Home | History | Annotate | Line # | Download | only in netbsd32
netbsd32_netbsd.c revision 1.56
      1  1.56       mrg /*	$NetBSD: netbsd32_netbsd.c,v 1.56 2001/02/07 15:22:39 mrg Exp $	*/
      2   1.1       mrg 
      3   1.1       mrg /*
      4   1.1       mrg  * Copyright (c) 1998 Matthew R. Green
      5   1.1       mrg  * All rights reserved.
      6   1.1       mrg  *
      7   1.1       mrg  * Redistribution and use in source and binary forms, with or without
      8   1.1       mrg  * modification, are permitted provided that the following conditions
      9   1.1       mrg  * are met:
     10   1.1       mrg  * 1. Redistributions of source code must retain the above copyright
     11   1.1       mrg  *    notice, this list of conditions and the following disclaimer.
     12   1.1       mrg  * 2. Redistributions in binary form must reproduce the above copyright
     13   1.1       mrg  *    notice, this list of conditions and the following disclaimer in the
     14   1.1       mrg  *    documentation and/or other materials provided with the distribution.
     15   1.1       mrg  * 3. The name of the author may not be used to endorse or promote products
     16   1.1       mrg  *    derived from this software without specific prior written permission.
     17   1.1       mrg  *
     18   1.1       mrg  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
     19   1.1       mrg  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     20   1.1       mrg  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     21   1.1       mrg  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
     22   1.1       mrg  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
     23   1.1       mrg  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
     24   1.1       mrg  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
     25   1.1       mrg  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
     26   1.1       mrg  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     27   1.1       mrg  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     28   1.1       mrg  * SUCH DAMAGE.
     29   1.1       mrg  */
     30   1.1       mrg 
     31  1.42  jdolecek #if defined(_KERNEL) && !defined(_LKM)
     32  1.28       eeh #include "opt_ddb.h"
     33   1.4       eeh #include "opt_ktrace.h"
     34   1.6       eeh #include "opt_ntp.h"
     35  1.20       eeh #include "opt_compat_netbsd.h"
     36   1.7  drochner #include "opt_compat_43.h"
     37  1.20       eeh #include "opt_sysv.h"
     38   1.7  drochner 
     39   1.6       eeh #include "fs_lfs.h"
     40   1.6       eeh #include "fs_nfs.h"
     41  1.42  jdolecek #endif
     42  1.42  jdolecek 
     43  1.42  jdolecek /*
     44  1.42  jdolecek  * Though COMPAT_OLDSOCK is needed only for COMPAT_43, SunOS, Linux,
     45  1.42  jdolecek  * HP-UX, FreeBSD, Ultrix, OSF1, we define it unconditionally so that
     46  1.42  jdolecek  * this would be LKM-safe.
     47  1.42  jdolecek  */
     48  1.42  jdolecek #define COMPAT_OLDSOCK /* used by <sys/socket.h> */
     49   1.4       eeh 
     50   1.1       mrg #include <sys/param.h>
     51   1.1       mrg #include <sys/systm.h>
     52  1.20       eeh #include <sys/filedesc.h>
     53   1.6       eeh #include <sys/kernel.h>
     54   1.1       mrg #include <sys/ipc.h>
     55   1.1       mrg #include <sys/msg.h>
     56  1.19       eeh #define msg __msg /* Don't ask me! */
     57   1.1       mrg #include <sys/sem.h>
     58   1.1       mrg #include <sys/shm.h>
     59   1.1       mrg #include <sys/malloc.h>
     60   1.1       mrg #include <sys/mount.h>
     61   1.1       mrg #include <sys/socket.h>
     62   1.1       mrg #include <sys/sockio.h>
     63   1.6       eeh #include <sys/socketvar.h>
     64   1.6       eeh #include <sys/mbuf.h>
     65   1.1       mrg #include <sys/stat.h>
     66   1.1       mrg #include <sys/time.h>
     67   1.1       mrg #include <sys/timex.h>
     68   1.4       eeh #include <sys/signalvar.h>
     69   1.6       eeh #include <sys/wait.h>
     70   1.6       eeh #include <sys/ptrace.h>
     71   1.6       eeh #include <sys/ktrace.h>
     72   1.6       eeh #include <sys/trace.h>
     73   1.6       eeh #include <sys/resourcevar.h>
     74   1.6       eeh #include <sys/pool.h>
     75   1.6       eeh #include <sys/vnode.h>
     76   1.6       eeh #include <sys/file.h>
     77   1.6       eeh #include <sys/filedesc.h>
     78   1.6       eeh #include <sys/namei.h>
     79  1.29       mrg 
     80  1.29       mrg #include <uvm/uvm_extern.h>
     81  1.29       mrg 
     82   1.1       mrg #include <sys/syscallargs.h>
     83   1.6       eeh #include <sys/proc.h>
     84  1.20       eeh #include <sys/acct.h>
     85  1.20       eeh #include <sys/exec.h>
     86  1.34   thorpej #define	__SYSCTL_PRIVATE
     87   1.6       eeh #include <sys/sysctl.h>
     88   1.1       mrg 
     89   1.1       mrg #include <net/if.h>
     90   1.1       mrg 
     91  1.10       mrg #include <compat/netbsd32/netbsd32.h>
     92  1.42  jdolecek #include <compat/netbsd32/netbsd32_syscall.h>
     93  1.10       mrg #include <compat/netbsd32/netbsd32_syscallargs.h>
     94  1.56       mrg #include <compat/netbsd32/netbsd32_conv.h>
     95   1.1       mrg 
     96   1.4       eeh #include <machine/frame.h>
     97  1.28       eeh 
     98  1.28       eeh #if defined(DDB)
     99  1.28       eeh #include <ddb/ddbvar.h>
    100  1.28       eeh #endif
    101   1.4       eeh 
    102  1.42  jdolecek /* this is provided by kern/kern_exec.c */
    103  1.42  jdolecek extern int exec_maxhdrsz;
    104  1.44  jdolecek extern struct lock exec_lock;
    105  1.42  jdolecek 
    106   1.6       eeh 
    107  1.51       mrg /* note that the netbsd32_msghdr's iov really points to a struct iovec, not a netbsd32_iovec. */
    108  1.10       mrg static int recvit32 __P((struct proc *, int, struct netbsd32_msghdr *, struct iovec *, caddr_t,
    109   1.6       eeh 			 register_t *));
    110  1.10       mrg static int dofilereadv32 __P((struct proc *, int, struct file *, struct netbsd32_iovec *,
    111   1.6       eeh 			      int, off_t *, int, register_t *));
    112  1.10       mrg static int dofilewritev32 __P((struct proc *, int, struct file *, struct netbsd32_iovec *,
    113   1.6       eeh 			       int,  off_t *, int, register_t *));
    114  1.54       mrg static int change_utimes32 __P((struct vnode *, netbsd32_timevalp_t, struct proc *));
    115   1.6       eeh 
    116  1.42  jdolecek extern char netbsd32_sigcode[], netbsd32_esigcode[];
    117  1.42  jdolecek extern struct sysent netbsd32_sysent[];
    118  1.42  jdolecek #ifdef SYSCALL_DEBUG
    119  1.42  jdolecek extern const char * const netbsd32_syscallnames[];
    120  1.42  jdolecek #endif
    121  1.46   mycroft #ifdef __HAVE_SYSCALL_INTERN
    122  1.46   mycroft void syscall_intern __P((struct proc *));
    123  1.46   mycroft #else
    124  1.45  jdolecek void syscall __P((void));
    125  1.46   mycroft #endif
    126  1.42  jdolecek 
    127  1.42  jdolecek const struct emul emul_netbsd32 = {
    128  1.42  jdolecek 	"netbsd32",
    129  1.42  jdolecek 	"/emul/netbsd32",
    130  1.46   mycroft #ifndef __HAVE_MINIMAL_EMUL
    131  1.46   mycroft 	0,
    132  1.42  jdolecek 	NULL,
    133  1.42  jdolecek 	netbsd32_SYS_syscall,
    134  1.42  jdolecek 	netbsd32_SYS_MAXSYSCALL,
    135  1.46   mycroft #endif
    136  1.42  jdolecek 	netbsd32_sysent,
    137  1.42  jdolecek #ifdef SYSCALL_DEBUG
    138  1.42  jdolecek 	netbsd32_syscallnames,
    139  1.42  jdolecek #else
    140  1.42  jdolecek 	NULL,
    141  1.42  jdolecek #endif
    142  1.46   mycroft 	netbsd32_sendsig,
    143  1.42  jdolecek 	netbsd32_sigcode,
    144  1.42  jdolecek 	netbsd32_esigcode,
    145  1.45  jdolecek 	NULL,
    146  1.45  jdolecek 	NULL,
    147  1.45  jdolecek 	NULL,
    148  1.46   mycroft #ifdef __HAVE_SYSCALL_INTERN
    149  1.46   mycroft 	syscall_intern,
    150  1.46   mycroft #else
    151  1.46   mycroft 	syscall,
    152  1.46   mycroft #endif
    153  1.42  jdolecek };
    154  1.42  jdolecek 
    155   1.1       mrg /*
    156   1.1       mrg  * below are all the standard NetBSD system calls, in the 32bit
    157  1.32       mrg  * environment, with the necessary conversions to 64bit before
    158  1.32       mrg  * calling the real syscall, unless we need to inline the whole
    159  1.32       mrg  * syscall here, sigh.
    160   1.1       mrg  */
    161   1.1       mrg 
    162   1.6       eeh int
    163  1.19       eeh netbsd32_exit(p, v, retval)
    164   1.6       eeh 	struct proc *p;
    165   1.6       eeh 	void *v;
    166   1.6       eeh 	register_t *retval;
    167   1.6       eeh {
    168  1.19       eeh 	struct netbsd32_exit_args /* {
    169   1.6       eeh 		syscallarg(int) rval;
    170   1.6       eeh 	} */ *uap = v;
    171   1.6       eeh 	struct sys_exit_args ua;
    172   1.6       eeh 
    173  1.11       mrg 	NETBSD32TO64_UAP(rval);
    174  1.42  jdolecek 	return sys_exit(p, &ua, retval);
    175   1.6       eeh }
    176   1.6       eeh 
    177   1.1       mrg int
    178  1.19       eeh netbsd32_read(p, v, retval)
    179   1.1       mrg 	struct proc *p;
    180   1.1       mrg 	void *v;
    181   1.1       mrg 	register_t *retval;
    182   1.1       mrg {
    183  1.19       eeh 	struct netbsd32_read_args /* {
    184   1.1       mrg 		syscallarg(int) fd;
    185  1.10       mrg 		syscallarg(netbsd32_voidp) buf;
    186  1.10       mrg 		syscallarg(netbsd32_size_t) nbyte;
    187   1.1       mrg 	} */ *uap = v;
    188   1.1       mrg 	struct sys_read_args ua;
    189   1.1       mrg 
    190  1.11       mrg 	NETBSD32TO64_UAP(fd);
    191  1.11       mrg 	NETBSD32TOP_UAP(buf, void *);
    192  1.11       mrg 	NETBSD32TOX_UAP(nbyte, size_t);
    193   1.6       eeh 	return sys_read(p, &ua, retval);
    194   1.1       mrg }
    195   1.1       mrg 
    196   1.1       mrg int
    197  1.19       eeh netbsd32_write(p, v, retval)
    198   1.1       mrg 	struct proc *p;
    199   1.1       mrg 	void *v;
    200   1.1       mrg 	register_t *retval;
    201   1.1       mrg {
    202  1.19       eeh 	struct netbsd32_write_args /* {
    203   1.1       mrg 		syscallarg(int) fd;
    204  1.10       mrg 		syscallarg(const netbsd32_voidp) buf;
    205  1.10       mrg 		syscallarg(netbsd32_size_t) nbyte;
    206   1.1       mrg 	} */ *uap = v;
    207   1.1       mrg 	struct sys_write_args ua;
    208   1.1       mrg 
    209  1.11       mrg 	NETBSD32TO64_UAP(fd);
    210  1.11       mrg 	NETBSD32TOP_UAP(buf, void *);
    211  1.11       mrg 	NETBSD32TOX_UAP(nbyte, size_t);
    212   1.6       eeh 	return sys_write(p, &ua, retval);
    213   1.6       eeh }
    214   1.6       eeh 
    215   1.6       eeh int
    216  1.19       eeh netbsd32_close(p, v, retval)
    217   1.6       eeh 	struct proc *p;
    218   1.6       eeh 	void *v;
    219   1.6       eeh 	register_t *retval;
    220   1.6       eeh {
    221  1.19       eeh 	struct netbsd32_close_args /* {
    222   1.6       eeh 		syscallarg(int) fd;
    223   1.6       eeh 	} */ *uap = v;
    224   1.6       eeh 	struct sys_close_args ua;
    225   1.1       mrg 
    226  1.11       mrg 	NETBSD32TO64_UAP(fd);
    227  1.21       eeh 	return sys_close(p, &ua, retval);
    228   1.1       mrg }
    229   1.1       mrg 
    230   1.1       mrg int
    231  1.19       eeh netbsd32_open(p, v, retval)
    232   1.1       mrg 	struct proc *p;
    233   1.1       mrg 	void *v;
    234   1.1       mrg 	register_t *retval;
    235   1.1       mrg {
    236  1.19       eeh 	struct netbsd32_open_args /* {
    237  1.10       mrg 		syscallarg(const netbsd32_charp) path;
    238   1.1       mrg 		syscallarg(int) flags;
    239   1.1       mrg 		syscallarg(mode_t) mode;
    240   1.1       mrg 	} */ *uap = v;
    241   1.1       mrg 	struct sys_open_args ua;
    242   1.1       mrg 	caddr_t sg;
    243   1.1       mrg 
    244  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
    245  1.11       mrg 	NETBSD32TO64_UAP(flags);
    246  1.11       mrg 	NETBSD32TO64_UAP(mode);
    247   1.1       mrg 	sg = stackgap_init(p->p_emul);
    248  1.41  jdolecek 	CHECK_ALT_EXIST(p, &sg, SCARG(&ua, path));
    249   1.1       mrg 
    250   1.1       mrg 	return (sys_open(p, &ua, retval));
    251   1.1       mrg }
    252   1.1       mrg 
    253  1.56       mrg /* XXX MOVE ME XXX */
    254   1.1       mrg int
    255  1.19       eeh netbsd32_wait4(q, v, retval)
    256   1.6       eeh 	struct proc *q;
    257   1.1       mrg 	void *v;
    258   1.1       mrg 	register_t *retval;
    259   1.1       mrg {
    260  1.19       eeh 	struct netbsd32_wait4_args /* {
    261   1.1       mrg 		syscallarg(int) pid;
    262  1.10       mrg 		syscallarg(netbsd32_intp) status;
    263   1.1       mrg 		syscallarg(int) options;
    264  1.10       mrg 		syscallarg(netbsd32_rusagep_t) rusage;
    265   1.1       mrg 	} */ *uap = v;
    266  1.10       mrg 	struct netbsd32_rusage ru32;
    267  1.25  augustss 	int nfound;
    268  1.25  augustss 	struct proc *p, *t;
    269   1.6       eeh 	int status, error;
    270   1.6       eeh 
    271   1.6       eeh 	if (SCARG(uap, pid) == 0)
    272   1.6       eeh 		SCARG(uap, pid) = -q->p_pgid;
    273   1.6       eeh 	if (SCARG(uap, options) &~ (WUNTRACED|WNOHANG))
    274   1.6       eeh 		return (EINVAL);
    275   1.1       mrg 
    276   1.6       eeh loop:
    277   1.6       eeh 	nfound = 0;
    278   1.6       eeh 	for (p = q->p_children.lh_first; p != 0; p = p->p_sibling.le_next) {
    279   1.6       eeh 		if (SCARG(uap, pid) != WAIT_ANY &&
    280   1.6       eeh 		    p->p_pid != SCARG(uap, pid) &&
    281   1.6       eeh 		    p->p_pgid != -SCARG(uap, pid))
    282   1.6       eeh 			continue;
    283   1.6       eeh 		nfound++;
    284   1.6       eeh 		if (p->p_stat == SZOMB) {
    285   1.6       eeh 			retval[0] = p->p_pid;
    286   1.6       eeh 
    287   1.6       eeh 			if (SCARG(uap, status)) {
    288   1.6       eeh 				status = p->p_xstat;	/* convert to int */
    289   1.6       eeh 				error = copyout((caddr_t)&status,
    290   1.6       eeh 						(caddr_t)(u_long)SCARG(uap, status),
    291   1.6       eeh 						sizeof(status));
    292   1.6       eeh 				if (error)
    293   1.6       eeh 					return (error);
    294   1.6       eeh 			}
    295   1.6       eeh 			if (SCARG(uap, rusage)) {
    296  1.10       mrg 				netbsd32_from_rusage(p->p_ru, &ru32);
    297   1.6       eeh 				if ((error = copyout((caddr_t)&ru32,
    298   1.6       eeh 						     (caddr_t)(u_long)SCARG(uap, rusage),
    299  1.10       mrg 						     sizeof(struct netbsd32_rusage))))
    300   1.6       eeh 					return (error);
    301   1.6       eeh 			}
    302   1.6       eeh 			/*
    303   1.6       eeh 			 * If we got the child via ptrace(2) or procfs, and
    304   1.6       eeh 			 * the parent is different (meaning the process was
    305   1.6       eeh 			 * attached, rather than run as a child), then we need
    306   1.6       eeh 			 * to give it back to the old parent, and send the
    307   1.6       eeh 			 * parent a SIGCHLD.  The rest of the cleanup will be
    308   1.6       eeh 			 * done when the old parent waits on the child.
    309   1.6       eeh 			 */
    310   1.6       eeh 			if ((p->p_flag & P_TRACED) &&
    311   1.6       eeh 			    p->p_oppid != p->p_pptr->p_pid) {
    312   1.6       eeh 				t = pfind(p->p_oppid);
    313   1.6       eeh 				proc_reparent(p, t ? t : initproc);
    314   1.6       eeh 				p->p_oppid = 0;
    315   1.6       eeh 				p->p_flag &= ~(P_TRACED|P_WAITED|P_FSTRACE);
    316   1.6       eeh 				psignal(p->p_pptr, SIGCHLD);
    317   1.6       eeh 				wakeup((caddr_t)p->p_pptr);
    318   1.6       eeh 				return (0);
    319   1.6       eeh 			}
    320   1.6       eeh 			p->p_xstat = 0;
    321   1.6       eeh 			ruadd(&q->p_stats->p_cru, p->p_ru);
    322   1.6       eeh 			pool_put(&rusage_pool, p->p_ru);
    323   1.6       eeh 
    324   1.6       eeh 			/*
    325   1.6       eeh 			 * Finally finished with old proc entry.
    326   1.6       eeh 			 * Unlink it from its process group and free it.
    327   1.6       eeh 			 */
    328   1.6       eeh 			leavepgrp(p);
    329   1.6       eeh 
    330   1.6       eeh 			LIST_REMOVE(p, p_list);	/* off zombproc */
    331   1.6       eeh 
    332   1.6       eeh 			LIST_REMOVE(p, p_sibling);
    333   1.6       eeh 
    334   1.6       eeh 			/*
    335   1.6       eeh 			 * Decrement the count of procs running with this uid.
    336   1.6       eeh 			 */
    337   1.6       eeh 			(void)chgproccnt(p->p_cred->p_ruid, -1);
    338   1.6       eeh 
    339   1.6       eeh 			/*
    340   1.6       eeh 			 * Free up credentials.
    341   1.6       eeh 			 */
    342   1.6       eeh 			if (--p->p_cred->p_refcnt == 0) {
    343   1.6       eeh 				crfree(p->p_cred->pc_ucred);
    344   1.6       eeh 				pool_put(&pcred_pool, p->p_cred);
    345   1.6       eeh 			}
    346   1.6       eeh 
    347   1.6       eeh 			/*
    348   1.6       eeh 			 * Release reference to text vnode
    349   1.6       eeh 			 */
    350   1.6       eeh 			if (p->p_textvp)
    351   1.6       eeh 				vrele(p->p_textvp);
    352   1.6       eeh 
    353   1.6       eeh 			pool_put(&proc_pool, p);
    354   1.6       eeh 			nprocs--;
    355   1.6       eeh 			return (0);
    356   1.6       eeh 		}
    357   1.6       eeh 		if (p->p_stat == SSTOP && (p->p_flag & P_WAITED) == 0 &&
    358   1.6       eeh 		    (p->p_flag & P_TRACED || SCARG(uap, options) & WUNTRACED)) {
    359   1.6       eeh 			p->p_flag |= P_WAITED;
    360   1.6       eeh 			retval[0] = p->p_pid;
    361   1.6       eeh 
    362   1.6       eeh 			if (SCARG(uap, status)) {
    363   1.6       eeh 				status = W_STOPCODE(p->p_xstat);
    364   1.6       eeh 				error = copyout((caddr_t)&status,
    365   1.6       eeh 				    (caddr_t)(u_long)SCARG(uap, status),
    366   1.6       eeh 				    sizeof(status));
    367   1.6       eeh 			} else
    368   1.6       eeh 				error = 0;
    369   1.6       eeh 			return (error);
    370   1.6       eeh 		}
    371   1.6       eeh 	}
    372   1.6       eeh 	if (nfound == 0)
    373   1.6       eeh 		return (ECHILD);
    374   1.6       eeh 	if (SCARG(uap, options) & WNOHANG) {
    375   1.6       eeh 		retval[0] = 0;
    376   1.6       eeh 		return (0);
    377   1.5       eeh 	}
    378   1.6       eeh 	if ((error = tsleep((caddr_t)q, PWAIT | PCATCH, "wait", 0)) != 0)
    379   1.6       eeh 		return (error);
    380   1.6       eeh 	goto loop;
    381   1.1       mrg }
    382   1.1       mrg 
    383   1.1       mrg int
    384  1.19       eeh netbsd32_link(p, v, retval)
    385   1.1       mrg 	struct proc *p;
    386   1.1       mrg 	void *v;
    387   1.1       mrg 	register_t *retval;
    388   1.1       mrg {
    389  1.19       eeh 	struct netbsd32_link_args /* {
    390  1.10       mrg 		syscallarg(const netbsd32_charp) path;
    391  1.10       mrg 		syscallarg(const netbsd32_charp) link;
    392   1.1       mrg 	} */ *uap = v;
    393   1.1       mrg 	struct sys_link_args ua;
    394   1.1       mrg 
    395  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
    396  1.11       mrg 	NETBSD32TOP_UAP(link, const char);
    397   1.1       mrg 	return (sys_link(p, &ua, retval));
    398   1.1       mrg }
    399   1.1       mrg 
    400   1.1       mrg int
    401  1.19       eeh netbsd32_unlink(p, v, retval)
    402   1.1       mrg 	struct proc *p;
    403   1.1       mrg 	void *v;
    404   1.1       mrg 	register_t *retval;
    405   1.1       mrg {
    406  1.19       eeh 	struct netbsd32_unlink_args /* {
    407  1.10       mrg 		syscallarg(const netbsd32_charp) path;
    408   1.1       mrg 	} */ *uap = v;
    409   1.1       mrg 	struct sys_unlink_args ua;
    410   1.1       mrg 
    411  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
    412   1.1       mrg 
    413   1.1       mrg 	return (sys_unlink(p, &ua, retval));
    414   1.1       mrg }
    415   1.1       mrg 
    416   1.1       mrg int
    417  1.19       eeh netbsd32_chdir(p, v, retval)
    418   1.1       mrg 	struct proc *p;
    419   1.1       mrg 	void *v;
    420   1.1       mrg 	register_t *retval;
    421   1.1       mrg {
    422  1.19       eeh 	struct netbsd32_chdir_args /* {
    423  1.10       mrg 		syscallarg(const netbsd32_charp) path;
    424   1.1       mrg 	} */ *uap = v;
    425   1.1       mrg 	struct sys_chdir_args ua;
    426   1.1       mrg 
    427  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
    428   1.1       mrg 
    429   1.1       mrg 	return (sys_chdir(p, &ua, retval));
    430   1.1       mrg }
    431   1.1       mrg 
    432   1.1       mrg int
    433  1.19       eeh netbsd32_fchdir(p, v, retval)
    434   1.6       eeh 	struct proc *p;
    435   1.6       eeh 	void *v;
    436   1.6       eeh 	register_t *retval;
    437   1.6       eeh {
    438  1.19       eeh 	struct netbsd32_fchdir_args /* {
    439   1.6       eeh 		syscallarg(int) fd;
    440   1.6       eeh 	} */ *uap = v;
    441   1.6       eeh 	struct sys_fchdir_args ua;
    442   1.6       eeh 
    443  1.11       mrg 	NETBSD32TO64_UAP(fd);
    444   1.6       eeh 
    445   1.6       eeh 	return (sys_fchdir(p, &ua, retval));
    446   1.6       eeh }
    447   1.6       eeh 
    448   1.6       eeh int
    449  1.19       eeh netbsd32_mknod(p, v, retval)
    450   1.1       mrg 	struct proc *p;
    451   1.1       mrg 	void *v;
    452   1.1       mrg 	register_t *retval;
    453   1.1       mrg {
    454  1.19       eeh 	struct netbsd32_mknod_args /* {
    455  1.10       mrg 		syscallarg(const netbsd32_charp) path;
    456   1.1       mrg 		syscallarg(mode_t) mode;
    457   1.1       mrg 		syscallarg(dev_t) dev;
    458   1.1       mrg 	} */ *uap = v;
    459   1.1       mrg 	struct sys_mknod_args ua;
    460   1.1       mrg 
    461  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
    462  1.11       mrg 	NETBSD32TO64_UAP(dev);
    463  1.11       mrg 	NETBSD32TO64_UAP(mode);
    464   1.1       mrg 
    465   1.1       mrg 	return (sys_mknod(p, &ua, retval));
    466   1.1       mrg }
    467   1.1       mrg 
    468   1.1       mrg int
    469  1.19       eeh netbsd32_chmod(p, v, retval)
    470   1.1       mrg 	struct proc *p;
    471   1.1       mrg 	void *v;
    472   1.1       mrg 	register_t *retval;
    473   1.1       mrg {
    474  1.19       eeh 	struct netbsd32_chmod_args /* {
    475  1.10       mrg 		syscallarg(const netbsd32_charp) path;
    476   1.1       mrg 		syscallarg(mode_t) mode;
    477   1.1       mrg 	} */ *uap = v;
    478   1.1       mrg 	struct sys_chmod_args ua;
    479   1.1       mrg 
    480  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
    481  1.11       mrg 	NETBSD32TO64_UAP(mode);
    482   1.1       mrg 
    483   1.1       mrg 	return (sys_chmod(p, &ua, retval));
    484   1.1       mrg }
    485   1.1       mrg 
    486   1.1       mrg int
    487  1.19       eeh netbsd32_chown(p, v, retval)
    488   1.1       mrg 	struct proc *p;
    489   1.1       mrg 	void *v;
    490   1.1       mrg 	register_t *retval;
    491   1.1       mrg {
    492  1.19       eeh 	struct netbsd32_chown_args /* {
    493  1.10       mrg 		syscallarg(const netbsd32_charp) path;
    494   1.1       mrg 		syscallarg(uid_t) uid;
    495   1.1       mrg 		syscallarg(gid_t) gid;
    496   1.1       mrg 	} */ *uap = v;
    497   1.1       mrg 	struct sys_chown_args ua;
    498   1.1       mrg 
    499  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
    500  1.11       mrg 	NETBSD32TO64_UAP(uid);
    501  1.11       mrg 	NETBSD32TO64_UAP(gid);
    502   1.1       mrg 
    503   1.1       mrg 	return (sys_chown(p, &ua, retval));
    504   1.1       mrg }
    505   1.1       mrg 
    506   1.1       mrg int
    507  1.19       eeh netbsd32_break(p, v, retval)
    508   1.1       mrg 	struct proc *p;
    509   1.1       mrg 	void *v;
    510   1.1       mrg 	register_t *retval;
    511   1.1       mrg {
    512  1.19       eeh 	struct netbsd32_break_args /* {
    513  1.10       mrg 		syscallarg(netbsd32_charp) nsize;
    514   1.1       mrg 	} */ *uap = v;
    515   1.1       mrg 	struct sys_obreak_args ua;
    516   1.1       mrg 
    517   1.1       mrg 	SCARG(&ua, nsize) = (char *)(u_long)SCARG(uap, nsize);
    518  1.11       mrg 	NETBSD32TOP_UAP(nsize, char);
    519   1.1       mrg 	return (sys_obreak(p, &ua, retval));
    520   1.1       mrg }
    521   1.1       mrg 
    522  1.56       mrg /* XXX MOVE ME XXX */
    523   1.1       mrg int
    524  1.19       eeh netbsd32_getfsstat(p, v, retval)
    525   1.1       mrg 	struct proc *p;
    526   1.1       mrg 	void *v;
    527   1.1       mrg 	register_t *retval;
    528   1.1       mrg {
    529  1.19       eeh 	struct netbsd32_getfsstat_args /* {
    530  1.10       mrg 		syscallarg(netbsd32_statfsp_t) buf;
    531  1.10       mrg 		syscallarg(netbsd32_long) bufsize;
    532   1.1       mrg 		syscallarg(int) flags;
    533   1.1       mrg 	} */ *uap = v;
    534  1.25  augustss 	struct mount *mp, *nmp;
    535  1.25  augustss 	struct statfs *sp;
    536  1.21       eeh 	struct netbsd32_statfs sb32;
    537  1.21       eeh 	caddr_t sfsp;
    538  1.21       eeh 	long count, maxcount, error;
    539  1.21       eeh 
    540  1.21       eeh 	maxcount = SCARG(uap, bufsize) / sizeof(struct netbsd32_statfs);
    541  1.32       mrg 	sfsp = (caddr_t)(u_long)SCARG(uap, buf);
    542  1.21       eeh 	simple_lock(&mountlist_slock);
    543  1.21       eeh 	count = 0;
    544  1.21       eeh 	for (mp = mountlist.cqh_first; mp != (void *)&mountlist; mp = nmp) {
    545  1.21       eeh 		if (vfs_busy(mp, LK_NOWAIT, &mountlist_slock)) {
    546  1.21       eeh 			nmp = mp->mnt_list.cqe_next;
    547  1.21       eeh 			continue;
    548  1.21       eeh 		}
    549  1.21       eeh 		if (sfsp && count < maxcount) {
    550  1.21       eeh 			sp = &mp->mnt_stat;
    551  1.21       eeh 			/*
    552  1.21       eeh 			 * If MNT_NOWAIT or MNT_LAZY is specified, do not
    553  1.21       eeh 			 * refresh the fsstat cache. MNT_WAIT or MNT_LAXY
    554  1.21       eeh 			 * overrides MNT_NOWAIT.
    555  1.21       eeh 			 */
    556  1.21       eeh 			if (SCARG(uap, flags) != MNT_NOWAIT &&
    557  1.21       eeh 			    SCARG(uap, flags) != MNT_LAZY &&
    558  1.21       eeh 			    (SCARG(uap, flags) == MNT_WAIT ||
    559  1.21       eeh 			     SCARG(uap, flags) == 0) &&
    560  1.21       eeh 			    (error = VFS_STATFS(mp, sp, p)) != 0) {
    561  1.21       eeh 				simple_lock(&mountlist_slock);
    562  1.21       eeh 				nmp = mp->mnt_list.cqe_next;
    563  1.21       eeh 				vfs_unbusy(mp);
    564  1.21       eeh 				continue;
    565  1.21       eeh 			}
    566  1.21       eeh 			sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK;
    567  1.21       eeh 			sp->f_oflags = sp->f_flags & 0xffff;
    568  1.21       eeh 			netbsd32_from_statfs(sp, &sb32);
    569  1.21       eeh 			error = copyout(&sb32, sfsp, sizeof(sb32));
    570  1.21       eeh 			if (error) {
    571  1.21       eeh 				vfs_unbusy(mp);
    572  1.21       eeh 				return (error);
    573  1.21       eeh 			}
    574  1.21       eeh 			sfsp += sizeof(sb32);
    575  1.21       eeh 		}
    576  1.21       eeh 		count++;
    577  1.21       eeh 		simple_lock(&mountlist_slock);
    578  1.21       eeh 		nmp = mp->mnt_list.cqe_next;
    579  1.21       eeh 		vfs_unbusy(mp);
    580  1.21       eeh 	}
    581  1.21       eeh 	simple_unlock(&mountlist_slock);
    582  1.21       eeh 	if (sfsp && count > maxcount)
    583  1.21       eeh 		*retval = maxcount;
    584   1.1       mrg 	else
    585  1.21       eeh 		*retval = count;
    586   1.1       mrg 	return (0);
    587   1.1       mrg }
    588   1.1       mrg 
    589   1.1       mrg int
    590  1.19       eeh netbsd32_mount(p, v, retval)
    591   1.1       mrg 	struct proc *p;
    592   1.1       mrg 	void *v;
    593   1.1       mrg 	register_t *retval;
    594   1.1       mrg {
    595  1.19       eeh 	struct netbsd32_mount_args /* {
    596  1.10       mrg 		syscallarg(const netbsd32_charp) type;
    597  1.10       mrg 		syscallarg(const netbsd32_charp) path;
    598   1.1       mrg 		syscallarg(int) flags;
    599  1.10       mrg 		syscallarg(netbsd32_voidp) data;
    600   1.1       mrg 	} */ *uap = v;
    601   1.1       mrg 	struct sys_mount_args ua;
    602   1.1       mrg 
    603  1.11       mrg 	NETBSD32TOP_UAP(type, const char);
    604  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
    605  1.11       mrg 	NETBSD32TO64_UAP(flags);
    606  1.11       mrg 	NETBSD32TOP_UAP(data, void);
    607   1.1       mrg 	return (sys_mount(p, &ua, retval));
    608   1.1       mrg }
    609   1.1       mrg 
    610   1.1       mrg int
    611  1.19       eeh netbsd32_unmount(p, v, retval)
    612   1.1       mrg 	struct proc *p;
    613   1.1       mrg 	void *v;
    614   1.1       mrg 	register_t *retval;
    615   1.1       mrg {
    616  1.19       eeh 	struct netbsd32_unmount_args /* {
    617  1.10       mrg 		syscallarg(const netbsd32_charp) path;
    618   1.1       mrg 		syscallarg(int) flags;
    619   1.1       mrg 	} */ *uap = v;
    620   1.1       mrg 	struct sys_unmount_args ua;
    621   1.1       mrg 
    622  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
    623  1.11       mrg 	NETBSD32TO64_UAP(flags);
    624   1.1       mrg 	return (sys_unmount(p, &ua, retval));
    625   1.1       mrg }
    626   1.1       mrg 
    627   1.1       mrg int
    628  1.19       eeh netbsd32_setuid(p, v, retval)
    629   1.6       eeh 	struct proc *p;
    630   1.6       eeh 	void *v;
    631   1.6       eeh 	register_t *retval;
    632   1.6       eeh {
    633  1.19       eeh 	struct netbsd32_setuid_args /* {
    634   1.6       eeh 		syscallarg(uid_t) uid;
    635   1.6       eeh 	} */ *uap = v;
    636   1.6       eeh 	struct sys_setuid_args ua;
    637   1.6       eeh 
    638  1.11       mrg 	NETBSD32TO64_UAP(uid);
    639   1.6       eeh 	return (sys_setuid(p, &ua, retval));
    640   1.6       eeh }
    641   1.6       eeh 
    642   1.6       eeh int
    643  1.19       eeh netbsd32_ptrace(p, v, retval)
    644   1.1       mrg 	struct proc *p;
    645   1.1       mrg 	void *v;
    646   1.1       mrg 	register_t *retval;
    647   1.1       mrg {
    648  1.19       eeh 	struct netbsd32_ptrace_args /* {
    649   1.1       mrg 		syscallarg(int) req;
    650   1.1       mrg 		syscallarg(pid_t) pid;
    651  1.10       mrg 		syscallarg(netbsd32_caddr_t) addr;
    652   1.1       mrg 		syscallarg(int) data;
    653   1.1       mrg 	} */ *uap = v;
    654   1.1       mrg 	struct sys_ptrace_args ua;
    655   1.1       mrg 
    656  1.11       mrg 	NETBSD32TO64_UAP(req);
    657  1.11       mrg 	NETBSD32TO64_UAP(pid);
    658  1.11       mrg 	NETBSD32TOX64_UAP(addr, caddr_t);
    659  1.11       mrg 	NETBSD32TO64_UAP(data);
    660   1.1       mrg 	return (sys_ptrace(p, &ua, retval));
    661   1.1       mrg }
    662   1.1       mrg 
    663  1.56       mrg /* XXX MOVE ME XXX */
    664   1.1       mrg int
    665  1.19       eeh netbsd32_recvmsg(p, v, retval)
    666   1.1       mrg 	struct proc *p;
    667   1.1       mrg 	void *v;
    668   1.1       mrg 	register_t *retval;
    669   1.1       mrg {
    670  1.19       eeh 	struct netbsd32_recvmsg_args /* {
    671   1.1       mrg 		syscallarg(int) s;
    672  1.10       mrg 		syscallarg(netbsd32_msghdrp_t) msg;
    673   1.1       mrg 		syscallarg(int) flags;
    674   1.1       mrg 	} */ *uap = v;
    675  1.10       mrg 	struct netbsd32_msghdr msg;
    676   1.6       eeh 	struct iovec aiov[UIO_SMALLIOV], *uiov, *iov;
    677  1.25  augustss 	int error;
    678   1.6       eeh 
    679   1.6       eeh 	error = copyin((caddr_t)(u_long)SCARG(uap, msg), (caddr_t)&msg,
    680   1.6       eeh 		       sizeof(msg));
    681  1.10       mrg 		/* netbsd32_msghdr needs the iov pre-allocated */
    682   1.6       eeh 	if (error)
    683   1.6       eeh 		return (error);
    684   1.6       eeh 	if ((u_int)msg.msg_iovlen > UIO_SMALLIOV) {
    685   1.6       eeh 		if ((u_int)msg.msg_iovlen > IOV_MAX)
    686   1.6       eeh 			return (EMSGSIZE);
    687   1.6       eeh 		MALLOC(iov, struct iovec *,
    688   1.6       eeh 		       sizeof(struct iovec) * (u_int)msg.msg_iovlen, M_IOV,
    689   1.6       eeh 		       M_WAITOK);
    690   1.6       eeh 	} else if ((u_int)msg.msg_iovlen > 0)
    691   1.6       eeh 		iov = aiov;
    692   1.6       eeh 	else
    693   1.6       eeh 		return (EMSGSIZE);
    694   1.6       eeh #ifdef COMPAT_OLDSOCK
    695   1.6       eeh 	msg.msg_flags = SCARG(uap, flags) &~ MSG_COMPAT;
    696   1.6       eeh #else
    697   1.6       eeh 	msg.msg_flags = SCARG(uap, flags);
    698   1.6       eeh #endif
    699   1.6       eeh 	uiov = (struct iovec *)(u_long)msg.msg_iov;
    700  1.10       mrg 	error = netbsd32_to_iovecin((struct netbsd32_iovec *)uiov,
    701   1.6       eeh 				   iov, msg.msg_iovlen);
    702   1.6       eeh 	if (error)
    703   1.6       eeh 		goto done;
    704   1.6       eeh 	if ((error = recvit32(p, SCARG(uap, s), &msg, iov, (caddr_t)0, retval)) == 0) {
    705   1.6       eeh 		error = copyout((caddr_t)&msg, (caddr_t)(u_long)SCARG(uap, msg),
    706   1.6       eeh 		    sizeof(msg));
    707   1.6       eeh 	}
    708   1.6       eeh done:
    709   1.6       eeh 	if (iov != aiov)
    710   1.6       eeh 		FREE(iov, M_IOV);
    711   1.6       eeh 	return (error);
    712   1.6       eeh }
    713   1.1       mrg 
    714  1.56       mrg /* XXX MOVE ME XXX */
    715   1.6       eeh int
    716   1.6       eeh recvit32(p, s, mp, iov, namelenp, retsize)
    717   1.6       eeh 	struct proc *p;
    718   1.6       eeh 	int s;
    719  1.10       mrg 	struct netbsd32_msghdr *mp;
    720   1.6       eeh 	struct iovec *iov;
    721   1.6       eeh 	caddr_t namelenp;
    722   1.6       eeh 	register_t *retsize;
    723   1.6       eeh {
    724   1.6       eeh 	struct file *fp;
    725   1.6       eeh 	struct uio auio;
    726  1.25  augustss 	int i;
    727   1.6       eeh 	int len, error;
    728   1.6       eeh 	struct mbuf *from = 0, *control = 0;
    729   1.6       eeh 	struct socket *so;
    730   1.6       eeh #ifdef KTRACE
    731   1.6       eeh 	struct iovec *ktriov = NULL;
    732   1.6       eeh #endif
    733   1.6       eeh 
    734  1.12   thorpej 	/* getsock() will use the descriptor for us */
    735   1.6       eeh 	if ((error = getsock(p->p_fd, s, &fp)) != 0)
    736   1.6       eeh 		return (error);
    737  1.51       mrg 	auio.uio_iov = iov;
    738   1.6       eeh 	auio.uio_iovcnt = mp->msg_iovlen;
    739   1.6       eeh 	auio.uio_segflg = UIO_USERSPACE;
    740   1.6       eeh 	auio.uio_rw = UIO_READ;
    741   1.6       eeh 	auio.uio_procp = p;
    742   1.6       eeh 	auio.uio_offset = 0;			/* XXX */
    743   1.6       eeh 	auio.uio_resid = 0;
    744   1.6       eeh 	for (i = 0; i < mp->msg_iovlen; i++, iov++) {
    745   1.6       eeh #if 0
    746   1.6       eeh 		/* cannot happen iov_len is unsigned */
    747  1.12   thorpej 		if (iov->iov_len < 0) {
    748  1.12   thorpej 			error = EINVAL;
    749  1.12   thorpej 			goto out1;
    750  1.12   thorpej 		}
    751   1.6       eeh #endif
    752   1.6       eeh 		/*
    753   1.6       eeh 		 * Reads return ssize_t because -1 is returned on error.
