Home | History | Annotate | Line # | Download | only in netbsd32
netbsd32_compat_30.c revision 1.8.4.3
      1  1.8.4.3  yamt /*	$NetBSD: netbsd32_compat_30.c,v 1.8.4.3 2006/12/30 20:47:42 yamt Exp $	*/
      2  1.8.4.2  yamt 
      3  1.8.4.2  yamt /*
      4  1.8.4.2  yamt  * Copyright (c) 1998, 2001 Matthew R. Green
      5  1.8.4.2  yamt  * All rights reserved.
      6  1.8.4.2  yamt  *
      7  1.8.4.2  yamt  * Redistribution and use in source and binary forms, with or without
      8  1.8.4.2  yamt  * modification, are permitted provided that the following conditions
      9  1.8.4.2  yamt  * are met:
     10  1.8.4.2  yamt  * 1. Redistributions of source code must retain the above copyright
     11  1.8.4.2  yamt  *    notice, this list of conditions and the following disclaimer.
     12  1.8.4.2  yamt  * 2. Redistributions in binary form must reproduce the above copyright
     13  1.8.4.2  yamt  *    notice, this list of conditions and the following disclaimer in the
     14  1.8.4.2  yamt  *    documentation and/or other materials provided with the distribution.
     15  1.8.4.2  yamt  * 3. The name of the author may not be used to endorse or promote products
     16  1.8.4.2  yamt  *    derived from this software without specific prior written permission.
     17  1.8.4.2  yamt  *
     18  1.8.4.2  yamt  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
     19  1.8.4.2  yamt  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     20  1.8.4.2  yamt  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     21  1.8.4.2  yamt  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
     22  1.8.4.2  yamt  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
     23  1.8.4.2  yamt  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
     24  1.8.4.2  yamt  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
     25  1.8.4.2  yamt  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
     26  1.8.4.2  yamt  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     27  1.8.4.2  yamt  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     28  1.8.4.2  yamt  * SUCH DAMAGE.
     29  1.8.4.2  yamt  */
     30  1.8.4.2  yamt 
     31  1.8.4.2  yamt #include <sys/cdefs.h>
     32  1.8.4.3  yamt __KERNEL_RCSID(0, "$NetBSD: netbsd32_compat_30.c,v 1.8.4.3 2006/12/30 20:47:42 yamt Exp $");
     33  1.8.4.3  yamt 
     34  1.8.4.3  yamt #include "opt_nfsserver.h"
     35  1.8.4.2  yamt 
     36  1.8.4.2  yamt #include <sys/param.h>
     37  1.8.4.2  yamt #include <sys/systm.h>
     38  1.8.4.2  yamt #include <sys/malloc.h>
     39  1.8.4.2  yamt #include <sys/mount.h>
     40  1.8.4.2  yamt #include <sys/socket.h>
     41  1.8.4.2  yamt #include <sys/socketvar.h>
     42  1.8.4.2  yamt #include <sys/stat.h>
