Home | History | Annotate | Line # | Download | only in common
linux_ipccall.c revision 1.13
      1 /*	$NetBSD: linux_ipccall.c,v 1.13 1998/01/22 16:33:57 mycroft Exp $	*/
      2 
      3 /*
      4  * Copyright (c) 1995 Frank van der Linden
      5  * All rights reserved.
      6  *
      7  * Redistribution and use in source and binary forms, with or without
      8  * modification, are permitted provided that the following conditions
      9  * are met:
     10  * 1. Redistributions of source code must retain the above copyright
     11  *    notice, this list of conditions and the following disclaimer.
     12  * 2. Redistributions in binary form must reproduce the above copyright
     13  *    notice, this list of conditions and the following disclaimer in the
     14  *    documentation and/or other materials provided with the distribution.
     15  * 3. All advertising materials mentioning features or use of this software
     16  *    must display the following acknowledgement:
     17  *      This product includes software developed for the NetBSD Project
     18  *      by Frank van der Linden
     19  * 4. The name of the author may not be used to endorse or promote products
     20  *    derived from this software without specific prior written permission
     21  *
     22  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
     23  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     24  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     25  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
     26  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
     27  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
     28  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
     29  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     30  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
     31  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     32  */
     33 
     34 #include <sys/types.h>
     35 #include <sys/param.h>
     36 #include <sys/kernel.h>
     37 #include <sys/shm.h>
     38 #include <sys/sem.h>
     39 #include <sys/msg.h>
     40 #include <sys/proc.h>
     41 #include <sys/uio.h>
     42 #include <sys/time.h>
     43 #include <sys/malloc.h>
     44 #include <sys/mman.h>
     45 #include <sys/systm.h>
     46 #include <sys/stat.h>
     47 
     48 #include <sys/mount.h>
     49 #include <sys/syscallargs.h>
     50 
     51 #include <compat/linux/linux_types.h>
     52 #include <compat/linux/linux_signal.h>
     53 #include <compat/linux/linux_syscallargs.h>
     54 #include <compat/linux/linux_util.h>
     55 #include <compat/linux/linux_ipc.h>
     56 #include <compat/linux/linux_msg.h>
     57 #include <compat/linux/linux_shm.h>
     58 #include <compat/linux/linux_sem.h>
     59 #include <compat/linux/linux_ipccall.h>
     60 
     61 /*
     62  * Stuff to deal with the SysV ipc/shm/semaphore interface in Linux.
     63  * The main difference is, that Linux handles it all via one
     64  * system call, which has the usual maximum amount of 5 arguments.
     65  * This results in a kludge for calls that take 6 of them.
     66  *
     67  * The SYSVXXXX options have to be enabled to get the appropriate
     68  * functions to work.
     69  */
     70 
     71 #ifdef SYSVSEM
     72 static int linux_semop __P((struct proc *, struct linux_sys_ipc_args *,
     73 				register_t *));
     74 static int linux_semget __P((struct proc *, struct linux_sys_ipc_args *,
     75 				register_t *));
     76 static int linux_semctl __P((struct proc *, struct linux_sys_ipc_args *,
     77 				register_t *));