    754   1.6       eeh 		 * Therefore we must restrict the length to SSIZE_MAX to
    755   1.6       eeh 		 * avoid garbage return values.
    756   1.6       eeh 		 */
    757   1.6       eeh 		auio.uio_resid += iov->iov_len;
    758  1.12   thorpej 		if (iov->iov_len > SSIZE_MAX || auio.uio_resid > SSIZE_MAX) {
    759  1.12   thorpej 			error = EINVAL;
    760  1.12   thorpej 			goto out1;
    761  1.12   thorpej 		}
    762   1.6       eeh 	}
    763   1.6       eeh #ifdef KTRACE
    764   1.6       eeh 	if (KTRPOINT(p, KTR_GENIO)) {
    765   1.6       eeh 		int iovlen = auio.uio_iovcnt * sizeof(struct iovec);
    766   1.1       mrg 
    767   1.6       eeh 		MALLOC(ktriov, struct iovec *, iovlen, M_TEMP, M_WAITOK);
    768   1.6       eeh 		memcpy((caddr_t)ktriov, (caddr_t)auio.uio_iov, iovlen);
    769   1.6       eeh 	}
    770   1.6       eeh #endif
    771   1.6       eeh 	len = auio.uio_resid;
    772   1.6       eeh 	so = (struct socket *)fp->f_data;
    773   1.6       eeh 	error = (*so->so_receive)(so, &from, &auio, NULL,
    774   1.6       eeh 			  mp->msg_control ? &control : NULL, &mp->msg_flags);
    775   1.6       eeh 	if (error) {
    776   1.6       eeh 		if (auio.uio_resid != len && (error == ERESTART ||
    777   1.6       eeh 		    error == EINTR || error == EWOULDBLOCK))
    778   1.6       eeh 			error = 0;
    779   1.6       eeh 	}
    780   1.6       eeh #ifdef KTRACE
    781   1.6       eeh 	if (ktriov != NULL) {
    782   1.6       eeh 		if (error == 0)
    783  1.26  sommerfe 			ktrgenio(p, s, UIO_READ, ktriov,
    784  1.26  sommerfe 			    len - auio.uio_resid, error);
    785   1.6       eeh 		FREE(ktriov, M_TEMP);
    786   1.6       eeh 	}
    787   1.6       eeh #endif
    788   1.6       eeh 	if (error)
    789   1.6       eeh 		goto out;
    790   1.6       eeh 	*retsize = len - auio.uio_resid;
    791   1.6       eeh 	if (mp->msg_name) {
    792   1.6       eeh 		len = mp->msg_namelen;
    793   1.6       eeh 		if (len <= 0 || from == 0)
    794   1.6       eeh 			len = 0;
    795   1.6       eeh 		else {
    796   1.6       eeh #ifdef COMPAT_OLDSOCK
    797   1.6       eeh 			if (mp->msg_flags & MSG_COMPAT)
    798   1.6       eeh 				mtod(from, struct osockaddr *)->sa_family =
    799   1.6       eeh 				    mtod(from, struct sockaddr *)->sa_family;
    800   1.6       eeh #endif
    801   1.6       eeh 			if (len > from->m_len)
    802   1.6       eeh 				len = from->m_len;
    803   1.6       eeh 			/* else if len < from->m_len ??? */
    804   1.6       eeh 			error = copyout(mtod(from, caddr_t),
    805   1.6       eeh 					(caddr_t)(u_long)mp->msg_name, (unsigned)len);
    806   1.6       eeh 			if (error)
    807   1.6       eeh 				goto out;
    808   1.6       eeh 		}
    809   1.6       eeh 		mp->msg_namelen = len;
    810   1.6       eeh 		if (namelenp &&
    811   1.6       eeh 		    (error = copyout((caddr_t)&len, namelenp, sizeof(int)))) {
    812   1.6       eeh #ifdef COMPAT_OLDSOCK
    813   1.6       eeh 			if (mp->msg_flags & MSG_COMPAT)
    814   1.6       eeh 				error = 0;	/* old recvfrom didn't check */
    815   1.6       eeh 			else
    816   1.6       eeh #endif
    817   1.6       eeh 			goto out;
    818   1.6       eeh 		}
    819   1.6       eeh 	}
    820   1.6       eeh 	if (mp->msg_control) {
    821   1.6       eeh #ifdef COMPAT_OLDSOCK
    822   1.6       eeh 		/*
    823   1.6       eeh 		 * We assume that old recvmsg calls won't receive access
    824   1.6       eeh 		 * rights and other control info, esp. as control info
    825   1.6       eeh 		 * is always optional and those options didn't exist in 4.3.
    826   1.6       eeh 		 * If we receive rights, trim the cmsghdr; anything else
    827   1.6       eeh 		 * is tossed.
    828   1.6       eeh 		 */
    829   1.6       eeh 		if (control && mp->msg_flags & MSG_COMPAT) {
    830   1.6       eeh 			if (mtod(control, struct cmsghdr *)->cmsg_level !=
    831   1.6       eeh 			    SOL_SOCKET ||
    832   1.6       eeh 			    mtod(control, struct cmsghdr *)->cmsg_type !=
    833   1.6       eeh 			    SCM_RIGHTS) {
    834   1.6       eeh 				mp->msg_controllen = 0;
    835   1.6       eeh 				goto out;
    836   1.6       eeh 			}
    837   1.6       eeh 			control->m_len -= sizeof(struct cmsghdr);
    838   1.6       eeh 			control->m_data += sizeof(struct cmsghdr);
    839   1.6       eeh 		}
    840   1.6       eeh #endif
    841   1.6       eeh 		len = mp->msg_controllen;
    842   1.6       eeh 		if (len <= 0 || control == 0)
    843   1.6       eeh 			len = 0;
    844   1.6       eeh 		else {
    845   1.6       eeh 			struct mbuf *m = control;
    846   1.6       eeh 			caddr_t p = (caddr_t)(u_long)mp->msg_control;
    847   1.6       eeh 
    848   1.6       eeh 			do {
    849   1.6       eeh 				i = m->m_len;
    850   1.6       eeh 				if (len < i) {
    851   1.6       eeh 					mp->msg_flags |= MSG_CTRUNC;
    852   1.6       eeh 					i = len;
    853   1.6       eeh 				}
    854   1.6       eeh 				error = copyout(mtod(m, caddr_t), p,
    855   1.6       eeh 				    (unsigned)i);
    856   1.6       eeh 				if (m->m_next)
    857   1.6       eeh 					i = ALIGN(i);
    858   1.6       eeh 				p += i;
    859   1.6       eeh 				len -= i;
    860   1.6       eeh 				if (error != 0 || len <= 0)
    861   1.6       eeh 					break;
    862   1.6       eeh 			} while ((m = m->m_next) != NULL);
    863   1.6       eeh 			len = p - (caddr_t)(u_long)mp->msg_control;
    864   1.6       eeh 		}
    865   1.6       eeh 		mp->msg_controllen = len;
    866   1.6       eeh 	}
    867  1.12   thorpej  out:
    868   1.6       eeh 	if (from)
    869   1.6       eeh 		m_freem(from);
    870   1.6       eeh 	if (control)
    871   1.6       eeh 		m_freem(control);
    872  1.12   thorpej  out1:
    873  1.19       eeh 	FILE_UNUSE(fp, p);
    874   1.1       mrg 	return (error);
    875   1.1       mrg }
    876   1.1       mrg 
    877  1.56       mrg /* XXX MOVE ME XXX */
    878   1.1       mrg int
    879  1.19       eeh netbsd32_sendmsg(p, v, retval)
    880   1.1       mrg 	struct proc *p;
    881   1.1       mrg 	void *v;
    882   1.1       mrg 	register_t *retval;
    883   1.1       mrg {
    884  1.19       eeh 	struct netbsd32_sendmsg_args /* {
    885   1.1       mrg 		syscallarg(int) s;
    886  1.10       mrg 		syscallarg(const netbsd32_msghdrp_t) msg;
    887   1.1       mrg 		syscallarg(int) flags;
    888   1.1       mrg 	} */ *uap = v;
    889   1.6       eeh 	struct msghdr msg;
    890  1.10       mrg 	struct netbsd32_msghdr msg32;
    891   1.6       eeh 	struct iovec aiov[UIO_SMALLIOV], *iov;
    892   1.1       mrg 	int error;
    893   1.1       mrg 
    894   1.6       eeh 	error = copyin((caddr_t)(u_long)SCARG(uap, msg),
    895   1.6       eeh 		       (caddr_t)&msg32, sizeof(msg32));
    896   1.6       eeh 	if (error)
    897   1.6       eeh 		return (error);
    898  1.10       mrg 	netbsd32_to_msghdr(&msg32, &msg);
    899   1.6       eeh 	if ((u_int)msg.msg_iovlen > UIO_SMALLIOV) {
    900   1.6       eeh 		if ((u_int)msg.msg_iovlen > IOV_MAX)
    901   1.6       eeh 			return (EMSGSIZE);
    902   1.6       eeh 		MALLOC(iov, struct iovec *,
    903   1.6       eeh 		       sizeof(struct iovec) * (u_int)msg.msg_iovlen, M_IOV,
    904   1.6       eeh 		       M_WAITOK);
    905   1.6       eeh 	} else if ((u_int)msg.msg_iovlen > 0)
    906   1.6       eeh 		iov = aiov;
    907   1.6       eeh 	else
    908   1.6       eeh 		return (EMSGSIZE);
    909  1.10       mrg 	error = netbsd32_to_iovecin((struct netbsd32_iovec *)msg.msg_iov,
    910   1.6       eeh 				   iov, msg.msg_iovlen);
    911   1.6       eeh 	if (error)
    912   1.6       eeh 		goto done;
    913   1.6       eeh 	msg.msg_iov = iov;
    914   1.6       eeh #ifdef COMPAT_OLDSOCK
    915   1.6       eeh 	msg.msg_flags = 0;
    916   1.6       eeh #endif
    917   1.6       eeh 	/* Luckily we can use this directly */
    918   1.6       eeh 	error = sendit(p, SCARG(uap, s), &msg, SCARG(uap, flags), retval);
    919   1.6       eeh done:
    920   1.6       eeh 	if (iov != aiov)
    921   1.6       eeh 		FREE(iov, M_IOV);
    922   1.1       mrg 	return (error);
    923   1.1       mrg }
    924   1.1       mrg 
    925  1.56       mrg /* XXX MOVE ME XXX */
    926   1.1       mrg int
    927  1.19       eeh netbsd32_recvfrom(p, v, retval)
    928   1.1       mrg 	struct proc *p;
    929   1.1       mrg 	void *v;
    930   1.1       mrg 	register_t *retval;
    931   1.1       mrg {
    932  1.19       eeh 	struct netbsd32_recvfrom_args /* {
    933   1.1       mrg 		syscallarg(int) s;
    934  1.10       mrg 		syscallarg(netbsd32_voidp) buf;
    935  1.10       mrg 		syscallarg(netbsd32_size_t) len;
    936   1.1       mrg 		syscallarg(int) flags;
    937  1.10       mrg 		syscallarg(netbsd32_sockaddrp_t) from;
    938  1.10       mrg 		syscallarg(netbsd32_intp) fromlenaddr;
    939   1.1       mrg 	} */ *uap = v;
    940  1.10       mrg 	struct netbsd32_msghdr msg;
    941   1.6       eeh 	struct iovec aiov;
    942   1.1       mrg 	int error;
    943   1.1       mrg 
    944   1.6       eeh 	if (SCARG(uap, fromlenaddr)) {
    945   1.6       eeh 		error = copyin((caddr_t)(u_long)SCARG(uap, fromlenaddr),
    946   1.6       eeh 			       (caddr_t)&msg.msg_namelen,
    947   1.6       eeh 			       sizeof(msg.msg_namelen));
    948   1.6       eeh 		if (error)
    949   1.6       eeh 			return (error);
    950   1.6       eeh 	} else
    951   1.6       eeh 		msg.msg_namelen = 0;
    952   1.6       eeh 	msg.msg_name = SCARG(uap, from);
    953  1.51       mrg 	msg.msg_iov = NULL; /* ignored in recvit32(), uses iov */
    954   1.6       eeh 	msg.msg_iovlen = 1;
    955   1.6       eeh 	aiov.iov_base = (caddr_t)(u_long)SCARG(uap, buf);
    956   1.6       eeh 	aiov.iov_len = (u_long)SCARG(uap, len);
    957   1.6       eeh 	msg.msg_control = 0;
    958   1.6       eeh 	msg.msg_flags = SCARG(uap, flags);
    959   1.6       eeh 	return (recvit32(p, SCARG(uap, s), &msg, &aiov,
    960   1.6       eeh 		       (caddr_t)(u_long)SCARG(uap, fromlenaddr), retval));
    961   1.1       mrg }
    962   1.1       mrg 
    963  1.56       mrg /* XXX MOVE ME XXX */
    964   1.1       mrg int
    965  1.19       eeh netbsd32_sendto(p, v, retval)
    966   1.1       mrg 	struct proc *p;
    967   1.1       mrg 	void *v;
    968   1.1       mrg 	register_t *retval;
    969   1.1       mrg {
    970  1.19       eeh 	struct netbsd32_sendto_args /* {
    971   1.1       mrg 		syscallarg(int) s;
    972  1.10       mrg 		syscallarg(const netbsd32_voidp) buf;
    973  1.10       mrg 		syscallarg(netbsd32_size_t) len;
    974   1.1       mrg 		syscallarg(int) flags;
    975  1.10       mrg 		syscallarg(const netbsd32_sockaddrp_t) to;
    976   1.1       mrg 		syscallarg(int) tolen;
    977   1.1       mrg 	} */ *uap = v;
    978   1.6       eeh 	struct msghdr msg;
    979   1.6       eeh 	struct iovec aiov;
    980   1.1       mrg 
    981   1.6       eeh 	msg.msg_name = (caddr_t)(u_long)SCARG(uap, to);		/* XXX kills const */
    982   1.6       eeh 	msg.msg_namelen = SCARG(uap, tolen);
    983   1.6       eeh 	msg.msg_iov = &aiov;
    984   1.6       eeh 	msg.msg_iovlen = 1;
    985   1.6       eeh 	msg.msg_control = 0;
    986   1.6       eeh #ifdef COMPAT_OLDSOCK
    987   1.6       eeh 	msg.msg_flags = 0;
    988   1.6       eeh #endif
    989   1.6       eeh 	aiov.iov_base = (char *)(u_long)SCARG(uap, buf);	/* XXX kills const */
    990   1.6       eeh 	aiov.iov_len = SCARG(uap, len);
    991   1.6       eeh 	return (sendit(p, SCARG(uap, s), &msg, SCARG(uap, flags), retval));
    992   1.1       mrg }
    993   1.1       mrg 
    994   1.1       mrg int
    995  1.19       eeh netbsd32_accept(p, v, retval)
    996   1.1       mrg 	struct proc *p;
    997   1.1       mrg 	void *v;
    998   1.1       mrg 	register_t *retval;
    999   1.1       mrg {
   1000  1.19       eeh 	struct netbsd32_accept_args /* {
   1001   1.1       mrg 		syscallarg(int) s;
   1002  1.10       mrg 		syscallarg(netbsd32_sockaddrp_t) name;
   1003  1.10       mrg 		syscallarg(netbsd32_intp) anamelen;
   1004   1.1       mrg 	} */ *uap = v;
   1005   1.1       mrg 	struct sys_accept_args ua;
   1006   1.1       mrg 
   1007  1.11       mrg 	NETBSD32TO64_UAP(s);
   1008  1.11       mrg 	NETBSD32TOP_UAP(name, struct sockaddr);
   1009  1.11       mrg 	NETBSD32TOP_UAP(anamelen, int);
   1010   1.1       mrg 	return (sys_accept(p, &ua, retval));
   1011   1.1       mrg }
   1012   1.1       mrg 
   1013   1.1       mrg int
   1014  1.19       eeh netbsd32_getpeername(p, v, retval)
   1015   1.1       mrg 	struct proc *p;
   1016   1.1       mrg 	void *v;
   1017   1.1       mrg 	register_t *retval;
   1018   1.1       mrg {
   1019  1.19       eeh 	struct netbsd32_getpeername_args /* {
   1020   1.1       mrg 		syscallarg(int) fdes;
   1021  1.10       mrg 		syscallarg(netbsd32_sockaddrp_t) asa;
   1022  1.10       mrg 		syscallarg(netbsd32_intp) alen;
   1023   1.1       mrg 	} */ *uap = v;
   1024   1.1       mrg 	struct sys_getpeername_args ua;
   1025   1.1       mrg 
   1026  1.11       mrg 	NETBSD32TO64_UAP(fdes);
   1027  1.11       mrg 	NETBSD32TOP_UAP(asa, struct sockaddr);
   1028  1.11       mrg 	NETBSD32TOP_UAP(alen, int);
   1029   1.6       eeh /* NB: do the protocol specific sockaddrs need to be converted? */
   1030   1.1       mrg 	return (sys_getpeername(p, &ua, retval));
   1031   1.1       mrg }
   1032   1.1       mrg 
   1033   1.1       mrg int
   1034  1.19       eeh netbsd32_getsockname(p, v, retval)
   1035   1.1       mrg 	struct proc *p;
   1036   1.1       mrg 	void *v;
   1037   1.1       mrg 	register_t *retval;
   1038   1.1       mrg {
   1039  1.19       eeh 	struct netbsd32_getsockname_args /* {
   1040   1.1       mrg 		syscallarg(int) fdes;
   1041  1.10       mrg 		syscallarg(netbsd32_sockaddrp_t) asa;
   1042  1.10       mrg 		syscallarg(netbsd32_intp) alen;
   1043   1.1       mrg 	} */ *uap = v;
   1044   1.1       mrg 	struct sys_getsockname_args ua;
   1045   1.1       mrg 
   1046  1.11       mrg 	NETBSD32TO64_UAP(fdes);
   1047  1.11       mrg 	NETBSD32TOP_UAP(asa, struct sockaddr);
   1048  1.11       mrg 	NETBSD32TOP_UAP(alen, int);
   1049   1.1       mrg 	return (sys_getsockname(p, &ua, retval));
   1050   1.1       mrg }
   1051   1.1       mrg 
   1052   1.1       mrg int
   1053  1.19       eeh netbsd32_access(p, v, retval)
   1054   1.1       mrg 	struct proc *p;
   1055   1.1       mrg 	void *v;
   1056   1.1       mrg 	register_t *retval;
   1057   1.1       mrg {
   1058  1.19       eeh 	struct netbsd32_access_args /* {
   1059  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   1060   1.1       mrg 		syscallarg(int) flags;
   1061   1.1       mrg 	} */ *uap = v;
   1062   1.1       mrg 	struct sys_access_args ua;
   1063   1.1       mrg 	caddr_t sg;
   1064   1.1       mrg 
   1065  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   1066  1.11       mrg 	NETBSD32TO64_UAP(flags);
   1067   1.1       mrg 	sg = stackgap_init(p->p_emul);
   1068  1.41  jdolecek 	CHECK_ALT_EXIST(p, &sg, SCARG(&ua, path));
   1069   1.1       mrg 
   1070   1.1       mrg 	return (sys_access(p, &ua, retval));
   1071   1.1       mrg }
   1072   1.1       mrg 
   1073   1.1       mrg int
   1074  1.19       eeh netbsd32_chflags(p, v, retval)
   1075   1.1       mrg 	struct proc *p;
   1076   1.1       mrg 	void *v;
   1077   1.1       mrg 	register_t *retval;
   1078   1.1       mrg {
   1079  1.19       eeh 	struct netbsd32_chflags_args /* {
   1080  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   1081  1.10       mrg 		syscallarg(netbsd32_u_long) flags;
   1082   1.1       mrg 	} */ *uap = v;
   1083   1.1       mrg 	struct sys_chflags_args ua;
   1084   1.1       mrg 
   1085  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   1086  1.11       mrg 	NETBSD32TO64_UAP(flags);
   1087   1.1       mrg 
   1088   1.1       mrg 	return (sys_chflags(p, &ua, retval));
   1089   1.1       mrg }
   1090   1.1       mrg 
   1091   1.1       mrg int
   1092  1.19       eeh netbsd32_fchflags(p, v, retval)
   1093   1.1       mrg 	struct proc *p;
   1094   1.1       mrg 	void *v;
   1095   1.1       mrg 	register_t *retval;
   1096   1.1       mrg {
   1097  1.19       eeh 	struct netbsd32_fchflags_args /* {
   1098   1.1       mrg 		syscallarg(int) fd;
   1099  1.10       mrg 		syscallarg(netbsd32_u_long) flags;
   1100   1.1       mrg 	} */ *uap = v;
   1101   1.1       mrg 	struct sys_fchflags_args ua;
   1102   1.1       mrg 
   1103  1.11       mrg 	NETBSD32TO64_UAP(fd);
   1104  1.11       mrg 	NETBSD32TO64_UAP(flags);
   1105   1.1       mrg 
   1106   1.1       mrg 	return (sys_fchflags(p, &ua, retval));
   1107   1.1       mrg }
   1108   1.1       mrg 
   1109   1.1       mrg int
   1110  1.50       mrg netbsd32_lchflags(p, v, retval)
   1111  1.50       mrg 	struct proc *p;
   1112  1.50       mrg 	void *v;
   1113  1.50       mrg 	register_t *retval;
   1114  1.50       mrg {
   1115  1.50       mrg 	struct netbsd32_lchflags_args /* {
   1116  1.50       mrg 		syscallarg(int) fd;
   1117  1.50       mrg 		syscallarg(netbsd32_u_long) flags;
   1118  1.50       mrg 	} */ *uap = v;
   1119  1.50       mrg 	struct sys_lchflags_args ua;
   1120  1.50       mrg 
   1121  1.50       mrg 	NETBSD32TOP_UAP(path, const char);
   1122  1.50       mrg 	NETBSD32TO64_UAP(flags);
   1123  1.50       mrg 
   1124  1.50       mrg 	return (sys_lchflags(p, &ua, retval));
   1125  1.50       mrg }
   1126  1.50       mrg 
   1127  1.50       mrg int
   1128  1.19       eeh netbsd32_kill(p, v, retval)
   1129   1.6       eeh 	struct proc *p;
   1130   1.6       eeh 	void *v;
   1131   1.6       eeh 	register_t *retval;
   1132   1.6       eeh {
   1133  1.19       eeh 	struct netbsd32_kill_args /* {
   1134   1.6       eeh 		syscallarg(int) pid;
   1135   1.6       eeh 		syscallarg(int) signum;
   1136   1.6       eeh 	} */ *uap = v;
   1137   1.6       eeh 	struct sys_kill_args ua;
   1138   1.6       eeh 
   1139  1.11       mrg 	NETBSD32TO64_UAP(pid);
   1140  1.11       mrg 	NETBSD32TO64_UAP(signum);
   1141   1.6       eeh 
   1142   1.6       eeh 	return (sys_kill(p, &ua, retval));
   1143   1.6       eeh }
   1144   1.6       eeh 
   1145   1.6       eeh int
   1146  1.19       eeh netbsd32_dup(p, v, retval)
   1147   1.6       eeh 	struct proc *p;
   1148   1.6       eeh 	void *v;
   1149   1.6       eeh 	register_t *retval;
   1150   1.6       eeh {
   1151  1.19       eeh 	struct netbsd32_dup_args /* {
   1152   1.6       eeh 		syscallarg(int) fd;
   1153   1.6       eeh 	} */ *uap = v;
   1154   1.6       eeh 	struct sys_dup_args ua;
   1155   1.6       eeh 
   1156  1.11       mrg 	NETBSD32TO64_UAP(fd);
   1157   1.6       eeh 
   1158   1.6       eeh 	return (sys_dup(p, &ua, retval));
   1159   1.6       eeh }
   1160   1.6       eeh 
   1161   1.6       eeh int
   1162  1.19       eeh netbsd32_profil(p, v, retval)
   1163   1.1       mrg 	struct proc *p;
   1164   1.1       mrg 	void *v;
   1165   1.1       mrg 	register_t *retval;
   1166   1.1       mrg {
   1167  1.19       eeh 	struct netbsd32_profil_args /* {
   1168  1.10       mrg 		syscallarg(netbsd32_caddr_t) samples;
   1169  1.10       mrg 		syscallarg(netbsd32_size_t) size;
   1170  1.10       mrg 		syscallarg(netbsd32_u_long) offset;
   1171   1.1       mrg 		syscallarg(u_int) scale;
   1172   1.1       mrg 	} */ *uap = v;
   1173   1.1       mrg 	struct sys_profil_args ua;
   1174   1.1       mrg 
   1175  1.11       mrg 	NETBSD32TOX64_UAP(samples, caddr_t);
   1176  1.11       mrg 	NETBSD32TOX_UAP(size, size_t);
   1177  1.11       mrg 	NETBSD32TOX_UAP(offset, u_long);
   1178  1.11       mrg 	NETBSD32TO64_UAP(scale);
   1179   1.1       mrg 	return (sys_profil(p, &ua, retval));
   1180   1.1       mrg }
   1181   1.1       mrg 
   1182  1.42  jdolecek #ifdef KTRACE
   1183   1.1       mrg int
   1184  1.19       eeh netbsd32_ktrace(p, v, retval)
   1185   1.1       mrg 	struct proc *p;
   1186   1.1       mrg 	void *v;
   1187   1.1       mrg 	register_t *retval;
   1188   1.1       mrg {
   1189  1.19       eeh 	struct netbsd32_ktrace_args /* {
   1190  1.10       mrg 		syscallarg(const netbsd32_charp) fname;
   1191   1.1       mrg 		syscallarg(int) ops;
   1192   1.1       mrg 		syscallarg(int) facs;
   1193   1.1       mrg 		syscallarg(int) pid;
   1194   1.1       mrg 	} */ *uap = v;
   1195   1.1       mrg 	struct sys_ktrace_args ua;
   1196   1.1       mrg 
   1197  1.11       mrg 	NETBSD32TOP_UAP(fname, const char);
   1198  1.11       mrg 	NETBSD32TO64_UAP(ops);
   1199  1.11       mrg 	NETBSD32TO64_UAP(facs);
   1200  1.11       mrg 	NETBSD32TO64_UAP(pid);
   1201   1.1       mrg 	return (sys_ktrace(p, &ua, retval));
   1202   1.1       mrg }
   1203  1.42  jdolecek #endif /* KTRACE */
   1204  1.50       mrg 
   1205  1.50       mrg int
   1206  1.50       mrg netbsd32_utrace(p, v, retval)
   1207  1.50       mrg 	struct proc *p;
   1208  1.50       mrg 	void *v;
   1209  1.50       mrg 	register_t *retval;
   1210  1.50       mrg {
   1211  1.50       mrg 	struct netbsd32_utrace_args /* {
   1212  1.50       mrg 		syscallarg(const netbsd32_charp) label;
   1213  1.50       mrg 		syscallarg(netbsd32_voidp) addr;
   1214  1.50       mrg 		syscallarg(netbsd32_size_t) len;
   1215  1.50       mrg 	} */ *uap = v;
   1216  1.50       mrg 	struct sys_utrace_args ua;
   1217  1.50       mrg 
   1218  1.50       mrg 	NETBSD32TOP_UAP(label, const char);
   1219  1.50       mrg 	NETBSD32TOP_UAP(addr, void);
   1220  1.50       mrg 	NETBSD32TO64_UAP(len);
   1221  1.50       mrg 	return (sys_utrace(p, &ua, retval));
   1222  1.50       mrg }
   1223   1.1       mrg 
   1224  1.56       mrg /* XXX MOVE ME XXX */
   1225   1.1       mrg int
   1226  1.19       eeh netbsd32_sigaction(p, v, retval)
   1227   1.1       mrg 	struct proc *p;
   1228   1.1       mrg 	void *v;
   1229   1.1       mrg 	register_t *retval;
   1230   1.1       mrg {
   1231  1.19       eeh 	struct netbsd32_sigaction_args /* {
   1232   1.1       mrg 		syscallarg(int) signum;
   1233  1.10       mrg 		syscallarg(const netbsd32_sigactionp_t) nsa;
   1234  1.10       mrg 		syscallarg(netbsd32_sigactionp_t) osa;
   1235   1.1       mrg 	} */ *uap = v;
   1236   1.1       mrg 	struct sigaction nsa, osa;
   1237  1.10       mrg 	struct netbsd32_sigaction *sa32p, sa32;
   1238   1.1       mrg 	int error;
   1239   1.1       mrg 
   1240   1.1       mrg 	if (SCARG(uap, nsa)) {
   1241  1.10       mrg 		sa32p = (struct netbsd32_sigaction *)(u_long)SCARG(uap, nsa);
   1242   1.5       eeh 		if (copyin(sa32p, &sa32, sizeof(sa32)))
   1243   1.5       eeh 			return EFAULT;
   1244   1.5       eeh 		nsa.sa_handler = (void *)(u_long)sa32.sa_handler;
   1245   1.5       eeh 		nsa.sa_mask = sa32.sa_mask;
   1246   1.5       eeh 		nsa.sa_flags = sa32.sa_flags;
   1247   1.6       eeh 	}
   1248   1.6       eeh 	error = sigaction1(p, SCARG(uap, signum),
   1249   1.6       eeh 			   SCARG(uap, nsa) ? &nsa : 0,
   1250   1.6       eeh 			   SCARG(uap, osa) ? &osa : 0);
   1251   1.6       eeh 
   1252   1.1       mrg 	if (error)
   1253   1.1       mrg 		return (error);
   1254   1.1       mrg 
   1255   1.1       mrg 	if (SCARG(uap, osa)) {
   1256  1.10       mrg 		sa32.sa_handler = (netbsd32_sigactionp_t)(u_long)osa.sa_handler;
   1257   1.5       eeh 		sa32.sa_mask = osa.sa_mask;
   1258   1.5       eeh 		sa32.sa_flags = osa.sa_flags;
   1259  1.10       mrg 		sa32p = (struct netbsd32_sigaction *)(u_long)SCARG(uap, osa);
   1260   1.5       eeh 		if (copyout(&sa32, sa32p, sizeof(sa32)))
   1261   1.5       eeh 			return EFAULT;
   1262   1.1       mrg 	}
   1263   1.1       mrg 
   1264   1.1       mrg 	return (0);
   1265   1.1       mrg }
   1266   1.1       mrg 
   1267   1.1       mrg int
   1268  1.19       eeh netbsd32___getlogin(p, v, retval)
   1269   1.1       mrg 	struct proc *p;
   1270   1.1       mrg 	void *v;
   1271   1.1       mrg 	register_t *retval;
   1272   1.1       mrg {
   1273  1.19       eeh 	struct netbsd32___getlogin_args /* {
   1274  1.10       mrg 		syscallarg(netbsd32_charp) namebuf;
   1275   1.1       mrg 		syscallarg(u_int) namelen;
   1276   1.1       mrg 	} */ *uap = v;
   1277   1.1       mrg 	struct sys___getlogin_args ua;
   1278   1.1       mrg 
   1279  1.11       mrg 	NETBSD32TOP_UAP(namebuf, char);
   1280  1.11       mrg 	NETBSD32TO64_UAP(namelen);
   1281   1.1       mrg 	return (sys___getlogin(p, &ua, retval));
   1282   1.1       mrg }
   1283   1.1       mrg 
   1284   1.1       mrg int
   1285  1.19       eeh netbsd32_setlogin(p, v, retval)
   1286   1.1       mrg 	struct proc *p;
   1287   1.1       mrg 	void *v;
   1288   1.1       mrg 	register_t *retval;
   1289   1.1       mrg {
   1290  1.19       eeh 	struct netbsd32_setlogin_args /* {
   1291  1.10       mrg 		syscallarg(const netbsd32_charp) namebuf;
   1292   1.1       mrg 	} */ *uap = v;
   1293   1.1       mrg 	struct sys_setlogin_args ua;
   1294   1.1       mrg 
   1295  1.11       mrg 	NETBSD32TOP_UAP(namebuf, char);
   1296   1.1       mrg 	return (sys_setlogin(p, &ua, retval));
   1297   1.1       mrg }
   1298   1.1       mrg 
   1299   1.1       mrg int
   1300  1.19       eeh netbsd32_acct(p, v, retval)
   1301   1.1       mrg 	struct proc *p;
   1302   1.1       mrg 	void *v;
   1303   1.1       mrg 	register_t *retval;
   1304   1.1       mrg {
   1305  1.19       eeh 	struct netbsd32_acct_args /* {
   1306  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   1307   1.1       mrg 	} */ *uap = v;
   1308   1.1       mrg 	struct sys_acct_args ua;
   1309   1.1       mrg 
   1310  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   1311   1.1       mrg 	return (sys_acct(p, &ua, retval));
   1312   1.1       mrg }
   1313   1.1       mrg 
   1314   1.1       mrg int
   1315  1.19       eeh netbsd32_revoke(p, v, retval)
   1316   1.1       mrg 	struct proc *p;
   1317   1.1       mrg 	void *v;
   1318   1.1       mrg 	register_t *retval;
   1319   1.1       mrg {
   1320  1.19       eeh 	struct netbsd32_revoke_args /* {
   1321  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   1322   1.1       mrg 	} */ *uap = v;
   1323   1.1       mrg 	struct sys_revoke_args ua;
   1324   1.1       mrg 	caddr_t sg;
   1325   1.1       mrg 
   1326  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   1327   1.1       mrg 	sg = stackgap_init(p->p_emul);
   1328  1.41  jdolecek 	CHECK_ALT_EXIST(p, &sg, SCARG(&ua, path));
   1329   1.1       mrg 
   1330   1.1       mrg 	return (sys_revoke(p, &ua, retval));
   1331   1.1       mrg }
   1332   1.1       mrg 
   1333   1.1       mrg int
   1334  1.19       eeh netbsd32_symlink(p, v, retval)
   1335   1.1       mrg 	struct proc *p;
   1336   1.1       mrg 	void *v;
   1337   1.1       mrg 	register_t *retval;
   1338   1.1       mrg {
   1339  1.19       eeh 	struct netbsd32_symlink_args /* {
   1340  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   1341  1.10       mrg 		syscallarg(const netbsd32_charp) link;
   1342   1.1       mrg 	} */ *uap = v;
   1343   1.1       mrg 	struct sys_symlink_args ua;
   1344   1.1       mrg 
   1345  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   1346  1.11       mrg 	NETBSD32TOP_UAP(link, const char);
   1347   1.1       mrg 
   1348   1.1       mrg 	return (sys_symlink(p, &ua, retval));
   1349   1.1       mrg }
   1350   1.1       mrg 
   1351   1.1       mrg int
   1352  1.19       eeh netbsd32_readlink(p, v, retval)
   1353   1.1       mrg 	struct proc *p;
   1354   1.1       mrg 	void *v;
   1355   1.1       mrg 	register_t *retval;
   1356   1.1       mrg {
   1357  1.19       eeh 	struct netbsd32_readlink_args /* {
   1358  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   1359  1.10       mrg 		syscallarg(netbsd32_charp) buf;
   1360  1.10       mrg 		syscallarg(netbsd32_size_t) count;
   1361   1.1       mrg 	} */ *uap = v;
   1362   1.1       mrg 	struct sys_readlink_args ua;
   1363   1.1       mrg 	caddr_t sg;
   1364   1.1       mrg 
   1365  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   1366  1.11       mrg 	NETBSD32TOP_UAP(buf, char);
   1367  1.11       mrg 	NETBSD32TOX_UAP(count, size_t);
   1368   1.1       mrg 	sg = stackgap_init(p->p_emul);
   1369  1.48  jdolecek 	CHECK_ALT_SYMLINK(p, &sg, SCARG(&ua, path));
   1370   1.1       mrg 
   1371   1.1       mrg 	return (sys_readlink(p, &ua, retval));
   1372   1.1       mrg }
   1373   1.1       mrg 
   1374  1.56       mrg /* XXX MOVE ME XXX */
   1375  1.20       eeh /*
   1376  1.20       eeh  * Need to completly reimplement this syscall due to argument copying.
   1377  1.20       eeh  */
   1378  1.40  jdolecek /* ARGSUSED */
   1379   1.1       mrg int
   1380  1.19       eeh netbsd32_execve(p, v, retval)
   1381   1.1       mrg 	struct proc *p;
   1382   1.1       mrg 	void *v;
   1383   1.1       mrg 	register_t *retval;
   1384   1.1       mrg {
   1385  1.19       eeh 	struct netbsd32_execve_args /* {
   1386  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   1387  1.10       mrg 		syscallarg(netbsd32_charpp) argp;
   1388  1.10       mrg 		syscallarg(netbsd32_charpp) envp;
   1389   1.1       mrg 	} */ *uap = v;
   1390   1.1       mrg 	struct sys_execve_args ua;
   1391   1.1       mrg 	caddr_t sg;
   1392  1.49       mrg 
   1393  1.49       mrg 	NETBSD32TOP_UAP(path, const char);
   1394  1.49       mrg 	NETBSD32TOP_UAP(argp, char *);
   1395  1.49       mrg 	NETBSD32TOP_UAP(envp, char *);
   1396  1.49       mrg 	sg = stackgap_init(p->p_emul);
   1397  1.49       mrg 	CHECK_ALT_EXIST(p, &sg, SCARG(&ua, path));
   1398  1.49       mrg 
   1399  1.49       mrg 	return netbsd32_execve2(p, &ua, retval);
   1400  1.49       mrg }
   1401  1.49       mrg 
   1402  1.56       mrg /* XXX MOVE ME XXX */
   1403  1.49       mrg int
   1404  1.49       mrg netbsd32_execve2(p, uap, retval)
   1405  1.49       mrg 	struct proc *p;
   1406  1.49       mrg 	struct sys_execve_args *uap;
   1407  1.49       mrg 	register_t *retval;
   1408  1.49       mrg {
   1409  1.20       eeh 	/* Function args */
   1410  1.20       eeh 	int error, i;
   1411  1.20       eeh 	struct exec_package pack;
   1412  1.20       eeh 	struct nameidata nid;
   1413  1.20       eeh 	struct vattr attr;
   1414  1.20       eeh 	struct ucred *cred = p->p_ucred;
   1415  1.20       eeh 	char *argp;
   1416  1.20       eeh 	netbsd32_charp const *cpp;
   1417  1.20       eeh 	char *dp;
   1418  1.20       eeh 	netbsd32_charp sp;
   1419  1.20       eeh 	long argc, envc;
   1420  1.20       eeh 	size_t len;
   1421  1.20       eeh 	char *stack;
   1422  1.20       eeh 	struct ps_strings arginfo;
   1423  1.20       eeh 	struct vmspace *vm;
   1424  1.20       eeh 	char **tmpfap;
   1425  1.20       eeh 	int szsigcode;
   1426  1.40  jdolecek 	struct exec_vmcmd *base_vcp = NULL;
   1427   1.1       mrg 
   1428  1.51       mrg 	/*
   1429  1.51       mrg 	 * Init the namei data to point the file user's program name.
