* frobbing has left it in the last 4.
*/
u.val = *((int *)&arg + 1);
return sys_semctl (semid, semnum, cmd, u);
}
return sys_semctl (semid, semnum, cmd, arg);
}
asmlinkage long compat_sys_fanotify_mark(int fan_fd, int flags, u32 mask_hi, asmlinkage long compat_sys_fanotify_mark(int fan_fd, int flags, u32 mask_hi,
u32 mask_lo, int fd, u32 mask_lo, int fd,
const char __user *pathname) const char __user *pathname)
......
...@@ -282,7 +282,7 @@ ...@@ -282,7 +282,7 @@
ENTRY_COMP(recvmsg) ENTRY_COMP(recvmsg)
ENTRY_SAME(semop) /* 185 */ ENTRY_SAME(semop) /* 185 */
ENTRY_SAME(semget) ENTRY_SAME(semget)
ENTRY_DIFF(semctl) ENTRY_COMP(semctl)
ENTRY_COMP(msgsnd) ENTRY_COMP(msgsnd)
ENTRY_COMP(msgrcv) ENTRY_COMP(msgrcv)
ENTRY_SAME(msgget) /* 190 */ ENTRY_SAME(msgget) /* 190 */
......
...@@ -353,7 +353,7 @@ SYSCALL_DEFINE6(sparc_ipc, unsigned int, call, int, first, unsigned long, second ...@@ -353,7 +353,7 @@ SYSCALL_DEFINE6(sparc_ipc, unsigned int, call, int, first, unsigned long, second
case SEMCTL: { case SEMCTL: {
err = sys_semctl(first, second, err = sys_semctl(first, second,
(int)third | IPC_64, (int)third | IPC_64,
(union semun) ptr); (unsigned long) ptr);
goto out; goto out;
} }
default: default:
......
...@@ -657,7 +657,7 @@ asmlinkage long sys_msgctl(int msqid, int cmd, struct msqid_ds __user *buf); ...@@ -657,7 +657,7 @@ asmlinkage long sys_msgctl(int msqid, int cmd, struct msqid_ds __user *buf);
asmlinkage long sys_semget(key_t key, int nsems, int semflg); asmlinkage long sys_semget(key_t key, int nsems, int semflg);
asmlinkage long sys_semop(int semid, struct sembuf __user *sops, asmlinkage long sys_semop(int semid, struct sembuf __user *sops,
unsigned nsops); unsigned nsops);
asmlinkage long sys_semctl(int semid, int semnum, int cmd, union semun arg); asmlinkage long sys_semctl(int semid, int semnum, int cmd, unsigned long arg);
asmlinkage long sys_semtimedop(int semid, struct sembuf __user *sops, asmlinkage long sys_semtimedop(int semid, struct sembuf __user *sops,
unsigned nsops, unsigned nsops,
const struct timespec __user *timeout); const struct timespec __user *timeout);
......
...@@ -240,7 +240,7 @@ static inline int put_compat_semid_ds(struct semid64_ds *s, ...@@ -240,7 +240,7 @@ static inline int put_compat_semid_ds(struct semid64_ds *s,
static long do_compat_semctl(int first, int second, int third, u32 pad) static long do_compat_semctl(int first, int second, int third, u32 pad)
{ {
union semun fourth; unsigned long fourth;
int err, err2; int err, err2;
struct semid64_ds s64; struct semid64_ds s64;
struct semid64_ds __user *up64; struct semid64_ds __user *up64;
...@@ -249,9 +249,13 @@ static long do_compat_semctl(int first, int second, int third, u32 pad) ...@@ -249,9 +249,13 @@ static long do_compat_semctl(int first, int second, int third, u32 pad)
memset(&s64, 0, sizeof(s64)); memset(&s64, 0, sizeof(s64));
if ((third & (~IPC_64)) == SETVAL) if ((third & (~IPC_64)) == SETVAL)
fourth.val = (int) pad; #ifdef __BIG_ENDIAN
fourth = (unsigned long)pad << 32;
#else
fourth = pad;
#endif
else else
fourth.__pad = compat_ptr(pad); fourth = (unsigned long)compat_ptr(pad);
switch (third & (~IPC_64)) { switch (third & (~IPC_64)) {
case IPC_INFO: case IPC_INFO:
case IPC_RMID: case IPC_RMID:
...@@ -269,7 +273,7 @@ static long do_compat_semctl(int first, int second, int third, u32 pad) ...@@ -269,7 +273,7 @@ static long do_compat_semctl(int first, int second, int third, u32 pad)
case IPC_STAT: case IPC_STAT:
case SEM_STAT: case SEM_STAT:
up64 = compat_alloc_user_space(sizeof(s64)); up64 = compat_alloc_user_space(sizeof(s64));
fourth.__pad = up64; fourth = (unsigned long)up64;
err = sys_semctl(first, second, third, fourth); err = sys_semctl(first, second, third, fourth);
if (err < 0) if (err < 0)
break; break;
...@@ -295,7 +299,7 @@ static long do_compat_semctl(int first, int second, int third, u32 pad) ...@@ -295,7 +299,7 @@ static long do_compat_semctl(int first, int second, int third, u32 pad)
if (err) if (err)
break; break;
fourth.__pad = up64; fourth = (unsigned long)up64;
err = sys_semctl(first, second, third, fourth); err = sys_semctl(first, second, third, fourth);
break; break;
......