     43  1.8.4.2  yamt #include <sys/time.h>
     44  1.8.4.2  yamt #include <sys/ktrace.h>
     45  1.8.4.2  yamt #include <sys/resourcevar.h>
     46  1.8.4.2  yamt #include <sys/vnode.h>
     47  1.8.4.2  yamt #include <sys/file.h>
     48  1.8.4.2  yamt #include <sys/filedesc.h>
     49  1.8.4.2  yamt #include <sys/namei.h>
     50  1.8.4.2  yamt #include <sys/sa.h>
     51  1.8.4.2  yamt #include <sys/statvfs.h>
     52  1.8.4.2  yamt #include <sys/syscallargs.h>
     53  1.8.4.2  yamt #include <sys/proc.h>
     54  1.8.4.2  yamt #include <sys/dirent.h>
     55  1.8.4.2  yamt #include <sys/kauth.h>
     56  1.8.4.2  yamt 
     57  1.8.4.2  yamt #include <compat/netbsd32/netbsd32.h>
     58  1.8.4.2  yamt #include <compat/netbsd32/netbsd32_syscallargs.h>
     59  1.8.4.2  yamt #include <compat/netbsd32/netbsd32_conv.h>
     60  1.8.4.3  yamt #include <compat/sys/mount.h>
     61  1.8.4.2  yamt 
     62  1.8.4.2  yamt 
     63  1.8.4.2  yamt int
     64  1.8.4.3  yamt compat_30_netbsd32_getdents(l, v, retval)
     65  1.8.4.2  yamt 	struct lwp *l;
     66  1.8.4.2  yamt 	void *v;
     67  1.8.4.2  yamt 	register_t *retval;
     68  1.8.4.2  yamt {
     69  1.8.4.3  yamt 	struct compat_30_netbsd32_getdents_args /* {
     70  1.8.4.2  yamt 		syscallarg(int) fd;
     71  1.8.4.2  yamt 		syscallarg(netbsd32_charp) buf;
     72  1.8.4.2  yamt 		syscallarg(netbsd32_size_t) count;
     73  1.8.4.2  yamt 	} */ *uap = v;
     74  1.8.4.2  yamt 	struct file *fp;
     75  1.8.4.2  yamt 	int error, done;
     76  1.8.4.2  yamt 	char  *buf;
     77  1.8.4.2  yamt 	netbsd32_size_t count;
     78  1.8.4.2  yamt 	struct proc *p = l->l_proc;
     79  1.8.4.2  yamt 
     80  1.8.4.2  yamt 	/* Limit the size on any kernel buffers used by VOP_READDIR */
     81  1.8.4.2  yamt 	count = min(MAXBSIZE, SCARG(uap, count));
     82  1.8.4.2  yamt 
     83  1.8.4.2  yamt 	/* getvnode() will use the descriptor for us */
     84  1.8.4.2  yamt 	if ((error = getvnode(p->p_fd, SCARG(uap, fd), &fp)) != 0)
     85  1.8.4.2  yamt 		return (error);
     86  1.8.4.2  yamt 	if ((fp->f_flag & FREAD) == 0) {
     87  1.8.4.2  yamt 		error = EBADF;
     88  1.8.4.2  yamt 		goto out;
     89  1.8.4.2  yamt 	}
     90  1.8.4.2  yamt 	buf = malloc(count, M_TEMP, M_WAITOK);
     91  1.8.4.2  yamt 	error = vn_readdir(fp, buf, UIO_SYSSPACE, count, &done, l, 0, 0);
     92  1.8.4.2  yamt 	if (error == 0) {
     93  1.8.4.2  yamt 		*retval = netbsd32_to_dirent12(buf, done);
     94  1.8.4.2  yamt 		error = copyout(buf, NETBSD32PTR64(SCARG(uap, buf)), *retval);
     95  1.8.4.2  yamt 	}
     96  1.8.4.2  yamt 	free(buf, M_TEMP);
     97  1.8.4.2  yamt  out:
     98  1.8.4.2  yamt 	FILE_UNUSE(fp, l);
     99  1.8.4.2  yamt 	return (error);