   1430  1.51       mrg 	 * This is done here rather than in check_exec(), so that it's
   1431  1.51       mrg 	 * possible to override this settings if any of makecmd/probe
   1432  1.51       mrg 	 * functions call check_exec() recursively - for example,
   1433  1.51       mrg 	 * see exec_script_makecmds().
   1434  1.51       mrg 	 */
   1435  1.49       mrg 	NDINIT(&nid, LOOKUP, NOFOLLOW, UIO_USERSPACE, SCARG(uap, path), p);
   1436  1.20       eeh 
   1437  1.20       eeh 	/*
   1438  1.20       eeh 	 * initialize the fields of the exec package.
   1439  1.20       eeh 	 */
   1440  1.49       mrg 	pack.ep_name = SCARG(uap, path);
   1441  1.39       mrg 	pack.ep_hdr = malloc(exec_maxhdrsz, M_EXEC, M_WAITOK);
   1442  1.20       eeh 	pack.ep_hdrlen = exec_maxhdrsz;
   1443  1.20       eeh 	pack.ep_hdrvalid = 0;
   1444  1.20       eeh 	pack.ep_ndp = &nid;
   1445  1.20       eeh 	pack.ep_emul_arg = NULL;
   1446  1.20       eeh 	pack.ep_vmcmds.evs_cnt = 0;
   1447  1.20       eeh 	pack.ep_vmcmds.evs_used = 0;
   1448  1.20       eeh 	pack.ep_vap = &attr;
   1449  1.20       eeh 	pack.ep_flags = 0;
   1450  1.20       eeh 
   1451  1.44  jdolecek 	lockmgr(&exec_lock, LK_SHARED, NULL);
   1452  1.44  jdolecek 
   1453  1.20       eeh 	/* see if we can run it. */
   1454  1.20       eeh 	if ((error = check_exec(p, &pack)) != 0)
   1455  1.20       eeh 		goto freehdr;
   1456  1.20       eeh 
   1457  1.20       eeh 	/* XXX -- THE FOLLOWING SECTION NEEDS MAJOR CLEANUP */
   1458  1.20       eeh 
   1459  1.20       eeh 	/* allocate an argument buffer */
   1460  1.20       eeh 	argp = (char *) uvm_km_valloc_wait(exec_map, NCARGS);
   1461  1.20       eeh #ifdef DIAGNOSTIC
   1462  1.20       eeh 	if (argp == (vaddr_t) 0)
   1463  1.20       eeh 		panic("execve: argp == NULL");
   1464  1.20       eeh #endif
   1465  1.20       eeh 	dp = argp;
   1466  1.20       eeh 	argc = 0;
   1467  1.20       eeh 
   1468  1.20       eeh 	/* copy the fake args list, if there's one, freeing it as we go */
   1469  1.20       eeh 	if (pack.ep_flags & EXEC_HASARGL) {
   1470  1.20       eeh 		tmpfap = pack.ep_fa;
   1471  1.20       eeh 		while (*tmpfap != NULL) {
   1472  1.20       eeh 			char *cp;
   1473  1.20       eeh 
   1474  1.20       eeh 			cp = *tmpfap;
   1475  1.20       eeh 			while (*cp)
   1476  1.20       eeh 				*dp++ = *cp++;
   1477  1.20       eeh 			dp++;
   1478  1.20       eeh 
   1479  1.20       eeh 			FREE(*tmpfap, M_EXEC);
   1480  1.20       eeh 			tmpfap++; argc++;
   1481  1.20       eeh 		}
   1482  1.20       eeh 		FREE(pack.ep_fa, M_EXEC);
   1483  1.20       eeh 		pack.ep_flags &= ~EXEC_HASARGL;
   1484  1.20       eeh 	}
   1485  1.20       eeh 
   1486  1.20       eeh 	/* Now get argv & environment */
   1487  1.49       mrg 	if (!(cpp = (netbsd32_charp *)SCARG(uap, argp))) {
   1488  1.20       eeh 		error = EINVAL;
   1489  1.20       eeh 		goto bad;
   1490  1.20       eeh 	}
   1491  1.20       eeh 
   1492  1.20       eeh 	if (pack.ep_flags & EXEC_SKIPARG)
   1493  1.20       eeh 		cpp++;
   1494  1.20       eeh 
   1495  1.20       eeh 	while (1) {
   1496  1.20       eeh 		len = argp + ARG_MAX - dp;
   1497  1.20       eeh 		if ((error = copyin(cpp, &sp, sizeof(sp))) != 0)
   1498  1.20       eeh 			goto bad;
   1499  1.20       eeh 		if (!sp)
   1500  1.20       eeh 			break;
   1501  1.20       eeh 		if ((error = copyinstr((char *)(u_long)sp, dp,
   1502  1.20       eeh 				       len, &len)) != 0) {
   1503  1.20       eeh 			if (error == ENAMETOOLONG)
   1504  1.20       eeh 				error = E2BIG;
   1505  1.20       eeh 			goto bad;
   1506  1.20       eeh 		}
   1507  1.20       eeh 		dp += len;
   1508  1.20       eeh 		cpp++;
   1509  1.20       eeh 		argc++;
   1510  1.20       eeh 	}
   1511  1.20       eeh 
   1512  1.20       eeh 	envc = 0;
   1513  1.20       eeh 	/* environment need not be there */
   1514  1.49       mrg 	if ((cpp = (netbsd32_charp *)SCARG(uap, envp)) != NULL ) {
   1515  1.20       eeh 		while (1) {
   1516  1.20       eeh 			len = argp + ARG_MAX - dp;
   1517  1.20       eeh 			if ((error = copyin(cpp, &sp, sizeof(sp))) != 0)
   1518  1.20       eeh 				goto bad;
   1519  1.20       eeh 			if (!sp)
   1520  1.20       eeh 				break;
   1521  1.20       eeh 			if ((error = copyinstr((char *)(u_long)sp,
   1522  1.20       eeh 					       dp, len, &len)) != 0) {
   1523  1.20       eeh 				if (error == ENAMETOOLONG)
   1524  1.20       eeh 					error = E2BIG;
   1525  1.20       eeh 				goto bad;
   1526  1.20       eeh 			}
   1527  1.20       eeh 			dp += len;
   1528  1.20       eeh 			cpp++;
   1529  1.20       eeh 			envc++;
   1530  1.20       eeh 		}
   1531  1.20       eeh 	}
   1532  1.20       eeh 
   1533  1.20       eeh 	dp = (char *) ALIGN(dp);
   1534  1.20       eeh 
   1535  1.39       mrg 	szsigcode = pack.ep_es->es_emul->e_esigcode -
   1536  1.39       mrg 	    pack.ep_es->es_emul->e_sigcode;
   1537  1.20       eeh 
   1538  1.20       eeh 	/* Now check if args & environ fit into new stack */
   1539  1.20       eeh 	if (pack.ep_flags & EXEC_32)
   1540  1.39       mrg 		len = ((argc + envc + 2 + pack.ep_es->es_arglen) *
   1541  1.39       mrg 		    sizeof(int) + sizeof(int) + dp + STACKGAPLEN +
   1542  1.39       mrg 		    szsigcode + sizeof(struct ps_strings)) - argp;
   1543  1.20       eeh 	else
   1544  1.39       mrg 		len = ((argc + envc + 2 + pack.ep_es->es_arglen) *
   1545  1.39       mrg 		    sizeof(char *) + sizeof(int) + dp + STACKGAPLEN +
   1546  1.39       mrg 		    szsigcode + sizeof(struct ps_strings)) - argp;
   1547  1.20       eeh 
   1548  1.20       eeh 	len = ALIGN(len);	/* make the stack "safely" aligned */
   1549  1.20       eeh 
   1550  1.20       eeh 	if (len > pack.ep_ssize) { /* in effect, compare to initial limit */
   1551  1.20       eeh 		error = ENOMEM;
   1552  1.20       eeh 		goto bad;
   1553  1.20       eeh 	}
   1554  1.20       eeh 
   1555  1.20       eeh 	/* adjust "active stack depth" for process VSZ */
   1556  1.20       eeh 	pack.ep_ssize = len;	/* maybe should go elsewhere, but... */
   1557  1.20       eeh 
   1558  1.20       eeh 	/*
   1559  1.20       eeh 	 * Do whatever is necessary to prepare the address space
   1560  1.20       eeh 	 * for remapping.  Note that this might replace the current
   1561  1.20       eeh 	 * vmspace with another!
   1562  1.20       eeh 	 */
   1563  1.55       eeh 	uvmspace_exec(p, VM_MIN_ADDRESS, (vaddr_t)pack.ep_minsaddr);
   1564  1.20       eeh 
   1565  1.20       eeh 	/* Now map address space */
   1566  1.20       eeh 	vm = p->p_vmspace;
   1567  1.20       eeh 	vm->vm_taddr = (char *) pack.ep_taddr;
   1568  1.20       eeh 	vm->vm_tsize = btoc(pack.ep_tsize);
   1569  1.20       eeh 	vm->vm_daddr = (char *) pack.ep_daddr;
   1570  1.20       eeh 	vm->vm_dsize = btoc(pack.ep_dsize);
   1571  1.20       eeh 	vm->vm_ssize = btoc(pack.ep_ssize);
   1572  1.20       eeh 	vm->vm_maxsaddr = (char *) pack.ep_maxsaddr;
   1573  1.38       eeh 	vm->vm_minsaddr = (char *) pack.ep_minsaddr;
   1574  1.20       eeh 
   1575  1.20       eeh 	/* create the new process's VM space by running the vmcmds */
   1576  1.20       eeh #ifdef DIAGNOSTIC
   1577  1.20       eeh 	if (pack.ep_vmcmds.evs_used == 0)
   1578  1.20       eeh 		panic("execve: no vmcmds");
   1579  1.20       eeh #endif
   1580  1.20       eeh 	for (i = 0; i < pack.ep_vmcmds.evs_used && !error; i++) {
   1581  1.20       eeh 		struct exec_vmcmd *vcp;
   1582  1.20       eeh 
   1583  1.20       eeh 		vcp = &pack.ep_vmcmds.evs_cmds[i];
   1584  1.40  jdolecek 		if (vcp->ev_flags & VMCMD_RELATIVE) {
   1585  1.40  jdolecek #ifdef DIAGNOSTIC
   1586  1.40  jdolecek 			if (base_vcp == NULL)
   1587  1.40  jdolecek 				panic("execve: relative vmcmd with no base");
   1588  1.40  jdolecek 			if (vcp->ev_flags & VMCMD_BASE)
   1589  1.40  jdolecek 				panic("execve: illegal base & relative vmcmd");
   1590  1.40  jdolecek #endif
   1591  1.40  jdolecek 			vcp->ev_addr += base_vcp->ev_addr;
   1592  1.40  jdolecek 		}
   1593  1.20       eeh 		error = (*vcp->ev_proc)(p, vcp);
   1594  1.40  jdolecek #ifdef DEBUG
   1595  1.40  jdolecek 		if (error) {
   1596  1.40  jdolecek 			if (i > 0)
   1597  1.40  jdolecek 				printf("vmcmd[%d] = %#lx/%#lx @ %#lx\n", i-1,
   1598  1.40  jdolecek 				       vcp[-1].ev_addr, vcp[-1].ev_len,
   1599  1.40  jdolecek 				       vcp[-1].ev_offset);
   1600  1.40  jdolecek 			printf("vmcmd[%d] = %#lx/%#lx @ %#lx\n", i,
   1601  1.40  jdolecek 			       vcp->ev_addr, vcp->ev_len, vcp->ev_offset);
   1602  1.40  jdolecek 		}
   1603  1.40  jdolecek #endif
   1604  1.40  jdolecek 		if (vcp->ev_flags & VMCMD_BASE)
   1605  1.40  jdolecek 			base_vcp = vcp;
   1606  1.20       eeh 	}
   1607  1.20       eeh 
   1608  1.20       eeh 	/* free the vmspace-creation commands, and release their references */
   1609  1.20       eeh 	kill_vmcmds(&pack.ep_vmcmds);
   1610  1.20       eeh 
   1611  1.20       eeh 	/* if an error happened, deallocate and punt */
   1612  1.40  jdolecek 	if (error) {
   1613  1.40  jdolecek #ifdef DEBUG
   1614  1.40  jdolecek 		printf("execve: vmcmd %i failed: %d\n", i-1, error);
   1615  1.40  jdolecek #endif
   1616  1.20       eeh 		goto exec_abort;
   1617  1.40  jdolecek 	}
   1618  1.20       eeh 
   1619  1.20       eeh 	/* remember information about the process */
   1620  1.20       eeh 	arginfo.ps_nargvstr = argc;
   1621  1.20       eeh 	arginfo.ps_nenvstr = envc;
   1622  1.20       eeh 
   1623  1.38       eeh 	stack = (char *) (vm->vm_minsaddr - len);
   1624  1.20       eeh 	/* Now copy argc, args & environ to new stack */
   1625  1.40  jdolecek 	if (!(*pack.ep_es->es_copyargs)(&pack, &arginfo, stack, argp)) {
   1626  1.40  jdolecek #ifdef DEBUG
   1627  1.40  jdolecek 		printf("execve: copyargs failed\n");
   1628  1.40  jdolecek #endif
   1629  1.20       eeh 		goto exec_abort;
   1630  1.40  jdolecek 	}
   1631  1.20       eeh 
   1632  1.38       eeh 	/* fill process ps_strings info */
   1633  1.38       eeh 	p->p_psstr = (struct ps_strings *)(stack - sizeof(struct ps_strings));
   1634  1.38       eeh 	p->p_psargv = offsetof(struct ps_strings, ps_argvstr);
   1635  1.38       eeh 	p->p_psnargv = offsetof(struct ps_strings, ps_nargvstr);
   1636  1.38       eeh 	p->p_psenv = offsetof(struct ps_strings, ps_envstr);
   1637  1.38       eeh 	p->p_psnenv = offsetof(struct ps_strings, ps_nenvstr);
   1638  1.38       eeh 
   1639  1.20       eeh 	/* copy out the process's ps_strings structure */
   1640  1.40  jdolecek 	if (copyout(&arginfo, (char *)p->p_psstr, sizeof(arginfo))) {
   1641  1.40  jdolecek #ifdef DEBUG
   1642  1.40  jdolecek 		printf("execve: ps_strings copyout failed\n");
   1643  1.40  jdolecek #endif
   1644  1.20       eeh 		goto exec_abort;
   1645  1.40  jdolecek 	}
   1646  1.20       eeh 
   1647  1.20       eeh 	/* copy out the process's signal trapoline code */
   1648  1.20       eeh 	if (szsigcode) {
   1649  1.39       mrg 		if (copyout((char *)pack.ep_es->es_emul->e_sigcode,
   1650  1.47  jdolecek 		    p->p_sigctx.ps_sigcode = (char *)p->p_psstr - szsigcode,
   1651  1.40  jdolecek 		    szsigcode)) {
   1652  1.40  jdolecek #ifdef DEBUG
   1653  1.40  jdolecek 			printf("execve: sig trampoline copyout failed\n");
   1654  1.40  jdolecek #endif
   1655  1.20       eeh 			goto exec_abort;
   1656  1.40  jdolecek 		}
   1657  1.20       eeh #ifdef PMAP_NEED_PROCWR
   1658  1.20       eeh 		/* This is code. Let the pmap do what is needed. */
   1659  1.20       eeh 		pmap_procwr(p, (vaddr_t)p->p_sigacts->ps_sigcode, szsigcode);
   1660  1.20       eeh #endif
   1661  1.20       eeh 	}
   1662  1.20       eeh 
   1663  1.20       eeh 	stopprofclock(p);	/* stop profiling */
   1664  1.20       eeh 	fdcloseexec(p);		/* handle close on exec */
   1665  1.20       eeh 	execsigs(p);		/* reset catched signals */
   1666  1.20       eeh 	p->p_ctxlink = NULL;	/* reset ucontext link */
   1667  1.20       eeh 
   1668  1.20       eeh 	/* set command name & other accounting info */
   1669  1.20       eeh 	len = min(nid.ni_cnd.cn_namelen, MAXCOMLEN);
   1670  1.20       eeh 	memcpy(p->p_comm, nid.ni_cnd.cn_nameptr, len);
   1671  1.20       eeh 	p->p_comm[len] = 0;
   1672  1.20       eeh 	p->p_acflag &= ~AFORK;
   1673  1.20       eeh 
   1674  1.20       eeh 	/* record proc's vnode, for use by procfs and others */
   1675  1.20       eeh         if (p->p_textvp)
   1676  1.20       eeh                 vrele(p->p_textvp);
   1677  1.20       eeh 	VREF(pack.ep_vp);
   1678  1.20       eeh 	p->p_textvp = pack.ep_vp;
   1679  1.20       eeh 
   1680  1.20       eeh 	p->p_flag |= P_EXEC;
   1681  1.20       eeh 	if (p->p_flag & P_PPWAIT) {
   1682  1.20       eeh 		p->p_flag &= ~P_PPWAIT;
   1683  1.20       eeh 		wakeup((caddr_t) p->p_pptr);
   1684  1.20       eeh 	}
   1685  1.20       eeh 
   1686  1.20       eeh 	/*
   1687  1.20       eeh 	 * deal with set[ug]id.
   1688  1.20       eeh 	 * MNT_NOSUID and P_TRACED have already been used to disable s[ug]id.
   1689  1.20       eeh 	 */
   1690  1.20       eeh 	if (((attr.va_mode & S_ISUID) != 0 && p->p_ucred->cr_uid != attr.va_uid)
   1691  1.20       eeh 	 || ((attr.va_mode & S_ISGID) != 0 && p->p_ucred->cr_gid != attr.va_gid)){
   1692  1.20       eeh 		p->p_ucred = crcopy(cred);
   1693  1.20       eeh #ifdef KTRACE
   1694  1.20       eeh 		/*
   1695  1.20       eeh 		 * If process is being ktraced, turn off - unless
   1696  1.20       eeh 		 * root set it.
   1697  1.20       eeh 		 */
   1698  1.20       eeh 		if (p->p_tracep && !(p->p_traceflag & KTRFAC_ROOT))
   1699  1.20       eeh 			ktrderef(p);
   1700  1.20       eeh #endif
   1701  1.20       eeh 		if (attr.va_mode & S_ISUID)
   1702  1.20       eeh 			p->p_ucred->cr_uid = attr.va_uid;
   1703  1.20       eeh 		if (attr.va_mode & S_ISGID)
   1704  1.20       eeh 			p->p_ucred->cr_gid = attr.va_gid;
   1705  1.20       eeh 		p_sugid(p);
   1706  1.20       eeh 	} else
   1707  1.20       eeh 		p->p_flag &= ~P_SUGID;
   1708  1.20       eeh 	p->p_cred->p_svuid = p->p_ucred->cr_uid;
   1709  1.20       eeh 	p->p_cred->p_svgid = p->p_ucred->cr_gid;
   1710  1.20       eeh 
   1711  1.40  jdolecek 	doexechooks(p);
   1712  1.40  jdolecek 
   1713  1.20       eeh 	uvm_km_free_wakeup(exec_map, (vaddr_t) argp, NCARGS);
   1714  1.20       eeh 
   1715  1.35   thorpej 	PNBUF_PUT(nid.ni_cnd.cn_pnbuf);
   1716  1.20       eeh 	vn_lock(pack.ep_vp, LK_EXCLUSIVE | LK_RETRY);
   1717  1.20       eeh 	VOP_CLOSE(pack.ep_vp, FREAD, cred, p);
   1718  1.20       eeh 	vput(pack.ep_vp);
   1719  1.20       eeh 
   1720  1.20       eeh 	/* setup new registers and do misc. setup. */
   1721  1.39       mrg 	(*pack.ep_es->es_setregs)(p, &pack, (u_long) stack);
   1722  1.20       eeh 
   1723  1.20       eeh 	if (p->p_flag & P_TRACED)
   1724  1.20       eeh 		psignal(p, SIGTRAP);
   1725  1.20       eeh 
   1726  1.39       mrg 	free(pack.ep_hdr, M_EXEC);
   1727  1.39       mrg 
   1728  1.39       mrg 	/*
   1729  1.39       mrg 	 * Call emulation specific exec hook. This can setup setup per-process
   1730  1.39       mrg 	 * p->p_emuldata or do any other per-process stuff an emulation needs.
   1731  1.39       mrg 	 *
   1732  1.39       mrg 	 * If we are executing process of different emulation than the
   1733  1.39       mrg 	 * original forked process, call e_proc_exit() of the old emulation
   1734  1.39       mrg 	 * first, then e_proc_exec() of new emulation. If the emulation is
   1735  1.39       mrg 	 * same, the exec hook code should deallocate any old emulation
   1736  1.39       mrg 	 * resources held previously by this process.
   1737  1.39       mrg 	 */
   1738  1.39       mrg 	if (p->p_emul && p->p_emul->e_proc_exit
   1739  1.39       mrg 	    && p->p_emul != pack.ep_es->es_emul)
   1740  1.39       mrg 		(*p->p_emul->e_proc_exit)(p);
   1741  1.39       mrg 
   1742  1.39       mrg 	/*
   1743  1.39       mrg 	 * Call exec hook. Emulation code may NOT store reference to anything
   1744  1.39       mrg 	 * from &pack.
   1745  1.39       mrg 	 */
   1746  1.39       mrg         if (pack.ep_es->es_emul->e_proc_exec)
   1747  1.39       mrg                 (*pack.ep_es->es_emul->e_proc_exec)(p, &pack);
   1748  1.39       mrg 
   1749  1.39       mrg 	/* update p_emul, the old value is no longer needed */
   1750  1.39       mrg 	p->p_emul = pack.ep_es->es_emul;
   1751  1.20       eeh 
   1752  1.20       eeh #ifdef KTRACE
   1753  1.20       eeh 	if (KTRPOINT(p, KTR_EMUL))
   1754  1.26  sommerfe 		ktremul(p);
   1755  1.20       eeh #endif
   1756  1.20       eeh 
   1757  1.44  jdolecek 	lockmgr(&exec_lock, LK_RELEASE, NULL);
   1758  1.44  jdolecek 
   1759  1.20       eeh 	return (EJUSTRETURN);
   1760  1.20       eeh 
   1761  1.20       eeh bad:
   1762  1.20       eeh 	/* free the vmspace-creation commands, and release their references */
   1763  1.20       eeh 	kill_vmcmds(&pack.ep_vmcmds);
   1764  1.20       eeh 	/* kill any opened file descriptor, if necessary */
   1765  1.20       eeh 	if (pack.ep_flags & EXEC_HASFD) {
   1766  1.20       eeh 		pack.ep_flags &= ~EXEC_HASFD;
   1767  1.20       eeh 		(void) fdrelease(p, pack.ep_fd);
   1768  1.20       eeh 	}
   1769  1.20       eeh 	/* close and put the exec'd file */
   1770  1.20       eeh 	vn_lock(pack.ep_vp, LK_EXCLUSIVE | LK_RETRY);
   1771  1.20       eeh 	VOP_CLOSE(pack.ep_vp, FREAD, cred, p);
   1772  1.20       eeh 	vput(pack.ep_vp);
   1773  1.35   thorpej 	PNBUF_PUT(nid.ni_cnd.cn_pnbuf);
   1774  1.20       eeh 	uvm_km_free_wakeup(exec_map, (vaddr_t) argp, NCARGS);
   1775  1.20       eeh 
   1776  1.20       eeh freehdr:
   1777  1.44  jdolecek 	lockmgr(&exec_lock, LK_RELEASE, NULL);
   1778  1.44  jdolecek 
   1779  1.39       mrg 	free(pack.ep_hdr, M_EXEC);
   1780  1.20       eeh 	return error;
   1781  1.20       eeh 
   1782  1.20       eeh exec_abort:
   1783  1.44  jdolecek 	lockmgr(&exec_lock, LK_RELEASE, NULL);
   1784  1.44  jdolecek 
   1785  1.20       eeh 	/*
   1786  1.20       eeh 	 * the old process doesn't exist anymore.  exit gracefully.
   1787  1.20       eeh 	 * get rid of the (new) address space we have created, if any, get rid
   1788  1.20       eeh 	 * of our namei data and vnode, and exit noting failure
   1789  1.20       eeh 	 */
   1790  1.20       eeh 	uvm_deallocate(&vm->vm_map, VM_MIN_ADDRESS,
   1791  1.20       eeh 		VM_MAXUSER_ADDRESS - VM_MIN_ADDRESS);
   1792  1.20       eeh 	if (pack.ep_emul_arg)
   1793  1.20       eeh 		FREE(pack.ep_emul_arg, M_TEMP);
   1794  1.35   thorpej 	PNBUF_PUT(nid.ni_cnd.cn_pnbuf);
   1795  1.20       eeh 	vn_lock(pack.ep_vp, LK_EXCLUSIVE | LK_RETRY);
   1796  1.20       eeh 	VOP_CLOSE(pack.ep_vp, FREAD, cred, p);
   1797  1.20       eeh 	vput(pack.ep_vp);
   1798  1.20       eeh 	uvm_km_free_wakeup(exec_map, (vaddr_t) argp, NCARGS);
   1799  1.40  jdolecek 	free(pack.ep_hdr, M_EXEC);
   1800  1.20       eeh 	exit1(p, W_EXITCODE(0, SIGABRT));
   1801  1.20       eeh 	exit1(p, -1);
   1802  1.20       eeh 
   1803  1.20       eeh 	/* NOTREACHED */
   1804  1.20       eeh 	return 0;
   1805   1.1       mrg }
   1806   1.1       mrg 
   1807   1.1       mrg int
   1808  1.19       eeh netbsd32_umask(p, v, retval)
   1809   1.6       eeh 	struct proc *p;
   1810   1.6       eeh 	void *v;
   1811   1.6       eeh 	register_t *retval;
   1812   1.6       eeh {
   1813  1.19       eeh 	struct netbsd32_umask_args /* {
   1814   1.6       eeh 		syscallarg(mode_t) newmask;
   1815   1.6       eeh 	} */ *uap = v;
   1816   1.6       eeh 	struct sys_umask_args ua;
   1817   1.6       eeh 
   1818  1.11       mrg 	NETBSD32TO64_UAP(newmask);
   1819   1.6       eeh 	return (sys_umask(p, &ua, retval));
   1820   1.6       eeh }
   1821   1.6       eeh 
   1822   1.6       eeh int
   1823  1.19       eeh netbsd32_chroot(p, v, retval)
   1824   1.1       mrg 	struct proc *p;
   1825   1.1       mrg 	void *v;
   1826   1.1       mrg 	register_t *retval;
   1827   1.1       mrg {
   1828  1.19       eeh 	struct netbsd32_chroot_args /* {
   1829  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   1830   1.1       mrg 	} */ *uap = v;
   1831   1.1       mrg 	struct sys_chroot_args ua;
   1832   1.1       mrg 
   1833  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   1834   1.1       mrg 	return (sys_chroot(p, &ua, retval));
   1835   1.1       mrg }
   1836   1.1       mrg 
   1837   1.1       mrg int
   1838  1.19       eeh netbsd32_sbrk(p, v, retval)
   1839   1.6       eeh 	struct proc *p;
   1840   1.6       eeh 	void *v;
   1841   1.6       eeh 	register_t *retval;
   1842   1.6       eeh {
   1843  1.19       eeh 	struct netbsd32_sbrk_args /* {
   1844   1.6       eeh 		syscallarg(int) incr;
   1845   1.6       eeh 	} */ *uap = v;
   1846   1.6       eeh 	struct sys_sbrk_args ua;
   1847   1.6       eeh 
   1848  1.11       mrg 	NETBSD32TO64_UAP(incr);
   1849   1.6       eeh 	return (sys_sbrk(p, &ua, retval));
   1850   1.6       eeh }
   1851   1.6       eeh 
   1852   1.6       eeh int
   1853  1.19       eeh netbsd32_sstk(p, v, retval)
   1854   1.6       eeh 	struct proc *p;
   1855   1.6       eeh 	void *v;
   1856   1.6       eeh 	register_t *retval;
   1857   1.6       eeh {
   1858  1.19       eeh 	struct netbsd32_sstk_args /* {
   1859   1.6       eeh 		syscallarg(int) incr;
   1860   1.6       eeh 	} */ *uap = v;
   1861   1.6       eeh 	struct sys_sstk_args ua;
   1862   1.6       eeh 
   1863  1.11       mrg 	NETBSD32TO64_UAP(incr);
   1864   1.6       eeh 	return (sys_sstk(p, &ua, retval));
   1865   1.6       eeh }
   1866   1.6       eeh 
   1867   1.6       eeh int
   1868  1.19       eeh netbsd32_munmap(p, v, retval)
   1869   1.1       mrg 	struct proc *p;
   1870   1.1       mrg 	void *v;
   1871   1.1       mrg 	register_t *retval;
   1872   1.1       mrg {
   1873  1.19       eeh 	struct netbsd32_munmap_args /* {
   1874  1.10       mrg 		syscallarg(netbsd32_voidp) addr;
   1875  1.10       mrg 		syscallarg(netbsd32_size_t) len;
   1876   1.1       mrg 	} */ *uap = v;
   1877   1.1       mrg 	struct sys_munmap_args ua;
   1878   1.1       mrg 
   1879  1.11       mrg 	NETBSD32TOP_UAP(addr, void);
   1880  1.11       mrg 	NETBSD32TOX_UAP(len, size_t);
   1881   1.1       mrg 	return (sys_munmap(p, &ua, retval));
   1882   1.1       mrg }
   1883   1.1       mrg 
   1884   1.1       mrg int
   1885  1.19       eeh netbsd32_mprotect(p, v, retval)
   1886   1.1       mrg 	struct proc *p;
   1887   1.1       mrg 	void *v;
   1888   1.1       mrg 	register_t *retval;
   1889   1.1       mrg {
   1890  1.19       eeh 	struct netbsd32_mprotect_args /* {
   1891  1.10       mrg 		syscallarg(netbsd32_voidp) addr;
   1892  1.10       mrg 		syscallarg(netbsd32_size_t) len;
   1893   1.1       mrg 		syscallarg(int) prot;
   1894   1.1       mrg 	} */ *uap = v;
   1895   1.1       mrg 	struct sys_mprotect_args ua;
   1896   1.1       mrg 
   1897  1.11       mrg 	NETBSD32TOP_UAP(addr, void);
   1898  1.11       mrg 	NETBSD32TOX_UAP(len, size_t);
   1899  1.11       mrg 	NETBSD32TO64_UAP(prot);
   1900   1.1       mrg 	return (sys_mprotect(p, &ua, retval));
   1901   1.1       mrg }
   1902   1.1       mrg 
   1903   1.1       mrg int
   1904  1.19       eeh netbsd32_madvise(p, v, retval)
   1905   1.1       mrg 	struct proc *p;
   1906   1.1       mrg 	void *v;
   1907   1.1       mrg 	register_t *retval;
   1908   1.1       mrg {
   1909  1.19       eeh 	struct netbsd32_madvise_args /* {
   1910  1.10       mrg 		syscallarg(netbsd32_voidp) addr;
   1911  1.10       mrg 		syscallarg(netbsd32_size_t) len;
   1912   1.1       mrg 		syscallarg(int) behav;
   1913   1.1       mrg 	} */ *uap = v;
   1914   1.1       mrg 	struct sys_madvise_args ua;
   1915   1.1       mrg 
   1916  1.11       mrg 	NETBSD32TOP_UAP(addr, void);
   1917  1.11       mrg 	NETBSD32TOX_UAP(len, size_t);
   1918  1.11       mrg 	NETBSD32TO64_UAP(behav);
   1919   1.1       mrg 	return (sys_madvise(p, &ua, retval));
   1920   1.1       mrg }
   1921   1.1       mrg 
   1922   1.1       mrg int
   1923  1.19       eeh netbsd32_mincore(p, v, retval)
   1924   1.1       mrg 	struct proc *p;
   1925   1.1       mrg 	void *v;
   1926   1.1       mrg 	register_t *retval;
   1927   1.1       mrg {
   1928  1.19       eeh 	struct netbsd32_mincore_args /* {
   1929  1.10       mrg 		syscallarg(netbsd32_caddr_t) addr;
   1930  1.10       mrg 		syscallarg(netbsd32_size_t) len;
   1931  1.10       mrg 		syscallarg(netbsd32_charp) vec;
   1932   1.1       mrg 	} */ *uap = v;
   1933   1.1       mrg 	struct sys_mincore_args ua;
   1934   1.1       mrg 
   1935  1.11       mrg 	NETBSD32TOX64_UAP(addr, caddr_t);
   1936  1.11       mrg 	NETBSD32TOX_UAP(len, size_t);
   1937  1.11       mrg 	NETBSD32TOP_UAP(vec, char);
   1938   1.1       mrg 	return (sys_mincore(p, &ua, retval));
   1939   1.1       mrg }
   1940   1.1       mrg 
   1941  1.56       mrg /* XXX MOVE ME XXX */
   1942   1.1       mrg int
   1943  1.19       eeh netbsd32_getgroups(p, v, retval)
   1944   1.1       mrg 	struct proc *p;
   1945   1.1       mrg 	void *v;
   1946   1.1       mrg 	register_t *retval;
   1947   1.1       mrg {
   1948  1.19       eeh 	struct netbsd32_getgroups_args /* {
   1949   1.1       mrg 		syscallarg(int) gidsetsize;
   1950  1.10       mrg 		syscallarg(netbsd32_gid_tp) gidset;
   1951   1.1       mrg 	} */ *uap = v;
   1952  1.25  augustss 	struct pcred *pc = p->p_cred;
   1953  1.25  augustss 	int ngrp;
   1954   1.6       eeh 	int error;
   1955   1.1       mrg 
   1956   1.6       eeh 	ngrp = SCARG(uap, gidsetsize);
   1957   1.6       eeh 	if (ngrp == 0) {
   1958   1.6       eeh 		*retval = pc->pc_ucred->cr_ngroups;
   1959   1.6       eeh 		return (0);
   1960   1.6       eeh 	}
   1961   1.6       eeh 	if (ngrp < pc->pc_ucred->cr_ngroups)
   1962   1.6       eeh 		return (EINVAL);
   1963   1.6       eeh 	ngrp = pc->pc_ucred->cr_ngroups;
   1964  1.10       mrg 	/* Should convert gid_t to netbsd32_gid_t, but they're the same */
   1965   1.6       eeh 	error = copyout((caddr_t)pc->pc_ucred->cr_groups,
   1966   1.6       eeh 			(caddr_t)(u_long)SCARG(uap, gidset),
   1967   1.6       eeh 			ngrp * sizeof(gid_t));
   1968   1.6       eeh 	if (error)
   1969   1.6       eeh 		return (error);
   1970   1.6       eeh 	*retval = ngrp;
   1971   1.6       eeh 	return (0);
   1972   1.1       mrg }
   1973   1.1       mrg 
   1974   1.1       mrg int
   1975  1.19       eeh netbsd32_setgroups(p, v, retval)
   1976   1.1       mrg 	struct proc *p;
   1977   1.1       mrg 	void *v;
   1978   1.1       mrg 	register_t *retval;
   1979   1.1       mrg {
   1980  1.19       eeh 	struct netbsd32_setgroups_args /* {
   1981   1.1       mrg 		syscallarg(int) gidsetsize;
   1982  1.10       mrg 		syscallarg(const netbsd32_gid_tp) gidset;
   1983   1.1       mrg 	} */ *uap = v;
   1984   1.1       mrg 	struct sys_setgroups_args ua;
   1985   1.1       mrg 
   1986  1.11       mrg 	NETBSD32TO64_UAP(gidsetsize);
   1987  1.11       mrg 	NETBSD32TOP_UAP(gidset, gid_t);
   1988   1.1       mrg 	return (sys_setgroups(p, &ua, retval));
   1989   1.1       mrg }
   1990   1.1       mrg 
   1991   1.1       mrg int
   1992  1.19       eeh netbsd32_setpgid(p, v, retval)
   1993   1.6       eeh 	struct proc *p;
   1994   1.6       eeh 	void *v;
   1995   1.6       eeh 	register_t *retval;
   1996   1.6       eeh {
   1997  1.19       eeh 	struct netbsd32_setpgid_args /* {
   1998   1.6       eeh 		syscallarg(int) pid;
   1999   1.6       eeh 		syscallarg(int) pgid;
   2000   1.6       eeh 	} */ *uap = v;
   2001   1.6       eeh 	struct sys_setpgid_args ua;
   2002   1.6       eeh 
   2003  1.11       mrg 	NETBSD32TO64_UAP(pid);
   2004  1.11       mrg 	NETBSD32TO64_UAP(pgid);
   2005   1.6       eeh 	return (sys_setpgid(p, &ua, retval));
   2006   1.6       eeh }
   2007   1.6       eeh 
   2008  1.56       mrg /* XXX MOVE ME XXX */
   2009   1.6       eeh int
   2010  1.19       eeh netbsd32_setitimer(p, v, retval)
   2011   1.1       mrg 	struct proc *p;
   2012   1.1       mrg 	void *v;
   2013   1.1       mrg 	register_t *retval;
   2014   1.1       mrg {
   2015  1.19       eeh 	struct netbsd32_setitimer_args /* {
   2016   1.1       mrg 		syscallarg(int) which;
   2017  1.10       mrg 		syscallarg(const netbsd32_itimervalp_t) itv;
   2018  1.10       mrg 		syscallarg(netbsd32_itimervalp_t) oitv;
   2019   1.1       mrg 	} */ *uap = v;
   2020  1.10       mrg 	struct netbsd32_itimerval s32it, *itvp;
   2021   1.6       eeh 	int which = SCARG(uap, which);
   2022  1.19       eeh 	struct netbsd32_getitimer_args getargs;
   2023   1.6       eeh 	struct itimerval aitv;
   2024   1.6       eeh 	int s, error;
   2025   1.1       mrg 
   2026   1.6       eeh 	if ((u_int)which > ITIMER_PROF)
   2027   1.6       eeh 		return (EINVAL);
   2028  1.10       mrg 	itvp = (struct netbsd32_itimerval *)(u_long)SCARG(uap, itv);
   2029   1.6       eeh 	if (itvp && (error = copyin(itvp, &s32it, sizeof(s32it))))
   2030   1.6       eeh 		return (error);
   2031  1.10       mrg 	netbsd32_to_itimerval(&s32it, &aitv);
   2032   1.6       eeh 	if (SCARG(uap, oitv) != NULL) {
   2033   1.6       eeh 		SCARG(&getargs, which) = which;
   2034   1.6       eeh 		SCARG(&getargs, itv) = SCARG(uap, oitv);
   2035  1.19       eeh 		if ((error = netbsd32_getitimer(p, &getargs, retval)) != 0)
   2036   1.6       eeh 			return (error);
   2037   1.6       eeh 	}
   2038   1.6       eeh 	if (itvp == 0)
   2039   1.6       eeh 		return (0);
   2040   1.6       eeh 	if (itimerfix(&aitv.it_value) || itimerfix(&aitv.it_interval))
   2041   1.6       eeh 		return (EINVAL);
   2042   1.6       eeh 	s = splclock();
   2043   1.6       eeh 	if (which == ITIMER_REAL) {
   2044  1.24   thorpej 		callout_stop(&p->p_realit_ch);
   2045   1.6       eeh 		if (timerisset(&aitv.it_value)) {
   2046  1.33   thorpej 			/*
   2047  1.33   thorpej 			 * Don't need to check hzto() return value, here.