     78 static void bsd_to_linux_semid_ds __P((struct semid_ds *,
     79 				       struct linux_semid_ds *));
     80 static void linux_to_bsd_semid_ds __P((struct linux_semid_ds *,
     81 				       struct semid_ds *));
     82 #endif
     83 
     84 #ifdef SYSVMSG
     85 static int linux_msgsnd __P((struct proc *, struct linux_sys_ipc_args *,
     86 				register_t *));
     87 static int linux_msgrcv __P((struct proc *, struct linux_sys_ipc_args *,
     88 				register_t *));
     89 static int linux_msgget __P((struct proc *, struct linux_sys_ipc_args *,
     90 				register_t *));
     91 static int linux_msgctl __P((struct proc *, struct linux_sys_ipc_args *,
     92 				register_t *));
     93 static void linux_to_bsd_msqid_ds __P((struct linux_msqid_ds *,
     94 				       struct msqid_ds *));
     95 static void bsd_to_linux_msqid_ds __P((struct msqid_ds *,
     96 				       struct linux_msqid_ds *));
     97 #endif
     98 
     99 #ifdef SYSVSHM
    100 static int linux_shmat __P((struct proc *, struct linux_sys_ipc_args *,
    101 				register_t *));
    102 static int linux_shmdt __P((struct proc *, struct linux_sys_ipc_args *,
    103 				register_t *));
    104 static int linux_shmget __P((struct proc *, struct linux_sys_ipc_args *,
    105 				register_t *));
    106 static int linux_shmctl __P((struct proc *, struct linux_sys_ipc_args *,
    107 				register_t *));
    108 static void linux_to_bsd_shmid_ds __P((struct linux_shmid_ds *,
    109 				       struct shmid_ds *));
    110 static void bsd_to_linux_shmid_ds __P((struct shmid_ds *,
    111 				       struct linux_shmid_ds *));
    112 #endif
    113 
    114 
    115 #if defined (SYSVSEM) || defined(SYSVSHM) || defined(SYSVMSG)
    116 static void linux_to_bsd_ipc_perm __P((struct linux_ipc_perm *,
    117 				       struct ipc_perm *));
    118 static void bsd_to_linux_ipc_perm __P((struct ipc_perm *,
    119 				       struct linux_ipc_perm *));
    120 #endif
    121 
    122 int
    123 linux_sys_ipc(p, v, retval)
    124 	struct proc *p;
    125 	void *v;
    126 	register_t *retval;
    127 {
    128 	struct linux_sys_ipc_args /* {
    129 		syscallarg(int) what;
    130 		syscallarg(int) a1;
    131 		syscallarg(int) a2;
    132 		syscallarg(int) a3;
    133 		syscallarg(caddr_t) ptr;
    134 	} */ *uap = v;
    135 
    136 	switch (SCARG(uap, what)) {
    137 #ifdef SYSVSEM
    138 	case LINUX_SYS_semop:
    139 		return linux_semop(p, uap, retval);
    140 	case LINUX_SYS_semget:
    141 		return linux_semget(p, uap, retval);
    142 	case LINUX_SYS_semctl:
    143 		return linux_semctl(p, uap, retval);
    144 #endif
    145 #ifdef SYSVMSG
    146 	case LINUX_SYS_msgsnd:
    147 		return linux_msgsnd(p, uap, retval);
    148 	case LINUX_SYS_msgrcv:
    149 		return linux_msgrcv(p, uap, retval);
    150 	case LINUX_SYS_msgget:
    151 		return linux_msgget(p, uap, retval);
    152 	case LINUX_SYS_msgctl:
    153 		return linux_msgctl(p, uap, retval);
    154 #endif
    155 #ifdef SYSVSHM
    156 	case LINUX_SYS_shmat:
    157 		return linux_shmat(p, uap, retval);
    158 	case LINUX_SYS_shmdt:
    159 		return linux_shmdt(p, uap, retval);
    160 	case LINUX_SYS_shmget:
    161 		return linux_shmget(p, uap, retval);
    162 	case LINUX_SYS_shmctl:
    163 		return linux_shmctl(p, uap, retval);
    164 #endif
    165 	default:
    166 		return ENOSYS;
    167 	}
    168 }
    169 
    170 #if defined (SYSVSEM) || defined(SYSVSHM) || defined(SYSVMSG)
    171 /*
    172  * Convert between Linux and NetBSD ipc_perm structures. Only the
    173  * order of the fields is different.