    100  1.8.4.2  yamt }
    101  1.8.4.2  yamt 
    102  1.8.4.2  yamt int
    103  1.8.4.3  yamt compat_30_netbsd32___stat13(l, v, retval)
    104  1.8.4.2  yamt 	struct lwp *l;
    105  1.8.4.2  yamt 	void *v;
    106  1.8.4.2  yamt 	register_t *retval;
    107  1.8.4.2  yamt {
    108  1.8.4.3  yamt 	struct compat_30_netbsd32___stat13_args /* {
    109  1.8.4.2  yamt 		syscallarg(const netbsd32_charp) path;
    110  1.8.4.2  yamt 		syscallarg(netbsd32_stat13p_t) ub;
    111  1.8.4.2  yamt 	} */ *uap = v;
    112  1.8.4.2  yamt 	struct netbsd32_stat13 sb32;
    113  1.8.4.2  yamt 	struct stat sb;
    114  1.8.4.2  yamt 	int error;
    115  1.8.4.2  yamt 	struct nameidata nd;
    116  1.8.4.2  yamt 	caddr_t sg;
    117  1.8.4.2  yamt 	const char *path;
    118  1.8.4.2  yamt 	struct proc *p = l->l_proc;
    119  1.8.4.2  yamt 
    120  1.8.4.2  yamt 	path = (char *)NETBSD32PTR64(SCARG(uap, path));
    121  1.8.4.2  yamt 	sg = stackgap_init(p, 0);
    122  1.8.4.2  yamt 	CHECK_ALT_EXIST(l, &sg, path);
    123  1.8.4.2  yamt 
    124  1.8.4.2  yamt 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, path, l);
    125  1.8.4.2  yamt 	if ((error = namei(&nd)) != 0)
    126  1.8.4.2  yamt 		return (error);
    127  1.8.4.2  yamt 	error = vn_stat(nd.ni_vp, &sb, l);
    128  1.8.4.2  yamt 	vput(nd.ni_vp);
    129  1.8.4.2  yamt 	if (error)
    130  1.8.4.2  yamt 		return (error);
    131  1.8.4.2  yamt 	netbsd32_from___stat13(&sb, &sb32);
    132  1.8.4.2  yamt 	error = copyout(&sb32, (caddr_t)NETBSD32PTR64(SCARG(uap, ub)),
    133  1.8.4.2  yamt 	    sizeof(sb32));
    134  1.8.4.2  yamt 	return (error);
    135  1.8.4.2  yamt }
    136  1.8.4.2  yamt 
    137  1.8.4.2  yamt int
    138  1.8.4.3  yamt compat_30_netbsd32___fstat13(l, v, retval)
    139  1.8.4.2  yamt 	struct lwp *l;
    140  1.8.4.2  yamt 	void *v;
    141  1.8.4.2  yamt 	register_t *retval;
    142  1.8.4.2  yamt {
    143  1.8.4.3  yamt 	struct compat_30_netbsd32___fstat13_args /* {
    144  1.8.4.2  yamt 		syscallarg(int) fd;
    145  1.8.4.2  yamt 		syscallarg(netbsd32_stat13p_t) sb;
    146  1.8.4.2  yamt 	} */ *uap = v;
    147  1.8.4.2  yamt 	int fd = SCARG(uap, fd);
    148  1.8.4.2  yamt 	struct proc *p = l->l_proc;
    149  1.8.4.2  yamt 	struct filedesc *fdp = p->p_fd;
    150  1.8.4.2  yamt 	struct file *fp;
    151  1.8.4.2  yamt 	struct netbsd32_stat13 sb32;
    152  1.8.4.2  yamt 	struct stat ub;
    153  1.8.4.2  yamt 	int error = 0;
    154  1.8.4.2  yamt 
    155  1.8.4.2  yamt 	if ((fp = fd_getfile(fdp, fd)) == NULL)
    156  1.8.4.2  yamt 		return (EBADF);
    157  1.8.4.2  yamt 
    158  1.8.4.2  yamt 	FILE_USE(fp);
    159  1.8.4.2  yamt 	error = (*fp->f_ops->fo_stat)(fp, &ub, l);
    160  1.8.4.2  yamt 	FILE_UNUSE(fp, l);