   2048  1.33   thorpej 			 * callout_reset() does it for us.
   2049  1.33   thorpej 			 */
   2050   1.6       eeh 			timeradd(&aitv.it_value, &time, &aitv.it_value);
   2051  1.24   thorpej 			callout_reset(&p->p_realit_ch, hzto(&aitv.it_value),
   2052  1.24   thorpej 			    realitexpire, p);
   2053   1.6       eeh 		}
   2054   1.6       eeh 		p->p_realtimer = aitv;
   2055   1.1       mrg 	} else
   2056   1.6       eeh 		p->p_stats->p_timer[which] = aitv;
   2057   1.6       eeh 	splx(s);
   2058   1.6       eeh 	return (0);
   2059   1.6       eeh }
   2060   1.1       mrg 
   2061  1.56       mrg /* XXX MOVE ME XXX */
   2062   1.1       mrg int
   2063  1.19       eeh netbsd32_getitimer(p, v, retval)
   2064   1.1       mrg 	struct proc *p;
   2065   1.1       mrg 	void *v;
   2066   1.1       mrg 	register_t *retval;
   2067   1.1       mrg {
   2068  1.19       eeh 	struct netbsd32_getitimer_args /* {
   2069   1.1       mrg 		syscallarg(int) which;
   2070  1.10       mrg 		syscallarg(netbsd32_itimervalp_t) itv;
   2071   1.1       mrg 	} */ *uap = v;
   2072   1.6       eeh 	int which = SCARG(uap, which);
   2073  1.10       mrg 	struct netbsd32_itimerval s32it;
   2074   1.6       eeh 	struct itimerval aitv;
   2075   1.6       eeh 	int s;
   2076   1.1       mrg 
   2077   1.6       eeh 	if ((u_int)which > ITIMER_PROF)
   2078   1.6       eeh 		return (EINVAL);
   2079   1.6       eeh 	s = splclock();
   2080   1.6       eeh 	if (which == ITIMER_REAL) {
   2081   1.6       eeh 		/*
   2082   1.6       eeh 		 * Convert from absolute to relative time in .it_value
   2083   1.6       eeh 		 * part of real time timer.  If time for real time timer
   2084   1.6       eeh 		 * has passed return 0, else return difference between
   2085   1.6       eeh 		 * current time and time for the timer to go off.
   2086   1.6       eeh 		 */
   2087   1.6       eeh 		aitv = p->p_realtimer;
   2088   1.6       eeh 		if (timerisset(&aitv.it_value)) {
   2089   1.6       eeh 			if (timercmp(&aitv.it_value, &time, <))
   2090   1.6       eeh 				timerclear(&aitv.it_value);
   2091   1.6       eeh 			else
   2092   1.6       eeh 				timersub(&aitv.it_value, &time, &aitv.it_value);
   2093   1.6       eeh 		}
   2094   1.6       eeh 	} else
   2095   1.6       eeh 		aitv = p->p_stats->p_timer[which];
   2096   1.6       eeh 	splx(s);
   2097  1.10       mrg 	netbsd32_from_itimerval(&aitv, &s32it);
   2098   1.6       eeh 	return (copyout(&s32it, (caddr_t)(u_long)SCARG(uap, itv), sizeof(s32it)));
   2099   1.1       mrg }
   2100   1.1       mrg 
   2101   1.1       mrg int
   2102  1.19       eeh netbsd32_fcntl(p, v, retval)
   2103   1.1       mrg 	struct proc *p;
   2104   1.1       mrg 	void *v;
   2105   1.1       mrg 	register_t *retval;
   2106   1.1       mrg {
   2107  1.19       eeh 	struct netbsd32_fcntl_args /* {
   2108   1.1       mrg 		syscallarg(int) fd;
   2109   1.1       mrg 		syscallarg(int) cmd;
   2110  1.10       mrg 		syscallarg(netbsd32_voidp) arg;
   2111   1.1       mrg 	} */ *uap = v;
   2112   1.1       mrg 	struct sys_fcntl_args ua;
   2113   1.1       mrg 
   2114  1.11       mrg 	NETBSD32TO64_UAP(fd);
   2115  1.11       mrg 	NETBSD32TO64_UAP(cmd);
   2116  1.11       mrg 	NETBSD32TOP_UAP(arg, void);
   2117  1.54       mrg 	/* we can do this because `struct flock' doesn't change */
   2118   1.1       mrg 	return (sys_fcntl(p, &ua, retval));
   2119   1.1       mrg }
   2120   1.1       mrg 
   2121   1.1       mrg int
   2122  1.19       eeh netbsd32_dup2(p, v, retval)
   2123   1.6       eeh 	struct proc *p;
   2124   1.6       eeh 	void *v;
   2125   1.6       eeh 	register_t *retval;
   2126   1.6       eeh {
   2127  1.19       eeh 	struct netbsd32_dup2_args /* {
   2128   1.6       eeh 		syscallarg(int) from;
   2129   1.6       eeh 		syscallarg(int) to;
   2130   1.6       eeh 	} */ *uap = v;
   2131   1.6       eeh 	struct sys_dup2_args ua;
   2132   1.6       eeh 
   2133  1.11       mrg 	NETBSD32TO64_UAP(from);
   2134  1.11       mrg 	NETBSD32TO64_UAP(to);
   2135   1.6       eeh 	return (sys_dup2(p, &ua, retval));
   2136   1.6       eeh }
   2137   1.6       eeh 
   2138  1.56       mrg /* XXX MOVE ME XXX */
   2139   1.6       eeh int
   2140  1.19       eeh netbsd32_select(p, v, retval)
   2141   1.1       mrg 	struct proc *p;
   2142   1.1       mrg 	void *v;
   2143   1.1       mrg 	register_t *retval;
   2144   1.1       mrg {
   2145  1.19       eeh 	struct netbsd32_select_args /* {
   2146   1.1       mrg 		syscallarg(int) nd;
   2147  1.10       mrg 		syscallarg(netbsd32_fd_setp_t) in;
   2148  1.10       mrg 		syscallarg(netbsd32_fd_setp_t) ou;
   2149  1.10       mrg 		syscallarg(netbsd32_fd_setp_t) ex;
   2150  1.10       mrg 		syscallarg(netbsd32_timevalp_t) tv;
   2151   1.1       mrg 	} */ *uap = v;
   2152   1.6       eeh /* This one must be done in-line 'cause of the timeval */
   2153  1.10       mrg 	struct netbsd32_timeval tv32;
   2154   1.6       eeh 	caddr_t bits;
   2155   1.6       eeh 	char smallbits[howmany(FD_SETSIZE, NFDBITS) * sizeof(fd_mask) * 6];
   2156   1.6       eeh 	struct timeval atv;
   2157   1.6       eeh 	int s, ncoll, error = 0, timo;
   2158   1.6       eeh 	size_t ni;
   2159   1.6       eeh 	extern int	selwait, nselcoll;
   2160   1.6       eeh 	extern int selscan __P((struct proc *, fd_mask *, fd_mask *, int, register_t *));
   2161   1.1       mrg 
   2162   1.6       eeh 	if (SCARG(uap, nd) < 0)
   2163   1.6       eeh 		return (EINVAL);
   2164   1.6       eeh 	if (SCARG(uap, nd) > p->p_fd->fd_nfiles) {
   2165   1.6       eeh 		/* forgiving; slightly wrong */
   2166   1.6       eeh 		SCARG(uap, nd) = p->p_fd->fd_nfiles;
   2167   1.5       eeh 	}
   2168   1.6       eeh 	ni = howmany(SCARG(uap, nd), NFDBITS) * sizeof(fd_mask);
   2169   1.6       eeh 	if (ni * 6 > sizeof(smallbits))
   2170   1.6       eeh 		bits = malloc(ni * 6, M_TEMP, M_WAITOK);
   2171   1.6       eeh 	else
   2172   1.6       eeh 		bits = smallbits;
   2173   1.1       mrg 
   2174   1.6       eeh #define	getbits(name, x) \
   2175   1.6       eeh 	if (SCARG(uap, name)) { \
   2176   1.6       eeh 		error = copyin((caddr_t)(u_long)SCARG(uap, name), bits + ni * x, ni); \
   2177   1.6       eeh 		if (error) \
   2178   1.6       eeh 			goto done; \
   2179   1.6       eeh 	} else \
   2180   1.6       eeh 		memset(bits + ni * x, 0, ni);
   2181   1.6       eeh 	getbits(in, 0);
   2182   1.6       eeh 	getbits(ou, 1);
   2183   1.6       eeh 	getbits(ex, 2);
   2184   1.6       eeh #undef	getbits
   2185   1.6       eeh 
   2186   1.6       eeh 	if (SCARG(uap, tv)) {
   2187   1.6       eeh 		error = copyin((caddr_t)(u_long)SCARG(uap, tv), (caddr_t)&tv32,
   2188   1.6       eeh 			sizeof(tv32));
   2189   1.6       eeh 		if (error)
   2190   1.6       eeh 			goto done;
   2191  1.10       mrg 		netbsd32_to_timeval(&tv32, &atv);
   2192   1.6       eeh 		if (itimerfix(&atv)) {
   2193   1.6       eeh 			error = EINVAL;
   2194   1.6       eeh 			goto done;
   2195   1.6       eeh 		}
   2196   1.6       eeh 		s = splclock();
   2197   1.6       eeh 		timeradd(&atv, &time, &atv);
   2198   1.6       eeh 		splx(s);
   2199   1.6       eeh 	} else
   2200   1.6       eeh 		timo = 0;
   2201   1.6       eeh retry:
   2202   1.6       eeh 	ncoll = nselcoll;
   2203   1.6       eeh 	p->p_flag |= P_SELECT;
   2204   1.6       eeh 	error = selscan(p, (fd_mask *)(bits + ni * 0),
   2205   1.6       eeh 			   (fd_mask *)(bits + ni * 3), SCARG(uap, nd), retval);
   2206   1.6       eeh 	if (error || *retval)
   2207   1.6       eeh 		goto done;
   2208  1.33   thorpej 	if (SCARG(uap, tv)) {
   2209  1.33   thorpej 		/*
   2210  1.33   thorpej 		 * We have to recalculate the timeout on every retry.
   2211  1.33   thorpej 		 */
   2212  1.33   thorpej 		timo = hzto(&atv);
   2213  1.33   thorpej 		if (timo <= 0)
   2214  1.33   thorpej 			goto done;
   2215  1.33   thorpej 	}
   2216   1.6       eeh 	s = splhigh();
   2217   1.6       eeh 	if ((p->p_flag & P_SELECT) == 0 || nselcoll != ncoll) {
   2218   1.6       eeh 		splx(s);
   2219   1.6       eeh 		goto retry;
   2220   1.6       eeh 	}
   2221   1.6       eeh 	p->p_flag &= ~P_SELECT;
   2222   1.6       eeh 	error = tsleep((caddr_t)&selwait, PSOCK | PCATCH, "select", timo);
   2223   1.6       eeh 	splx(s);
   2224   1.6       eeh 	if (error == 0)
   2225   1.6       eeh 		goto retry;
   2226   1.6       eeh done:
   2227   1.6       eeh 	p->p_flag &= ~P_SELECT;
   2228   1.6       eeh 	/* select is not restarted after signals... */
   2229   1.6       eeh 	if (error == ERESTART)
   2230   1.6       eeh 		error = EINTR;
   2231   1.6       eeh 	if (error == EWOULDBLOCK)
   2232   1.6       eeh 		error = 0;
   2233   1.6       eeh 	if (error == 0) {
   2234   1.6       eeh #define	putbits(name, x) \
   2235   1.6       eeh 		if (SCARG(uap, name)) { \
   2236   1.6       eeh 			error = copyout(bits + ni * x, (caddr_t)(u_long)SCARG(uap, name), ni); \
   2237   1.6       eeh 			if (error) \
   2238   1.6       eeh 				goto out; \
   2239   1.6       eeh 		}
   2240   1.6       eeh 		putbits(in, 3);
   2241   1.6       eeh 		putbits(ou, 4);
   2242   1.6       eeh 		putbits(ex, 5);
   2243   1.6       eeh #undef putbits
   2244   1.5       eeh 	}
   2245   1.6       eeh out:
   2246   1.6       eeh 	if (ni * 6 > sizeof(smallbits))
   2247   1.6       eeh 		free(bits, M_TEMP);
   2248   1.6       eeh 	return (error);
   2249   1.6       eeh }
   2250   1.6       eeh 
   2251   1.6       eeh int
   2252  1.19       eeh netbsd32_fsync(p, v, retval)
   2253   1.6       eeh 	struct proc *p;
   2254   1.6       eeh 	void *v;
   2255   1.6       eeh 	register_t *retval;
   2256   1.6       eeh {
   2257  1.19       eeh 	struct netbsd32_fsync_args /* {
   2258   1.6       eeh 		syscallarg(int) fd;
   2259   1.6       eeh 	} */ *uap = v;
   2260   1.6       eeh 	struct sys_fsync_args ua;
   2261   1.1       mrg 
   2262  1.11       mrg 	NETBSD32TO64_UAP(fd);
   2263   1.6       eeh 	return (sys_fsync(p, &ua, retval));
   2264   1.6       eeh }
   2265   1.6       eeh 
   2266   1.6       eeh int
   2267  1.19       eeh netbsd32_setpriority(p, v, retval)
   2268   1.6       eeh 	struct proc *p;
   2269   1.6       eeh 	void *v;
   2270   1.6       eeh 	register_t *retval;
   2271   1.6       eeh {
   2272  1.19       eeh 	struct netbsd32_setpriority_args /* {
   2273   1.6       eeh 		syscallarg(int) which;
   2274   1.6       eeh 		syscallarg(int) who;
   2275   1.6       eeh 		syscallarg(int) prio;
   2276   1.6       eeh 	} */ *uap = v;
   2277   1.6       eeh 	struct sys_setpriority_args ua;
   2278   1.6       eeh 
   2279  1.11       mrg 	NETBSD32TO64_UAP(which);
   2280  1.11       mrg 	NETBSD32TO64_UAP(who);
   2281  1.11       mrg 	NETBSD32TO64_UAP(prio);
   2282   1.6       eeh 	return (sys_setpriority(p, &ua, retval));
   2283   1.6       eeh }
   2284   1.6       eeh 
   2285   1.6       eeh int
   2286  1.19       eeh netbsd32_socket(p, v, retval)
   2287   1.6       eeh 	struct proc *p;
   2288   1.6       eeh 	void *v;
   2289   1.6       eeh 	register_t *retval;
   2290   1.6       eeh {
   2291  1.19       eeh 	struct netbsd32_socket_args /* {
   2292   1.6       eeh 		syscallarg(int) domain;
   2293   1.6       eeh 		syscallarg(int) type;
   2294   1.6       eeh 		syscallarg(int) protocol;
   2295   1.6       eeh 	} */ *uap = v;
   2296   1.6       eeh 	struct sys_socket_args ua;
   2297   1.6       eeh 
   2298  1.11       mrg 	NETBSD32TO64_UAP(domain);
   2299  1.11       mrg 	NETBSD32TO64_UAP(type);
   2300  1.11       mrg 	NETBSD32TO64_UAP(protocol);
   2301   1.6       eeh 	return (sys_socket(p, &ua, retval));
   2302   1.1       mrg }
   2303   1.1       mrg 
   2304   1.1       mrg int
   2305  1.19       eeh netbsd32_connect(p, v, retval)
   2306   1.1       mrg 	struct proc *p;
   2307   1.1       mrg 	void *v;
   2308   1.1       mrg 	register_t *retval;
   2309   1.1       mrg {
   2310  1.19       eeh 	struct netbsd32_connect_args /* {
   2311   1.1       mrg 		syscallarg(int) s;
   2312  1.10       mrg 		syscallarg(const netbsd32_sockaddrp_t) name;
   2313   1.1       mrg 		syscallarg(int) namelen;
   2314   1.1       mrg 	} */ *uap = v;
   2315   1.1       mrg 	struct sys_connect_args ua;
   2316   1.1       mrg 
   2317  1.11       mrg 	NETBSD32TO64_UAP(s);
   2318  1.11       mrg 	NETBSD32TOP_UAP(name, struct sockaddr);
   2319  1.11       mrg 	NETBSD32TO64_UAP(namelen);
   2320   1.1       mrg 	return (sys_connect(p, &ua, retval));
   2321   1.1       mrg }
   2322   1.1       mrg 
   2323   1.6       eeh int
   2324  1.19       eeh netbsd32_getpriority(p, v, retval)
   2325   1.6       eeh 	struct proc *p;
   2326   1.6       eeh 	void *v;
   2327   1.6       eeh 	register_t *retval;
   2328   1.6       eeh {
   2329  1.19       eeh 	struct netbsd32_getpriority_args /* {
   2330   1.6       eeh 		syscallarg(int) which;
   2331   1.6       eeh 		syscallarg(int) who;
   2332   1.6       eeh 	} */ *uap = v;
   2333   1.6       eeh 	struct sys_getpriority_args ua;
   2334   1.6       eeh 
   2335  1.11       mrg 	NETBSD32TO64_UAP(which);
   2336  1.11       mrg 	NETBSD32TO64_UAP(who);
   2337   1.6       eeh 	return (sys_getpriority(p, &ua, retval));
   2338   1.6       eeh }
   2339   1.6       eeh 
   2340   1.1       mrg int
   2341  1.19       eeh netbsd32_bind(p, v, retval)
   2342   1.1       mrg 	struct proc *p;
   2343   1.1       mrg 	void *v;
   2344   1.1       mrg 	register_t *retval;
   2345   1.1       mrg {
   2346  1.19       eeh 	struct netbsd32_bind_args /* {
   2347   1.1       mrg 		syscallarg(int) s;
   2348  1.10       mrg 		syscallarg(const netbsd32_sockaddrp_t) name;
   2349   1.1       mrg 		syscallarg(int) namelen;
   2350   1.1       mrg 	} */ *uap = v;
   2351   1.6       eeh 	struct sys_bind_args ua;
   2352   1.1       mrg 
   2353  1.11       mrg 	NETBSD32TO64_UAP(s);
   2354  1.11       mrg 	NETBSD32TOP_UAP(name, struct sockaddr);
   2355  1.11       mrg 	NETBSD32TO64_UAP(namelen);
   2356   1.6       eeh 	return (sys_bind(p, &ua, retval));
   2357   1.1       mrg }
   2358   1.1       mrg 
   2359   1.1       mrg int
   2360  1.19       eeh netbsd32_setsockopt(p, v, retval)
   2361   1.1       mrg 	struct proc *p;
   2362   1.1       mrg 	void *v;
   2363   1.1       mrg 	register_t *retval;
   2364   1.1       mrg {
   2365  1.19       eeh 	struct netbsd32_setsockopt_args /* {
   2366   1.1       mrg 		syscallarg(int) s;
   2367   1.1       mrg 		syscallarg(int) level;
   2368   1.1       mrg 		syscallarg(int) name;
   2369  1.10       mrg 		syscallarg(const netbsd32_voidp) val;
   2370   1.1       mrg 		syscallarg(int) valsize;
   2371   1.1       mrg 	} */ *uap = v;
   2372   1.1       mrg 	struct sys_setsockopt_args ua;
   2373   1.1       mrg 
   2374  1.11       mrg 	NETBSD32TO64_UAP(s);
   2375  1.11       mrg 	NETBSD32TO64_UAP(level);
   2376  1.11       mrg 	NETBSD32TO64_UAP(name);
   2377  1.11       mrg 	NETBSD32TOP_UAP(val, void);
   2378  1.11       mrg 	NETBSD32TO64_UAP(valsize);
   2379   1.6       eeh 	/* may be more efficient to do this inline. */
   2380   1.1       mrg 	return (sys_setsockopt(p, &ua, retval));
   2381   1.1       mrg }
   2382   1.1       mrg 
   2383   1.1       mrg int
   2384  1.19       eeh netbsd32_listen(p, v, retval)
   2385   1.6       eeh 	struct proc *p;
   2386   1.6       eeh 	void *v;
   2387   1.6       eeh 	register_t *retval;
   2388   1.6       eeh {
   2389  1.19       eeh 	struct netbsd32_listen_args /* {
   2390   1.6       eeh 		syscallarg(int) s;
   2391   1.6       eeh 		syscallarg(int) backlog;
   2392   1.6       eeh 	} */ *uap = v;
   2393   1.6       eeh 	struct sys_listen_args ua;
   2394   1.6       eeh 
   2395  1.11       mrg 	NETBSD32TO64_UAP(s);
   2396  1.11       mrg 	NETBSD32TO64_UAP(backlog);
   2397   1.6       eeh 	return (sys_listen(p, &ua, retval));
   2398   1.6       eeh }
   2399   1.6       eeh 
   2400  1.56       mrg /* XXX MOVE ME XXX */
   2401   1.6       eeh int
   2402  1.19       eeh netbsd32_gettimeofday(p, v, retval)
   2403   1.1       mrg 	struct proc *p;
   2404   1.1       mrg 	void *v;
   2405   1.1       mrg 	register_t *retval;
   2406   1.1       mrg {
   2407  1.19       eeh 	struct netbsd32_gettimeofday_args /* {
   2408  1.10       mrg 		syscallarg(netbsd32_timevalp_t) tp;
   2409  1.10       mrg 		syscallarg(netbsd32_timezonep_t) tzp;
   2410   1.1       mrg 	} */ *uap = v;
   2411   1.6       eeh 	struct timeval atv;
   2412  1.10       mrg 	struct netbsd32_timeval tv32;
   2413   1.6       eeh 	int error = 0;
   2414  1.10       mrg 	struct netbsd32_timezone tzfake;
   2415   1.6       eeh 
   2416   1.6       eeh 	if (SCARG(uap, tp)) {
   2417   1.6       eeh 		microtime(&atv);
   2418  1.10       mrg 		netbsd32_from_timeval(&atv, &tv32);
   2419   1.6       eeh 		error = copyout(&tv32, (caddr_t)(u_long)SCARG(uap, tp), sizeof(tv32));
   2420   1.6       eeh 		if (error)
   2421   1.6       eeh 			return (error);
   2422   1.6       eeh 	}
   2423   1.6       eeh 	if (SCARG(uap, tzp)) {
   2424   1.6       eeh 		/*
   2425   1.6       eeh 		 * NetBSD has no kernel notion of time zone, so we just
   2426   1.6       eeh 		 * fake up a timezone struct and return it if demanded.
   2427   1.6       eeh 		 */
   2428   1.6       eeh 		tzfake.tz_minuteswest = 0;
   2429   1.6       eeh 		tzfake.tz_dsttime = 0;
   2430   1.6       eeh 		error = copyout(&tzfake, (caddr_t)(u_long)SCARG(uap, tzp), sizeof(tzfake));
   2431   1.6       eeh 	}
   2432   1.6       eeh 	return (error);
   2433   1.6       eeh }
   2434   1.1       mrg 
   2435  1.56       mrg /* XXX MOVE ME XXX */
   2436   1.1       mrg int
   2437  1.19       eeh netbsd32_settimeofday(p, v, retval)
   2438   1.1       mrg 	struct proc *p;
   2439   1.1       mrg 	void *v;
   2440   1.1       mrg 	register_t *retval;
   2441   1.1       mrg {
   2442  1.19       eeh 	struct netbsd32_settimeofday_args /* {
   2443  1.10       mrg 		syscallarg(const netbsd32_timevalp_t) tv;
   2444  1.10       mrg 		syscallarg(const netbsd32_timezonep_t) tzp;
   2445   1.1       mrg 	} */ *uap = v;
   2446  1.10       mrg 	struct netbsd32_timeval atv32;
   2447   1.6       eeh 	struct timeval atv;
   2448   1.1       mrg 	int error;
   2449   1.1       mrg 
   2450   1.6       eeh 	if ((error = suser(p->p_ucred, &p->p_acflag)) != 0)
   2451   1.6       eeh 		return (error);
   2452   1.6       eeh 	/* Verify all parameters before changing time. */
   2453   1.6       eeh 	if (SCARG(uap, tv) && (error = copyin((caddr_t)(u_long)SCARG(uap, tv),
   2454   1.6       eeh 	    &atv32, sizeof(atv32))))
   2455   1.6       eeh 		return (error);
   2456  1.10       mrg 	netbsd32_to_timeval(&atv32, &atv);
   2457   1.6       eeh 	if (SCARG(uap, tv))
   2458   1.6       eeh 		if ((error = settime(&atv)))
   2459   1.6       eeh 			return (error);
   2460  1.54       mrg 	/* don't bother copying the tz in, we don't use it. */
   2461   1.6       eeh 	/*
   2462   1.6       eeh 	 * NetBSD has no kernel notion of time zone, and only an
   2463   1.6       eeh 	 * obsolete program would try to set it, so we log a warning.
   2464   1.6       eeh 	 */
   2465   1.6       eeh 	if (SCARG(uap, tzp))
   2466   1.6       eeh 		printf("pid %d attempted to set the "
   2467   1.6       eeh 		    "(obsolete) kernel time zone\n", p->p_pid);
   2468   1.6       eeh 	return (0);
   2469   1.6       eeh }
   2470   1.6       eeh 
   2471   1.6       eeh int
   2472  1.19       eeh netbsd32_fchown(p, v, retval)
   2473   1.6       eeh 	struct proc *p;
   2474   1.6       eeh 	void *v;
   2475   1.6       eeh 	register_t *retval;
   2476   1.6       eeh {
   2477  1.19       eeh 	struct netbsd32_fchown_args /* {
   2478   1.6       eeh 		syscallarg(int) fd;
   2479   1.6       eeh 		syscallarg(uid_t) uid;
   2480   1.6       eeh 		syscallarg(gid_t) gid;
   2481   1.6       eeh 	} */ *uap = v;
   2482   1.6       eeh 	struct sys_fchown_args ua;
   2483   1.6       eeh 
   2484  1.11       mrg 	NETBSD32TO64_UAP(fd);
   2485  1.11       mrg 	NETBSD32TO64_UAP(uid);
   2486  1.11       mrg 	NETBSD32TO64_UAP(gid);
   2487   1.6       eeh 	return (sys_fchown(p, &ua, retval));
   2488   1.6       eeh }
   2489   1.6       eeh 
   2490   1.6       eeh int
   2491  1.19       eeh netbsd32_fchmod(p, v, retval)
   2492   1.6       eeh 	struct proc *p;
   2493   1.6       eeh 	void *v;
   2494   1.6       eeh 	register_t *retval;
   2495   1.6       eeh {
   2496  1.19       eeh 	struct netbsd32_fchmod_args /* {
   2497   1.6       eeh 		syscallarg(int) fd;
   2498   1.6       eeh 		syscallarg(mode_t) mode;
   2499   1.6       eeh 	} */ *uap = v;
   2500   1.6       eeh 	struct sys_fchmod_args ua;
   2501   1.6       eeh 
   2502  1.11       mrg 	NETBSD32TO64_UAP(fd);
   2503  1.11       mrg 	NETBSD32TO64_UAP(mode);
   2504   1.6       eeh 	return (sys_fchmod(p, &ua, retval));
   2505   1.6       eeh }
   2506   1.6       eeh 
   2507   1.6       eeh int
   2508  1.19       eeh netbsd32_setreuid(p, v, retval)
   2509   1.6       eeh 	struct proc *p;
   2510   1.6       eeh 	void *v;
   2511   1.6       eeh 	register_t *retval;
   2512   1.6       eeh {
   2513  1.19       eeh 	struct netbsd32_setreuid_args /* {
   2514   1.6       eeh 		syscallarg(uid_t) ruid;
   2515   1.6       eeh 		syscallarg(uid_t) euid;
   2516   1.6       eeh 	} */ *uap = v;
   2517   1.6       eeh 	struct sys_setreuid_args ua;
   2518   1.6       eeh 
   2519  1.11       mrg 	NETBSD32TO64_UAP(ruid);
   2520  1.11       mrg 	NETBSD32TO64_UAP(euid);
   2521   1.6       eeh 	return (sys_setreuid(p, &ua, retval));
   2522   1.6       eeh }
   2523   1.1       mrg 
   2524   1.6       eeh int
   2525  1.19       eeh netbsd32_setregid(p, v, retval)
   2526   1.6       eeh 	struct proc *p;
   2527   1.6       eeh 	void *v;
   2528   1.6       eeh 	register_t *retval;
   2529   1.6       eeh {
   2530  1.19       eeh 	struct netbsd32_setregid_args /* {
   2531   1.6       eeh 		syscallarg(gid_t) rgid;
   2532   1.6       eeh 		syscallarg(gid_t) egid;
   2533   1.6       eeh 	} */ *uap = v;
   2534   1.6       eeh 	struct sys_setregid_args ua;
   2535   1.6       eeh 
   2536  1.11       mrg 	NETBSD32TO64_UAP(rgid);
   2537  1.11       mrg 	NETBSD32TO64_UAP(egid);
   2538   1.6       eeh 	return (sys_setregid(p, &ua, retval));
   2539   1.1       mrg }
   2540   1.1       mrg 
   2541  1.56       mrg /* XXX MOVE ME XXX */
   2542   1.1       mrg int
   2543  1.19       eeh netbsd32_getrusage(p, v, retval)
   2544   1.1       mrg 	struct proc *p;
   2545   1.1       mrg 	void *v;
   2546   1.1       mrg 	register_t *retval;
   2547   1.1       mrg {
   2548  1.19       eeh 	struct netbsd32_getrusage_args /* {
   2549   1.1       mrg 		syscallarg(int) who;
   2550  1.10       mrg 		syscallarg(netbsd32_rusagep_t) rusage;
   2551   1.1       mrg 	} */ *uap = v;
   2552   1.6       eeh 	struct rusage *rup;
   2553  1.10       mrg 	struct netbsd32_rusage ru;
   2554   1.6       eeh 
   2555   1.6       eeh 	switch (SCARG(uap, who)) {
   2556   1.1       mrg 
   2557   1.6       eeh 	case RUSAGE_SELF:
   2558   1.6       eeh 		rup = &p->p_stats->p_ru;
   2559   1.6       eeh 		calcru(p, &rup->ru_utime, &rup->ru_stime, NULL);
   2560   1.6       eeh 		break;
   2561   1.1       mrg 
   2562   1.6       eeh 	case RUSAGE_CHILDREN:
   2563   1.6       eeh 		rup = &p->p_stats->p_cru;
   2564   1.6       eeh 		break;
   2565   1.1       mrg 
   2566   1.6       eeh 	default:
   2567   1.6       eeh 		return (EINVAL);
   2568   1.6       eeh 	}
   2569  1.10       mrg 	netbsd32_from_rusage(rup, &ru);
   2570   1.6       eeh 	return (copyout(&ru, (caddr_t)(u_long)SCARG(uap, rusage), sizeof(ru)));
   2571   1.1       mrg }
   2572   1.1       mrg 
   2573   1.1       mrg int
   2574  1.19       eeh netbsd32_getsockopt(p, v, retval)
   2575   1.1       mrg 	struct proc *p;
   2576   1.1       mrg 	void *v;
   2577   1.1       mrg 	register_t *retval;
   2578   1.1       mrg {
   2579  1.19       eeh 	struct netbsd32_getsockopt_args /* {
   2580   1.1       mrg 		syscallarg(int) s;
   2581   1.1       mrg 		syscallarg(int) level;
   2582   1.1       mrg 		syscallarg(int) name;
   2583  1.10       mrg 		syscallarg(netbsd32_voidp) val;
   2584  1.10       mrg 		syscallarg(netbsd32_intp) avalsize;
   2585   1.1       mrg 	} */ *uap = v;
   2586   1.1       mrg 	struct sys_getsockopt_args ua;
   2587   1.1       mrg 
   2588  1.11       mrg 	NETBSD32TO64_UAP(s);
   2589  1.11       mrg 	NETBSD32TO64_UAP(level);
   2590  1.11       mrg 	NETBSD32TO64_UAP(name);
   2591  1.11       mrg 	NETBSD32TOP_UAP(val, void);
   2592  1.11       mrg 	NETBSD32TOP_UAP(avalsize, int);
   2593   1.1       mrg 	return (sys_getsockopt(p, &ua, retval));
   2594   1.1       mrg }
   2595   1.1       mrg 
   2596  1.56       mrg /* XXX MOVE ME XXX */
   2597   1.1       mrg int
   2598  1.19       eeh netbsd32_readv(p, v, retval)
   2599   1.1       mrg 	struct proc *p;
   2600   1.1       mrg 	void *v;
   2601   1.1       mrg 	register_t *retval;
   2602   1.1       mrg {
   2603  1.19       eeh 	struct netbsd32_readv_args /* {
   2604   1.1       mrg 		syscallarg(int) fd;
   2605  1.10       mrg 		syscallarg(const netbsd32_iovecp_t) iovp;
   2606   1.1       mrg 		syscallarg(int) iovcnt;
   2607   1.1       mrg 	} */ *uap = v;
   2608   1.6       eeh 	int fd = SCARG(uap, fd);
   2609  1.25  augustss 	struct file *fp;
   2610  1.25  augustss 	struct filedesc *fdp = p->p_fd;
   2611   1.6       eeh 
   2612   1.6       eeh 	if ((u_int)fd >= fdp->fd_nfiles ||
   2613   1.6       eeh 	    (fp = fdp->fd_ofiles[fd]) == NULL ||
   2614   1.6       eeh 	    (fp->f_flag & FREAD) == 0)
   2615   1.6       eeh 		return (EBADF);
   2616   1.6       eeh 
   2617  1.10       mrg 	return (dofilereadv32(p, fd, fp, (struct netbsd32_iovec *)(u_long)SCARG(uap, iovp),
   2618   1.6       eeh 			      SCARG(uap, iovcnt), &fp->f_offset, FOF_UPDATE_OFFSET, retval));
   2619   1.6       eeh }
   2620   1.6       eeh 
   2621  1.56       mrg /* XXX MOVE ME XXX */
   2622   1.6       eeh /* Damn thing copies in the iovec! */
   2623   1.6       eeh int
   2624   1.6       eeh dofilereadv32(p, fd, fp, iovp, iovcnt, offset, flags, retval)
   2625   1.6       eeh 	struct proc *p;
   2626   1.6       eeh 	int fd;
   2627   1.6       eeh 	struct file *fp;
   2628  1.10       mrg 	struct netbsd32_iovec *iovp;
   2629   1.6       eeh 	int iovcnt;
   2630   1.6       eeh 	off_t *offset;
   2631   1.6       eeh 	int flags;
   2632   1.6       eeh 	register_t *retval;
   2633   1.6       eeh {
   2634   1.6       eeh 	struct uio auio;
   2635  1.25  augustss 	struct iovec *iov;
   2636   1.6       eeh 	struct iovec *needfree;
   2637   1.6       eeh 	struct iovec aiov[UIO_SMALLIOV];
   2638   1.6       eeh 	long i, cnt, error = 0;
   2639   1.6       eeh 	u_int iovlen;
   2640   1.6       eeh #ifdef KTRACE
   2641   1.6       eeh 	struct iovec *ktriov = NULL;
   2642   1.6       eeh #endif
   2643   1.1       mrg 
   2644   1.6       eeh 	/* note: can't use iovlen until iovcnt is validated */
   2645   1.6       eeh 	iovlen = iovcnt * sizeof(struct iovec);
   2646   1.6       eeh 	if ((u_int)iovcnt > UIO_SMALLIOV) {
   2647   1.6       eeh 		if ((u_int)iovcnt > IOV_MAX)
   2648   1.6       eeh 			return (EINVAL);
   2649   1.6       eeh 		MALLOC(iov, struct iovec *, iovlen, M_IOV, M_WAITOK);
   2650   1.6       eeh 		needfree = iov;
   2651   1.6       eeh 	} else if ((u_int)iovcnt > 0) {
   2652   1.6       eeh 		iov = aiov;
   2653   1.6       eeh 		needfree = NULL;
   2654   1.6       eeh 	} else
   2655   1.6       eeh 		return (EINVAL);
   2656   1.1       mrg 
   2657   1.6       eeh 	auio.uio_iov = iov;
   2658   1.6       eeh 	auio.uio_iovcnt = iovcnt;
   2659   1.6       eeh 	auio.uio_rw = UIO_READ;
   2660   1.6       eeh 	auio.uio_segflg = UIO_USERSPACE;
   2661   1.6       eeh 	auio.uio_procp = p;
   2662  1.10       mrg 	error = netbsd32_to_iovecin(iovp, iov, iovcnt);
   2663   1.6       eeh 	if (error)
   2664   1.6       eeh 		goto done;
   2665   1.6       eeh 	auio.uio_resid = 0;
   2666   1.6       eeh 	for (i = 0; i < iovcnt; i++) {
   2667   1.6       eeh 		auio.uio_resid += iov->iov_len;
   2668   1.6       eeh 		/*
   2669   1.6       eeh 		 * Reads return ssize_t because -1 is returned on error.
   2670   1.6       eeh 		 * Therefore we must restrict the length to SSIZE_MAX to
   2671   1.6       eeh 		 * avoid garbage return values.