...@@ -799,7 +799,7 @@ static unsigned long copy_semid_to_user(void __user *buf, struct semid64_ds *in, ...@@ -799,7 +799,7 @@ static unsigned long copy_semid_to_user(void __user *buf, struct semid64_ds *in,
} }
static int semctl_nolock(struct ipc_namespace *ns, int semid, static int semctl_nolock(struct ipc_namespace *ns, int semid,
int cmd, int version, union semun arg) int cmd, int version, void __user *p)
{ {
int err; int err;
struct sem_array *sma; struct sem_array *sma;
...@@ -834,7 +834,7 @@ static int semctl_nolock(struct ipc_namespace *ns, int semid, ...@@ -834,7 +834,7 @@ static int semctl_nolock(struct ipc_namespace *ns, int semid,
} }
max_id = ipc_get_maxid(&sem_ids(ns)); max_id = ipc_get_maxid(&sem_ids(ns));
up_read(&sem_ids(ns).rw_mutex); up_read(&sem_ids(ns).rw_mutex);
if (copy_to_user (arg.__buf, &seminfo, sizeof(struct seminfo))) if (copy_to_user(p, &seminfo, sizeof(struct seminfo)))
return -EFAULT; return -EFAULT;
return (max_id < 0) ? 0: max_id; return (max_id < 0) ? 0: max_id;
} }
...@@ -871,7 +871,7 @@ static int semctl_nolock(struct ipc_namespace *ns, int semid, ...@@ -871,7 +871,7 @@ static int semctl_nolock(struct ipc_namespace *ns, int semid,
tbuf.sem_ctime = sma->sem_ctime; tbuf.sem_ctime = sma->sem_ctime;
tbuf.sem_nsems = sma->sem_nsems; tbuf.sem_nsems = sma->sem_nsems;
sem_unlock(sma); sem_unlock(sma);
if (copy_semid_to_user (arg.buf, &tbuf, version)) if (copy_semid_to_user(p, &tbuf, version))
return -EFAULT; return -EFAULT;
return id; return id;
} }
...@@ -883,8 +883,67 @@ static int semctl_nolock(struct ipc_namespace *ns, int semid, ...@@ -883,8 +883,67 @@ static int semctl_nolock(struct ipc_namespace *ns, int semid,
return err; return err;
} }
static int semctl_setval(struct ipc_namespace *ns, int semid, int semnum,
unsigned long arg)
{
struct sem_undo *un;
struct sem_array *sma;
struct sem* curr;
int err;
int nsems;
struct list_head tasks;
int val;
#if defined(CONFIG_64BIT) && defined(__BIG_ENDIAN)
/* big-endian 64bit */
val = arg >> 32;
#else
/* 32bit or little-endian 64bit */
val = arg;
#endif
sma = sem_lock_check(ns, semid);
if (IS_ERR(sma))
return PTR_ERR(sma);
INIT_LIST_HEAD(&tasks);
nsems = sma->sem_nsems;
err = -EACCES;
if (ipcperms(ns, &sma->sem_perm, S_IWUGO))
goto out_unlock;
err = security_sem_semctl(sma, SETVAL);
if (err)
goto out_unlock;
err = -EINVAL;
if(semnum < 0 || semnum >= nsems)
goto out_unlock;
curr = &sma->sem_base[semnum];
err = -ERANGE;
if (val > SEMVMX || val < 0)
goto out_unlock;
assert_spin_locked(&sma->sem_perm.lock);
list_for_each_entry(un, &sma->list_id, list_id)
un->semadj[semnum] = 0;
curr->semval = val;
curr->sempid = task_tgid_vnr(current);
sma->sem_ctime = get_seconds();
/* maybe some queued-up processes were waiting for this */
do_smart_update(sma, NULL, 0, 0, &tasks);
err = 0;
out_unlock:
sem_unlock(sma);
wake_up_sem_queue_do(&tasks);
return err;
}
static int semctl_main(struct ipc_namespace *ns, int semid, int semnum, static int semctl_main(struct ipc_namespace *ns, int semid, int semnum,