    161  1.8.4.2  yamt 
    162  1.8.4.2  yamt 	if (error == 0) {
    163  1.8.4.2  yamt 		netbsd32_from___stat13(&ub, &sb32);
    164  1.8.4.2  yamt 		error = copyout(&sb32, (caddr_t)NETBSD32PTR64(SCARG(uap, sb)),
    165  1.8.4.2  yamt 		    sizeof(sb32));
    166  1.8.4.2  yamt 	}
    167  1.8.4.2  yamt 	return (error);
    168  1.8.4.2  yamt }
    169  1.8.4.2  yamt 
    170  1.8.4.2  yamt int
    171  1.8.4.3  yamt compat_30_netbsd32___lstat13(l, v, retval)
    172  1.8.4.2  yamt 	struct lwp *l;
    173  1.8.4.2  yamt 	void *v;
    174  1.8.4.2  yamt 	register_t *retval;
    175  1.8.4.2  yamt {
    176  1.8.4.3  yamt 	struct compat_30_netbsd32___lstat13_args /* {
    177  1.8.4.2  yamt 		syscallarg(const netbsd32_charp) path;
    178  1.8.4.2  yamt 		syscallarg(netbsd32_stat13p_t) ub;
    179  1.8.4.2  yamt 	} */ *uap = v;
    180  1.8.4.2  yamt 	struct netbsd32_stat13 sb32;
    181  1.8.4.2  yamt 	struct stat sb;
    182  1.8.4.2  yamt 	int error;
    183  1.8.4.2  yamt 	struct nameidata nd;
    184  1.8.4.2  yamt 	caddr_t sg;
    185  1.8.4.2  yamt 	const char *path;
    186  1.8.4.2  yamt 	struct proc *p = l->l_proc;
    187  1.8.4.2  yamt 
    188  1.8.4.2  yamt 	path = (char *)NETBSD32PTR64(SCARG(uap, path));
    189  1.8.4.2  yamt 	sg = stackgap_init(p, 0);
    190  1.8.4.2  yamt 	CHECK_ALT_EXIST(l, &sg, path);
    191  1.8.4.2  yamt 
    192  1.8.4.2  yamt 	NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF, UIO_USERSPACE, path, l);
    193  1.8.4.2  yamt 	if ((error = namei(&nd)) != 0)
    194  1.8.4.2  yamt 		return (error);
    195  1.8.4.2  yamt 	error = vn_stat(nd.ni_vp, &sb, l);
    196  1.8.4.2  yamt 	vput(nd.ni_vp);
    197  1.8.4.2  yamt 	if (error)
    198  1.8.4.2  yamt 		return (error);
    199  1.8.4.2  yamt 	netbsd32_from___stat13(&sb, &sb32);
    200  1.8.4.2  yamt 	error = copyout(&sb32, (caddr_t)NETBSD32PTR64(SCARG(uap, ub)),
    201  1.8.4.2  yamt 	    sizeof(sb32));
    202  1.8.4.2  yamt 	return (error);
    203  1.8.4.2  yamt }
    204  1.8.4.2  yamt 
    205  1.8.4.2  yamt int
    206  1.8.4.2  yamt compat_30_netbsd32_fhstat(l, v, retval)
    207  1.8.4.2  yamt 	struct lwp *l;
    208  1.8.4.2  yamt 	void *v;
    209  1.8.4.2  yamt 	register_t *retval;
    210  1.8.4.2  yamt {
    211  1.8.4.2  yamt 	struct compat_30_netbsd32_fhstat_args /* {
    212  1.8.4.2  yamt 		syscallarg(const netbsd32_fhandlep_t) fhp;
    213  1.8.4.2  yamt 		syscallarg(netbsd32_stat13p_t) sb);
    214  1.8.4.2  yamt 	} */ *uap = v;
    215  1.8.4.2  yamt 	struct stat sb;
    216  1.8.4.2  yamt 	struct netbsd32_stat13 sb32;
    217  1.8.4.2  yamt 	int error;
    218  1.8.4.3  yamt 	struct compat_30_fhandle fh;
    219  1.8.4.2  yamt 	struct mount *mp;
    220  1.8.4.2  yamt 	struct vnode *vp;