   2672   1.6       eeh 		 */
   2673   1.6       eeh 		if (iov->iov_len > SSIZE_MAX || auio.uio_resid > SSIZE_MAX) {
   2674   1.6       eeh 			error = EINVAL;
   2675   1.6       eeh 			goto done;
   2676   1.6       eeh 		}
   2677   1.6       eeh 		iov++;
   2678   1.6       eeh 	}
   2679   1.6       eeh #ifdef KTRACE
   2680   1.6       eeh 	/*
   2681   1.6       eeh 	 * if tracing, save a copy of iovec
   2682   1.6       eeh 	 */
   2683   1.6       eeh 	if (KTRPOINT(p, KTR_GENIO))  {
   2684   1.6       eeh 		MALLOC(ktriov, struct iovec *, iovlen, M_TEMP, M_WAITOK);
   2685   1.6       eeh 		memcpy((caddr_t)ktriov, (caddr_t)auio.uio_iov, iovlen);
   2686   1.6       eeh 	}
   2687   1.6       eeh #endif
   2688   1.6       eeh 	cnt = auio.uio_resid;
   2689   1.6       eeh 	error = (*fp->f_ops->fo_read)(fp, offset, &auio, fp->f_cred, flags);
   2690   1.6       eeh 	if (error)
   2691   1.6       eeh 		if (auio.uio_resid != cnt && (error == ERESTART ||
   2692   1.6       eeh 		    error == EINTR || error == EWOULDBLOCK))
   2693   1.6       eeh 			error = 0;
   2694   1.6       eeh 	cnt -= auio.uio_resid;
   2695   1.6       eeh #ifdef KTRACE
   2696   1.6       eeh 	if (KTRPOINT(p, KTR_GENIO))
   2697   1.6       eeh 		if (error == 0) {
   2698  1.26  sommerfe 			ktrgenio(p, fd, UIO_READ, ktriov, cnt,
   2699   1.6       eeh 			    error);
   2700   1.6       eeh 		FREE(ktriov, M_TEMP);
   2701   1.6       eeh 	}
   2702   1.6       eeh #endif
   2703   1.6       eeh 	*retval = cnt;
   2704   1.6       eeh done:
   2705   1.6       eeh 	if (needfree)
   2706   1.6       eeh 		FREE(needfree, M_IOV);
   2707   1.1       mrg 	return (error);
   2708   1.1       mrg }
   2709   1.1       mrg 
   2710  1.56       mrg /* XXX MOVE ME XXX */
   2711   1.1       mrg int
   2712  1.19       eeh netbsd32_writev(p, v, retval)
   2713   1.1       mrg 	struct proc *p;
   2714   1.1       mrg 	void *v;
   2715   1.1       mrg 	register_t *retval;
   2716   1.1       mrg {
   2717  1.19       eeh 	struct netbsd32_writev_args /* {
   2718   1.1       mrg 		syscallarg(int) fd;
   2719  1.10       mrg 		syscallarg(const netbsd32_iovecp_t) iovp;
   2720   1.1       mrg 		syscallarg(int) iovcnt;
   2721   1.1       mrg 	} */ *uap = v;
   2722   1.6       eeh 	int fd = SCARG(uap, fd);
   2723  1.25  augustss 	struct file *fp;
   2724  1.25  augustss 	struct filedesc *fdp = p->p_fd;
   2725   1.6       eeh 
   2726   1.6       eeh 	if ((u_int)fd >= fdp->fd_nfiles ||
   2727   1.6       eeh 	    (fp = fdp->fd_ofiles[fd]) == NULL ||
   2728   1.6       eeh 	    (fp->f_flag & FWRITE) == 0)
   2729   1.6       eeh 		return (EBADF);
   2730   1.6       eeh 
   2731  1.10       mrg 	return (dofilewritev32(p, fd, fp, (struct netbsd32_iovec *)(u_long)SCARG(uap, iovp),
   2732   1.6       eeh 			       SCARG(uap, iovcnt), &fp->f_offset, FOF_UPDATE_OFFSET, retval));
   2733   1.6       eeh }
   2734   1.6       eeh 
   2735  1.56       mrg /* XXX MOVE ME XXX */
   2736   1.6       eeh int
   2737   1.6       eeh dofilewritev32(p, fd, fp, iovp, iovcnt, offset, flags, retval)
   2738   1.6       eeh 	struct proc *p;
   2739   1.6       eeh 	int fd;
   2740   1.6       eeh 	struct file *fp;
   2741  1.10       mrg 	struct netbsd32_iovec *iovp;
   2742   1.6       eeh 	int iovcnt;
   2743   1.6       eeh 	off_t *offset;
   2744   1.6       eeh 	int flags;
   2745   1.6       eeh 	register_t *retval;
   2746   1.6       eeh {
   2747   1.6       eeh 	struct uio auio;
   2748  1.25  augustss 	struct iovec *iov;
   2749   1.6       eeh 	struct iovec *needfree;
   2750   1.6       eeh 	struct iovec aiov[UIO_SMALLIOV];
   2751   1.6       eeh 	long i, cnt, error = 0;
   2752   1.6       eeh 	u_int iovlen;
   2753   1.6       eeh #ifdef KTRACE
   2754   1.6       eeh 	struct iovec *ktriov = NULL;
   2755   1.6       eeh #endif
   2756   1.1       mrg 
   2757   1.6       eeh 	/* note: can't use iovlen until iovcnt is validated */
   2758   1.6       eeh 	iovlen = iovcnt * sizeof(struct iovec);
   2759   1.6       eeh 	if ((u_int)iovcnt > UIO_SMALLIOV) {
   2760   1.6       eeh 		if ((u_int)iovcnt > IOV_MAX)
   2761   1.6       eeh 			return (EINVAL);
   2762   1.6       eeh 		MALLOC(iov, struct iovec *, iovlen, M_IOV, M_WAITOK);
   2763   1.6       eeh 		needfree = iov;
   2764   1.6       eeh 	} else if ((u_int)iovcnt > 0) {
   2765   1.6       eeh 		iov = aiov;
   2766   1.6       eeh 		needfree = NULL;
   2767   1.6       eeh 	} else
   2768   1.6       eeh 		return (EINVAL);
   2769   1.1       mrg 
   2770   1.6       eeh 	auio.uio_iov = iov;
   2771   1.6       eeh 	auio.uio_iovcnt = iovcnt;
   2772   1.6       eeh 	auio.uio_rw = UIO_WRITE;
   2773   1.6       eeh 	auio.uio_segflg = UIO_USERSPACE;
   2774   1.6       eeh 	auio.uio_procp = p;
   2775  1.10       mrg 	error = netbsd32_to_iovecin(iovp, iov, iovcnt);
   2776   1.6       eeh 	if (error)
   2777   1.6       eeh 		goto done;
   2778   1.6       eeh 	auio.uio_resid = 0;
   2779   1.6       eeh 	for (i = 0; i < iovcnt; i++) {
   2780   1.6       eeh 		auio.uio_resid += iov->iov_len;
   2781   1.6       eeh 		/*
   2782   1.6       eeh 		 * Writes return ssize_t because -1 is returned on error.
   2783   1.6       eeh 		 * Therefore we must restrict the length to SSIZE_MAX to
   2784   1.6       eeh 		 * avoid garbage return values.
   2785   1.6       eeh 		 */
   2786   1.6       eeh 		if (iov->iov_len > SSIZE_MAX || auio.uio_resid > SSIZE_MAX) {
   2787   1.6       eeh 			error = EINVAL;
   2788   1.6       eeh 			goto done;
   2789   1.6       eeh 		}
   2790   1.6       eeh 		iov++;
   2791   1.6       eeh 	}
   2792   1.6       eeh #ifdef KTRACE
   2793   1.6       eeh 	/*
   2794   1.6       eeh 	 * if tracing, save a copy of iovec
   2795   1.6       eeh 	 */
   2796   1.6       eeh 	if (KTRPOINT(p, KTR_GENIO))  {
   2797   1.6       eeh 		MALLOC(ktriov, struct iovec *, iovlen, M_TEMP, M_WAITOK);
   2798   1.6       eeh 		memcpy((caddr_t)ktriov, (caddr_t)auio.uio_iov, iovlen);
   2799   1.6       eeh 	}
   2800   1.6       eeh #endif
   2801   1.6       eeh 	cnt = auio.uio_resid;
   2802   1.6       eeh 	error = (*fp->f_ops->fo_write)(fp, offset, &auio, fp->f_cred, flags);
   2803   1.6       eeh 	if (error) {
   2804   1.6       eeh 		if (auio.uio_resid != cnt && (error == ERESTART ||
   2805   1.6       eeh 		    error == EINTR || error == EWOULDBLOCK))
   2806   1.6       eeh 			error = 0;
   2807   1.6       eeh 		if (error == EPIPE)
   2808   1.6       eeh 			psignal(p, SIGPIPE);
   2809   1.6       eeh 	}
   2810   1.6       eeh 	cnt -= auio.uio_resid;
   2811   1.6       eeh #ifdef KTRACE
   2812   1.6       eeh 	if (KTRPOINT(p, KTR_GENIO))
   2813   1.6       eeh 		if (error == 0) {
   2814  1.26  sommerfe 			ktrgenio(p, fd, UIO_WRITE, ktriov, cnt,
   2815   1.6       eeh 			    error);
   2816   1.6       eeh 		FREE(ktriov, M_TEMP);
   2817   1.6       eeh 	}
   2818   1.6       eeh #endif
   2819   1.6       eeh 	*retval = cnt;
   2820   1.6       eeh done:
   2821   1.6       eeh 	if (needfree)
   2822   1.6       eeh 		FREE(needfree, M_IOV);
   2823   1.1       mrg 	return (error);
   2824   1.1       mrg }
   2825   1.1       mrg 
   2826   1.6       eeh 
   2827   1.1       mrg int
   2828  1.19       eeh netbsd32_rename(p, v, retval)
   2829   1.1       mrg 	struct proc *p;
   2830   1.1       mrg 	void *v;
   2831   1.1       mrg 	register_t *retval;
   2832   1.1       mrg {
   2833  1.19       eeh 	struct netbsd32_rename_args /* {
   2834  1.10       mrg 		syscallarg(const netbsd32_charp) from;
   2835  1.10       mrg 		syscallarg(const netbsd32_charp) to;
   2836   1.1       mrg 	} */ *uap = v;
   2837   1.1       mrg 	struct sys_rename_args ua;
   2838   1.1       mrg 
   2839  1.20       eeh 	NETBSD32TOP_UAP(from, const char);
   2840  1.20       eeh 	NETBSD32TOP_UAP(to, const char)
   2841   1.6       eeh 
   2842   1.1       mrg 	return (sys_rename(p, &ua, retval));
   2843   1.1       mrg }
   2844   1.1       mrg 
   2845   1.1       mrg int
   2846  1.19       eeh netbsd32_flock(p, v, retval)
   2847   1.6       eeh 	struct proc *p;
   2848   1.6       eeh 	void *v;
   2849   1.6       eeh 	register_t *retval;
   2850   1.6       eeh {
   2851  1.19       eeh 	struct netbsd32_flock_args /* {
   2852   1.6       eeh 		syscallarg(int) fd;
   2853   1.6       eeh 		syscallarg(int) how;
   2854   1.6       eeh 	} */ *uap = v;
   2855   1.6       eeh 	struct sys_flock_args ua;
   2856   1.6       eeh 
   2857  1.11       mrg 	NETBSD32TO64_UAP(fd);
   2858  1.11       mrg 	NETBSD32TO64_UAP(how)
   2859   1.6       eeh 
   2860   1.6       eeh 	return (sys_flock(p, &ua, retval));
   2861   1.6       eeh }
   2862   1.6       eeh 
   2863   1.6       eeh int
   2864  1.19       eeh netbsd32_mkfifo(p, v, retval)
   2865   1.1       mrg 	struct proc *p;
   2866   1.1       mrg 	void *v;
   2867   1.1       mrg 	register_t *retval;
   2868   1.1       mrg {
   2869  1.19       eeh 	struct netbsd32_mkfifo_args /* {
   2870  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   2871   1.1       mrg 		syscallarg(mode_t) mode;
   2872   1.1       mrg 	} */ *uap = v;
   2873   1.1       mrg 	struct sys_mkfifo_args ua;
   2874   1.1       mrg 
   2875  1.11       mrg 	NETBSD32TOP_UAP(path, const char)
   2876  1.11       mrg 	NETBSD32TO64_UAP(mode);
   2877   1.1       mrg 	return (sys_mkfifo(p, &ua, retval));
   2878   1.1       mrg }
   2879   1.1       mrg 
   2880   1.1       mrg int
   2881  1.19       eeh netbsd32_shutdown(p, v, retval)
   2882   1.6       eeh 	struct proc *p;
   2883   1.6       eeh 	void *v;
   2884   1.6       eeh 	register_t *retval;
   2885   1.6       eeh {
   2886  1.19       eeh 	struct netbsd32_shutdown_args /* {
   2887   1.6       eeh 		syscallarg(int) s;
   2888   1.6       eeh 		syscallarg(int) how;
   2889   1.6       eeh 	} */ *uap = v;
   2890   1.6       eeh 	struct sys_shutdown_args ua;
   2891   1.6       eeh 
   2892  1.11       mrg 	NETBSD32TO64_UAP(s)
   2893  1.11       mrg 	NETBSD32TO64_UAP(how);
   2894   1.6       eeh 	return (sys_shutdown(p, &ua, retval));
   2895   1.6       eeh }
   2896   1.6       eeh 
   2897   1.6       eeh int
   2898  1.19       eeh netbsd32_socketpair(p, v, retval)
   2899   1.6       eeh 	struct proc *p;
   2900   1.6       eeh 	void *v;
   2901   1.6       eeh 	register_t *retval;
   2902   1.6       eeh {
   2903  1.19       eeh 	struct netbsd32_socketpair_args /* {
   2904   1.6       eeh 		syscallarg(int) domain;
   2905   1.6       eeh 		syscallarg(int) type;
   2906   1.6       eeh 		syscallarg(int) protocol;
   2907  1.10       mrg 		syscallarg(netbsd32_intp) rsv;
   2908   1.6       eeh 	} */ *uap = v;
   2909   1.6       eeh 	struct sys_socketpair_args ua;
   2910   1.6       eeh 
   2911  1.11       mrg 	NETBSD32TO64_UAP(domain);
   2912  1.11       mrg 	NETBSD32TO64_UAP(type);
   2913  1.11       mrg 	NETBSD32TO64_UAP(protocol);
   2914  1.11       mrg 	NETBSD32TOP_UAP(rsv, int);
   2915   1.6       eeh 	/* Since we're just copying out two `int's we can do this */
   2916   1.6       eeh 	return (sys_socketpair(p, &ua, retval));
   2917   1.6       eeh }
   2918   1.6       eeh 
   2919   1.6       eeh int
   2920  1.19       eeh netbsd32_mkdir(p, v, retval)
   2921   1.1       mrg 	struct proc *p;
   2922   1.1       mrg 	void *v;
   2923   1.1       mrg 	register_t *retval;
   2924   1.1       mrg {
   2925  1.19       eeh 	struct netbsd32_mkdir_args /* {
   2926  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   2927   1.1       mrg 		syscallarg(mode_t) mode;
   2928   1.1       mrg 	} */ *uap = v;
   2929   1.1       mrg 	struct sys_mkdir_args ua;
   2930   1.1       mrg 
   2931  1.11       mrg 	NETBSD32TOP_UAP(path, const char)
   2932  1.11       mrg 	NETBSD32TO64_UAP(mode);
   2933   1.1       mrg 	return (sys_mkdir(p, &ua, retval));
   2934   1.1       mrg }
   2935   1.1       mrg 
   2936   1.1       mrg int
   2937  1.19       eeh netbsd32_rmdir(p, v, retval)
   2938   1.1       mrg 	struct proc *p;
   2939   1.1       mrg 	void *v;
   2940   1.1       mrg 	register_t *retval;
   2941   1.1       mrg {
   2942  1.19       eeh 	struct netbsd32_rmdir_args /* {
   2943  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   2944   1.1       mrg 	} */ *uap = v;
   2945   1.1       mrg 	struct sys_rmdir_args ua;
   2946   1.1       mrg 
   2947  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   2948   1.1       mrg 	return (sys_rmdir(p, &ua, retval));
   2949   1.1       mrg }
   2950   1.1       mrg 
   2951  1.56       mrg /* XXX MOVE ME XXX */
   2952   1.1       mrg int
   2953  1.19       eeh netbsd32_utimes(p, v, retval)
   2954   1.1       mrg 	struct proc *p;
   2955   1.1       mrg 	void *v;
   2956   1.1       mrg 	register_t *retval;
   2957   1.1       mrg {
   2958  1.19       eeh 	struct netbsd32_utimes_args /* {
   2959  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   2960  1.10       mrg 		syscallarg(const netbsd32_timevalp_t) tptr;
   2961   1.1       mrg 	} */ *uap = v;
   2962   1.6       eeh 	int error;
   2963   1.6       eeh 	struct nameidata nd;
   2964   1.6       eeh 
   2965   1.6       eeh 	NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, (char *)(u_long)SCARG(uap, path), p);
   2966   1.6       eeh 	if ((error = namei(&nd)) != 0)
   2967   1.6       eeh 		return (error);
   2968   1.1       mrg 
   2969  1.54       mrg 	error = change_utimes32(nd.ni_vp, SCARG(uap, tptr), p);
   2970   1.1       mrg 
   2971   1.6       eeh 	vrele(nd.ni_vp);
   2972   1.6       eeh 	return (error);
   2973   1.6       eeh }
   2974   1.6       eeh 
   2975  1.56       mrg /* XXX MOVE ME XXX */
   2976   1.6       eeh /*
   2977   1.6       eeh  * Common routine to set access and modification times given a vnode.
   2978   1.6       eeh  */
   2979   1.6       eeh static int
   2980   1.6       eeh change_utimes32(vp, tptr, p)
   2981   1.6       eeh 	struct vnode *vp;
   2982  1.54       mrg 	netbsd32_timevalp_t tptr;
   2983   1.6       eeh 	struct proc *p;
   2984   1.6       eeh {
   2985  1.10       mrg 	struct netbsd32_timeval tv32[2];
   2986   1.6       eeh 	struct timeval tv[2];
   2987   1.6       eeh 	struct vattr vattr;
   2988   1.6       eeh 	int error;
   2989   1.6       eeh 
   2990   1.6       eeh 	VATTR_NULL(&vattr);
   2991   1.6       eeh 	if (tptr == NULL) {
   2992   1.6       eeh 		microtime(&tv[0]);
   2993   1.6       eeh 		tv[1] = tv[0];
   2994   1.6       eeh 		vattr.va_vaflags |= VA_UTIMES_NULL;
   2995   1.6       eeh 	} else {
   2996  1.54       mrg 		error = copyin((caddr_t)(u_long)tptr, tv32, sizeof(tv32));
   2997   1.6       eeh 		if (error)
   2998   1.6       eeh 			return (error);
   2999  1.54       mrg 		netbsd32_to_timeval(&tv32[0], &tv[0]);
   3000  1.54       mrg 		netbsd32_to_timeval(&tv32[1], &tv[1]);
   3001   1.6       eeh 	}
   3002   1.6       eeh 	VOP_LEASE(vp, p, p->p_ucred, LEASE_WRITE);
   3003   1.6       eeh 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
   3004   1.6       eeh 	vattr.va_atime.tv_sec = tv[0].tv_sec;
   3005   1.6       eeh 	vattr.va_atime.tv_nsec = tv[0].tv_usec * 1000;
   3006   1.6       eeh 	vattr.va_mtime.tv_sec = tv[1].tv_sec;
   3007   1.6       eeh 	vattr.va_mtime.tv_nsec = tv[1].tv_usec * 1000;
   3008   1.6       eeh 	error = VOP_SETATTR(vp, &vattr, p->p_ucred, p);
   3009   1.6       eeh 	VOP_UNLOCK(vp, 0);
   3010   1.6       eeh 	return (error);
   3011   1.1       mrg }
   3012   1.1       mrg 
   3013  1.56       mrg /* XXX MOVE ME XXX */
   3014   1.1       mrg int
   3015  1.19       eeh netbsd32_adjtime(p, v, retval)
   3016   1.1       mrg 	struct proc *p;
   3017   1.1       mrg 	void *v;
   3018   1.1       mrg 	register_t *retval;
   3019   1.1       mrg {
   3020  1.19       eeh 	struct netbsd32_adjtime_args /* {
   3021  1.10       mrg 		syscallarg(const netbsd32_timevalp_t) delta;
   3022  1.10       mrg 		syscallarg(netbsd32_timevalp_t) olddelta;
   3023   1.1       mrg 	} */ *uap = v;
   3024  1.10       mrg 	struct netbsd32_timeval atv;
   3025   1.6       eeh 	int32_t ndelta, ntickdelta, odelta;
   3026   1.6       eeh 	int s, error;
   3027   1.6       eeh 	extern long bigadj, timedelta;
   3028   1.6       eeh 	extern int tickdelta;
   3029   1.1       mrg 
   3030   1.6       eeh 	if ((error = suser(p->p_ucred, &p->p_acflag)) != 0)
   3031   1.6       eeh 		return (error);
   3032   1.1       mrg 
   3033   1.6       eeh 	error = copyin((caddr_t)(u_long)SCARG(uap, delta), &atv, sizeof(struct timeval));
   3034   1.1       mrg 	if (error)
   3035   1.1       mrg 		return (error);
   3036   1.6       eeh 	/*
   3037   1.6       eeh 	 * Compute the total correction and the rate at which to apply it.
   3038   1.6       eeh 	 * Round the adjustment down to a whole multiple of the per-tick
   3039   1.6       eeh 	 * delta, so that after some number of incremental changes in
   3040   1.6       eeh 	 * hardclock(), tickdelta will become zero, lest the correction
   3041   1.6       eeh 	 * overshoot and start taking us away from the desired final time.
   3042   1.6       eeh 	 */
   3043   1.6       eeh 	ndelta = atv.tv_sec * 1000000 + atv.tv_usec;
   3044   1.6       eeh 	if (ndelta > bigadj)
   3045   1.6       eeh 		ntickdelta = 10 * tickadj;
   3046   1.6       eeh 	else
   3047   1.6       eeh 		ntickdelta = tickadj;
   3048   1.6       eeh 	if (ndelta % ntickdelta)
   3049   1.6       eeh 		ndelta = ndelta / ntickdelta * ntickdelta;
   3050   1.1       mrg 
   3051   1.6       eeh 	/*
   3052   1.6       eeh 	 * To make hardclock()'s job easier, make the per-tick delta negative
   3053   1.6       eeh 	 * if we want time to run slower; then hardclock can simply compute
   3054   1.6       eeh 	 * tick + tickdelta, and subtract tickdelta from timedelta.
   3055   1.6       eeh 	 */
   3056   1.6       eeh 	if (ndelta < 0)
   3057   1.6       eeh 		ntickdelta = -ntickdelta;
   3058   1.6       eeh 	s = splclock();
   3059   1.6       eeh 	odelta = timedelta;
   3060   1.6       eeh 	timedelta = ndelta;
   3061   1.6       eeh 	tickdelta = ntickdelta;
   3062   1.6       eeh 	splx(s);
   3063   1.6       eeh 
   3064   1.6       eeh 	if (SCARG(uap, olddelta)) {
   3065   1.6       eeh 		atv.tv_sec = odelta / 1000000;
   3066   1.6       eeh 		atv.tv_usec = odelta % 1000000;
   3067   1.6       eeh 		(void) copyout(&atv, (caddr_t)(u_long)SCARG(uap, olddelta),
   3068  1.54       mrg 		    sizeof(atv));
   3069   1.6       eeh 	}
   3070   1.1       mrg 	return (0);
   3071   1.1       mrg }
   3072   1.1       mrg 
   3073   1.1       mrg int
   3074  1.19       eeh netbsd32_quotactl(p, v, retval)
   3075   1.1       mrg 	struct proc *p;
   3076   1.1       mrg 	void *v;
   3077   1.1       mrg 	register_t *retval;
   3078   1.1       mrg {
   3079  1.19       eeh 	struct netbsd32_quotactl_args /* {
   3080  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   3081   1.1       mrg 		syscallarg(int) cmd;
   3082   1.1       mrg 		syscallarg(int) uid;
   3083  1.10       mrg 		syscallarg(netbsd32_caddr_t) arg;
   3084   1.1       mrg 	} */ *uap = v;
   3085   1.1       mrg 	struct sys_quotactl_args ua;
   3086   1.1       mrg 
   3087  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   3088  1.11       mrg 	NETBSD32TO64_UAP(cmd);
   3089  1.11       mrg 	NETBSD32TO64_UAP(uid);
   3090  1.11       mrg 	NETBSD32TOX64_UAP(arg, caddr_t);
   3091   1.1       mrg 	return (sys_quotactl(p, &ua, retval));
   3092   1.1       mrg }
   3093   1.1       mrg 
   3094   1.6       eeh #if defined(NFS) || defined(NFSSERVER)
   3095   1.1       mrg int
   3096  1.19       eeh netbsd32_nfssvc(p, v, retval)
   3097   1.1       mrg 	struct proc *p;
   3098   1.1       mrg 	void *v;
   3099   1.1       mrg 	register_t *retval;
   3100   1.1       mrg {
   3101   1.6       eeh #if 0
   3102  1.19       eeh 	struct netbsd32_nfssvc_args /* {
   3103   1.1       mrg 		syscallarg(int) flag;
   3104  1.10       mrg 		syscallarg(netbsd32_voidp) argp;
   3105   1.1       mrg 	} */ *uap = v;
   3106   1.1       mrg 	struct sys_nfssvc_args ua;
   3107   1.1       mrg 
   3108  1.11       mrg 	NETBSD32TO64_UAP(flag);
   3109  1.11       mrg 	NETBSD32TOP_UAP(argp, void);
   3110   1.1       mrg 	return (sys_nfssvc(p, &ua, retval));
   3111   1.6       eeh #else
   3112   1.6       eeh 	/* Why would we want to support a 32-bit nfsd? */
   3113   1.6       eeh 	return (ENOSYS);
   3114   1.6       eeh #endif
   3115   1.1       mrg }
   3116   1.6       eeh #endif
   3117   1.1       mrg 
   3118  1.56       mrg /* XXX MOVE ME XXX */
   3119   1.1       mrg int
   3120  1.19       eeh netbsd32_statfs(p, v, retval)
   3121   1.1       mrg 	struct proc *p;
   3122   1.1       mrg 	void *v;
   3123   1.1       mrg 	register_t *retval;
   3124   1.1       mrg {
   3125  1.19       eeh 	struct netbsd32_statfs_args /* {
   3126  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   3127  1.10       mrg 		syscallarg(netbsd32_statfsp_t) buf;
   3128   1.1       mrg 	} */ *uap = v;
   3129  1.25  augustss 	struct mount *mp;
   3130  1.25  augustss 	struct statfs *sp;
   3131  1.10       mrg 	struct netbsd32_statfs s32;
   3132   1.1       mrg 	int error;
   3133   1.6       eeh 	struct nameidata nd;
   3134   1.1       mrg 
   3135   1.6       eeh 	NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, (char *)(u_long)SCARG(uap, path), p);
   3136   1.6       eeh 	if ((error = namei(&nd)) != 0)
   3137   1.6       eeh 		return (error);
   3138   1.6       eeh 	mp = nd.ni_vp->v_mount;
   3139   1.6       eeh 	sp = &mp->mnt_stat;
   3140   1.6       eeh 	vrele(nd.ni_vp);
   3141   1.6       eeh 	if ((error = VFS_STATFS(mp, sp, p)) != 0)
   3142   1.1       mrg 		return (error);
   3143   1.6       eeh 	sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK;
   3144  1.10       mrg 	netbsd32_from_statfs(sp, &s32);
   3145   1.6       eeh 	return (copyout(&s32, (caddr_t)(u_long)SCARG(uap, buf), sizeof(s32)));
   3146   1.1       mrg }
   3147   1.1       mrg 
   3148  1.56       mrg /* XXX MOVE ME XXX */
   3149   1.1       mrg int
   3150  1.19       eeh netbsd32_fstatfs(p, v, retval)
   3151   1.1       mrg 	struct proc *p;
   3152   1.1       mrg 	void *v;
   3153   1.1       mrg 	register_t *retval;
   3154   1.1       mrg {
   3155  1.19       eeh 	struct netbsd32_fstatfs_args /* {
   3156   1.1       mrg 		syscallarg(int) fd;
   3157  1.10       mrg 		syscallarg(netbsd32_statfsp_t) buf;
   3158   1.1       mrg 	} */ *uap = v;
   3159   1.6       eeh 	struct file *fp;
   3160  1.25  augustss 	struct mount *mp;
   3161  1.25  augustss 	struct statfs *sp;
   3162  1.10       mrg 	struct netbsd32_statfs s32;
   3163   1.1       mrg 	int error;
   3164   1.1       mrg 
   3165  1.12   thorpej 	/* getvnode() will use the descriptor for us */
   3166   1.6       eeh 	if ((error = getvnode(p->p_fd, SCARG(uap, fd), &fp)) != 0)
   3167   1.6       eeh 		return (error);
   3168   1.6       eeh 	mp = ((struct vnode *)fp->f_data)->v_mount;
   3169   1.6       eeh 	sp = &mp->mnt_stat;
   3170   1.6       eeh 	if ((error = VFS_STATFS(mp, sp, p)) != 0)
   3171  1.12   thorpej 		goto out;
   3172   1.6       eeh 	sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK;
   3173  1.10       mrg 	netbsd32_from_statfs(sp, &s32);
   3174  1.12   thorpej 	error = copyout(&s32, (caddr_t)(u_long)SCARG(uap, buf), sizeof(s32));
   3175  1.12   thorpej  out:
   3176  1.19       eeh 	FILE_UNUSE(fp, p);
   3177  1.12   thorpej 	return (error);
   3178   1.1       mrg }
   3179   1.1       mrg 
   3180   1.6       eeh #if defined(NFS) || defined(NFSSERVER)
   3181   1.1       mrg int
   3182  1.19       eeh netbsd32_getfh(p, v, retval)
   3183   1.1       mrg 	struct proc *p;
   3184   1.1       mrg 	void *v;
   3185   1.1       mrg 	register_t *retval;
   3186   1.1       mrg {
   3187  1.19       eeh 	struct netbsd32_getfh_args /* {
   3188  1.10       mrg 		syscallarg(const netbsd32_charp) fname;
   3189  1.10       mrg 		syscallarg(netbsd32_fhandlep_t) fhp;
   3190   1.1       mrg 	} */ *uap = v;
   3191   1.1       mrg 	struct sys_getfh_args ua;
   3192   1.1       mrg 
   3193  1.11       mrg 	NETBSD32TOP_UAP(fname, const char);
   3194  1.11       mrg 	NETBSD32TOP_UAP(fhp, struct fhandle);
   3195   1.6       eeh 	/* Lucky for us a fhandlep_t doesn't change sizes */
   3196   1.1       mrg 	return (sys_getfh(p, &ua, retval));
   3197   1.1       mrg }
   3198   1.6       eeh #endif
   3199   1.1       mrg 
   3200   1.1       mrg int
   3201  1.19       eeh netbsd32_sysarch(p, v, retval)
   3202   1.1       mrg 	struct proc *p;
   3203   1.1       mrg 	void *v;
   3204   1.1       mrg 	register_t *retval;
   3205   1.1       mrg {
   3206  1.19       eeh 	struct netbsd32_sysarch_args /* {
   3207   1.1       mrg 		syscallarg(int) op;
   3208  1.10       mrg 		syscallarg(netbsd32_voidp) parms;
   3209   1.1       mrg 	} */ *uap = v;
   3210   1.1       mrg 
   3211   1.6       eeh 	switch (SCARG(uap, op)) {
   3212   1.6       eeh 	default:
   3213  1.54       mrg 		printf("(%s) netbsd32_sysarch(%d)\n", MACHINE, SCARG(uap, op));
   3214   1.6       eeh 		return EINVAL;
   3215   1.6       eeh 	}
   3216   1.1       mrg }
   3217   1.1       mrg 
   3218   1.1       mrg int
   3219  1.19       eeh netbsd32_pread(p, v, retval)
   3220   1.1       mrg 	struct proc *p;
   3221   1.1       mrg 	void *v;
   3222   1.1       mrg 	register_t *retval;
   3223   1.1       mrg {
   3224  1.19       eeh 	struct netbsd32_pread_args /* {
   3225   1.1       mrg 		syscallarg(int) fd;
   3226  1.10       mrg 		syscallarg(netbsd32_voidp) buf;
   3227  1.10       mrg 		syscallarg(netbsd32_size_t) nbyte;
   3228   1.1       mrg 		syscallarg(int) pad;
   3229   1.1       mrg 		syscallarg(off_t) offset;
   3230   1.1       mrg 	} */ *uap = v;
   3231   1.1       mrg 	struct sys_pread_args ua;
   3232   1.1       mrg 	ssize_t rt;
   3233   1.1       mrg 	int error;
   3234   1.1       mrg 
   3235  1.11       mrg 	NETBSD32TO64_UAP(fd);
   3236  1.11       mrg 	NETBSD32TOP_UAP(buf, void);
   3237  1.11       mrg 	NETBSD32TOX_UAP(nbyte, size_t);
   3238  1.11       mrg 	NETBSD32TO64_UAP(pad);
   3239  1.11       mrg 	NETBSD32TO64_UAP(offset);
   3240   1.1       mrg 	error = sys_pread(p, &ua, (register_t *)&rt);
   3241  1.32       mrg 	*retval = rt;
   3242   1.1       mrg 	return (error);
   3243   1.1       mrg }
   3244   1.1       mrg 
   3245   1.1       mrg int
   3246  1.19       eeh netbsd32_pwrite(p, v, retval)
   3247   1.1       mrg 	struct proc *p;
   3248   1.1       mrg 	void *v;
   3249   1.1       mrg 	register_t *retval;
   3250   1.1       mrg {
   3251  1.19       eeh 	struct netbsd32_pwrite_args /* {
   3252   1.1       mrg 		syscallarg(int) fd;
   3253  1.10       mrg 		syscallarg(const netbsd32_voidp) buf;
   3254  1.10       mrg 		syscallarg(netbsd32_size_t) nbyte;
   3255   1.1       mrg 		syscallarg(int) pad;
   3256   1.1       mrg 		syscallarg(off_t) offset;
   3257   1.1       mrg 	} */ *uap = v;
   3258   1.1       mrg 	struct sys_pwrite_args ua;
   3259   1.1       mrg 	ssize_t rt;
   3260   1.1       mrg 	int error;
   3261   1.1       mrg 
   3262  1.11       mrg 	NETBSD32TO64_UAP(fd);
   3263  1.11       mrg 	NETBSD32TOP_UAP(buf, void);
   3264  1.11       mrg 	NETBSD32TOX_UAP(nbyte, size_t);
   3265  1.11       mrg 	NETBSD32TO64_UAP(pad);
   3266  1.11       mrg 	NETBSD32TO64_UAP(offset);
   3267   1.1       mrg 	error = sys_pwrite(p, &ua, (register_t *)&rt);
   3268  1.32       mrg 	*retval = rt;
   3269   1.1       mrg 	return (error);
   3270   1.1       mrg }
   3271   1.1       mrg 
   3272  1.56       mrg /* XXX MOVE ME XXX */
   3273  1.56       mrg /* XXX MOVE ME NTP START XXX */
   3274   1.6       eeh #ifdef NTP
   3275   1.1       mrg int
   3276  1.19       eeh netbsd32_ntp_gettime(p, v, retval)
   3277   1.1       mrg 	struct proc *p;
   3278   1.1       mrg 	void *v;
   3279   1.1       mrg 	register_t *retval;
   3280   1.1       mrg {
   3281  1.19       eeh 	struct netbsd32_ntp_gettime_args /* {
   3282  1.10       mrg 		syscallarg(netbsd32_ntptimevalp_t) ntvp;
   3283   1.1       mrg 	} */ *uap = v;
   3284  1.10       mrg 	struct netbsd32_ntptimeval ntv32;
   3285   1.6       eeh 	struct timeval atv;
   3286   1.1       mrg 	struct ntptimeval ntv;
   3287   1.6       eeh 	int error = 0;
   3288   1.6       eeh 	int s;
   3289   1.1       mrg 
   3290   1.6       eeh 	/* The following are NTP variables */
   3291   1.6       eeh 	extern long time_maxerror;
   3292   1.6       eeh 	extern long time_esterror;
   3293   1.6       eeh 	extern int time_status;
   3294   1.6       eeh 	extern int time_state;	/* clock state */
   3295   1.6       eeh 	extern int time_status;	/* clock status bits */
   3296   1.6       eeh 
   3297   1.6       eeh 	if (SCARG(uap, ntvp)) {
   3298   1.6       eeh 		s = splclock();
   3299   1.6       eeh #ifdef EXT_CLOCK
   3300   1.6       eeh 		/*
   3301   1.6       eeh 		 * The microtime() external clock routine returns a
   3302   1.6       eeh 		 * status code. If less than zero, we declare an error
   3303   1.6       eeh 		 * in the clock status word and return the kernel
   3304   1.6       eeh 		 * (software) time variable. While there are other
   3305   1.6       eeh 		 * places that call microtime(), this is the only place
   3306   1.6       eeh 		 * that matters from an application point of view.
   3307   1.6       eeh 		 */
   3308   1.6       eeh 		if (microtime(&atv) < 0) {
   3309   1.6       eeh 			time_status |= STA_CLOCKERR;
   3310   1.6       eeh 			ntv.time = time;
   3311   1.6       eeh 		} else
   3312   1.6       eeh 			time_status &= ~STA_CLOCKERR;
   3313   1.6       eeh #else /* EXT_CLOCK */
   3314   1.6       eeh 		microtime(&atv);
   3315   1.6       eeh #endif /* EXT_CLOCK */
   3316   1.6       eeh 		ntv.time = atv;
   3317   1.6       eeh 		ntv.maxerror = time_maxerror;
   3318   1.6       eeh 		ntv.esterror = time_esterror;
   3319   1.6       eeh 		(void) splx(s);
   3320   1.1       mrg 
   3321  1.10       mrg 		netbsd32_from_timeval(&ntv.time, &ntv32.time);
   3322  1.10       mrg 		ntv32.maxerror = (netbsd32_long)ntv.maxerror;
   3323  1.10       mrg 		ntv32.esterror = (netbsd32_long)ntv.esterror;
   3324   1.6       eeh 		error = copyout((caddr_t)&ntv32, (caddr_t)(u_long)SCARG(uap, ntvp),
   3325   1.6       eeh 		    sizeof(ntv32));
   3326   1.6       eeh 	}
   3327   1.6       eeh 	if (!error) {
   3328   1.6       eeh 
   3329   1.6       eeh 		/*
   3330   1.6       eeh 		 * Status word error decode. If any of these conditions
   3331   1.6       eeh 		 * occur, an error is returned, instead of the status
   3332   1.6       eeh 		 * word. Most applications will care only about the fact
   3333   1.6       eeh 		 * the system clock may not be trusted, not about the
   3334   1.6       eeh 		 * details.
   3335   1.6       eeh 		 *
   3336   1.6       eeh 		 * Hardware or software error
   3337   1.6       eeh 		 */
   3338   1.6       eeh 		if ((time_status & (STA_UNSYNC | STA_CLOCKERR)) ||
   3339   1.6       eeh 
   3340   1.6       eeh 		/*
   3341   1.6       eeh 		 * PPS signal lost when either time or frequency
   3342   1.6       eeh 		 * synchronization requested
   3343   1.6       eeh 		 */
   3344   1.6       eeh 		    (time_status & (STA_PPSFREQ | STA_PPSTIME) &&
   3345   1.6       eeh 		    !(time_status & STA_PPSSIGNAL)) ||
   3346   1.6       eeh 
   3347   1.6       eeh 		/*
   3348   1.6       eeh 		 * PPS jitter exceeded when time synchronization
   3349   1.6       eeh 		 * requested
   3350   1.6       eeh 		 */
   3351   1.6       eeh 		    (time_status & STA_PPSTIME &&
   3352   1.6       eeh 		    time_status & STA_PPSJITTER) ||
   3353   1.6       eeh 
   3354   1.6       eeh 		/*
   3355   1.6       eeh 		 * PPS wander exceeded or calibration error when
   3356   1.6       eeh 		 * frequency synchronization requested
   3357   1.6       eeh 		 */
   3358   1.6       eeh 		    (time_status & STA_PPSFREQ &&
   3359   1.6       eeh 		    time_status & (STA_PPSWANDER | STA_PPSERROR)))
   3360   1.6       eeh 			*retval = TIME_ERROR;
   3361   1.6       eeh 		else
   3362  1.32       mrg 			*retval = time_state;
   3363   1.1       mrg 	}
   3364  1.54       mrg 	return (error);
   3365   1.1       mrg }
   3366   1.1       mrg 
   3367   1.1       mrg int
   3368  1.19       eeh netbsd32_ntp_adjtime(p, v, retval)
   3369   1.1       mrg 	struct proc *p;
   3370   1.1       mrg 	void *v;
   3371   1.1       mrg 	register_t *retval;
   3372   1.1       mrg {
   3373  1.19       eeh 	struct netbsd32_ntp_adjtime_args /* {
   3374  1.10       mrg 		syscallarg(netbsd32_timexp_t) tp;
   3375   1.1       mrg 	} */ *uap = v;
   3376  1.10       mrg 	struct netbsd32_timex ntv32;
   3377   1.6       eeh 	struct timex ntv;
   3378   1.6       eeh 	int error = 0;
   3379   1.6       eeh 	int modes;
   3380   1.6       eeh 	int s;
   3381   1.6       eeh 	extern long time_freq;		/* frequency offset (scaled ppm) */
   3382   1.6       eeh 	extern long time_maxerror;
   3383   1.6       eeh 	extern long time_esterror;
   3384   1.6       eeh 	extern int time_state;	/* clock state */
   3385   1.6       eeh 	extern int time_status;	/* clock status bits */
   3386   1.6       eeh 	extern long time_constant;		/* pll time constant */
   3387   1.6       eeh 	extern long time_offset;		/* time offset (us) */
   3388   1.6       eeh 	extern long time_tolerance;	/* frequency tolerance (scaled ppm) */
   3389   1.6       eeh 	extern long time_precision;	/* clock precision (us) */
   3390   1.6       eeh 
   3391   1.6       eeh 	if ((error = copyin((caddr_t)(u_long)SCARG(uap, tp), (caddr_t)&ntv32,
   3392   1.6       eeh 			sizeof(ntv32))))
   3393   1.6       eeh 		return (error);
   3394  1.10       mrg 	netbsd32_to_timex(&ntv32, &ntv);
   3395   1.1       mrg 
   3396   1.6       eeh 	/*
   3397   1.6       eeh 	 * Update selected clock variables - only the superuser can
   3398   1.6       eeh 	 * change anything. Note that there is no error checking here on
   3399   1.6       eeh 	 * the assumption the superuser should know what it is doing.