int cmd, int version, union semun arg) int cmd, void __user *p)
{ {
struct sem_array *sma; struct sem_array *sma;
struct sem* curr; struct sem* curr;
...@@ -903,7 +962,7 @@ static int semctl_main(struct ipc_namespace *ns, int semid, int semnum, ...@@ -903,7 +962,7 @@ static int semctl_main(struct ipc_namespace *ns, int semid, int semnum,
err = -EACCES; err = -EACCES;
if (ipcperms(ns, &sma->sem_perm, if (ipcperms(ns, &sma->sem_perm,
(cmd == SETVAL || cmd == SETALL) ? S_IWUGO : S_IRUGO)) cmd == SETALL ? S_IWUGO : S_IRUGO))
goto out_unlock; goto out_unlock;
err = security_sem_semctl(sma, cmd); err = security_sem_semctl(sma, cmd);
...@@ -914,7 +973,7 @@ static int semctl_main(struct ipc_namespace *ns, int semid, int semnum, ...@@ -914,7 +973,7 @@ static int semctl_main(struct ipc_namespace *ns, int semid, int semnum,
switch (cmd) { switch (cmd) {
case GETALL: case GETALL:
{ {
ushort __user *array = arg.array; ushort __user *array = p;
int i; int i;
if(nsems > SEMMSL_FAST) { if(nsems > SEMMSL_FAST) {
...@@ -957,7 +1016,7 @@ static int semctl_main(struct ipc_namespace *ns, int semid, int semnum, ...@@ -957,7 +1016,7 @@ static int semctl_main(struct ipc_namespace *ns, int semid, int semnum,
} }
} }
if (copy_from_user (sem_io, arg.array, nsems*sizeof(ushort))) { if (copy_from_user (sem_io, p, nsems*sizeof(ushort))) {
sem_putref(sma); sem_putref(sma);
err = -EFAULT; err = -EFAULT;
goto out_free; goto out_free;
...@@ -991,7 +1050,7 @@ static int semctl_main(struct ipc_namespace *ns, int semid, int semnum, ...@@ -991,7 +1050,7 @@ static int semctl_main(struct ipc_namespace *ns, int semid, int semnum,
err = 0; err = 0;
goto out_unlock; goto out_unlock;
} }
/* GETVAL, GETPID, GETNCTN, GETZCNT, SETVAL: fall-through */ /* GETVAL, GETPID, GETNCTN, GETZCNT: fall-through */
} }
err = -EINVAL; err = -EINVAL;
if(semnum < 0 || semnum >= nsems) if(semnum < 0 || semnum >= nsems)
...@@ -1012,27 +1071,6 @@ static int semctl_main(struct ipc_namespace *ns, int semid, int semnum, ...@@ -1012,27 +1071,6 @@ static int semctl_main(struct ipc_namespace *ns, int semid, int semnum,
case GETZCNT: case GETZCNT:
err = count_semzcnt(sma,semnum); err = count_semzcnt(sma,semnum);
goto out_unlock; goto out_unlock;
case SETVAL:
{
int val = arg.val;
struct sem_undo *un;
err = -ERANGE;
if (val > SEMVMX || val < 0)
goto out_unlock;
assert_spin_locked(&sma->sem_perm.lock);
list_for_each_entry(un, &sma->list_id, list_id)
un->semadj[semnum] = 0;
curr->semval = val;
curr->sempid = task_tgid_vnr(current);
sma->sem_ctime = get_seconds();
/* maybe some queued-up processes were waiting for this */
do_smart_update(sma, NULL, 0, 0, &tasks);
err = 0;
goto out_unlock;
}
} }
out_unlock: out_unlock:
sem_unlock(sma); sem_unlock(sma);
...@@ -1076,7 +1114,7 @@ copy_semid_from_user(struct semid64_ds *out, void __user *buf, int version) ...@@ -1076,7 +1114,7 @@ copy_semid_from_user(struct semid64_ds *out, void __user *buf, int version)
* NOTE: no locks must be held, the rw_mutex is taken inside this function. * NOTE: no locks must be held, the rw_mutex is taken inside this function.