    221  1.8.4.2  yamt 
    222  1.8.4.2  yamt 	/*
    223  1.8.4.2  yamt 	 * Must be super user
    224  1.8.4.2  yamt 	 */
    225  1.8.4.3  yamt 	if ((error = kauth_authorize_system(l->l_cred,
    226  1.8.4.3  yamt 	    KAUTH_SYSTEM_FILEHANDLE, 0, NULL, NULL, NULL)))
    227  1.8.4.2  yamt 		return (error);
    228  1.8.4.2  yamt 
    229  1.8.4.2  yamt 	if ((error = copyin(NETBSD32PTR64(SCARG(uap, fhp)), &fh,
    230  1.8.4.3  yamt 	    sizeof(fh))) != 0)
    231  1.8.4.2  yamt 		return (error);
    232  1.8.4.2  yamt 
    233  1.8.4.2  yamt 	if ((mp = vfs_getvfs(&fh.fh_fsid)) == NULL)
    234  1.8.4.2  yamt 		return (ESTALE);
    235  1.8.4.2  yamt 	if (mp->mnt_op->vfs_fhtovp == NULL)
    236  1.8.4.2  yamt 		return EOPNOTSUPP;
    237  1.8.4.3  yamt 	if ((error = VFS_FHTOVP(mp, (struct fid*)&fh.fh_fid, &vp)))
    238  1.8.4.2  yamt 		return (error);
    239  1.8.4.2  yamt 	error = vn_stat(vp, &sb, l);
    240  1.8.4.2  yamt 	vput(vp);
    241  1.8.4.2  yamt 	if (error)
    242  1.8.4.2  yamt 		return (error);
    243  1.8.4.2  yamt 	netbsd32_from___stat13(&sb, &sb32);
    244  1.8.4.2  yamt 	error = copyout(&sb32, NETBSD32PTR64(SCARG(uap, sb)), sizeof(sb));
    245  1.8.4.2  yamt 	return (error);
    246  1.8.4.2  yamt }
    247  1.8.4.3  yamt 
    248  1.8.4.3  yamt int
    249  1.8.4.3  yamt compat_30_netbsd32_fhstatvfs1(l, v, retval)
    250  1.8.4.3  yamt 	struct lwp *l;
    251  1.8.4.3  yamt 	void *v;
    252  1.8.4.3  yamt 	register_t *retval;
    253  1.8.4.3  yamt {
    254  1.8.4.3  yamt 	struct compat_30_netbsd32_fhstatvfs1_args /* {
    255  1.8.4.3  yamt 		syscallarg(const netbsd32_fhandlep_t) fhp;
    256  1.8.4.3  yamt 		syscallarg(netbsd32_statvfsp_t) buf;
    257  1.8.4.3  yamt 		syscallarg(int) flags;
    258  1.8.4.3  yamt 	} */ *uap = v;
    259  1.8.4.3  yamt 	struct statvfs *sbuf;
    260  1.8.4.3  yamt 	struct netbsd32_statvfs *s32;
    261  1.8.4.3  yamt 	fhandle_t *fh;
    262  1.8.4.3  yamt 	struct vnode *vp;
    263  1.8.4.3  yamt 	int error;
    264  1.8.4.3  yamt 
    265  1.8.4.3  yamt 	/*
    266  1.8.4.3  yamt 	 * Must be super user
    267  1.8.4.3  yamt 	 */
    268  1.8.4.3  yamt 	if ((error = kauth_authorize_system(l->l_cred,
    269  1.8.4.3  yamt 	    KAUTH_SYSTEM_FILEHANDLE, 0, NULL, NULL, NULL)) != 0)
    270  1.8.4.3  yamt 		return error;
    271  1.8.4.3  yamt 
    272  1.8.4.3  yamt 	if ((error = vfs_copyinfh_alloc(NETBSD32PTR64(SCARG(uap, fhp)),
    273  1.8.4.3  yamt 	    FHANDLE_SIZE_COMPAT, &fh)) != 0)
    274  1.8.4.3  yamt 		goto bad;
    275  1.8.4.3  yamt 	if ((error = vfs_fhtovp(fh, &vp)) != 0)
    276  1.8.4.3  yamt 		goto bad;
    277  1.8.4.3  yamt 
    278  1.8.4.3  yamt 	sbuf = (struct statvfs *)malloc(sizeof(struct statvfs), M_TEMP,