   3400   1.6       eeh 	 */
   3401   1.6       eeh 	modes = ntv.modes;
   3402   1.6       eeh 	if (modes != 0 && (error = suser(p->p_ucred, &p->p_acflag)))
   3403   1.1       mrg 		return (error);
   3404   1.1       mrg 
   3405   1.6       eeh 	s = splclock();
   3406   1.6       eeh 	if (modes & MOD_FREQUENCY)
   3407   1.6       eeh #ifdef PPS_SYNC
   3408   1.6       eeh 		time_freq = ntv.freq - pps_freq;
   3409   1.6       eeh #else /* PPS_SYNC */
   3410   1.6       eeh 		time_freq = ntv.freq;
   3411   1.6       eeh #endif /* PPS_SYNC */
   3412   1.6       eeh 	if (modes & MOD_MAXERROR)
   3413   1.6       eeh 		time_maxerror = ntv.maxerror;
   3414   1.6       eeh 	if (modes & MOD_ESTERROR)
   3415   1.6       eeh 		time_esterror = ntv.esterror;
   3416   1.6       eeh 	if (modes & MOD_STATUS) {
   3417   1.6       eeh 		time_status &= STA_RONLY;
   3418   1.6       eeh 		time_status |= ntv.status & ~STA_RONLY;
   3419   1.6       eeh 	}
   3420   1.6       eeh 	if (modes & MOD_TIMECONST)
   3421   1.6       eeh 		time_constant = ntv.constant;
   3422   1.6       eeh 	if (modes & MOD_OFFSET)
   3423   1.6       eeh 		hardupdate(ntv.offset);
   3424   1.6       eeh 
   3425   1.6       eeh 	/*
   3426   1.6       eeh 	 * Retrieve all clock variables
   3427   1.6       eeh 	 */
   3428   1.6       eeh 	if (time_offset < 0)
   3429   1.6       eeh 		ntv.offset = -(-time_offset >> SHIFT_UPDATE);
   3430   1.6       eeh 	else
   3431   1.6       eeh 		ntv.offset = time_offset >> SHIFT_UPDATE;
   3432   1.6       eeh #ifdef PPS_SYNC
   3433   1.6       eeh 	ntv.freq = time_freq + pps_freq;
   3434   1.6       eeh #else /* PPS_SYNC */
   3435   1.6       eeh 	ntv.freq = time_freq;
   3436   1.6       eeh #endif /* PPS_SYNC */
   3437   1.6       eeh 	ntv.maxerror = time_maxerror;
   3438   1.6       eeh 	ntv.esterror = time_esterror;
   3439   1.6       eeh 	ntv.status = time_status;
   3440   1.6       eeh 	ntv.constant = time_constant;
   3441   1.6       eeh 	ntv.precision = time_precision;
   3442   1.6       eeh 	ntv.tolerance = time_tolerance;
   3443   1.6       eeh #ifdef PPS_SYNC
   3444   1.6       eeh 	ntv.shift = pps_shift;
   3445   1.6       eeh 	ntv.ppsfreq = pps_freq;
   3446   1.6       eeh 	ntv.jitter = pps_jitter >> PPS_AVG;
   3447   1.6       eeh 	ntv.stabil = pps_stabil;
   3448   1.6       eeh 	ntv.calcnt = pps_calcnt;
   3449   1.6       eeh 	ntv.errcnt = pps_errcnt;
   3450   1.6       eeh 	ntv.jitcnt = pps_jitcnt;
   3451   1.6       eeh 	ntv.stbcnt = pps_stbcnt;
   3452   1.6       eeh #endif /* PPS_SYNC */
   3453   1.6       eeh 	(void)splx(s);
   3454   1.6       eeh 
   3455  1.32       mrg 	netbsd32_from_timex(&ntv, &ntv32);
   3456  1.32       mrg 	error = copyout((caddr_t)&ntv32, (caddr_t)(u_long)SCARG(uap, tp),
   3457  1.32       mrg 	    sizeof(ntv32));
   3458   1.6       eeh 	if (!error) {
   3459   1.6       eeh 
   3460   1.6       eeh 		/*
   3461   1.6       eeh 		 * Status word error decode. See comments in
   3462   1.6       eeh 		 * ntp_gettime() routine.
   3463   1.6       eeh 		 */
   3464   1.6       eeh 		if ((time_status & (STA_UNSYNC | STA_CLOCKERR)) ||
   3465   1.6       eeh 		    (time_status & (STA_PPSFREQ | STA_PPSTIME) &&
   3466   1.6       eeh 		    !(time_status & STA_PPSSIGNAL)) ||
   3467   1.6       eeh 		    (time_status & STA_PPSTIME &&
   3468   1.6       eeh 		    time_status & STA_PPSJITTER) ||
   3469   1.6       eeh 		    (time_status & STA_PPSFREQ &&
   3470   1.6       eeh 		    time_status & (STA_PPSWANDER | STA_PPSERROR)))
   3471   1.6       eeh 			*retval = TIME_ERROR;
   3472   1.6       eeh 		else
   3473  1.32       mrg 			*retval = time_state;
   3474   1.6       eeh 	}
   3475   1.6       eeh 	return error;
   3476  1.36       eeh }
   3477  1.36       eeh #else
   3478  1.36       eeh int
   3479  1.36       eeh netbsd32_ntp_gettime(p, v, retval)
   3480  1.36       eeh 	struct proc *p;
   3481  1.36       eeh 	void *v;
   3482  1.36       eeh 	register_t *retval;
   3483  1.36       eeh {
   3484  1.54       mrg 
   3485  1.54       mrg 	return (ENOSYS);
   3486  1.36       eeh }
   3487  1.36       eeh 
   3488  1.36       eeh int
   3489  1.36       eeh netbsd32_ntp_adjtime(p, v, retval)
   3490  1.36       eeh 	struct proc *p;
   3491  1.36       eeh 	void *v;
   3492  1.36       eeh 	register_t *retval;
   3493  1.36       eeh {
   3494  1.54       mrg 
   3495  1.36       eeh 	return (ENOSYS);
   3496   1.6       eeh }
   3497   1.6       eeh #endif
   3498  1.56       mrg /* XXX MOVE ME NTP END XXX */
   3499   1.6       eeh 
   3500   1.6       eeh int
   3501  1.19       eeh netbsd32_setgid(p, v, retval)
   3502   1.6       eeh 	struct proc *p;
   3503   1.6       eeh 	void *v;
   3504   1.6       eeh 	register_t *retval;
   3505   1.6       eeh {
   3506  1.19       eeh 	struct netbsd32_setgid_args /* {
   3507   1.6       eeh 		syscallarg(gid_t) gid;
   3508   1.6       eeh 	} */ *uap = v;
   3509   1.6       eeh 	struct sys_setgid_args ua;
   3510   1.6       eeh 
   3511  1.11       mrg 	NETBSD32TO64_UAP(gid);
   3512   1.6       eeh 	return (sys_setgid(p, v, retval));
   3513   1.6       eeh }
   3514   1.6       eeh 
   3515   1.6       eeh int
   3516  1.19       eeh netbsd32_setegid(p, v, retval)
   3517   1.6       eeh 	struct proc *p;
   3518   1.6       eeh 	void *v;
   3519   1.6       eeh 	register_t *retval;
   3520   1.6       eeh {
   3521  1.19       eeh 	struct netbsd32_setegid_args /* {
   3522   1.6       eeh 		syscallarg(gid_t) egid;
   3523   1.6       eeh 	} */ *uap = v;
   3524   1.6       eeh 	struct sys_setegid_args ua;
   3525   1.6       eeh 
   3526  1.11       mrg 	NETBSD32TO64_UAP(egid);
   3527   1.6       eeh 	return (sys_setegid(p, v, retval));
   3528   1.6       eeh }
   3529   1.6       eeh 
   3530   1.6       eeh int
   3531  1.19       eeh netbsd32_seteuid(p, v, retval)
   3532   1.6       eeh 	struct proc *p;
   3533   1.6       eeh 	void *v;
   3534   1.6       eeh 	register_t *retval;
   3535   1.6       eeh {
   3536  1.19       eeh 	struct netbsd32_seteuid_args /* {
   3537   1.6       eeh 		syscallarg(gid_t) euid;
   3538   1.6       eeh 	} */ *uap = v;
   3539   1.6       eeh 	struct sys_seteuid_args ua;
   3540   1.6       eeh 
   3541  1.11       mrg 	NETBSD32TO64_UAP(euid);
   3542   1.6       eeh 	return (sys_seteuid(p, v, retval));
   3543   1.1       mrg }
   3544   1.1       mrg 
   3545   1.6       eeh #ifdef LFS
   3546   1.1       mrg int
   3547  1.20       eeh netbsd32_sys_lfs_bmapv(p, v, retval)
   3548   1.1       mrg 	struct proc *p;
   3549   1.1       mrg 	void *v;
   3550   1.1       mrg 	register_t *retval;
   3551   1.1       mrg {
   3552   1.1       mrg 
   3553   1.1       mrg 	return (ENOSYS);	/* XXX */
   3554   1.1       mrg }
   3555   1.1       mrg 
   3556   1.1       mrg int
   3557  1.20       eeh netbsd32_sys_lfs_markv(p, v, retval)
   3558   1.1       mrg 	struct proc *p;
   3559   1.1       mrg 	void *v;
   3560   1.1       mrg 	register_t *retval;
   3561   1.1       mrg {
   3562   1.1       mrg 
   3563   1.1       mrg 	return (ENOSYS);	/* XXX */
   3564   1.1       mrg }
   3565   1.1       mrg 
   3566   1.1       mrg int
   3567  1.20       eeh netbsd32_sys_lfs_segclean(p, v, retval)
   3568   1.1       mrg 	struct proc *p;
   3569   1.1       mrg 	void *v;
   3570   1.1       mrg 	register_t *retval;
   3571   1.1       mrg {
   3572  1.20       eeh 
   3573   1.1       mrg 	return (ENOSYS);	/* XXX */
   3574   1.1       mrg }
   3575   1.1       mrg 
   3576   1.1       mrg int
   3577  1.20       eeh netbsd32_sys_lfs_segwait(p, v, retval)
   3578   1.1       mrg 	struct proc *p;
   3579   1.1       mrg 	void *v;
   3580   1.1       mrg 	register_t *retval;
   3581   1.1       mrg {
   3582  1.20       eeh 
   3583   1.1       mrg 	return (ENOSYS);	/* XXX */
   3584   1.1       mrg }
   3585   1.6       eeh #endif
   3586   1.1       mrg 
   3587   1.1       mrg int
   3588  1.19       eeh netbsd32_pathconf(p, v, retval)
   3589   1.1       mrg 	struct proc *p;
   3590   1.1       mrg 	void *v;
   3591   1.1       mrg 	register_t *retval;
   3592   1.1       mrg {
   3593  1.19       eeh 	struct netbsd32_pathconf_args /* {
   3594   1.1       mrg 		syscallarg(int) fd;
   3595   1.1       mrg 		syscallarg(int) name;
   3596   1.1       mrg 	} */ *uap = v;
   3597   1.1       mrg 	struct sys_pathconf_args ua;
   3598   1.1       mrg 	long rt;
   3599   1.1       mrg 	int error;
   3600   1.1       mrg 
   3601  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   3602  1.11       mrg 	NETBSD32TO64_UAP(name);
   3603   1.1       mrg 	error = sys_pathconf(p, &ua, (register_t *)&rt);
   3604  1.32       mrg 	*retval = rt;
   3605   1.1       mrg 	return (error);
   3606   1.1       mrg }
   3607   1.1       mrg 
   3608   1.1       mrg int
   3609  1.19       eeh netbsd32_fpathconf(p, v, retval)
   3610   1.1       mrg 	struct proc *p;
   3611   1.1       mrg 	void *v;
   3612   1.1       mrg 	register_t *retval;
   3613   1.1       mrg {
   3614  1.19       eeh 	struct netbsd32_fpathconf_args /* {
   3615   1.1       mrg 		syscallarg(int) fd;
   3616   1.1       mrg 		syscallarg(int) name;
   3617   1.1       mrg 	} */ *uap = v;
   3618   1.1       mrg 	struct sys_fpathconf_args ua;
   3619   1.1       mrg 	long rt;
   3620   1.1       mrg 	int error;
   3621   1.1       mrg 
   3622  1.11       mrg 	NETBSD32TO64_UAP(fd);
   3623  1.11       mrg 	NETBSD32TO64_UAP(name);
   3624   1.1       mrg 	error = sys_fpathconf(p, &ua, (register_t *)&rt);
   3625  1.32       mrg 	*retval = rt;
   3626   1.1       mrg 	return (error);
   3627   1.1       mrg }
   3628   1.1       mrg 
   3629   1.1       mrg int
   3630  1.19       eeh netbsd32_getrlimit(p, v, retval)
   3631   1.1       mrg 	struct proc *p;
   3632   1.1       mrg 	void *v;
   3633   1.1       mrg 	register_t *retval;
   3634   1.1       mrg {
   3635  1.19       eeh 	struct netbsd32_getrlimit_args /* {
   3636   1.1       mrg 		syscallarg(int) which;
   3637  1.10       mrg 		syscallarg(netbsd32_rlimitp_t) rlp;
   3638   1.1       mrg 	} */ *uap = v;
   3639   1.6       eeh 	int which = SCARG(uap, which);
   3640   1.1       mrg 
   3641   1.6       eeh 	if ((u_int)which >= RLIM_NLIMITS)
   3642   1.6       eeh 		return (EINVAL);
   3643   1.6       eeh 	return (copyout(&p->p_rlimit[which], (caddr_t)(u_long)SCARG(uap, rlp),
   3644   1.6       eeh 	    sizeof(struct rlimit)));
   3645   1.1       mrg }
   3646   1.1       mrg 
   3647   1.1       mrg int
   3648  1.19       eeh netbsd32_setrlimit(p, v, retval)
   3649   1.1       mrg 	struct proc *p;
   3650   1.1       mrg 	void *v;
   3651   1.1       mrg 	register_t *retval;
   3652   1.1       mrg {
   3653  1.19       eeh 	struct netbsd32_setrlimit_args /* {
   3654   1.1       mrg 		syscallarg(int) which;
   3655  1.10       mrg 		syscallarg(const netbsd32_rlimitp_t) rlp;
   3656   1.1       mrg 	} */ *uap = v;
   3657   1.6       eeh 		int which = SCARG(uap, which);
   3658   1.6       eeh 	struct rlimit alim;
   3659   1.6       eeh 	int error;
   3660   1.1       mrg 
   3661   1.6       eeh 	error = copyin((caddr_t)(u_long)SCARG(uap, rlp), &alim, sizeof(struct rlimit));
   3662   1.6       eeh 	if (error)
   3663   1.6       eeh 		return (error);
   3664  1.18    bouyer 	return (dosetrlimit(p, p->p_cred, which, &alim));
   3665   1.1       mrg }
   3666   1.1       mrg 
   3667   1.1       mrg int
   3668  1.19       eeh netbsd32_mmap(p, v, retval)
   3669   1.1       mrg 	struct proc *p;
   3670   1.1       mrg 	void *v;
   3671   1.1       mrg 	register_t *retval;
   3672   1.1       mrg {
   3673  1.19       eeh 	struct netbsd32_mmap_args /* {
   3674  1.10       mrg 		syscallarg(netbsd32_voidp) addr;
   3675  1.10       mrg 		syscallarg(netbsd32_size_t) len;
   3676   1.1       mrg 		syscallarg(int) prot;
   3677   1.1       mrg 		syscallarg(int) flags;
   3678   1.1       mrg 		syscallarg(int) fd;
   3679  1.10       mrg 		syscallarg(netbsd32_long) pad;
   3680   1.1       mrg 		syscallarg(off_t) pos;
   3681   1.1       mrg 	} */ *uap = v;
   3682   1.1       mrg 	struct sys_mmap_args ua;
   3683   1.1       mrg 	void *rt;
   3684   1.1       mrg 	int error;
   3685   1.1       mrg 
   3686  1.11       mrg 	NETBSD32TOP_UAP(addr, void);
   3687  1.11       mrg 	NETBSD32TOX_UAP(len, size_t);
   3688  1.11       mrg 	NETBSD32TO64_UAP(prot);
   3689  1.11       mrg 	NETBSD32TO64_UAP(flags);
   3690  1.11       mrg 	NETBSD32TO64_UAP(fd);
   3691  1.11       mrg 	NETBSD32TOX_UAP(pad, long);
   3692  1.11       mrg 	NETBSD32TOX_UAP(pos, off_t);
   3693   1.1       mrg 	error = sys_mmap(p, &ua, (register_t *)&rt);
   3694  1.55       eeh 	if ((u_long)rt > (u_long)UINT_MAX) {
   3695  1.42  jdolecek 		printf("netbsd32_mmap: retval out of range: %p", rt);
   3696  1.55       eeh 		/* Should try to recover and return an error here. */
   3697  1.55       eeh 	}
   3698  1.10       mrg 	*retval = (netbsd32_voidp)(u_long)rt;
   3699   1.1       mrg 	return (error);
   3700   1.1       mrg }
   3701   1.1       mrg 
   3702   1.1       mrg int
   3703  1.19       eeh netbsd32_lseek(p, v, retval)
   3704   1.6       eeh 	struct proc *p;
   3705   1.6       eeh 	void *v;
   3706   1.6       eeh 	register_t *retval;
   3707   1.6       eeh {
   3708  1.19       eeh 	struct netbsd32_lseek_args /* {
   3709   1.6       eeh 		syscallarg(int) fd;
   3710   1.6       eeh 		syscallarg(int) pad;
   3711   1.6       eeh 		syscallarg(off_t) offset;
   3712   1.6       eeh 		syscallarg(int) whence;
   3713   1.6       eeh 	} */ *uap = v;
   3714   1.6       eeh 	struct sys_lseek_args ua;
   3715   1.6       eeh 
   3716  1.11       mrg 	NETBSD32TO64_UAP(fd);
   3717  1.11       mrg 	NETBSD32TO64_UAP(pad);
   3718  1.11       mrg 	NETBSD32TO64_UAP(offset);
   3719  1.11       mrg 	NETBSD32TO64_UAP(whence);
   3720   1.6       eeh 	return (sys_lseek(p, &ua, retval));
   3721   1.6       eeh }
   3722   1.6       eeh 
   3723   1.6       eeh int
   3724  1.19       eeh netbsd32_truncate(p, v, retval)
   3725   1.1       mrg 	struct proc *p;
   3726   1.1       mrg 	void *v;
   3727   1.1       mrg 	register_t *retval;
   3728   1.1       mrg {
   3729  1.19       eeh 	struct netbsd32_truncate_args /* {
   3730  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   3731   1.1       mrg 		syscallarg(int) pad;
   3732   1.1       mrg 		syscallarg(off_t) length;
   3733   1.1       mrg 	} */ *uap = v;
   3734   1.1       mrg 	struct sys_truncate_args ua;
   3735   1.1       mrg 
   3736  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   3737  1.11       mrg 	NETBSD32TO64_UAP(pad);
   3738  1.11       mrg 	NETBSD32TO64_UAP(length);
   3739   1.1       mrg 	return (sys_truncate(p, &ua, retval));
   3740   1.1       mrg }
   3741   1.1       mrg 
   3742   1.1       mrg int
   3743  1.19       eeh netbsd32_ftruncate(p, v, retval)
   3744   1.6       eeh 	struct proc *p;
   3745   1.6       eeh 	void *v;
   3746   1.6       eeh 	register_t *retval;
   3747   1.6       eeh {
   3748  1.19       eeh 	struct netbsd32_ftruncate_args /* {
   3749   1.6       eeh 		syscallarg(int) fd;
   3750   1.6       eeh 		syscallarg(int) pad;
   3751   1.6       eeh 		syscallarg(off_t) length;
   3752   1.6       eeh 	} */ *uap = v;
   3753   1.6       eeh 	struct sys_ftruncate_args ua;
   3754   1.6       eeh 
   3755  1.11       mrg 	NETBSD32TO64_UAP(fd);
   3756  1.11       mrg 	NETBSD32TO64_UAP(pad);
   3757  1.11       mrg 	NETBSD32TO64_UAP(length);
   3758   1.6       eeh 	return (sys_ftruncate(p, &ua, retval));
   3759   1.6       eeh }
   3760   1.6       eeh 
   3761  1.56       mrg /* XXX MOVE ME XXX */
   3762  1.52       mrg int uvm_sysctl32(int *, u_int, void *, size_t *, void *, size_t, struct proc *);
   3763  1.53       mrg int kern_sysctl32(int *, u_int, void *, size_t *, void *, size_t, struct proc *);
   3764  1.52       mrg 
   3765  1.52       mrg /*
   3766  1.52       mrg  * uvm_sysctl32: sysctl hook into UVM system, handling special 32-bit
   3767  1.52       mrg  * sensitive calls.
   3768  1.52       mrg  */
   3769  1.52       mrg int
   3770  1.52       mrg uvm_sysctl32(name, namelen, oldp, oldlenp, newp, newlen, p)
   3771  1.52       mrg 	int *name;
   3772  1.52       mrg 	u_int namelen;
   3773  1.52       mrg 	void *oldp;
   3774  1.52       mrg 	size_t *oldlenp;
   3775  1.52       mrg 	void *newp;
   3776  1.52       mrg 	size_t newlen;
   3777  1.52       mrg 	struct proc *p;
   3778  1.52       mrg {
   3779  1.52       mrg 	struct netbsd32_loadavg av32;
   3780  1.52       mrg 
   3781  1.52       mrg 	/* all sysctl names at this level are terminal */
   3782  1.52       mrg 	if (namelen != 1)
   3783  1.52       mrg 		return (ENOTDIR);		/* overloaded */
   3784  1.52       mrg 
   3785  1.52       mrg 	switch (name[0]) {
   3786  1.52       mrg 	case VM_LOADAVG:
   3787  1.52       mrg 		netbsd32_from_loadavg(&av32, &averunnable);
   3788  1.52       mrg 		return (sysctl_rdstruct(oldp, oldlenp, newp, &av32,
   3789  1.52       mrg 		    sizeof(av32)));
   3790  1.52       mrg 
   3791  1.52       mrg 	default:
   3792  1.52       mrg 		return (EOPNOTSUPP);
   3793  1.52       mrg 	}
   3794  1.52       mrg 	/* NOTREACHED */
   3795  1.52       mrg }
   3796  1.52       mrg 
   3797  1.56       mrg /* XXX MOVE ME XXX */
   3798  1.53       mrg /*
   3799  1.53       mrg  * kern_sysctl32: sysctl hook into KERN system, handling special 32-bit
   3800  1.53       mrg  * sensitive calls.
   3801  1.53       mrg  */
   3802  1.53       mrg int
   3803  1.53       mrg kern_sysctl32(name, namelen, oldp, oldlenp, newp, newlen, p)
   3804  1.53       mrg 	int *name;
   3805  1.53       mrg 	u_int namelen;
   3806  1.53       mrg 	void *oldp;
   3807  1.53       mrg 	size_t *oldlenp;
   3808  1.53       mrg 	void *newp;
   3809  1.53       mrg 	size_t newlen;
   3810  1.53       mrg 	struct proc *p;
   3811  1.53       mrg {
   3812  1.53       mrg 	struct netbsd32_timeval bt32;
   3813  1.53       mrg 
   3814  1.53       mrg 	/* All sysctl names at this level, except for a few, are terminal. */
   3815  1.53       mrg 	switch (name[0]) {
   3816  1.53       mrg #if 0
   3817  1.53       mrg 	case KERN_PROC:
   3818  1.53       mrg 	case KERN_PROC2:
   3819  1.53       mrg 	case KERN_PROF:
   3820  1.53       mrg 	case KERN_MBUF:
   3821  1.53       mrg 	case KERN_PROC_ARGS:
   3822  1.53       mrg 	case KERN_SYSVIPC_INFO:
   3823  1.53       mrg 		/* Not terminal. */
   3824  1.53       mrg 		break;
   3825  1.53       mrg #endif
   3826  1.53       mrg 	default:
   3827  1.53       mrg 		if (namelen != 1)
   3828  1.53       mrg 			return (ENOTDIR);	/* overloaded */
   3829  1.53       mrg 	}
   3830  1.53       mrg 
   3831  1.53       mrg 	switch (name[0]) {
   3832  1.53       mrg 	case KERN_BOOTTIME:
   3833  1.53       mrg 		netbsd32_from_timeval(&boottime, &bt32);
   3834  1.53       mrg 		return (sysctl_rdstruct(oldp, oldlenp, newp, &bt32,
   3835  1.53       mrg 		    sizeof(struct netbsd32_timeval)));
   3836  1.53       mrg 
   3837  1.53       mrg 	default:
   3838  1.53       mrg 		return (EOPNOTSUPP);
   3839  1.53       mrg 	}
   3840  1.53       mrg 	/* NOTREACHED */
   3841  1.53       mrg }
   3842  1.53       mrg 
   3843  1.56       mrg /* XXX MOVE ME XXX */
   3844   1.6       eeh int
   3845  1.19       eeh netbsd32___sysctl(p, v, retval)
   3846   1.1       mrg 	struct proc *p;
   3847   1.1       mrg 	void *v;
   3848   1.1       mrg 	register_t *retval;
   3849   1.1       mrg {
   3850  1.19       eeh 	struct netbsd32___sysctl_args /* {
   3851  1.10       mrg 		syscallarg(netbsd32_intp) name;
   3852   1.1       mrg 		syscallarg(u_int) namelen;
   3853  1.10       mrg 		syscallarg(netbsd32_voidp) old;
   3854  1.10       mrg 		syscallarg(netbsd32_size_tp) oldlenp;
   3855  1.10       mrg 		syscallarg(netbsd32_voidp) new;
   3856  1.10       mrg 		syscallarg(netbsd32_size_t) newlen;
   3857   1.1       mrg 	} */ *uap = v;
   3858  1.34   thorpej 	int error;
   3859  1.10       mrg 	netbsd32_size_t savelen = 0;
   3860   1.6       eeh 	size_t oldlen = 0;
   3861   1.6       eeh 	sysctlfn *fn;
   3862   1.6       eeh 	int name[CTL_MAXNAME];
   3863   1.6       eeh 
   3864   1.6       eeh /*
   3865   1.6       eeh  * Some of these sysctl functions do their own copyin/copyout.
   3866   1.6       eeh  * We need to disable or emulate the ones that need their
   3867   1.6       eeh  * arguments converted.
   3868   1.6       eeh  */
   3869   1.6       eeh 
   3870   1.6       eeh 	if (SCARG(uap, new) != NULL &&
   3871   1.6       eeh 	    (error = suser(p->p_ucred, &p->p_acflag)))
   3872   1.6       eeh 		return (error);
   3873   1.6       eeh 	/*
   3874   1.6       eeh 	 * all top-level sysctl names are non-terminal
   3875   1.6       eeh 	 */
   3876   1.6       eeh 	if (SCARG(uap, namelen) > CTL_MAXNAME || SCARG(uap, namelen) < 2)
   3877   1.6       eeh 		return (EINVAL);
   3878   1.6       eeh 	error = copyin((caddr_t)(u_long)SCARG(uap, name), &name,
   3879   1.6       eeh 		       SCARG(uap, namelen) * sizeof(int));
   3880   1.6       eeh 	if (error)
   3881   1.6       eeh 		return (error);
   3882   1.6       eeh 
   3883   1.6       eeh 	switch (name[0]) {
   3884   1.6       eeh 	case CTL_KERN:
   3885  1.53       mrg 		switch (name[1]) {
   3886  1.53       mrg #if 0
   3887  1.53       mrg 		case KERN_FILE:
   3888  1.53       mrg 		case KERN_NTPTIME:
   3889  1.53       mrg 		case KERN_SYSVIPC_INFO:
   3890  1.53       mrg #endif
   3891  1.53       mrg 		case KERN_BOOTTIME:
   3892  1.53       mrg 			fn = kern_sysctl32;
   3893  1.53       mrg 			break;
   3894  1.53       mrg 		default:
   3895  1.53       mrg 			fn = kern_sysctl;
   3896  1.53       mrg 			break;
   3897  1.53       mrg 		}
   3898   1.6       eeh 		break;
   3899   1.6       eeh 	case CTL_HW:
   3900   1.6       eeh 		fn = hw_sysctl;
   3901   1.6       eeh 		break;
   3902   1.6       eeh 	case CTL_VM:
   3903  1.52       mrg 		switch (name[1]) {
   3904  1.52       mrg 		case VM_LOADAVG:
   3905  1.52       mrg 			fn = uvm_sysctl32;	/* need to convert a `long' */
   3906  1.52       mrg 			break;
   3907  1.52       mrg 		default:
   3908  1.52       mrg 			fn = uvm_sysctl;
   3909  1.52       mrg 			break;
   3910  1.52       mrg 		}
   3911   1.6       eeh 		break;
   3912   1.6       eeh 	case CTL_NET:
   3913   1.6       eeh 		fn = net_sysctl;
   3914   1.6       eeh 		break;
   3915   1.6       eeh 	case CTL_VFS:
   3916   1.6       eeh 		fn = vfs_sysctl;
   3917   1.6       eeh 		break;
   3918   1.6       eeh 	case CTL_MACHDEP:
   3919   1.6       eeh 		fn = cpu_sysctl;
   3920   1.6       eeh 		break;
   3921   1.6       eeh #ifdef DEBUG
   3922   1.6       eeh 	case CTL_DEBUG:
   3923   1.6       eeh 		fn = debug_sysctl;
   3924   1.6       eeh 		break;
   3925   1.6       eeh #endif
   3926   1.6       eeh #ifdef DDB
   3927   1.6       eeh 	case CTL_DDB:
   3928   1.6       eeh 		fn = ddb_sysctl;
   3929   1.6       eeh 		break;
   3930   1.6       eeh #endif
   3931  1.34   thorpej 	case CTL_PROC:
   3932  1.34   thorpej 		fn = proc_sysctl;
   3933  1.34   thorpej 		break;
   3934   1.6       eeh 	default:
   3935   1.6       eeh 		return (EOPNOTSUPP);
   3936   1.6       eeh 	}
   3937   1.1       mrg 
   3938  1.34   thorpej 	/*
   3939  1.34   thorpej 	 * XXX Hey, we wire `old', but what about `new'?
   3940  1.34   thorpej 	 */
   3941  1.34   thorpej 
   3942   1.6       eeh 	if (SCARG(uap, oldlenp) &&
   3943  1.34   thorpej 	    (error = copyin((caddr_t)(u_long)SCARG(uap, oldlenp), &savelen,
   3944  1.34   thorpej 	     sizeof(savelen))))
   3945   1.6       eeh 		return (error);
   3946   1.6       eeh 	if (SCARG(uap, old) != NULL) {
   3947  1.34   thorpej 		error = lockmgr(&sysctl_memlock, LK_EXCLUSIVE, NULL);
   3948  1.34   thorpej 		if (error)
   3949  1.34   thorpej 			return (error);
   3950  1.34   thorpej 		if (uvm_vslock(p, (void *)(u_long)SCARG(uap, old), savelen,
   3951  1.34   thorpej 		    VM_PROT_READ|VM_PROT_WRITE) != KERN_SUCCESS) {
   3952  1.34   thorpej 			(void) lockmgr(&sysctl_memlock, LK_RELEASE, NULL);
   3953   1.6       eeh 			return (EFAULT);
   3954  1.13   thorpej 		}
   3955   1.6       eeh 		oldlen = savelen;
   3956   1.6       eeh 	}
   3957  1.20       eeh 	error = (*fn)(name + 1, SCARG(uap, namelen) - 1,
   3958  1.20       eeh 		      (void *)(u_long)SCARG(uap, old), &oldlen,
   3959  1.20       eeh 		      (void *)(u_long)SCARG(uap, new), SCARG(uap, newlen), p);
   3960   1.6       eeh 	if (SCARG(uap, old) != NULL) {
   3961  1.34   thorpej 		uvm_vsunlock(p, (void *)(u_long)SCARG(uap, old), savelen);
   3962  1.34   thorpej 		(void) lockmgr(&sysctl_memlock, LK_RELEASE, NULL);
   3963   1.6       eeh 	}
   3964   1.6       eeh 	savelen = oldlen;
   3965   1.6       eeh 	if (error)
   3966   1.6       eeh 		return (error);
   3967   1.6       eeh 	if (SCARG(uap, oldlenp))
   3968  1.34   thorpej 		error = copyout(&savelen,
   3969  1.34   thorpej 		    (caddr_t)(u_long)SCARG(uap, oldlenp), sizeof(savelen));
   3970   1.6       eeh 	return (error);
   3971   1.1       mrg }
   3972   1.1       mrg 
   3973   1.1       mrg int
   3974  1.19       eeh netbsd32_mlock(p, v, retval)
   3975   1.1       mrg 	struct proc *p;
   3976   1.1       mrg 	void *v;
   3977   1.1       mrg 	register_t *retval;
   3978   1.1       mrg {
   3979  1.19       eeh 	struct netbsd32_mlock_args /* {
   3980  1.10       mrg 		syscallarg(const netbsd32_voidp) addr;
   3981  1.10       mrg 		syscallarg(netbsd32_size_t) len;
   3982   1.1       mrg 	} */ *uap = v;
   3983   1.1       mrg 	struct sys_mlock_args ua;
   3984   1.1       mrg 
   3985  1.11       mrg 	NETBSD32TOP_UAP(addr, const void);
   3986  1.11       mrg 	NETBSD32TO64_UAP(len);
   3987   1.1       mrg 	return (sys_mlock(p, &ua, retval));
   3988   1.1       mrg }
   3989   1.1       mrg 
   3990   1.1       mrg int
   3991  1.19       eeh netbsd32_munlock(p, v, retval)
   3992   1.1       mrg 	struct proc *p;
   3993   1.1       mrg 	void *v;
   3994   1.1       mrg 	register_t *retval;
   3995   1.1       mrg {
   3996  1.19       eeh 	struct netbsd32_munlock_args /* {
   3997  1.10       mrg 		syscallarg(const netbsd32_voidp) addr;
   3998  1.10       mrg 		syscallarg(netbsd32_size_t) len;
   3999   1.1       mrg 	} */ *uap = v;
   4000   1.1       mrg 	struct sys_munlock_args ua;
   4001   1.1       mrg 
   4002  1.11       mrg 	NETBSD32TOP_UAP(addr, const void);
   4003  1.11       mrg 	NETBSD32TO64_UAP(len);
   4004   1.1       mrg 	return (sys_munlock(p, &ua, retval));
   4005   1.1       mrg }
   4006   1.1       mrg 
   4007   1.1       mrg int
   4008  1.19       eeh netbsd32_undelete(p, v, retval)
   4009   1.1       mrg 	struct proc *p;
   4010   1.1       mrg 	void *v;
   4011   1.1       mrg 	register_t *retval;
   4012   1.1       mrg {
   4013  1.19       eeh 	struct netbsd32_undelete_args /* {
   4014  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   4015   1.1       mrg 	} */ *uap = v;
   4016   1.1       mrg 	struct sys_undelete_args ua;
   4017   1.1       mrg 
   4018  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   4019   1.1       mrg 	return (sys_undelete(p, &ua, retval));
   4020   1.1       mrg }
   4021   1.1       mrg 
   4022  1.56       mrg /* XXX MOVE ME XXX */
   4023   1.1       mrg int
   4024  1.19       eeh netbsd32_futimes(p, v, retval)
   4025   1.1       mrg 	struct proc *p;
   4026   1.1       mrg 	void *v;
   4027   1.1       mrg 	register_t *retval;
   4028   1.1       mrg {
   4029  1.19       eeh 	struct netbsd32_futimes_args /* {
   4030   1.1       mrg 		syscallarg(int) fd;
   4031  1.10       mrg 		syscallarg(const netbsd32_timevalp_t) tptr;
   4032   1.1       mrg 	} */ *uap = v;
   4033   1.6       eeh 	int error;
   4034   1.6       eeh 	struct file *fp;
   4035   1.6       eeh 
   4036  1.12   thorpej 	/* getvnode() will use the descriptor for us */
   4037   1.6       eeh 	if ((error = getvnode(p->p_fd, SCARG(uap, fd), &fp)) != 0)
   4038   1.6       eeh 		return (error);
   4039   1.6       eeh 
   4040  1.12   thorpej 	error = change_utimes32((struct vnode *)fp->f_data,
   4041  1.54       mrg 				SCARG(uap, tptr), p);
   4042  1.19       eeh 	FILE_UNUSE(fp, p);
   4043  1.12   thorpej 	return (error);
   4044   1.6       eeh }
   4045   1.6       eeh 
   4046   1.6       eeh int
   4047  1.19       eeh netbsd32_getpgid(p, v, retval)
   4048   1.6       eeh 	struct proc *p;
   4049   1.6       eeh 	void *v;
   4050   1.6       eeh 	register_t *retval;
   4051   1.6       eeh {
   4052  1.19       eeh 	struct netbsd32_getpgid_args /* {
   4053   1.6       eeh 		syscallarg(pid_t) pid;
   4054   1.6       eeh 	} */ *uap = v;
   4055   1.6       eeh 	struct sys_getpgid_args ua;
   4056   1.1       mrg 
   4057  1.11       mrg 	NETBSD32TO64_UAP(pid);
   4058   1.6       eeh 	return (sys_getpgid(p, &ua, retval));
   4059   1.1       mrg }
   4060   1.1       mrg 
   4061   1.1       mrg int
   4062  1.19       eeh netbsd32_reboot(p, v, retval)
   4063   1.1       mrg 	struct proc *p;
   4064   1.1       mrg 	void *v;
   4065   1.1       mrg 	register_t *retval;
   4066   1.1       mrg {
   4067  1.19       eeh 	struct netbsd32_reboot_args /* {
   4068   1.1       mrg 		syscallarg(int) opt;
   4069  1.10       mrg 		syscallarg(netbsd32_charp) bootstr;
   4070   1.1       mrg 	} */ *uap = v;
   4071   1.1       mrg 	struct sys_reboot_args ua;
   4072   1.1       mrg 
   4073  1.11       mrg 	NETBSD32TO64_UAP(opt);
   4074  1.11       mrg 	NETBSD32TOP_UAP(bootstr, char);
   4075   1.1       mrg 	return (sys_reboot(p, &ua, retval));
   4076   1.1       mrg }
   4077   1.1       mrg 
   4078   1.1       mrg int
   4079  1.19       eeh netbsd32_poll(p, v, retval)
   4080   1.1       mrg 	struct proc *p;
   4081   1.1       mrg 	void *v;
   4082   1.1       mrg 	register_t *retval;
   4083   1.1       mrg {
   4084  1.19       eeh 	struct netbsd32_poll_args /* {
   4085  1.10       mrg 		syscallarg(netbsd32_pollfdp_t) fds;
   4086   1.1       mrg 		syscallarg(u_int) nfds;
   4087   1.1       mrg 		syscallarg(int) timeout;
   4088   1.1       mrg 	} */ *uap = v;
   4089   1.1       mrg 	struct sys_poll_args ua;
   4090   1.1       mrg 
   4091  1.11       mrg 	NETBSD32TOP_UAP(fds, struct pollfd);
   4092  1.11       mrg 	NETBSD32TO64_UAP(nfds);
   4093  1.11       mrg 	NETBSD32TO64_UAP(timeout);
   4094   1.1       mrg 	return (sys_poll(p, &ua, retval));
   4095   1.1       mrg }
   4096   1.1       mrg 
   4097  1.56       mrg /* XXX MOVE ME XXX */
   4098  1.56       mrg /* XXX MOVE ME IPC START */
   4099  1.20       eeh #if defined(SYSVSEM)
   4100   1.6       eeh /*
   4101   1.6       eeh  * XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
   4102   1.6       eeh  *
   4103   1.6       eeh  * This is BSD.  We won't support System V IPC.