    174  */
    175 static void
    176 linux_to_bsd_ipc_perm(lpp, bpp)
    177 	struct linux_ipc_perm *lpp;
    178 	struct ipc_perm *bpp;
    179 {
    180 
    181 	bpp->key = lpp->l_key;
    182 	bpp->uid = lpp->l_uid;
    183 	bpp->gid = lpp->l_gid;
    184 	bpp->cuid = lpp->l_cuid;
    185 	bpp->cgid = lpp->l_cgid;
    186 	bpp->mode = lpp->l_mode;
    187 	bpp->seq = lpp->l_seq;
    188 }
    189 
    190 static void
    191 bsd_to_linux_ipc_perm(bpp, lpp)
    192 	struct ipc_perm *bpp;
    193 	struct linux_ipc_perm *lpp;
    194 {
    195 
    196 	lpp->l_key = bpp->key;
    197 	lpp->l_uid = bpp->uid;
    198 	lpp->l_gid = bpp->gid;
    199 	lpp->l_cuid = bpp->cuid;
    200 	lpp->l_cgid = bpp->cgid;
    201 	lpp->l_mode = bpp->mode;
    202 	lpp->l_seq = bpp->seq;
    203 }
    204 #endif
    205 
    206 #ifdef SYSVSEM
    207 /*
    208  * Semaphore operations. Most constants and structures are the same on
    209  * both systems. Only semctl() needs some extra work.
    210  */
    211 
    212 /*
    213  * Convert between Linux and NetBSD semid_ds structures.
    214  */
    215 static void
    216 bsd_to_linux_semid_ds(bs, ls)
    217 	struct semid_ds *bs;
    218 	struct linux_semid_ds *ls;
    219 {
    220 
    221 	bsd_to_linux_ipc_perm(&bs->sem_perm, &ls->l_sem_perm);
    222 	ls->l_sem_otime = bs->sem_otime;
    223 	ls->l_sem_ctime = bs->sem_ctime;
    224 	ls->l_sem_nsems = bs->sem_nsems;
    225 	ls->l_sem_base = bs->sem_base;
    226 }
    227 
    228 static void
    229 linux_to_bsd_semid_ds(ls, bs)
    230 	struct linux_semid_ds *ls;
    231 	struct semid_ds *bs;
    232 {
    233 
    234 	linux_to_bsd_ipc_perm(&ls->l_sem_perm, &bs->sem_perm);
    235 	bs->sem_otime = ls->l_sem_otime;
    236 	bs->sem_ctime = ls->l_sem_ctime;
    237 	bs->sem_nsems = ls->l_sem_nsems;
    238 	bs->sem_base = ls->l_sem_base;
    239 }
    240 
    241 int
    242 linux_semop(p, uap, retval)
    243 	struct proc *p;
    244 	struct linux_sys_ipc_args /* {
    245 		syscallarg(int) what;
    246 		syscallarg(int) a1;
    247 		syscallarg(int) a2;
    248 		syscallarg(int) a3;
    249 		syscallarg(caddr_t) ptr;
    250 	} */ *uap;
    251 	register_t *retval;
    252 {
    253 	struct sys_semop_args bsa;
    254 
    255 	SCARG(&bsa, semid) = SCARG(uap, a1);
    256 	SCARG(&bsa, sops) = (struct sembuf *)SCARG(uap, ptr);
    257 	SCARG(&bsa, nsops) = SCARG(uap, a2);
    258 
    259 	return sys_semop(p, &bsa, retval);
    260 }
    261 
    262 int
    263 linux_semget(p, uap, retval)
    264 	struct proc *p;
    265 	struct linux_sys_ipc_args /* {
    266 		syscallarg(int) what;
    267 		syscallarg(int) a1;
    268 		syscallarg(int) a2;
    269 		syscallarg(int) a3;
    270 		syscallarg(caddr_t) ptr;
    271 	} */ *uap;
    272 	register_t *retval;
    273 {
    274 	struct sys_semget_args bsa;
    275 
    276 	SCARG(&bsa, key) = (key_t)SCARG(uap, a1);
    277 	SCARG(&bsa, nsems) = SCARG(uap, a2);
    278 	SCARG(&bsa, semflg) = SCARG(uap, a3);
    279 
    280 	return sys_semget(p, &bsa, retval);
    281 }
    282 
    283 /*
    284  * Most of this can be handled by directly passing the arguments on,
    285  * buf IPC_* require a lot of copy{in,out} because of the extra indirection
    286  * (we are passed a pointer to a union cointaining a pointer to a semid_ds
    287  * structure.