    279  1.8.4.3  yamt 	    M_WAITOK);
    280  1.8.4.3  yamt 	error = dostatvfs(vp->v_mount, sbuf, l, SCARG(uap, flags), 1);
    281  1.8.4.3  yamt 	vput(vp);
    282  1.8.4.3  yamt 	if (error != 0)
    283  1.8.4.3  yamt 		goto out;
    284  1.8.4.3  yamt 
    285  1.8.4.3  yamt 	s32 = (struct netbsd32_statvfs *)
    286  1.8.4.3  yamt 	    malloc(sizeof(struct netbsd32_statvfs), M_TEMP, M_WAITOK);
    287  1.8.4.3  yamt 	netbsd32_from_statvfs(sbuf, s32);
    288  1.8.4.3  yamt 	error = copyout(s32, (caddr_t)NETBSD32PTR64(SCARG(uap, buf)),
    289  1.8.4.3  yamt 	    sizeof(struct netbsd32_statvfs));
    290  1.8.4.3  yamt 	free(s32, M_TEMP);
    291  1.8.4.3  yamt 
    292  1.8.4.3  yamt out:
    293  1.8.4.3  yamt 	free(sbuf, M_TEMP);
    294  1.8.4.3  yamt bad:
    295  1.8.4.3  yamt 	vfs_copyinfh_free(fh);
    296  1.8.4.3  yamt 	return (error);
    297  1.8.4.3  yamt }
    298  1.8.4.3  yamt 
    299  1.8.4.3  yamt int
    300  1.8.4.3  yamt compat_30_netbsd32_socket(l, v, retval)
    301  1.8.4.3  yamt 	struct lwp *l;
    302  1.8.4.3  yamt 	void *v;
    303  1.8.4.3  yamt 	register_t *retval;
    304  1.8.4.3  yamt {
    305  1.8.4.3  yamt 	struct compat_30_netbsd32_socket_args /* {
    306  1.8.4.3  yamt 		syscallarg(int) domain;
    307  1.8.4.3  yamt 		syscallarg(int) type;
    308  1.8.4.3  yamt 		syscallarg(int) protocol;
    309  1.8.4.3  yamt 	} */ *uap = v;
    310  1.8.4.3  yamt 	struct compat_30_sys_socket_args ua;
    311  1.8.4.3  yamt 
    312  1.8.4.3  yamt 	NETBSD32TO64_UAP(domain);
    313  1.8.4.3  yamt 	NETBSD32TO64_UAP(type);
    314  1.8.4.3  yamt 	NETBSD32TO64_UAP(protocol);
    315  1.8.4.3  yamt 	return (compat_30_sys_socket(l, &ua, retval));
    316  1.8.4.3  yamt }
    317  1.8.4.3  yamt 
    318  1.8.4.3  yamt int
    319  1.8.4.3  yamt compat_30_netbsd32_getfh(l, v, retval)
    320  1.8.4.3  yamt 	struct lwp *l;
    321  1.8.4.3  yamt 	void *v;
    322  1.8.4.3  yamt 	register_t *retval;
    323  1.8.4.3  yamt {
    324  1.8.4.3  yamt 	struct compat_30_netbsd32_getfh_args /* {
    325  1.8.4.3  yamt 		syscallarg(const netbsd32_charp) fname;
    326  1.8.4.3  yamt 		syscallarg(netbsd32_compat_30_fhandlep_t) fhp;
    327  1.8.4.3  yamt 	} */ *uap = v;
    328  1.8.4.3  yamt 	struct compat_30_sys_getfh_args ua;
    329  1.8.4.3  yamt 
    330  1.8.4.3  yamt 	NETBSD32TOP_UAP(fname, const char);
    331  1.8.4.3  yamt 	NETBSD32TOP_UAP(fhp, struct compat_30_fhandle);
    332  1.8.4.3  yamt 	/* Lucky for us a fhandle_t doesn't change sizes */
    333  1.8.4.3  yamt 	return (compat_30_sys_getfh(l, &ua, retval));
    334  1.8.4.3  yamt }
    335  1.8.4.3  yamt 
    336  1.8.4.3  yamt 
    337  1.8.4.3  yamt int compat_30_netbsd32_sys___fhstat30(l, v, retval)