   4104   1.6       eeh  * Too much work.
   4105   1.6       eeh  *
   4106   1.6       eeh  * XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
   4107   1.6       eeh  */
   4108   1.1       mrg int
   4109  1.22  christos netbsd32___semctl14(p, v, retval)
   4110   1.1       mrg 	struct proc *p;
   4111   1.1       mrg 	void *v;
   4112   1.1       mrg 	register_t *retval;
   4113   1.1       mrg {
   4114   1.6       eeh #if 0
   4115  1.19       eeh 	struct netbsd32___semctl_args /* {
   4116   1.1       mrg 		syscallarg(int) semid;
   4117   1.1       mrg 		syscallarg(int) semnum;
   4118   1.1       mrg 		syscallarg(int) cmd;
   4119  1.22  christos 		syscallarg(netbsd32_semunu_t *) arg;
   4120   1.1       mrg 	} */ *uap = v;
   4121  1.10       mrg 	union netbsd32_semun sem32;
   4122   1.6       eeh 	int semid = SCARG(uap, semid);
   4123   1.6       eeh 	int semnum = SCARG(uap, semnum);
   4124   1.6       eeh 	int cmd = SCARG(uap, cmd);
   4125  1.10       mrg 	union netbsd32_semun *arg = (void*)(u_long)SCARG(uap, arg);
   4126  1.10       mrg 	union netbsd32_semun real_arg;
   4127   1.6       eeh 	struct ucred *cred = p->p_ucred;
   4128   1.6       eeh 	int i, rval, eval;
   4129  1.10       mrg 	struct netbsd32_semid_ds sbuf;
   4130  1.25  augustss 	struct semid_ds *semaptr;
   4131   1.6       eeh 
   4132   1.6       eeh 	semlock(p);
   4133   1.6       eeh 
   4134   1.6       eeh 	semid = IPCID_TO_IX(semid);
   4135   1.6       eeh 	if (semid < 0 || semid >= seminfo.semmsl)
   4136   1.6       eeh 		return(EINVAL);
   4137   1.6       eeh 
   4138   1.6       eeh 	semaptr = &sema[semid];
   4139   1.6       eeh 	if ((semaptr->sem_perm.mode & SEM_ALLOC) == 0 ||
   4140   1.6       eeh 	    semaptr->sem_perm.seq != IPCID_TO_SEQ(SCARG(uap, semid)))
   4141   1.6       eeh 		return(EINVAL);
   4142   1.6       eeh 
   4143   1.6       eeh 	eval = 0;
   4144   1.6       eeh 	rval = 0;
   4145   1.6       eeh 
   4146   1.6       eeh 	switch (cmd) {
   4147   1.6       eeh 	case IPC_RMID:
   4148   1.6       eeh 		if ((eval = ipcperm(cred, &semaptr->sem_perm, IPC_M)) != 0)
   4149   1.6       eeh 			return(eval);
   4150   1.6       eeh 		semaptr->sem_perm.cuid = cred->cr_uid;
   4151   1.6       eeh 		semaptr->sem_perm.uid = cred->cr_uid;
   4152   1.6       eeh 		semtot -= semaptr->sem_nsems;
   4153  1.19       eeh 		for (i = semaptr->_sem_base - sem; i < semtot; i++)
   4154   1.6       eeh 			sem[i] = sem[i + semaptr->sem_nsems];
   4155   1.6       eeh 		for (i = 0; i < seminfo.semmni; i++) {
   4156   1.6       eeh 			if ((sema[i].sem_perm.mode & SEM_ALLOC) &&
   4157  1.19       eeh 			    sema[i]._sem_base > semaptr->_sem_base)
   4158  1.19       eeh 				sema[i]._sem_base -= semaptr->sem_nsems;
   4159   1.6       eeh 		}
   4160   1.6       eeh 		semaptr->sem_perm.mode = 0;
   4161   1.6       eeh 		semundo_clear(semid, -1);
   4162   1.6       eeh 		wakeup((caddr_t)semaptr);
   4163   1.6       eeh 		break;
   4164   1.6       eeh 
   4165   1.6       eeh 	case IPC_SET:
   4166   1.6       eeh 		if ((eval = ipcperm(cred, &semaptr->sem_perm, IPC_M)))
   4167   1.6       eeh 			return(eval);
   4168   1.6       eeh 		if ((eval = copyin(arg, &real_arg, sizeof(real_arg))) != 0)
   4169   1.6       eeh 			return(eval);
   4170   1.6       eeh 		if ((eval = copyin((caddr_t)(u_long)real_arg.buf, (caddr_t)&sbuf,
   4171   1.6       eeh 		    sizeof(sbuf))) != 0)
   4172   1.6       eeh 			return(eval);
   4173   1.6       eeh 		semaptr->sem_perm.uid = sbuf.sem_perm.uid;
   4174   1.6       eeh 		semaptr->sem_perm.gid = sbuf.sem_perm.gid;
   4175   1.6       eeh 		semaptr->sem_perm.mode = (semaptr->sem_perm.mode & ~0777) |
   4176   1.6       eeh 		    (sbuf.sem_perm.mode & 0777);
   4177   1.6       eeh 		semaptr->sem_ctime = time.tv_sec;
   4178   1.6       eeh 		break;
   4179   1.6       eeh 
   4180   1.6       eeh 	case IPC_STAT:
   4181   1.6       eeh 		if ((eval = ipcperm(cred, &semaptr->sem_perm, IPC_R)))
   4182   1.6       eeh 			return(eval);
   4183   1.6       eeh 		if ((eval = copyin(arg, &real_arg, sizeof(real_arg))) != 0)
   4184   1.6       eeh 			return(eval);
   4185   1.6       eeh 		eval = copyout((caddr_t)semaptr, (caddr_t)(u_long)real_arg.buf,
   4186   1.6       eeh 		    sizeof(struct semid_ds));
   4187   1.6       eeh 		break;
   4188   1.6       eeh 
   4189   1.6       eeh 	case GETNCNT:
   4190   1.6       eeh 		if ((eval = ipcperm(cred, &semaptr->sem_perm, IPC_R)))
   4191   1.6       eeh 			return(eval);
   4192   1.6       eeh 		if (semnum < 0 || semnum >= semaptr->sem_nsems)
   4193   1.6       eeh 			return(EINVAL);
   4194  1.19       eeh 		rval = semaptr->_sem_base[semnum].semncnt;
   4195   1.6       eeh 		break;
   4196   1.6       eeh 
   4197   1.6       eeh 	case GETPID:
   4198   1.6       eeh 		if ((eval = ipcperm(cred, &semaptr->sem_perm, IPC_R)))
   4199   1.6       eeh 			return(eval);
   4200   1.6       eeh 		if (semnum < 0 || semnum >= semaptr->sem_nsems)
   4201   1.6       eeh 			return(EINVAL);
   4202  1.19       eeh 		rval = semaptr->_sem_base[semnum].sempid;
   4203   1.6       eeh 		break;
   4204   1.6       eeh 
   4205   1.6       eeh 	case GETVAL:
   4206   1.6       eeh 		if ((eval = ipcperm(cred, &semaptr->sem_perm, IPC_R)))
   4207   1.6       eeh 			return(eval);
   4208   1.6       eeh 		if (semnum < 0 || semnum >= semaptr->sem_nsems)
   4209   1.6       eeh 			return(EINVAL);
   4210  1.19       eeh 		rval = semaptr->_sem_base[semnum].semval;
   4211   1.6       eeh 		break;
   4212   1.6       eeh 
   4213   1.6       eeh 	case GETALL:
   4214   1.6       eeh 		if ((eval = ipcperm(cred, &semaptr->sem_perm, IPC_R)))
   4215   1.6       eeh 			return(eval);
   4216   1.6       eeh 		if ((eval = copyin(arg, &real_arg, sizeof(real_arg))) != 0)
   4217   1.6       eeh 			return(eval);
   4218   1.6       eeh 		for (i = 0; i < semaptr->sem_nsems; i++) {
   4219  1.19       eeh 			eval = copyout((caddr_t)&semaptr->_sem_base[i].semval,
   4220   1.6       eeh 			    &real_arg.array[i], sizeof(real_arg.array[0]));
   4221   1.6       eeh 			if (eval != 0)
   4222   1.6       eeh 				break;
   4223   1.6       eeh 		}
   4224   1.6       eeh 		break;
   4225   1.1       mrg 
   4226   1.6       eeh 	case GETZCNT:
   4227   1.6       eeh 		if ((eval = ipcperm(cred, &semaptr->sem_perm, IPC_R)))
   4228   1.6       eeh 			return(eval);
   4229   1.6       eeh 		if (semnum < 0 || semnum >= semaptr->sem_nsems)
   4230   1.6       eeh 			return(EINVAL);
   4231  1.19       eeh 		rval = semaptr->_sem_base[semnum].semzcnt;
   4232   1.6       eeh 		break;
   4233   1.6       eeh 
   4234   1.6       eeh 	case SETVAL:
   4235   1.6       eeh 		if ((eval = ipcperm(cred, &semaptr->sem_perm, IPC_W)))
   4236   1.6       eeh 			return(eval);
   4237   1.6       eeh 		if (semnum < 0 || semnum >= semaptr->sem_nsems)
   4238   1.6       eeh 			return(EINVAL);
   4239   1.6       eeh 		if ((eval = copyin(arg, &real_arg, sizeof(real_arg))) != 0)
   4240   1.6       eeh 			return(eval);
   4241  1.19       eeh 		semaptr->_sem_base[semnum].semval = real_arg.val;
   4242   1.6       eeh 		semundo_clear(semid, semnum);
   4243   1.6       eeh 		wakeup((caddr_t)semaptr);
   4244   1.6       eeh 		break;
   4245   1.6       eeh 
   4246   1.6       eeh 	case SETALL:
   4247   1.6       eeh 		if ((eval = ipcperm(cred, &semaptr->sem_perm, IPC_W)))
   4248   1.6       eeh 			return(eval);
   4249   1.6       eeh 		if ((eval = copyin(arg, &real_arg, sizeof(real_arg))) != 0)
   4250   1.6       eeh 			return(eval);
   4251   1.6       eeh 		for (i = 0; i < semaptr->sem_nsems; i++) {
   4252   1.6       eeh 			eval = copyin(&real_arg.array[i],
   4253  1.19       eeh 			    (caddr_t)&semaptr->_sem_base[i].semval,
   4254   1.6       eeh 			    sizeof(real_arg.array[0]));
   4255   1.6       eeh 			if (eval != 0)
   4256   1.6       eeh 				break;
   4257   1.1       mrg 		}
   4258   1.6       eeh 		semundo_clear(semid, -1);
   4259   1.6       eeh 		wakeup((caddr_t)semaptr);
   4260   1.6       eeh 		break;
   4261   1.1       mrg 
   4262   1.6       eeh 	default:
   4263   1.6       eeh 		return(EINVAL);
   4264   1.6       eeh 	}
   4265   1.1       mrg 
   4266   1.6       eeh 	if (eval == 0)
   4267   1.6       eeh 		*retval = rval;
   4268   1.6       eeh 	return(eval);
   4269   1.6       eeh #else
   4270   1.6       eeh 	return (ENOSYS);
   4271   1.6       eeh #endif
   4272   1.1       mrg }
   4273   1.1       mrg 
   4274   1.1       mrg int
   4275  1.19       eeh netbsd32_semget(p, v, retval)
   4276   1.1       mrg 	struct proc *p;
   4277   1.1       mrg 	void *v;
   4278   1.1       mrg 	register_t *retval;
   4279   1.1       mrg {
   4280  1.19       eeh 	struct netbsd32_semget_args /* {
   4281  1.10       mrg 		syscallarg(netbsd32_key_t) key;
   4282   1.1       mrg 		syscallarg(int) nsems;
   4283   1.1       mrg 		syscallarg(int) semflg;
   4284   1.1       mrg 	} */ *uap = v;
   4285   1.1       mrg 	struct sys_semget_args ua;
   4286   1.1       mrg 
   4287  1.11       mrg 	NETBSD32TOX_UAP(key, key_t);
   4288  1.11       mrg 	NETBSD32TO64_UAP(nsems);
   4289  1.11       mrg 	NETBSD32TO64_UAP(semflg);
   4290   1.1       mrg 	return (sys_semget(p, &ua, retval));
   4291   1.1       mrg }
   4292   1.1       mrg 
   4293   1.1       mrg int
   4294  1.19       eeh netbsd32_semop(p, v, retval)
   4295   1.1       mrg 	struct proc *p;
   4296   1.1       mrg 	void *v;
   4297   1.1       mrg 	register_t *retval;
   4298   1.1       mrg {
   4299  1.19       eeh 	struct netbsd32_semop_args /* {
   4300   1.1       mrg 		syscallarg(int) semid;
   4301  1.10       mrg 		syscallarg(netbsd32_sembufp_t) sops;
   4302  1.10       mrg 		syscallarg(netbsd32_size_t) nsops;
   4303   1.1       mrg 	} */ *uap = v;
   4304   1.1       mrg 	struct sys_semop_args ua;
   4305   1.1       mrg 
   4306  1.11       mrg 	NETBSD32TO64_UAP(semid);
   4307  1.11       mrg 	NETBSD32TOP_UAP(sops, struct sembuf);
   4308  1.11       mrg 	NETBSD32TOX_UAP(nsops, size_t);
   4309   1.2       mrg 	return (sys_semop(p, &ua, retval));
   4310   1.1       mrg }
   4311   1.1       mrg 
   4312   1.1       mrg int
   4313  1.19       eeh netbsd32_semconfig(p, v, retval)
   4314   1.6       eeh 	struct proc *p;
   4315   1.6       eeh 	void *v;
   4316   1.6       eeh 	register_t *retval;
   4317   1.6       eeh {
   4318  1.19       eeh 	struct netbsd32_semconfig_args /* {
   4319   1.6       eeh 		syscallarg(int) flag;
   4320   1.6       eeh 	} */ *uap = v;
   4321   1.6       eeh 	struct sys_semconfig_args ua;
   4322   1.6       eeh 
   4323  1.11       mrg 	NETBSD32TO64_UAP(flag);
   4324   1.6       eeh 	return (sys_semconfig(p, &ua, retval));
   4325   1.6       eeh }
   4326  1.20       eeh #endif /* SYSVSEM */
   4327  1.20       eeh 
   4328  1.20       eeh #if defined(SYSVMSG)
   4329   1.6       eeh 
   4330   1.6       eeh int
   4331  1.20       eeh netbsd32___msgctl13(p, v, retval)
   4332   1.1       mrg 	struct proc *p;
   4333   1.1       mrg 	void *v;
   4334   1.1       mrg 	register_t *retval;
   4335   1.1       mrg {
   4336   1.6       eeh #if 0
   4337  1.19       eeh 	struct netbsd32_msgctl_args /* {
   4338   1.1       mrg 		syscallarg(int) msqid;
   4339   1.1       mrg 		syscallarg(int) cmd;
   4340  1.10       mrg 		syscallarg(netbsd32_msqid_dsp_t) buf;
   4341   1.1       mrg 	} */ *uap = v;
   4342   1.1       mrg 	struct sys_msgctl_args ua;
   4343   1.1       mrg 	struct msqid_ds ds;
   4344  1.10       mrg 	struct netbsd32_msqid_ds *ds32p;
   4345   1.1       mrg 	int error;
   4346   1.1       mrg 
   4347  1.11       mrg 	NETBSD32TO64_UAP(msqid);
   4348  1.11       mrg 	NETBSD32TO64_UAP(cmd);
   4349  1.10       mrg 	ds32p = (struct netbsd32_msqid_ds *)(u_long)SCARG(uap, buf);
   4350   1.1       mrg 	if (ds32p) {
   4351   1.1       mrg 		SCARG(&ua, buf) = NULL;
   4352  1.10       mrg 		netbsd32_to_msqid_ds(ds32p, &ds);
   4353   1.1       mrg 	} else
   4354   1.1       mrg 		SCARG(&ua, buf) = NULL;
   4355   1.1       mrg 	error = sys_msgctl(p, &ua, retval);
   4356   1.1       mrg 	if (error)
   4357   1.1       mrg 		return (error);
   4358   1.1       mrg 
   4359   1.1       mrg 	if (ds32p)
   4360  1.10       mrg 		netbsd32_from_msqid_ds(&ds, ds32p);
   4361   1.1       mrg 	return (0);
   4362   1.6       eeh #else
   4363   1.6       eeh 	return (ENOSYS);
   4364   1.6       eeh #endif
   4365   1.1       mrg }
   4366   1.1       mrg 
   4367   1.1       mrg int
   4368  1.19       eeh netbsd32_msgget(p, v, retval)
   4369   1.1       mrg 	struct proc *p;
   4370   1.1       mrg 	void *v;
   4371   1.1       mrg 	register_t *retval;
   4372   1.1       mrg {
   4373   1.6       eeh #if 0
   4374  1.19       eeh 	struct netbsd32_msgget_args /* {
   4375  1.10       mrg 		syscallarg(netbsd32_key_t) key;
   4376   1.1       mrg 		syscallarg(int) msgflg;
   4377   1.1       mrg 	} */ *uap = v;
   4378   1.1       mrg 	struct sys_msgget_args ua;
   4379   1.1       mrg 
   4380  1.11       mrg 	NETBSD32TOX_UAP(key, key_t);
   4381  1.11       mrg 	NETBSD32TO64_UAP(msgflg);
   4382   1.1       mrg 	return (sys_msgget(p, &ua, retval));
   4383   1.6       eeh #else
   4384   1.6       eeh 	return (ENOSYS);
   4385   1.6       eeh #endif
   4386   1.1       mrg }
   4387   1.1       mrg 
   4388   1.1       mrg int
   4389  1.19       eeh netbsd32_msgsnd(p, v, retval)
   4390   1.1       mrg 	struct proc *p;
   4391   1.1       mrg 	void *v;
   4392   1.1       mrg 	register_t *retval;
   4393   1.1       mrg {
   4394   1.6       eeh #if 0
   4395  1.19       eeh 	struct netbsd32_msgsnd_args /* {
   4396   1.1       mrg 		syscallarg(int) msqid;
   4397  1.10       mrg 		syscallarg(const netbsd32_voidp) msgp;
   4398  1.10       mrg 		syscallarg(netbsd32_size_t) msgsz;
   4399   1.1       mrg 		syscallarg(int) msgflg;
   4400   1.1       mrg 	} */ *uap = v;
   4401   1.1       mrg 	struct sys_msgsnd_args ua;
   4402   1.1       mrg 
   4403  1.11       mrg 	NETBSD32TO64_UAP(msqid);
   4404  1.11       mrg 	NETBSD32TOP_UAP(msgp, void);
   4405  1.11       mrg 	NETBSD32TOX_UAP(msgsz, size_t);
   4406  1.11       mrg 	NETBSD32TO64_UAP(msgflg);
   4407   1.1       mrg 	return (sys_msgsnd(p, &ua, retval));
   4408   1.6       eeh #else
   4409   1.6       eeh 	return (ENOSYS);
   4410   1.6       eeh #endif
   4411   1.1       mrg }
   4412   1.1       mrg 
   4413   1.1       mrg int
   4414  1.19       eeh netbsd32_msgrcv(p, v, retval)
   4415   1.1       mrg 	struct proc *p;
   4416   1.1       mrg 	void *v;
   4417   1.1       mrg 	register_t *retval;
   4418   1.1       mrg {
   4419   1.6       eeh #if 0
   4420  1.19       eeh 	struct netbsd32_msgrcv_args /* {
   4421   1.1       mrg 		syscallarg(int) msqid;
   4422  1.10       mrg 		syscallarg(netbsd32_voidp) msgp;
   4423  1.10       mrg 		syscallarg(netbsd32_size_t) msgsz;
   4424  1.10       mrg 		syscallarg(netbsd32_long) msgtyp;
   4425   1.1       mrg 		syscallarg(int) msgflg;
   4426   1.1       mrg 	} */ *uap = v;
   4427   1.1       mrg 	struct sys_msgrcv_args ua;
   4428   1.1       mrg 	ssize_t rt;
   4429   1.1       mrg 	int error;
   4430   1.1       mrg 
   4431  1.11       mrg 	NETBSD32TO64_UAP(msqid);
   4432  1.11       mrg 	NETBSD32TOP_UAP(msgp, void);
   4433  1.11       mrg 	NETBSD32TOX_UAP(msgsz, size_t);
   4434  1.11       mrg 	NETBSD32TOX_UAP(msgtyp, long);
   4435  1.11       mrg 	NETBSD32TO64_UAP(msgflg);
   4436   1.1       mrg 	error = sys_msgrcv(p, &ua, (register_t *)&rt);
   4437  1.32       mrg 	*retval = rt;
   4438   1.1       mrg 	return (error);
   4439   1.6       eeh #else
   4440   1.6       eeh 	return (ENOSYS);
   4441   1.6       eeh #endif
   4442   1.1       mrg }
   4443  1.20       eeh #endif /* SYSVMSG */
   4444  1.20       eeh 
   4445  1.20       eeh #if defined(SYSVSHM)
   4446   1.1       mrg 
   4447   1.1       mrg int
   4448  1.19       eeh netbsd32_shmat(p, v, retval)
   4449   1.1       mrg 	struct proc *p;
   4450   1.1       mrg 	void *v;
   4451   1.1       mrg 	register_t *retval;
   4452   1.1       mrg {
   4453   1.6       eeh #if 0
   4454  1.19       eeh 	struct netbsd32_shmat_args /* {
   4455   1.1       mrg 		syscallarg(int) shmid;
   4456  1.10       mrg 		syscallarg(const netbsd32_voidp) shmaddr;
   4457   1.1       mrg 		syscallarg(int) shmflg;
   4458   1.1       mrg 	} */ *uap = v;
   4459   1.1       mrg 	struct sys_shmat_args ua;
   4460   1.1       mrg 	void *rt;
   4461   1.1       mrg 	int error;
   4462   1.1       mrg 
   4463  1.11       mrg 	NETBSD32TO64_UAP(shmid);
   4464  1.11       mrg 	NETBSD32TOP_UAP(shmaddr, void);
   4465  1.11       mrg 	NETBSD32TO64_UAP(shmflg);
   4466   1.1       mrg 	error = sys_shmat(p, &ua, (register_t *)&rt);
   4467  1.32       mrg 	*retval = rt;
   4468   1.1       mrg 	return (error);
   4469   1.6       eeh #else
   4470   1.6       eeh 	return (ENOSYS);
   4471   1.6       eeh #endif
   4472   1.1       mrg }
   4473   1.1       mrg 
   4474   1.1       mrg int
   4475  1.20       eeh netbsd32___shmctl13(p, v, retval)
   4476   1.1       mrg 	struct proc *p;
   4477   1.1       mrg 	void *v;
   4478   1.1       mrg 	register_t *retval;
   4479   1.1       mrg {
   4480   1.6       eeh #if 0
   4481  1.19       eeh 	struct netbsd32_shmctl_args /* {
   4482   1.1       mrg 		syscallarg(int) shmid;
   4483   1.1       mrg 		syscallarg(int) cmd;
   4484  1.10       mrg 		syscallarg(netbsd32_shmid_dsp_t) buf;
   4485   1.1       mrg 	} */ *uap = v;
   4486   1.1       mrg 	struct sys_shmctl_args ua;
   4487   1.1       mrg 	struct shmid_ds ds;
   4488  1.10       mrg 	struct netbsd32_shmid_ds *ds32p;
   4489   1.1       mrg 	int error;
   4490   1.1       mrg 
   4491  1.11       mrg 	NETBSD32TO64_UAP(shmid);
   4492  1.11       mrg 	NETBSD32TO64_UAP(cmd);
   4493  1.10       mrg 	ds32p = (struct netbsd32_shmid_ds *)(u_long)SCARG(uap, buf);
   4494   1.1       mrg 	if (ds32p) {
   4495   1.1       mrg 		SCARG(&ua, buf) = NULL;
   4496  1.10       mrg 		netbsd32_to_shmid_ds(ds32p, &ds);
   4497   1.1       mrg 	} else
   4498   1.1       mrg 		SCARG(&ua, buf) = NULL;
   4499   1.1       mrg 	error = sys_shmctl(p, &ua, retval);
   4500   1.1       mrg 	if (error)
   4501   1.1       mrg 		return (error);
   4502   1.1       mrg 
   4503   1.1       mrg 	if (ds32p)
   4504  1.10       mrg 		netbsd32_from_shmid_ds(&ds, ds32p);
   4505   1.1       mrg 	return (0);
   4506   1.6       eeh #else
   4507   1.6       eeh 	return (ENOSYS);
   4508   1.6       eeh #endif
   4509   1.1       mrg }
   4510   1.1       mrg 
   4511   1.1       mrg int
   4512  1.19       eeh netbsd32_shmdt(p, v, retval)
   4513   1.1       mrg 	struct proc *p;
   4514   1.1       mrg 	void *v;
   4515   1.1       mrg 	register_t *retval;
   4516   1.1       mrg {
   4517   1.6       eeh #if 0
   4518  1.19       eeh 	struct netbsd32_shmdt_args /* {
   4519  1.10       mrg 		syscallarg(const netbsd32_voidp) shmaddr;
   4520   1.1       mrg 	} */ *uap = v;
   4521   1.1       mrg 	struct sys_shmdt_args ua;
   4522   1.1       mrg 
   4523  1.11       mrg 	NETBSD32TOP_UAP(shmaddr, const char);
   4524   1.1       mrg 	return (sys_shmdt(p, &ua, retval));
   4525   1.6       eeh #else
   4526   1.6       eeh 	return (ENOSYS);
   4527   1.6       eeh #endif
   4528   1.1       mrg }
   4529   1.1       mrg 
   4530   1.1       mrg int
   4531  1.19       eeh netbsd32_shmget(p, v, retval)
   4532   1.1       mrg 	struct proc *p;
   4533   1.1       mrg 	void *v;
   4534   1.1       mrg 	register_t *retval;
   4535   1.1       mrg {
   4536   1.6       eeh #if 0
   4537  1.19       eeh 	struct netbsd32_shmget_args /* {
   4538  1.10       mrg 		syscallarg(netbsd32_key_t) key;
   4539  1.10       mrg 		syscallarg(netbsd32_size_t) size;
   4540   1.1       mrg 		syscallarg(int) shmflg;
   4541   1.1       mrg 	} */ *uap = v;
   4542   1.1       mrg 	struct sys_shmget_args ua;
   4543   1.1       mrg 
   4544  1.11       mrg 	NETBSD32TOX_UAP(key, key_t)
   4545  1.11       mrg 	NETBSD32TOX_UAP(size, size_t)
   4546  1.11       mrg 	NETBSD32TO64_UAP(shmflg);
   4547   1.1       mrg 	return (sys_shmget(p, &ua, retval));
   4548   1.6       eeh #else
   4549   1.6       eeh 	return (ENOSYS);
   4550   1.6       eeh #endif
   4551   1.1       mrg }
   4552  1.20       eeh #endif /* SYSVSHM */
   4553  1.56       mrg /* XXX MOVE ME IPC END */
   4554   1.1       mrg 
   4555  1.56       mrg /* XXX MOVE ME XXX */
   4556   1.1       mrg int
   4557  1.19       eeh netbsd32_clock_gettime(p, v, retval)
   4558   1.1       mrg 	struct proc *p;
   4559   1.1       mrg 	void *v;
   4560   1.1       mrg 	register_t *retval;
   4561   1.1       mrg {
   4562  1.19       eeh 	struct netbsd32_clock_gettime_args /* {
   4563  1.10       mrg 		syscallarg(netbsd32_clockid_t) clock_id;
   4564  1.10       mrg 		syscallarg(netbsd32_timespecp_t) tp;
   4565   1.1       mrg 	} */ *uap = v;
   4566   1.6       eeh 	clockid_t clock_id;
   4567   1.6       eeh 	struct timeval atv;
   4568   1.6       eeh 	struct timespec ats;
   4569  1.10       mrg 	struct netbsd32_timespec ts32;
   4570   1.6       eeh 
   4571   1.6       eeh 	clock_id = SCARG(uap, clock_id);
   4572   1.6       eeh 	if (clock_id != CLOCK_REALTIME)
   4573   1.6       eeh 		return (EINVAL);
   4574   1.1       mrg 
   4575   1.6       eeh 	microtime(&atv);
   4576   1.6       eeh 	TIMEVAL_TO_TIMESPEC(&atv,&ats);
   4577  1.10       mrg 	netbsd32_from_timespec(&ats, &ts32);
   4578   1.1       mrg 
   4579   1.6       eeh 	return copyout(&ts32, (caddr_t)(u_long)SCARG(uap, tp), sizeof(ts32));
   4580   1.1       mrg }
   4581   1.1       mrg 
   4582  1.56       mrg /* XXX MOVE ME XXX */
   4583   1.1       mrg int
   4584  1.19       eeh netbsd32_clock_settime(p, v, retval)
   4585   1.1       mrg 	struct proc *p;
   4586   1.1       mrg 	void *v;
   4587   1.1       mrg 	register_t *retval;
   4588   1.1       mrg {
   4589  1.19       eeh 	struct netbsd32_clock_settime_args /* {
   4590  1.10       mrg 		syscallarg(netbsd32_clockid_t) clock_id;
   4591  1.10       mrg 		syscallarg(const netbsd32_timespecp_t) tp;
   4592   1.1       mrg 	} */ *uap = v;
   4593  1.10       mrg 	struct netbsd32_timespec ts32;
   4594   1.6       eeh 	clockid_t clock_id;
   4595   1.6       eeh 	struct timeval atv;
   4596   1.6       eeh 	struct timespec ats;
   4597   1.6       eeh 	int error;
   4598   1.6       eeh 
   4599   1.6       eeh 	if ((error = suser(p->p_ucred, &p->p_acflag)) != 0)
   4600   1.6       eeh 		return (error);
   4601   1.6       eeh 
   4602   1.6       eeh 	clock_id = SCARG(uap, clock_id);
   4603   1.6       eeh 	if (clock_id != CLOCK_REALTIME)
   4604   1.6       eeh 		return (EINVAL);
   4605   1.6       eeh 
   4606   1.6       eeh 	if ((error = copyin((caddr_t)(u_long)SCARG(uap, tp), &ts32, sizeof(ts32))) != 0)
   4607   1.6       eeh 		return (error);
   4608   1.6       eeh 
   4609  1.10       mrg 	netbsd32_to_timespec(&ts32, &ats);
   4610   1.6       eeh 	TIMESPEC_TO_TIMEVAL(&atv,&ats);
   4611   1.6       eeh 	if ((error = settime(&atv)))
   4612   1.6       eeh 		return (error);
   4613   1.1       mrg 
   4614   1.6       eeh 	return 0;
   4615   1.1       mrg }
   4616   1.1       mrg 
   4617  1.56       mrg /* XXX MOVE ME XXX */
   4618   1.1       mrg int
   4619  1.19       eeh netbsd32_clock_getres(p, v, retval)
   4620   1.1       mrg 	struct proc *p;
   4621   1.1       mrg 	void *v;
   4622   1.1       mrg 	register_t *retval;
   4623   1.1       mrg {
   4624  1.19       eeh 	struct netbsd32_clock_getres_args /* {
   4625  1.10       mrg 		syscallarg(netbsd32_clockid_t) clock_id;
   4626  1.10       mrg 		syscallarg(netbsd32_timespecp_t) tp;
   4627   1.1       mrg 	} */ *uap = v;
   4628  1.10       mrg 	struct netbsd32_timespec ts32;
   4629   1.6       eeh 	clockid_t clock_id;
   4630   1.1       mrg 	struct timespec ts;
   4631   1.6       eeh 	int error = 0;
   4632   1.6       eeh 
   4633   1.6       eeh 	clock_id = SCARG(uap, clock_id);
   4634   1.6       eeh 	if (clock_id != CLOCK_REALTIME)
   4635   1.6       eeh 		return (EINVAL);
   4636   1.6       eeh 
   4637   1.6       eeh 	if (SCARG(uap, tp)) {
   4638   1.6       eeh 		ts.tv_sec = 0;
   4639   1.6       eeh 		ts.tv_nsec = 1000000000 / hz;
   4640   1.1       mrg 
   4641  1.10       mrg 		netbsd32_from_timespec(&ts, &ts32);
   4642   1.6       eeh 		error = copyout(&ts, (caddr_t)(u_long)SCARG(uap, tp), sizeof(ts));
   4643   1.6       eeh 	}
   4644   1.1       mrg 
   4645   1.6       eeh 	return error;
   4646   1.1       mrg }
   4647   1.1       mrg 
   4648  1.56       mrg /* XXX MOVE ME XXX */
   4649   1.1       mrg int
   4650  1.19       eeh netbsd32_nanosleep(p, v, retval)
   4651   1.1       mrg 	struct proc *p;
   4652   1.1       mrg 	void *v;
   4653   1.1       mrg 	register_t *retval;
   4654   1.1       mrg {
   4655  1.19       eeh 	struct netbsd32_nanosleep_args /* {
   4656  1.10       mrg 		syscallarg(const netbsd32_timespecp_t) rqtp;
   4657  1.10       mrg 		syscallarg(netbsd32_timespecp_t) rmtp;
   4658   1.1       mrg 	} */ *uap = v;
   4659   1.6       eeh 	static int nanowait;
   4660  1.10       mrg 	struct netbsd32_timespec ts32;
   4661   1.6       eeh 	struct timespec rqt;
   4662   1.6       eeh 	struct timespec rmt;
   4663   1.6       eeh 	struct timeval atv, utv;
   4664   1.6       eeh 	int error, s, timo;
   4665   1.6       eeh 
   4666   1.6       eeh 	error = copyin((caddr_t)(u_long)SCARG(uap, rqtp), (caddr_t)&ts32,
   4667   1.6       eeh 		       sizeof(ts32));
   4668   1.1       mrg 	if (error)
   4669   1.1       mrg 		return (error);
   4670   1.1       mrg 
   4671  1.10       mrg 	netbsd32_to_timespec(&ts32, &rqt);
   4672   1.6       eeh 	TIMESPEC_TO_TIMEVAL(&atv,&rqt)
   4673   1.6       eeh 	if (itimerfix(&atv))
   4674   1.6       eeh 		return (EINVAL);
   4675   1.6       eeh 
   4676   1.6       eeh 	s = splclock();
   4677   1.6       eeh 	timeradd(&atv,&time,&atv);
   4678   1.6       eeh 	timo = hzto(&atv);
   4679   1.6       eeh 	/*
   4680   1.6       eeh 	 * Avoid inadvertantly sleeping forever
   4681   1.6       eeh 	 */
   4682   1.6       eeh 	if (timo == 0)
   4683   1.6       eeh 		timo = 1;
   4684   1.6       eeh 	splx(s);
   4685   1.6       eeh 
   4686   1.6       eeh 	error = tsleep(&nanowait, PWAIT | PCATCH, "nanosleep", timo);
   4687   1.6       eeh 	if (error == ERESTART)
   4688   1.6       eeh 		error = EINTR;
   4689   1.6       eeh 	if (error == EWOULDBLOCK)
   4690   1.6       eeh 		error = 0;
   4691   1.6       eeh 
   4692   1.6       eeh 	if (SCARG(uap, rmtp)) {
   4693   1.6       eeh 		int error;
   4694   1.6       eeh 
   4695   1.6       eeh 		s = splclock();
   4696   1.6       eeh 		utv = time;
   4697   1.6       eeh 		splx(s);
   4698   1.6       eeh 
   4699   1.6       eeh 		timersub(&atv, &utv, &utv);
   4700   1.6       eeh 		if (utv.tv_sec < 0)
   4701   1.6       eeh 			timerclear(&utv);
   4702   1.6       eeh 
   4703   1.6       eeh 		TIMEVAL_TO_TIMESPEC(&utv,&rmt);
   4704  1.10       mrg 		netbsd32_from_timespec(&rmt, &ts32);
   4705   1.6       eeh 		error = copyout((caddr_t)&ts32, (caddr_t)(u_long)SCARG(uap,rmtp),
   4706   1.6       eeh 			sizeof(ts32));
   4707   1.6       eeh 		if (error)
   4708   1.6       eeh 			return (error);
   4709   1.6       eeh 	}
   4710   1.6       eeh 
   4711   1.6       eeh 	return error;
   4712   1.6       eeh }
   4713   1.6       eeh 
   4714   1.6       eeh int
   4715  1.19       eeh netbsd32_fdatasync(p, v, retval)
   4716   1.6       eeh 	struct proc *p;
   4717   1.6       eeh 	void *v;
   4718   1.6       eeh 	register_t *retval;
   4719   1.6       eeh {
   4720  1.19       eeh 	struct netbsd32_fdatasync_args /* {
   4721   1.6       eeh 		syscallarg(int) fd;
   4722   1.6       eeh 	} */ *uap = v;
   4723   1.6       eeh 	struct sys_fdatasync_args ua;
   4724   1.6       eeh 
   4725  1.11       mrg 	NETBSD32TO64_UAP(fd);
   4726   1.6       eeh 	return (sys_fdatasync(p, &ua, retval));
   4727   1.1       mrg }
   4728   1.1       mrg 
   4729   1.1       mrg int
   4730  1.19       eeh netbsd32___posix_rename(p, v, retval)
   4731   1.1       mrg 	struct proc *p;
   4732   1.1       mrg 	void *v;
   4733   1.1       mrg 	register_t *retval;
   4734   1.1       mrg {
   4735  1.19       eeh 	struct netbsd32___posix_rename_args /* {
   4736  1.10       mrg 		syscallarg(const netbsd32_charp) from;
   4737  1.10       mrg 		syscallarg(const netbsd32_charp) to;
   4738   1.1       mrg 	} */ *uap = v;
   4739   1.1       mrg 	struct sys___posix_rename_args ua;
   4740   1.1       mrg 
   4741  1.20       eeh 	NETBSD32TOP_UAP(from, const char);
   4742  1.20       eeh 	NETBSD32TOP_UAP(to, const char);
   4743   1.1       mrg 	return (sys___posix_rename(p, &ua, retval));
   4744   1.1       mrg }
   4745   1.1       mrg 
   4746   1.1       mrg int
   4747  1.19       eeh netbsd32_swapctl(p, v, retval)
   4748   1.1       mrg 	struct proc *p;
   4749   1.1       mrg 	void *v;
   4750   1.1       mrg 	register_t *retval;
   4751   1.1       mrg {
   4752  1.19       eeh 	struct netbsd32_swapctl_args /* {
   4753   1.1       mrg 		syscallarg(int) cmd;
   4754  1.10       mrg 		syscallarg(const netbsd32_voidp) arg;
   4755   1.1       mrg 		syscallarg(int) misc;
   4756   1.1       mrg 	} */ *uap = v;
   4757   1.1       mrg 	struct sys_swapctl_args ua;
   4758   1.1       mrg 
   4759  1.11       mrg 	NETBSD32TO64_UAP(cmd);
   4760  1.11       mrg 	NETBSD32TOP_UAP(arg, const void);
   4761  1.11       mrg 	NETBSD32TO64_UAP(misc);
   4762   1.1       mrg 	return (sys_swapctl(p, &ua, retval));
   4763   1.1       mrg }
   4764   1.1       mrg 
   4765  1.56       mrg /* XXX MOVE ME XXX */
   4766   1.1       mrg int
   4767  1.19       eeh netbsd32_getdents(p, v, retval)
   4768   1.1       mrg 	struct proc *p;
   4769   1.1       mrg 	void *v;
   4770   1.1       mrg 	register_t *retval;
   4771   1.1       mrg {
   4772  1.19       eeh 	struct netbsd32_getdents_args /* {
   4773   1.1       mrg 		syscallarg(int) fd;
   4774  1.10       mrg 		syscallarg(netbsd32_charp) buf;
