|
|
Message-ID: <20180616001423.GS4418@port70.net>
Date: Sat, 16 Jun 2018 02:14:24 +0200
From: Szabolcs Nagy <nsz@...t70.net>
To: musl@...ts.openwall.com
Subject: Re: broken __kernel_mode_t affecting some big endian archs
* Rich Felker <dalias@...c.org> [2018-06-14 22:01:54 -0400]:
> diff --git a/src/ipc/shmctl.c b/src/ipc/shmctl.c
> index e2879f2..9d723d9 100644
> --- a/src/ipc/shmctl.c
> +++ b/src/ipc/shmctl.c
> @@ -4,9 +4,23 @@
>
> int shmctl(int id, int cmd, struct shmid_ds *buf)
> {
> +#ifdef SYSCALL_IPC_BROKEN_MODE
> + struct shmid_ds tmp;
> + if (cmd == IPC_SET) {
> + tmp = *buf;
> + tmp.shm_perm.mode *= 0x10000U;
> + buf = &tmp;
> + }
> +#endif
> #ifdef SYS_shmctl
> - return syscall(SYS_shmctl, id, cmd | IPC_64, buf);
> + int r = __syscall(SYS_shmctl, id, cmd | IPC_64, buf);
> #else
> - return syscall(SYS_ipc, IPCOP_shmctl, id, cmd | IPC_64, 0, buf, 0);
> + int r = __syscall(SYS_ipc, IPCOP_shmctl, id, cmd | IPC_64, 0, buf, 0);
> +#endif
> +#ifdef SYSCALL_IPC_BROKEN_MODE
> + if (r >= 0 && cmd == IPC_STAT) {
> + buf->shm_perm.mode >>= 16;
> + }
> #endif
> + return __syscall_ret(r);
> }
ugly but looks ok to me.
i don't think there is a clean solution on the broken targets.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.