    288  */
    289 int
    290 linux_semctl(p, uap, retval)
    291 	struct proc *p;
    292 	struct linux_sys_ipc_args /* {
    293 		syscallarg(int) what;
    294 		syscallarg(int) a1;
    295 		syscallarg(int) a2;
    296 		syscallarg(int) a3;
    297 		syscallarg(caddr_t) ptr;
    298 	} */ *uap;
    299 	register_t *retval;
    300 {
    301 	caddr_t sg;
    302 	struct sys___semctl_args nua;
    303 	struct semid_ds *bmp, bm;
    304 	struct linux_semid_ds lm;
    305 	union semun *bup;
    306 	union linux_semun lu;
    307 	int error;
    308 
    309 	SCARG(&nua, semid) = SCARG(uap, a1);
    310 	SCARG(&nua, semnum) = SCARG(uap, a2);
    311 	SCARG(&nua, arg) = (union semun *)SCARG(uap, ptr);
    312 	switch (SCARG(uap, a3)) {
    313 	case LINUX_IPC_STAT:
    314 		sg = stackgap_init(p->p_emul);
    315 		bup = stackgap_alloc(&sg, sizeof (union semun));
    316 		bmp = stackgap_alloc(&sg, sizeof (struct semid_ds));
    317 		if ((error = copyout(&bmp, bup, sizeof bmp)))
    318 			return error;
    319 		SCARG(&nua, cmd) = IPC_STAT;
    320 		SCARG(&nua, arg) = bup;
    321 		if ((error = sys___semctl(p, &nua, retval)))
    322 			return error;
    323 		if ((error = copyin(bmp, &bm, sizeof bm)))
    324 			return error;
    325 		bsd_to_linux_semid_ds(&bm, &lm);
    326 		if ((error = copyin(SCARG(uap, ptr), &lu, sizeof lu)))
    327 			return error;
    328 		return copyout(&lm, lu.l_buf, sizeof lm);
    329 	case LINUX_IPC_SET:
    330 		if ((error = copyin(SCARG(uap, ptr), &lu, sizeof lu)))
    331 			return error;
    332 		if ((error = copyin(lu.l_buf, &lm, sizeof lm)))
    333 			return error;
    334 		linux_to_bsd_semid_ds(&lm, &bm);
    335 		sg = stackgap_init(p->p_emul);
    336 		bup = stackgap_alloc(&sg, sizeof (union semun));
    337 		bmp = stackgap_alloc(&sg, sizeof (struct semid_ds));
    338 		if ((error = copyout(&bm, bmp, sizeof bm)))
    339 			return error;
    340 		if ((error = copyout(&bmp, bup, sizeof bmp)))
    341 			return error;
    342 		SCARG(&nua, cmd) = IPC_SET;
    343 		SCARG(&nua, arg) = bup;
    344 		return sys___semctl(p, &nua, retval);
    345 	case LINUX_IPC_RMID:
    346 		SCARG(&nua, cmd) = IPC_RMID;
    347 		break;
    348 	case LINUX_GETVAL:
    349 		SCARG(&nua, cmd) = GETVAL;
    350 		break;
    351 	case LINUX_GETPID:
    352 		SCARG(&nua, cmd) = GETPID;
    353 		break;
    354 	case LINUX_GETNCNT:
    355 		SCARG(&nua, cmd) = GETNCNT;
    356 		break;
    357 	case LINUX_GETZCNT:
    358 		SCARG(&nua, cmd) = GETZCNT;
    359 		break;
    360 	case LINUX_SETVAL:
    361 		SCARG(&nua, cmd) = SETVAL;
    362 		break;
    363 	default:
    364 		return EINVAL;
    365 	}
    366 	return sys___semctl(p, &nua, retval);