*/ */
static int semctl_down(struct ipc_namespace *ns, int semid, static int semctl_down(struct ipc_namespace *ns, int semid,
int cmd, int version, union semun arg) int cmd, int version, void __user *p)
{ {
struct sem_array *sma; struct sem_array *sma;
int err; int err;
...@@ -1084,7 +1122,7 @@ static int semctl_down(struct ipc_namespace *ns, int semid, ...@@ -1084,7 +1122,7 @@ static int semctl_down(struct ipc_namespace *ns, int semid,
struct kern_ipc_perm *ipcp; struct kern_ipc_perm *ipcp;
if(cmd == IPC_SET) { if(cmd == IPC_SET) {
if (copy_semid_from_user(&semid64, arg.buf, version)) if (copy_semid_from_user(&semid64, p, version))
return -EFAULT; return -EFAULT;
} }
...@@ -1120,11 +1158,11 @@ static int semctl_down(struct ipc_namespace *ns, int semid, ...@@ -1120,11 +1158,11 @@ static int semctl_down(struct ipc_namespace *ns, int semid,
return err; return err;
} }
SYSCALL_DEFINE(semctl)(int semid, int semnum, int cmd, union semun arg) SYSCALL_DEFINE4(semctl, int, semid, int, semnum, int, cmd, unsigned long, arg)
{ {
int err = -EINVAL;
int version; int version;
struct ipc_namespace *ns; struct ipc_namespace *ns;
void __user *p = (void __user *)arg;
if (semid < 0) if (semid < 0)
return -EINVAL; return -EINVAL;
...@@ -1137,30 +1175,23 @@ SYSCALL_DEFINE(semctl)(int semid, int semnum, int cmd, union semun arg) ...@@ -1137,30 +1175,23 @@ SYSCALL_DEFINE(semctl)(int semid, int semnum, int cmd, union semun arg)
case SEM_INFO: case SEM_INFO:
case IPC_STAT: case IPC_STAT:
case SEM_STAT: case SEM_STAT:
err = semctl_nolock(ns, semid, cmd, version, arg); return semctl_nolock(ns, semid, cmd, version, p);
return err;
case GETALL: case GETALL:
case GETVAL: case GETVAL:
case GETPID: case GETPID:
case GETNCNT: case GETNCNT:
case GETZCNT: case GETZCNT:
case SETVAL:
case SETALL: case SETALL:
err = semctl_main(ns,semid,semnum,cmd,version,arg); return semctl_main(ns, semid, semnum, cmd, p);
return err; case SETVAL:
return semctl_setval(ns, semid, semnum, arg);
case IPC_RMID: case IPC_RMID:
case IPC_SET: case IPC_SET:
err = semctl_down(ns, semid, cmd, version, arg); return semctl_down(ns, semid, cmd, version, p);
return err;
default: default:
return -EINVAL; return -EINVAL;
} }
} }
asmlinkage long SyS_semctl(int semid, int semnum, int cmd, union semun arg)
{
return SYSC_semctl((int) semid, (int) semnum, (int) cmd, arg);
}
SYSCALL_ALIAS(sys_semctl, SyS_semctl);
/* If the task doesn't already have a undo_list, then allocate one /* If the task doesn't already have a undo_list, then allocate one
* here. We guarantee there is only one thread using this undo list, * here. We guarantee there is only one thread using this undo list,
......
...@@ -33,12 +33,12 @@ SYSCALL_DEFINE6(ipc, unsigned int, call, int, first, unsigned long, second, ...@@ -33,12 +33,12 @@ SYSCALL_DEFINE6(ipc, unsigned int, call, int, first, unsigned long, second,
case SEMGET: case SEMGET:
return sys_semget(first, second, third); return sys_semget(first, second, third);
case SEMCTL: { case SEMCTL: {
union semun fourth; unsigned long arg;
if (!ptr) if (!ptr)
return -EINVAL; return -EINVAL;
if (get_user(fourth.__pad, (void __user * __user *) ptr)) if (get_user(arg, (unsigned long __user *) ptr))
return -EFAULT; return -EFAULT;
return sys_semctl(first, second, third, fourth); return sys_semctl(first, second, third, arg);
} }
case MSGSND: case MSGSND:
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册