    338  1.8.4.3  yamt 	struct lwp *l;
    339  1.8.4.3  yamt 	void *v;
    340  1.8.4.3  yamt 	register_t *retval;
    341  1.8.4.3  yamt {
    342  1.8.4.3  yamt 	struct compat_30_netbsd32_sys___fhstat30_args /* {
    343  1.8.4.3  yamt 		syscallarg(const netbsd32_fhandlep_t) fhp;
    344  1.8.4.3  yamt 		syscallarg(netbsd32_statp_t) sb;
    345  1.8.4.3  yamt 	} */ *uap = v;
    346  1.8.4.3  yamt 	struct stat sb;
    347  1.8.4.3  yamt 	struct netbsd32_stat sb32;
    348  1.8.4.3  yamt 	int error;
    349  1.8.4.3  yamt 	fhandle_t *fh;
    350  1.8.4.3  yamt 	struct vnode *vp;
    351  1.8.4.3  yamt 
    352  1.8.4.3  yamt 	/*
    353  1.8.4.3  yamt 	 * Must be super user
    354  1.8.4.3  yamt 	 */
    355  1.8.4.3  yamt 	if ((error = kauth_authorize_system(l->l_cred, KAUTH_SYSTEM_FILEHANDLE,
    356  1.8.4.3  yamt 	    0, NULL, NULL, NULL)))
    357  1.8.4.3  yamt 		return error;
    358  1.8.4.3  yamt 
    359  1.8.4.3  yamt 	if ((error = vfs_copyinfh_alloc(NETBSD32PTR64(SCARG(uap, fhp)),
    360  1.8.4.3  yamt 	    FHANDLE_SIZE_COMPAT, &fh)) != 0)
    361  1.8.4.3  yamt 		goto bad;
    362  1.8.4.3  yamt 
    363  1.8.4.3  yamt 	if ((error = vfs_fhtovp(fh, &vp)) != 0)
    364  1.8.4.3  yamt 		goto bad;
    365  1.8.4.3  yamt 
    366  1.8.4.3  yamt 	error = vn_stat(vp, &sb, l);
    367  1.8.4.3  yamt 	vput(vp);
    368  1.8.4.3  yamt 	if (error)
    369  1.8.4.3  yamt 		goto bad;
    370  1.8.4.3  yamt 	netbsd32_from___stat30(&sb, &sb32);
    371  1.8.4.3  yamt 	error = copyout(&sb32, NETBSD32PTR64(SCARG(uap, sb)), sizeof(sb));
    372  1.8.4.3  yamt bad:
    373  1.8.4.3  yamt 	vfs_copyinfh_free(fh);
    374  1.8.4.3  yamt 	return error;
    375  1.8.4.3  yamt }
    376  1.8.4.3  yamt 
    377  1.8.4.3  yamt /*
    378  1.8.4.3  yamt  * Open a file given a file handle.
    379  1.8.4.3  yamt  *
    380  1.8.4.3  yamt  * Check permissions, allocate an open file structure,
    381  1.8.4.3  yamt  * and call the device open routine if any.
    382  1.8.4.3  yamt  */
    383  1.8.4.3  yamt int
    384  1.8.4.3  yamt compat_30_netbsd32_fhopen(l, v, retval)
    385  1.8.4.3  yamt 	struct lwp *l;
    386  1.8.4.3  yamt 	void *v;
    387  1.8.4.3  yamt 	register_t *retval;
    388  1.8.4.3  yamt {
    389  1.8.4.3  yamt 	struct compat_30_netbsd32_fhopen_args /* {
    390  1.8.4.3  yamt 		syscallarg(const fhandle_t *) fhp;
    391  1.8.4.3  yamt 		syscallarg(int) flags;
    392  1.8.4.3  yamt 	} */ *uap = v;
    393  1.8.4.3  yamt 	struct compat_30_sys_fhopen_args ua;
    394  1.8.4.3  yamt 
    395  1.8.4.3  yamt 	NETBSD32TOP_UAP(fhp, struct compat_30_fhandle);
    396  1.8.4.3  yamt 	NETBSD32TO64_UAP(flags);
    397  1.8.4.3  yamt 	return (compat_30_sys_fhopen(l, &ua, retval));
    398  1.8.4.3  yamt }
    399