    367 }
    368 #endif /* SYSVSEM */
    369 
    370 #ifdef SYSVMSG
    371 
    372 static void
    373 linux_to_bsd_msqid_ds(lmp, bmp)
    374 	struct linux_msqid_ds *lmp;
    375 	struct msqid_ds *bmp;
    376 {
    377 
    378 	linux_to_bsd_ipc_perm(&lmp->l_msg_perm, &bmp->msg_perm);
    379 	bmp->msg_first = lmp->l_msg_first;
    380 	bmp->msg_last = lmp->l_msg_last;
    381 	bmp->msg_cbytes = lmp->l_msg_cbytes;
    382 	bmp->msg_qnum = lmp->l_msg_qnum;
    383 	bmp->msg_qbytes = lmp->l_msg_qbytes;
    384 	bmp->msg_lspid = lmp->l_msg_lspid;
    385 	bmp->msg_lrpid = lmp->l_msg_lrpid;
    386 	bmp->msg_stime = lmp->l_msg_stime;
    387 	bmp->msg_rtime = lmp->l_msg_rtime;
    388 	bmp->msg_ctime = lmp->l_msg_ctime;
    389 }
    390 
    391 static void
    392 bsd_to_linux_msqid_ds(bmp, lmp)
    393 	struct msqid_ds *bmp;
    394 	struct linux_msqid_ds *lmp;
    395 {
    396 
    397 	bsd_to_linux_ipc_perm(&bmp->msg_perm, &lmp->l_msg_perm);
    398 	lmp->l_msg_first = bmp->msg_first;
    399 	lmp->l_msg_last = bmp->msg_last;
    400 	lmp->l_msg_cbytes = bmp->msg_cbytes;
    401 	lmp->l_msg_qnum = bmp->msg_qnum;
    402 	lmp->l_msg_qbytes = bmp->msg_qbytes;
    403 	lmp->l_msg_lspid = bmp->msg_lspid;
    404 	lmp->l_msg_lrpid = bmp->msg_lrpid;
    405 	lmp->l_msg_stime = bmp->msg_stime;
    406 	lmp->l_msg_rtime = bmp->msg_rtime;
    407 	lmp->l_msg_ctime = bmp->msg_ctime;
    408 }
    409 
    410 static int
    411 linux_msgsnd(p, uap, retval)
    412 	struct proc *p;
    413 	struct linux_sys_ipc_args /* {
    414 		syscallarg(int) what;
    415 		syscallarg(int) a1;
    416 		syscallarg(int) a2;
    417 		syscallarg(int) a3;
    418 		syscallarg(caddr_t) ptr;
    419 	} */ *uap;
    420 	register_t *retval;
    421 {
    422 	struct sys_msgsnd_args bma;
    423 
    424 	SCARG(&bma, msqid) = SCARG(uap, a1);
    425 	SCARG(&bma, msgp) = SCARG(uap, ptr);
    426 	SCARG(&bma, msgsz) = SCARG(uap, a2);
    427 	SCARG(&bma, msgflg) = SCARG(uap, a3);
    428 
    429 	return sys_msgsnd(p, &bma, retval);
    430 }
    431 
    432 static int
    433 linux_msgrcv(p, uap, retval)
    434 	struct proc *p;
    435 	struct linux_sys_ipc_args /* {
    436 		syscallarg(int) what;
    437 		syscallarg(int) a1;
    438 		syscallarg(int) a2;
    439 		syscallarg(int) a3;
    440 		syscallarg(caddr_t) ptr;
    441 	} */ *uap;
    442 	register_t *retval;
    443 {
    444 	struct sys_msgrcv_args bma;
    445 	struct linux_msgrcv_msgarg kluge;
    446 	int error;
    447 
    448 	if ((error = copyin(SCARG(uap, ptr), &kluge, sizeof kluge)))
    449 		return error;
    450 
    451 	SCARG(&bma, msqid) = SCARG(uap, a1);
    452 	SCARG(&bma, msgp) = kluge.msg;
    453 	SCARG(&bma, msgsz) = SCARG(uap, a2);
    454 	SCARG(&bma, msgtyp) = kluge.type;
    455 	SCARG(&bma, msgflg) = SCARG(uap, a3);
    456 
    457 	return sys_msgrcv(p, &bma, retval);
    458 }
    459 
    460 static int
    461 linux_msgget(p, uap, retval)
    462 	struct proc *p;
    463 	struct linux_sys_ipc_args /* {
    464 		syscallarg(int) what;
    465 		syscallarg(int) a1;
    466 		syscallarg(int) a2;
    467 		syscallarg(int) a3;
    468 		syscallarg(caddr_t) ptr;
    469 	} */ *uap;
    470 	register_t *retval;
    471 {
    472 	struct sys_msgget_args bma;
    473 
    474 	SCARG(&bma, key) = (key_t)SCARG(uap, a1);
    475 	SCARG(&bma, msgflg) = SCARG(uap, a2);
    476 
    477 	return sys_msgget(p, &bma, retval);
    478 }
    479 
    480 static int
    481 linux_msgctl(p, uap, retval)
    482 	struct proc *p;
    483 	struct linux_sys_ipc_args /* {
    484 		syscallarg(int) what;
    485 		syscallarg(int) a1;
    486 		syscallarg(int) a2;
    487 		syscallarg(int) a3;
    488 		syscallarg(caddr_t) ptr;
    489 	} */ *uap;
    490 	register_t *retval;
    491 {
    492 	caddr_t sg;
    493 	struct sys_msgctl_args nua;
    494 	struct msqid_ds *bmp, bm;
    495 	struct linux_msqid_ds lm;
    496 	int error;
    497 
    498 	SCARG(&nua, msqid) = SCARG(uap, a1);
    499 	switch (SCARG(uap, a2)) {
    500 	case LINUX_IPC_STAT:
    501 		sg = stackgap_init(p->p_emul);
    502 		bmp = stackgap_alloc(&sg, sizeof (struct msqid_ds));
    503 		SCARG(&nua, cmd) = IPC_STAT;
    504 		SCARG(&nua, buf) = bmp;
    505 		if ((error = sys_msgctl(p, &nua, retval)))
    506 			return error;
    507 		if ((error = copyin(bmp, &bm, sizeof bm)))
    508 			return error;
    509 		bsd_to_linux_msqid_ds(&bm, &lm);
    510 		return copyout(&lm, SCARG(uap, ptr), sizeof lm);
    511 	case LINUX_IPC_SET:
    512 		if ((error = copyin(SCARG(uap, ptr), &lm, sizeof lm)))
    513 			return error;
    514 		linux_to_bsd_msqid_ds(&lm, &bm);
    515 		sg = stackgap_init(p->p_emul);
    516 		bmp = stackgap_alloc(&sg, sizeof bm);
    517 		if ((error = copyout(&bm, bmp, sizeof bm)))
    518 			return error;
    519 		SCARG(&nua, cmd) = IPC_SET;
    520 		SCARG(&nua, buf) = bmp;
    521 		return sys_msgctl(p, &nua, retval);
    522 	case LINUX_IPC_RMID:
    523 		SCARG(&nua, cmd) = IPC_RMID;
    524 		SCARG(&nua, buf) = NULL;
    525 		break;
    526 	default:
    527 		return EINVAL;
    528 	}
    529 	return sys_msgctl(p, &nua, retval);
    530 }
    531 #endif /* SYSVMSG */
    532 
    533 #ifdef SYSVSHM
    534 /*
    535  * shmat(2). Very straightforward, except that Linux passes a pointer
    536  * in which the return value is to be passed. This is subsequently
    537  * handled by libc, apparently.
    538  */
    539 static int
    540 linux_shmat(p, uap, retval)
    541 	struct proc *p;
    542 	struct linux_sys_ipc_args /* {
    543 		syscallarg(int) what;
    544 		syscallarg(int) a1;
    545 		syscallarg(int) a2;
    546 		syscallarg(int) a3;
    547 		syscallarg(caddr_t) ptr;
    548 	} */ *uap;
    549 	register_t *retval;
    550 {
    551 	struct sys_shmat_args bsa;
    552 	int error;
    553 
    554 	SCARG(&bsa, shmid) = SCARG(uap, a1);
    555 	SCARG(&bsa, shmaddr) = SCARG(uap, ptr);
    556 	SCARG(&bsa, shmflg) = SCARG(uap, a2);
    557 
    558 	if ((error = sys_shmat(p, &bsa, retval)))
    559 		return error;
    560 
    561 	if ((error = copyout(&retval[0], (caddr_t) SCARG(uap, a3),
    562 	     sizeof retval[0])))
    563 		return error;
    564 
    565 	retval[0] = 0;
    566 	return 0;
    567 }
    568 
    569 /*
    570  * shmdt(): this could have been mapped directly, if it wasn't for
    571  * the extra indirection by the linux_ipc system call.
    572  */
    573 static int
    574 linux_shmdt(p, uap, retval)
    575 	struct proc *p;
    576 	struct linux_sys_ipc_args /* {
    577 		syscallarg(int) what;
    578 		syscallarg(int) a1;
    579 		syscallarg(int) a2;
    580 		syscallarg(int) a3;
    581 		syscallarg(caddr_t) ptr;
    582 	} */ *uap;
    583 	register_t *retval;
    584 {
    585 	struct sys_shmdt_args bsa;
    586 
    587 	SCARG(&bsa, shmaddr) = SCARG(uap, ptr);
    588 
    589 	return sys_shmdt(p, &bsa, retval);
    590 }
    591 
    592 /*
    593  * Same story as shmdt.
    594  */
    595 static int
    596 linux_shmget(p, uap, retval)
    597 	struct proc *p;
    598 	struct linux_sys_ipc_args /* {
    599 		syscallarg(int) what;
    600 		syscallarg(int) a1;
    601 		syscallarg(int) a2;
    602 		syscallarg(int) a3;
    603 		syscallarg(caddr_t) ptr;
    604 	} */ *uap;
    605 	register_t *retval;
    606 {
    607 	struct sys_shmget_args bsa;
    608 
    609 	SCARG(&bsa, key) = SCARG(uap, a1);
    610 	SCARG(&bsa, size) = SCARG(uap, a2);
    611 	SCARG(&bsa, shmflg) = SCARG(uap, a3);
    612 
    613 	return sys_shmget(p, &bsa, retval);
    614 }
    615 
    616 /*
    617  * Convert between Linux and NetBSD shmid_ds structures.
    618  * The order of the fields is once again the difference, and
    619  * we also need a place to store the internal data pointer
    620  * in, which is unfortunately stored in this structure.
    621  *
    622  * We abuse a Linux internal field for that.
    623  */
    624 static void
    625 linux_to_bsd_shmid_ds(lsp, bsp)
    626 	struct linux_shmid_ds *lsp;
    627 	struct shmid_ds *bsp;
    628 {
    629 
    630 	linux_to_bsd_ipc_perm(&lsp->l_shm_perm, &bsp->shm_perm);
    631 	bsp->shm_segsz = lsp->l_shm_segsz;
    632 	bsp->shm_lpid = lsp->l_shm_lpid;
    633 	bsp->shm_cpid = lsp->l_shm_cpid;
    634 	bsp->shm_nattch = lsp->l_shm_nattch;
    635 	bsp->shm_atime = lsp->l_shm_atime;
    636 	bsp->shm_dtime = lsp->l_shm_dtime;
    637 	bsp->shm_ctime = lsp->l_shm_ctime;
    638 	bsp->shm_internal = lsp->l_private2;	/* XXX Oh well. */
    639 }
    640 
    641 static void
    642 bsd_to_linux_shmid_ds(bsp, lsp)
    643 	struct shmid_ds *bsp;
    644 	struct linux_shmid_ds *lsp;
    645 {
    646 
    647 	bsd_to_linux_ipc_perm(&bsp->shm_perm, &lsp->l_shm_perm);
    648 	lsp->l_shm_segsz = bsp->shm_segsz;
    649 	lsp->l_shm_lpid = bsp->shm_lpid;
    650 	lsp->l_shm_cpid = bsp->shm_cpid;
    651 	lsp->l_shm_nattch = bsp->shm_nattch;
    652 	lsp->l_shm_atime = bsp->shm_atime;
    653 	lsp->l_shm_dtime = bsp->shm_dtime;
    654 	lsp->l_shm_ctime = bsp->shm_ctime;
    655 	lsp->l_private2 = bsp->shm_internal;	/* XXX */
    656 }
    657 
    658 /*
    659  * shmctl. Not implemented (for now): IPC_INFO, SHM_INFO, SHM_STAT
    660  * SHM_LOCK and SHM_UNLOCK are passed on, but currently not implemented
    661  * by NetBSD itself.
    662  *
    663  * The usual structure conversion and massaging is done.
    664  */
    665 static int
    666 linux_shmctl(p, uap, retval)
    667 	struct proc *p;
    668 	struct linux_sys_ipc_args /* {
    669 		syscallarg(int) what;
    670 		syscallarg(int) a1;
    671 		syscallarg(int) a2;
    672 		syscallarg(int) a3;
    673 		syscallarg(caddr_t) ptr;
    674 	} */ *uap;
    675 	register_t *retval;
    676 {
    677 	caddr_t sg;
    678 	struct sys_shmctl_args nua;
    679 	struct shmid_ds *bsp, bs;
    680 	struct linux_shmid_ds ls;
    681 	int error;
    682 
    683 	SCARG(&nua, shmid) = SCARG(uap, a1);
    684 	switch (SCARG(uap, a2)) {
    685 	case LINUX_IPC_STAT:
    686 		sg = stackgap_init(p->p_emul);
    687 		bsp = stackgap_alloc(&sg, sizeof (struct shmid_ds));
    688 		SCARG(&nua, cmd) = IPC_STAT;
    689 		SCARG(&nua, buf) = bsp;
    690 		if ((error = sys_shmctl(p, &nua, retval)))
    691 			return error;
    692 		if ((error = copyin(bsp, &bs, sizeof bs)))
    693 			return error;
    694 		bsd_to_linux_shmid_ds(&bs, &ls);
    695 		return copyout(&ls, SCARG(uap, ptr), sizeof ls);
    696 	case LINUX_IPC_SET:
    697 		if ((error = copyin(SCARG(uap, ptr), &ls, sizeof ls)))
    698 			return error;
    699 		linux_to_bsd_shmid_ds(&ls, &bs);
    700 		sg = stackgap_init(p->p_emul);
    701 		bsp = stackgap_alloc(&sg, sizeof bs);
    702 		if ((error = copyout(&bs, bsp, sizeof bs)))
    703 			return error;
    704 		SCARG(&nua, cmd) = IPC_SET;
    705 		SCARG(&nua, buf) = bsp;
    706 		return sys_shmctl(p, &nua, retval);
    707 	case LINUX_IPC_RMID:
    708 		SCARG(&nua, cmd) = IPC_RMID;
    709 		SCARG(&nua, buf) = NULL;
    710 		break;
    711 	case LINUX_SHM_LOCK:
    712 		SCARG(&nua, cmd) = SHM_LOCK;
    713 		SCARG(&nua, buf) = NULL;
    714 		break;
    715 	case LINUX_SHM_UNLOCK:
    716 		SCARG(&nua, cmd) = SHM_UNLOCK;
    717 		SCARG(&nua, buf) = NULL;
    718 		break;
    719 	case LINUX_IPC_INFO:
    720 	case LINUX_SHM_STAT:
    721 	case LINUX_SHM_INFO:
    722 	default:
    723 		return EINVAL;
    724 	}
    725 	return sys_shmctl(p, &nua, retval);
    726 }
    727 #endif /* SYSVSHM */
    728