   4775  1.10       mrg 		syscallarg(netbsd32_size_t) count;
   4776   1.1       mrg 	} */ *uap = v;
   4777   1.6       eeh 	struct file *fp;
   4778   1.6       eeh 	int error, done;
   4779   1.1       mrg 
   4780  1.12   thorpej 	/* getvnode() will use the descriptor for us */
   4781   1.6       eeh 	if ((error = getvnode(p->p_fd, SCARG(uap, fd), &fp)) != 0)
   4782   1.6       eeh 		return (error);
   4783  1.12   thorpej 	if ((fp->f_flag & FREAD) == 0) {
   4784  1.12   thorpej 		error = EBADF;
   4785  1.12   thorpej 		goto out;
   4786  1.12   thorpej 	}
   4787   1.6       eeh 	error = vn_readdir(fp, (caddr_t)(u_long)SCARG(uap, buf), UIO_USERSPACE,
   4788   1.6       eeh 			SCARG(uap, count), &done, p, 0, 0);
   4789   1.6       eeh 	*retval = done;
   4790  1.12   thorpej  out:
   4791  1.19       eeh 	FILE_UNUSE(fp, p);
   4792   1.6       eeh 	return (error);
   4793   1.1       mrg }
   4794   1.1       mrg 
   4795   1.6       eeh 
   4796   1.1       mrg int
   4797  1.19       eeh netbsd32_minherit(p, v, retval)
   4798   1.1       mrg 	struct proc *p;
   4799   1.1       mrg 	void *v;
   4800   1.1       mrg 	register_t *retval;
   4801   1.1       mrg {
   4802  1.19       eeh 	struct netbsd32_minherit_args /* {
   4803  1.10       mrg 		syscallarg(netbsd32_voidp) addr;
   4804  1.10       mrg 		syscallarg(netbsd32_size_t) len;
   4805   1.1       mrg 		syscallarg(int) inherit;
   4806   1.1       mrg 	} */ *uap = v;
   4807   1.1       mrg 	struct sys_minherit_args ua;
   4808   1.1       mrg 
   4809  1.11       mrg 	NETBSD32TOP_UAP(addr, void);
   4810  1.11       mrg 	NETBSD32TOX_UAP(len, size_t);
   4811  1.11       mrg 	NETBSD32TO64_UAP(inherit);
   4812   1.1       mrg 	return (sys_minherit(p, &ua, retval));
   4813   1.1       mrg }
   4814   1.1       mrg 
   4815   1.1       mrg int
   4816  1.19       eeh netbsd32_lchmod(p, v, retval)
   4817   1.1       mrg 	struct proc *p;
   4818   1.1       mrg 	void *v;
   4819   1.1       mrg 	register_t *retval;
   4820   1.1       mrg {
   4821  1.19       eeh 	struct netbsd32_lchmod_args /* {
   4822  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   4823   1.1       mrg 		syscallarg(mode_t) mode;
   4824   1.1       mrg 	} */ *uap = v;
   4825   1.1       mrg 	struct sys_lchmod_args ua;
   4826   1.1       mrg 
   4827  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   4828  1.11       mrg 	NETBSD32TO64_UAP(mode);
   4829   1.1       mrg 	return (sys_lchmod(p, &ua, retval));
   4830   1.1       mrg }
   4831   1.1       mrg 
   4832   1.1       mrg int
   4833  1.19       eeh netbsd32_lchown(p, v, retval)
   4834   1.1       mrg 	struct proc *p;
   4835   1.1       mrg 	void *v;
   4836   1.1       mrg 	register_t *retval;
   4837   1.1       mrg {
   4838  1.19       eeh 	struct netbsd32_lchown_args /* {
   4839  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   4840   1.1       mrg 		syscallarg(uid_t) uid;
   4841   1.1       mrg 		syscallarg(gid_t) gid;
   4842   1.1       mrg 	} */ *uap = v;
   4843   1.1       mrg 	struct sys_lchown_args ua;
   4844   1.1       mrg 
   4845  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   4846  1.11       mrg 	NETBSD32TO64_UAP(uid);
   4847  1.11       mrg 	NETBSD32TO64_UAP(gid);
   4848   1.1       mrg 	return (sys_lchown(p, &ua, retval));
   4849   1.1       mrg }
   4850   1.1       mrg 
   4851   1.1       mrg int
   4852  1.19       eeh netbsd32_lutimes(p, v, retval)
   4853   1.1       mrg 	struct proc *p;
   4854   1.1       mrg 	void *v;
   4855   1.1       mrg 	register_t *retval;
   4856   1.1       mrg {
   4857  1.19       eeh 	struct netbsd32_lutimes_args /* {
   4858  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   4859  1.10       mrg 		syscallarg(const netbsd32_timevalp_t) tptr;
   4860   1.1       mrg 	} */ *uap = v;
   4861   1.6       eeh 	int error;
   4862   1.6       eeh 	struct nameidata nd;
   4863   1.1       mrg 
   4864   1.6       eeh 	NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, (caddr_t)(u_long)SCARG(uap, path), p);
   4865   1.6       eeh 	if ((error = namei(&nd)) != 0)
   4866   1.6       eeh 		return (error);
   4867   1.6       eeh 
   4868  1.54       mrg 	error = change_utimes32(nd.ni_vp, SCARG(uap, tptr), p);
   4869   1.6       eeh 
   4870   1.6       eeh 	vrele(nd.ni_vp);
   4871   1.6       eeh 	return (error);
   4872   1.1       mrg }
   4873   1.1       mrg 
   4874   1.6       eeh 
   4875   1.1       mrg int
   4876  1.19       eeh netbsd32___msync13(p, v, retval)
   4877   1.1       mrg 	struct proc *p;
   4878   1.1       mrg 	void *v;
   4879   1.1       mrg 	register_t *retval;
   4880   1.1       mrg {
   4881  1.19       eeh 	struct netbsd32___msync13_args /* {
   4882  1.10       mrg 		syscallarg(netbsd32_voidp) addr;
   4883  1.10       mrg 		syscallarg(netbsd32_size_t) len;
   4884   1.1       mrg 		syscallarg(int) flags;
   4885   1.1       mrg 	} */ *uap = v;
   4886   1.1       mrg 	struct sys___msync13_args ua;
   4887   1.1       mrg 
   4888  1.11       mrg 	NETBSD32TOP_UAP(addr, void);
   4889  1.11       mrg 	NETBSD32TOX_UAP(len, size_t);
   4890  1.11       mrg 	NETBSD32TO64_UAP(flags);
   4891   1.1       mrg 	return (sys___msync13(p, &ua, retval));
   4892   1.1       mrg }
   4893   1.1       mrg 
   4894  1.56       mrg /* XXX MOVE ME XXX */
   4895   1.1       mrg int
   4896  1.19       eeh netbsd32___stat13(p, v, retval)
   4897   1.1       mrg 	struct proc *p;
   4898   1.1       mrg 	void *v;
   4899   1.1       mrg 	register_t *retval;
   4900   1.1       mrg {
   4901  1.19       eeh 	struct netbsd32___stat13_args /* {
   4902  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   4903  1.10       mrg 		syscallarg(netbsd32_statp_t) ub;
   4904   1.1       mrg 	} */ *uap = v;
   4905  1.10       mrg 	struct netbsd32_stat sb32;
   4906   1.1       mrg 	struct stat sb;
   4907   1.1       mrg 	int error;
   4908   1.6       eeh 	struct nameidata nd;
   4909  1.31       mrg 	caddr_t sg;
   4910  1.42  jdolecek 	const char *path;
   4911  1.31       mrg 
   4912  1.31       mrg 	path = (char *)(u_long)SCARG(uap, path);
   4913  1.31       mrg 	sg = stackgap_init(p->p_emul);
   4914  1.41  jdolecek 	CHECK_ALT_EXIST(p, &sg, path);
   4915   1.1       mrg 
   4916  1.31       mrg 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, path, p);
   4917   1.6       eeh 	if ((error = namei(&nd)) != 0)
   4918   1.6       eeh 		return (error);
   4919   1.6       eeh 	error = vn_stat(nd.ni_vp, &sb, p);
   4920   1.6       eeh 	vput(nd.ni_vp);
   4921   1.1       mrg 	if (error)
   4922   1.1       mrg 		return (error);
   4923  1.10       mrg 	netbsd32_from___stat13(&sb, &sb32);
   4924   1.6       eeh 	error = copyout(&sb32, (caddr_t)(u_long)SCARG(uap, ub), sizeof(sb32));
   4925   1.6       eeh 	return (error);
   4926   1.1       mrg }
   4927   1.1       mrg 
   4928  1.56       mrg /* XXX MOVE ME XXX */
   4929   1.1       mrg int
   4930  1.19       eeh netbsd32___fstat13(p, v, retval)
   4931   1.1       mrg 	struct proc *p;
   4932   1.1       mrg 	void *v;
   4933   1.1       mrg 	register_t *retval;
   4934   1.1       mrg {
   4935  1.19       eeh 	struct netbsd32___fstat13_args /* {
   4936   1.1       mrg 		syscallarg(int) fd;
   4937  1.10       mrg 		syscallarg(netbsd32_statp_t) sb;
   4938   1.1       mrg 	} */ *uap = v;
   4939   1.6       eeh 	int fd = SCARG(uap, fd);
   4940  1.25  augustss 	struct filedesc *fdp = p->p_fd;
   4941  1.25  augustss 	struct file *fp;
   4942  1.10       mrg 	struct netbsd32_stat sb32;
   4943   1.6       eeh 	struct stat ub;
   4944   1.6       eeh 	int error = 0;
   4945   1.6       eeh 
   4946   1.6       eeh 	if ((u_int)fd >= fdp->fd_nfiles ||
   4947   1.6       eeh 	    (fp = fdp->fd_ofiles[fd]) == NULL)
   4948   1.6       eeh 		return (EBADF);
   4949   1.6       eeh 	switch (fp->f_type) {
   4950   1.6       eeh 
   4951   1.6       eeh 	case DTYPE_VNODE:
   4952   1.6       eeh 		error = vn_stat((struct vnode *)fp->f_data, &ub, p);
   4953   1.6       eeh 		break;
   4954   1.6       eeh 
   4955   1.6       eeh 	case DTYPE_SOCKET:
   4956   1.6       eeh 		error = soo_stat((struct socket *)fp->f_data, &ub);
   4957   1.6       eeh 		break;
   4958   1.6       eeh 
   4959   1.6       eeh 	default:
   4960   1.6       eeh 		panic("fstat");
   4961   1.6       eeh 		/*NOTREACHED*/
   4962   1.6       eeh 	}
   4963   1.6       eeh 	if (error == 0) {
   4964  1.10       mrg 		netbsd32_from___stat13(&ub, &sb32);
   4965   1.6       eeh 		error = copyout(&sb32, (caddr_t)(u_long)SCARG(uap, sb), sizeof(sb32));
   4966   1.6       eeh 	}
   4967   1.6       eeh 	return (error);
   4968   1.1       mrg }
   4969   1.1       mrg 
   4970  1.56       mrg /* XXX MOVE ME XXX */
   4971   1.1       mrg int
   4972  1.19       eeh netbsd32___lstat13(p, v, retval)
   4973   1.1       mrg 	struct proc *p;
   4974   1.1       mrg 	void *v;
   4975   1.1       mrg 	register_t *retval;
   4976   1.1       mrg {
   4977  1.19       eeh 	struct netbsd32___lstat13_args /* {
   4978  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   4979  1.10       mrg 		syscallarg(netbsd32_statp_t) ub;
   4980   1.1       mrg 	} */ *uap = v;
   4981  1.10       mrg 	struct netbsd32_stat sb32;
   4982   1.1       mrg 	struct stat sb;
   4983   1.1       mrg 	int error;
   4984   1.6       eeh 	struct nameidata nd;
   4985  1.31       mrg 	caddr_t sg;
   4986  1.42  jdolecek 	const char *path;
   4987  1.31       mrg 
   4988  1.31       mrg 	path = (char *)(u_long)SCARG(uap, path);
   4989  1.31       mrg 	sg = stackgap_init(p->p_emul);
   4990  1.41  jdolecek 	CHECK_ALT_EXIST(p, &sg, path);
   4991   1.1       mrg 
   4992  1.31       mrg 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, path, p);
   4993   1.6       eeh 	if ((error = namei(&nd)) != 0)
   4994   1.6       eeh 		return (error);
   4995   1.6       eeh 	error = vn_stat(nd.ni_vp, &sb, p);
   4996   1.6       eeh 	vput(nd.ni_vp);
   4997   1.1       mrg 	if (error)
   4998   1.1       mrg 		return (error);
   4999  1.10       mrg 	netbsd32_from___stat13(&sb, &sb32);
   5000   1.6       eeh 	error = copyout(&sb32, (caddr_t)(u_long)SCARG(uap, ub), sizeof(sb32));
   5001   1.6       eeh 	return (error);
   5002   1.1       mrg }
   5003   1.1       mrg 
   5004  1.56       mrg /* XXX MOVE ME XXX */
   5005   1.1       mrg int
   5006  1.19       eeh netbsd32___sigaltstack14(p, v, retval)
   5007   1.1       mrg 	struct proc *p;
   5008   1.1       mrg 	void *v;
   5009   1.1       mrg 	register_t *retval;
   5010   1.1       mrg {
   5011  1.19       eeh 	struct netbsd32___sigaltstack14_args /* {
   5012  1.10       mrg 		syscallarg(const netbsd32_sigaltstackp_t) nss;
   5013  1.10       mrg 		syscallarg(netbsd32_sigaltstackp_t) oss;
   5014   1.1       mrg 	} */ *uap = v;
   5015  1.10       mrg 	struct netbsd32_sigaltstack s32;
   5016   1.1       mrg 	struct sigaltstack nss, oss;
   5017   1.1       mrg 	int error;
   5018   1.1       mrg 
   5019   1.6       eeh 	if (SCARG(uap, nss)) {
   5020   1.6       eeh 		error = copyin((caddr_t)(u_long)SCARG(uap, nss), &s32, sizeof(s32));
   5021   1.6       eeh 		if (error)
   5022   1.6       eeh 			return (error);
   5023   1.6       eeh 		nss.ss_sp = (void *)(u_long)s32.ss_sp;
   5024   1.6       eeh 		nss.ss_size = (size_t)s32.ss_size;
   5025   1.6       eeh 		nss.ss_flags = s32.ss_flags;
   5026   1.6       eeh 	}
   5027   1.6       eeh 	error = sigaltstack1(p,
   5028   1.6       eeh 	    SCARG(uap, nss) ? &nss : 0, SCARG(uap, oss) ? &oss : 0);
   5029   1.1       mrg 	if (error)
   5030   1.1       mrg 		return (error);
   5031   1.6       eeh 	if (SCARG(uap, oss)) {
   5032  1.10       mrg 		s32.ss_sp = (netbsd32_voidp)(u_long)oss.ss_sp;
   5033  1.10       mrg 		s32.ss_size = (netbsd32_size_t)oss.ss_size;
   5034   1.6       eeh 		s32.ss_flags = oss.ss_flags;
   5035   1.6       eeh 		error = copyout(&s32, (caddr_t)(u_long)SCARG(uap, oss), sizeof(s32));
   5036   1.6       eeh 		if (error)
   5037   1.6       eeh 			return (error);
   5038   1.1       mrg 	}
   5039   1.1       mrg 	return (0);
   5040   1.1       mrg }
   5041   1.1       mrg 
   5042   1.1       mrg int
   5043  1.19       eeh netbsd32___posix_chown(p, v, retval)
   5044   1.1       mrg 	struct proc *p;
   5045   1.1       mrg 	void *v;
   5046   1.1       mrg 	register_t *retval;
   5047   1.1       mrg {
   5048  1.19       eeh 	struct netbsd32___posix_chown_args /* {
   5049  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   5050   1.1       mrg 		syscallarg(uid_t) uid;
   5051   1.1       mrg 		syscallarg(gid_t) gid;
   5052   1.1       mrg 	} */ *uap = v;
   5053   1.1       mrg 	struct sys___posix_chown_args ua;
   5054   1.1       mrg 
   5055  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   5056  1.11       mrg 	NETBSD32TO64_UAP(uid);
   5057  1.11       mrg 	NETBSD32TO64_UAP(gid);
   5058   1.1       mrg 	return (sys___posix_chown(p, &ua, retval));
   5059   1.1       mrg }
   5060   1.1       mrg 
   5061   1.1       mrg int
   5062  1.19       eeh netbsd32___posix_fchown(p, v, retval)
   5063   1.6       eeh 	struct proc *p;
   5064   1.6       eeh 	void *v;
   5065   1.6       eeh 	register_t *retval;
   5066   1.6       eeh {
   5067  1.19       eeh 	struct netbsd32___posix_fchown_args /* {
   5068   1.6       eeh 		syscallarg(int) fd;
   5069   1.6       eeh 		syscallarg(uid_t) uid;
   5070   1.6       eeh 		syscallarg(gid_t) gid;
   5071   1.6       eeh 	} */ *uap = v;
   5072   1.6       eeh 	struct sys___posix_fchown_args ua;
   5073   1.6       eeh 
   5074  1.11       mrg 	NETBSD32TO64_UAP(fd);
   5075  1.11       mrg 	NETBSD32TO64_UAP(uid);
   5076  1.11       mrg 	NETBSD32TO64_UAP(gid);
   5077   1.6       eeh 	return (sys___posix_fchown(p, &ua, retval));
   5078   1.6       eeh }
   5079   1.6       eeh 
   5080   1.6       eeh int
   5081  1.19       eeh netbsd32___posix_lchown(p, v, retval)
   5082   1.1       mrg 	struct proc *p;
   5083   1.1       mrg 	void *v;
   5084   1.1       mrg 	register_t *retval;
   5085   1.1       mrg {
   5086  1.19       eeh 	struct netbsd32___posix_lchown_args /* {
   5087  1.10       mrg 		syscallarg(const netbsd32_charp) path;
   5088   1.1       mrg 		syscallarg(uid_t) uid;
   5089   1.1       mrg 		syscallarg(gid_t) gid;
   5090   1.1       mrg 	} */ *uap = v;
   5091   1.1       mrg 	struct sys___posix_lchown_args ua;
   5092   1.1       mrg 
   5093  1.11       mrg 	NETBSD32TOP_UAP(path, const char);
   5094  1.11       mrg 	NETBSD32TO64_UAP(uid);
   5095  1.11       mrg 	NETBSD32TO64_UAP(gid);
   5096   1.1       mrg 	return (sys___posix_lchown(p, &ua, retval));
   5097   1.1       mrg }
   5098   1.1       mrg 
   5099   1.1       mrg int
   5100  1.19       eeh netbsd32_getsid(p, v, retval)
   5101   1.6       eeh 	struct proc *p;
   5102   1.6       eeh 	void *v;
   5103   1.6       eeh 	register_t *retval;
   5104   1.6       eeh {
   5105  1.19       eeh 	struct netbsd32_getsid_args /* {
   5106   1.6       eeh 		syscallarg(pid_t) pid;
   5107   1.6       eeh 	} */ *uap = v;
   5108   1.6       eeh 	struct sys_getsid_args ua;
   5109   1.6       eeh 
   5110  1.11       mrg 	NETBSD32TO64_UAP(pid);
   5111   1.6       eeh 	return (sys_getsid(p, &ua, retval));
   5112   1.6       eeh }
   5113   1.6       eeh 
   5114  1.42  jdolecek #ifdef KTRACE
   5115   1.6       eeh int
   5116  1.19       eeh netbsd32_fktrace(p, v, retval)
   5117   1.6       eeh 	struct proc *p;
   5118   1.6       eeh 	void *v;
   5119   1.6       eeh 	register_t *retval;
   5120   1.6       eeh {
   5121  1.19       eeh 	struct netbsd32_fktrace_args /* {
   5122   1.6       eeh 		syscallarg(const int) fd;
   5123   1.6       eeh 		syscallarg(int) ops;
   5124   1.6       eeh 		syscallarg(int) facs;
   5125   1.6       eeh 		syscallarg(int) pid;
   5126   1.6       eeh 	} */ *uap = v;
   5127  1.43      fvdl #if 0
   5128   1.6       eeh 	struct sys_fktrace_args ua;
   5129  1.43      fvdl #else
   5130  1.43      fvdl 	/* XXXX */
   5131  1.43      fvdl 	struct sys_fktrace_noconst_args {
   5132  1.43      fvdl 		syscallarg(int) fd;
   5133  1.43      fvdl 		syscallarg(int) ops;
   5134  1.43      fvdl 		syscallarg(int) facs;
   5135  1.43      fvdl 		syscallarg(int) pid;
   5136  1.43      fvdl 	} ua;
   5137  1.43      fvdl #endif
   5138   1.6       eeh 
   5139  1.32       mrg 	NETBSD32TOX_UAP(fd, int);
   5140  1.11       mrg 	NETBSD32TO64_UAP(ops);
   5141  1.11       mrg 	NETBSD32TO64_UAP(facs);
   5142  1.11       mrg 	NETBSD32TO64_UAP(pid);
   5143   1.6       eeh 	return (sys_fktrace(p, &ua, retval));
   5144   1.6       eeh }
   5145  1.42  jdolecek #endif /* KTRACE */
   5146   1.6       eeh 
   5147  1.56       mrg /* XXX MOVE ME XXX */
   5148   1.6       eeh int
   5149  1.19       eeh netbsd32_preadv(p, v, retval)
   5150   1.1       mrg 	struct proc *p;
   5151   1.1       mrg 	void *v;
   5152   1.1       mrg 	register_t *retval;
   5153   1.1       mrg {
   5154  1.19       eeh 	struct netbsd32_preadv_args /* {
   5155   1.1       mrg 		syscallarg(int) fd;
   5156  1.10       mrg 		syscallarg(const netbsd32_iovecp_t) iovp;
   5157   1.1       mrg 		syscallarg(int) iovcnt;
   5158   1.1       mrg 		syscallarg(int) pad;
   5159   1.1       mrg 		syscallarg(off_t) offset;
   5160   1.1       mrg 	} */ *uap = v;
   5161   1.6       eeh 	struct filedesc *fdp = p->p_fd;
   5162   1.6       eeh 	struct file *fp;
   5163   1.6       eeh 	struct vnode *vp;
   5164   1.6       eeh 	off_t offset;
   5165   1.6       eeh 	int error, fd = SCARG(uap, fd);
   5166   1.6       eeh 
   5167   1.6       eeh 	if ((u_int)fd >= fdp->fd_nfiles ||
   5168   1.6       eeh 	    (fp = fdp->fd_ofiles[fd]) == NULL ||
   5169   1.6       eeh 	    (fp->f_flag & FREAD) == 0)
   5170   1.6       eeh 		return (EBADF);
   5171   1.6       eeh 
   5172   1.6       eeh 	vp = (struct vnode *)fp->f_data;
   5173   1.6       eeh 	if (fp->f_type != DTYPE_VNODE
   5174   1.6       eeh 	    || vp->v_type == VFIFO)
   5175   1.6       eeh 		return (ESPIPE);
   5176   1.6       eeh 
   5177   1.6       eeh 	offset = SCARG(uap, offset);
   5178   1.1       mrg 
   5179   1.6       eeh 	/*
   5180   1.6       eeh 	 * XXX This works because no file systems actually
   5181   1.6       eeh 	 * XXX take any action on the seek operation.
   5182   1.6       eeh 	 */
   5183   1.6       eeh 	if ((error = VOP_SEEK(vp, fp->f_offset, offset, fp->f_cred)) != 0)
   5184   1.6       eeh 		return (error);
   5185   1.1       mrg 
   5186  1.10       mrg 	return (dofilereadv32(p, fd, fp, (struct netbsd32_iovec *)(u_long)SCARG(uap, iovp), SCARG(uap, iovcnt),
   5187   1.6       eeh 	    &offset, 0, retval));
   5188   1.1       mrg }
   5189   1.1       mrg 
   5190  1.56       mrg /* XXX MOVE ME XXX */
   5191   1.1       mrg int
   5192  1.19       eeh netbsd32_pwritev(p, v, retval)
   5193   1.1       mrg 	struct proc *p;
   5194   1.1       mrg 	void *v;
   5195   1.1       mrg 	register_t *retval;
   5196   1.1       mrg {
   5197  1.19       eeh 	struct netbsd32_pwritev_args /* {
   5198   1.1       mrg 		syscallarg(int) fd;
   5199  1.10       mrg 		syscallarg(const netbsd32_iovecp_t) iovp;
   5200   1.1       mrg 		syscallarg(int) iovcnt;
   5201   1.1       mrg 		syscallarg(int) pad;
   5202   1.1       mrg 		syscallarg(off_t) offset;
   5203   1.1       mrg 	} */ *uap = v;
   5204   1.6       eeh 	struct filedesc *fdp = p->p_fd;
   5205   1.6       eeh 	struct file *fp;
   5206   1.6       eeh 	struct vnode *vp;
   5207   1.6       eeh 	off_t offset;
   5208   1.6       eeh 	int error, fd = SCARG(uap, fd);
   5209   1.6       eeh 
   5210   1.6       eeh 	if ((u_int)fd >= fdp->fd_nfiles ||
   5211   1.6       eeh 	    (fp = fdp->fd_ofiles[fd]) == NULL ||
   5212   1.6       eeh 	    (fp->f_flag & FWRITE) == 0)
   5213   1.6       eeh 		return (EBADF);
   5214   1.6       eeh 
   5215   1.6       eeh 	vp = (struct vnode *)fp->f_data;
   5216   1.6       eeh 	if (fp->f_type != DTYPE_VNODE
   5217   1.6       eeh 	    || vp->v_type == VFIFO)
   5218   1.6       eeh 		return (ESPIPE);
   5219   1.6       eeh 
   5220   1.6       eeh 	offset = SCARG(uap, offset);
   5221   1.6       eeh 
   5222   1.6       eeh 	/*
   5223   1.6       eeh 	 * XXX This works because no file systems actually
   5224   1.6       eeh 	 * XXX take any action on the seek operation.
   5225   1.6       eeh 	 */
   5226   1.6       eeh 	if ((error = VOP_SEEK(vp, fp->f_offset, offset, fp->f_cred)) != 0)
   5227   1.6       eeh 		return (error);
   5228   1.6       eeh 
   5229  1.10       mrg 	return (dofilewritev32(p, fd, fp, (struct netbsd32_iovec *)(u_long)SCARG(uap, iovp), SCARG(uap, iovcnt),
   5230   1.6       eeh 	    &offset, 0, retval));
   5231   1.6       eeh }
   5232   1.6       eeh 
   5233  1.56       mrg /* XXX MOVE ME XXX */
   5234  1.20       eeh /* ARGSUSED */
   5235   1.6       eeh int
   5236  1.20       eeh netbsd32___sigaction14(p, v, retval)
   5237  1.20       eeh 	struct proc *p;
   5238   1.6       eeh 	void *v;
   5239   1.6       eeh 	register_t *retval;
   5240   1.6       eeh {
   5241  1.25  augustss 	struct netbsd32___sigaction14_args /* {
   5242  1.20       eeh 		syscallarg(int) signum;
   5243  1.20       eeh 		syscallarg(const struct sigaction *) nsa;
   5244  1.20       eeh 		syscallarg(struct sigaction *) osa;
   5245   1.6       eeh 	} */ *uap = v;
   5246  1.20       eeh 	struct netbsd32_sigaction sa32;
   5247  1.20       eeh 	struct sigaction nsa, osa;
   5248   1.1       mrg 	int error;
   5249   1.1       mrg 
   5250  1.20       eeh 	if (SCARG(uap, nsa)) {
   5251  1.20       eeh 		error = copyin((caddr_t)(u_long)SCARG(uap, nsa),
   5252  1.20       eeh 			       &sa32, sizeof(sa32));
   5253  1.20       eeh 		if (error)
   5254  1.20       eeh 			return (error);
   5255  1.20       eeh 		nsa.sa_handler = (void *)(u_long)sa32.sa_handler;
   5256  1.20       eeh 		nsa.sa_mask = sa32.sa_mask;
   5257  1.20       eeh 		nsa.sa_flags = sa32.sa_flags;
   5258  1.20       eeh 	}
   5259  1.20       eeh 	error = sigaction1(p, SCARG(uap, signum),
   5260  1.20       eeh 	    SCARG(uap, nsa) ? &nsa : 0, SCARG(uap, osa) ? &osa : 0);
   5261   1.6       eeh 	if (error)
   5262   1.6       eeh 		return (error);
   5263  1.20       eeh 	if (SCARG(uap, osa)) {
   5264  1.20       eeh 		sa32.sa_handler = (netbsd32_voidp)(u_long)osa.sa_handler;
   5265  1.20       eeh 		sa32.sa_mask = osa.sa_mask;
   5266  1.20       eeh 		sa32.sa_flags = osa.sa_flags;
   5267  1.20       eeh 		error = copyout(&sa32, (caddr_t)(u_long)SCARG(uap, osa), sizeof(sa32));
   5268  1.20       eeh 		if (error)
   5269  1.20       eeh 			return (error);
   5270  1.20       eeh 	}
   5271   1.6       eeh 	return (0);
   5272   1.6       eeh }
   5273   1.6       eeh 
   5274  1.20       eeh int netbsd32___sigpending14(p, v, retval)
   5275  1.20       eeh 	struct proc *p;
   5276  1.20       eeh 	void   *v;
   5277  1.20       eeh 	register_t *retval;
   5278  1.20       eeh {
   5279  1.25  augustss 	struct netbsd32___sigpending14_args /* {
   5280  1.20       eeh 		syscallarg(sigset_t *) set;
   5281  1.20       eeh 	} */ *uap = v;
   5282  1.20       eeh 	struct sys___sigpending14_args ua;
   5283  1.20       eeh 
   5284  1.20       eeh 	NETBSD32TOP_UAP(set, sigset_t);
   5285  1.20       eeh 	return (sys___sigpending14(p, &ua, retval));
   5286  1.20       eeh }
   5287  1.20       eeh 
   5288  1.20       eeh int netbsd32___sigprocmask14(p, v, retval)
   5289  1.20       eeh 	struct proc *p;
   5290  1.20       eeh 	void   *v;
   5291  1.20       eeh 	register_t *retval;
   5292  1.20       eeh {
   5293  1.25  augustss 	struct netbsd32___sigprocmask14_args /* {
   5294  1.20       eeh 		syscallarg(int) how;
   5295  1.20       eeh 		syscallarg(const sigset_t *) set;
   5296  1.20       eeh 		syscallarg(sigset_t *) oset;
   5297  1.20       eeh 	} */ *uap = v;
   5298  1.20       eeh 	struct sys___sigprocmask14_args ua;
   5299  1.20       eeh 
   5300  1.20       eeh 	NETBSD32TO64_UAP(how);
   5301  1.20       eeh 	NETBSD32TOP_UAP(set, sigset_t);
   5302  1.20       eeh 	NETBSD32TOP_UAP(oset, sigset_t);
   5303  1.20       eeh 	return (sys___sigprocmask14(p, &ua, retval));
   5304  1.20       eeh }
   5305  1.20       eeh 
   5306  1.20       eeh int netbsd32___sigsuspend14(p, v, retval)
   5307  1.20       eeh 	struct proc *p;
   5308  1.20       eeh 	void   *v;
   5309  1.20       eeh 	register_t *retval;
   5310  1.20       eeh {
   5311  1.20       eeh 	struct netbsd32___sigsuspend14_args /* {
   5312  1.20       eeh 		syscallarg(const sigset_t *) set;
   5313  1.20       eeh 	} */ *uap = v;
   5314  1.20       eeh 	struct sys___sigsuspend14_args ua;
   5315  1.20       eeh 
   5316  1.20       eeh 	NETBSD32TOP_UAP(set, sigset_t);
   5317  1.20       eeh 	return (sys___sigsuspend14(p, &ua, retval));
   5318  1.20       eeh };
   5319  1.20       eeh 
   5320  1.56       mrg /* XXX MOVE ME XXX */
   5321  1.20       eeh /*
   5322  1.20       eeh  * Find pathname of process's current directory.
   5323  1.20       eeh  *
   5324  1.20       eeh  * Use vfs vnode-to-name reverse cache; if that fails, fall back
   5325  1.20       eeh  * to reading directory contents.
   5326  1.20       eeh  */
   5327  1.20       eeh int
   5328  1.20       eeh getcwd_common __P((struct vnode *, struct vnode *,
   5329  1.20       eeh 		   char **, char *, int, int, struct proc *));
   5330  1.20       eeh 
   5331  1.20       eeh int netbsd32___getcwd(p, v, retval)
   5332  1.20       eeh 	struct proc *p;
   5333  1.20       eeh 	void   *v;
   5334  1.20       eeh 	register_t *retval;
   5335  1.20       eeh {
   5336  1.25  augustss 	struct netbsd32___getcwd_args /* {
   5337  1.20       eeh 		syscallarg(char *) bufp;
   5338  1.20       eeh 		syscallarg(size_t) length;
   5339  1.20       eeh 	} */ *uap = v;
   5340  1.20       eeh 
   5341  1.20       eeh 	int     error;
   5342  1.20       eeh 	char   *path;
   5343  1.20       eeh 	char   *bp, *bend;
   5344  1.20       eeh 	int     len = (int)SCARG(uap, length);
   5345  1.20       eeh 	int	lenused;
   5346  1.20       eeh 
   5347  1.20       eeh 	if (len > MAXPATHLEN*4)
   5348  1.20       eeh 		len = MAXPATHLEN*4;
   5349  1.20       eeh 	else if (len < 2)
   5350  1.20       eeh 		return ERANGE;
   5351  1.20       eeh 
   5352  1.20       eeh 	path = (char *)malloc(len, M_TEMP, M_WAITOK);
   5353  1.20       eeh 	if (!path)
   5354  1.20       eeh 		return ENOMEM;
   5355  1.20       eeh 
   5356  1.20       eeh 	bp = &path[len];
   5357  1.20       eeh 	bend = bp;
   5358  1.20       eeh 	*(--bp) = '\0';
   5359  1.20       eeh 
   5360  1.20       eeh 	/*
   5361  1.20       eeh 	 * 5th argument here is "max number of vnodes to traverse".
   5362  1.20       eeh 	 * Since each entry takes up at least 2 bytes in the output buffer,
   5363  1.20       eeh 	 * limit it to N/2 vnodes for an N byte buffer.
   5364  1.20       eeh 	 */
   5365  1.20       eeh #define GETCWD_CHECK_ACCESS 0x0001
   5366  1.20       eeh 	error = getcwd_common (p->p_cwdi->cwdi_cdir, NULL, &bp, path, len/2,
   5367  1.20       eeh 			       GETCWD_CHECK_ACCESS, p);
   5368  1.20       eeh 
   5369  1.20       eeh 	if (error)
   5370  1.20       eeh 		goto out;
   5371  1.20       eeh 	lenused = bend - bp;
   5372  1.20       eeh 	*retval = lenused;
   5373  1.20       eeh 	/* put the result into user buffer */
   5374  1.20       eeh 	error = copyout(bp, (caddr_t)(u_long)SCARG(uap, bufp), lenused);
   5375  1.20       eeh 
   5376  1.20       eeh out:
   5377  1.20       eeh 	free(path, M_TEMP);
   5378  1.20       eeh 	return error;
   5379  1.20       eeh }
   5380  1.20       eeh 
   5381  1.20       eeh int netbsd32_fchroot(p, v, retval)
   5382  1.20       eeh 	struct proc *p;
   5383  1.20       eeh 	void *v;
   5384  1.20       eeh 	register_t *retval;
   5385  1.20       eeh {
   5386  1.25  augustss 	struct netbsd32_fchroot_args /* {
   5387  1.20       eeh 		syscallarg(int) fd;
   5388  1.20       eeh 	} */ *uap = v;
   5389  1.20       eeh 	struct sys_fchroot_args ua;
   5390  1.20       eeh 
   5391  1.20       eeh 	NETBSD32TO64_UAP(fd);
   5392  1.20       eeh 	return (sys_fchroot(p, &ua, retval));
   5393  1.20       eeh }
   5394  1.20       eeh 
   5395  1.20       eeh /*
   5396  1.20       eeh  * Open a file given a file handle.
   5397  1.20       eeh  *
   5398  1.20       eeh  * Check permissions, allocate an open file structure,
   5399  1.20       eeh  * and call the device open routine if any.
   5400  1.20       eeh  */
   5401   1.6       eeh int
   5402  1.20       eeh netbsd32_fhopen(p, v, retval)
   5403  1.20       eeh 	struct proc *p;
   5404  1.20       eeh 	void *v;
   5405  1.20       eeh 	register_t *retval;
   5406  1.20       eeh {
   5407  1.25  augustss 	struct netbsd32_fhopen_args /* {
   5408  1.20       eeh 		syscallarg(const fhandle_t *) fhp;
   5409  1.20       eeh 		syscallarg(int) flags;
   5410  1.20       eeh 	} */ *uap = v;
   5411  1.20       eeh 	struct sys_fhopen_args ua;
   5412  1.20       eeh 
   5413  1.20       eeh 	NETBSD32TOP_UAP(fhp, fhandle_t);
   5414  1.20       eeh 	NETBSD32TO64_UAP(flags);
   5415  1.20       eeh 	return (sys_fhopen(p, &ua, retval));
   5416  1.20       eeh }
   5417  1.20       eeh 
   5418  1.20       eeh int netbsd32_fhstat(p, v, retval)
   5419  1.20       eeh 	struct proc *p;
   5420  1.20       eeh 	void *v;
   5421  1.20       eeh 	register_t *retval;
   5422  1.20       eeh {
   5423  1.25  augustss 	struct netbsd32_fhstat_args /* {
   5424  1.20       eeh 		syscallarg(const netbsd32_fhandlep_t) fhp;
   5425  1.20       eeh 		syscallarg(struct stat *) sb;
   5426  1.20       eeh 	} */ *uap = v;
   5427  1.20       eeh 	struct sys_fhstat_args ua;
   5428  1.20       eeh 
   5429  1.20       eeh 	NETBSD32TOP_UAP(fhp, const fhandle_t);
   5430  1.20       eeh 	NETBSD32TOP_UAP(sb, struct stat);
   5431  1.20       eeh 	return (sys_fhstat(p, &ua, retval));
   5432  1.20       eeh }
   5433  1.20       eeh 
   5434  1.20       eeh int netbsd32_fhstatfs(p, v, retval)
   5435  1.20       eeh 	struct proc *p;
   5436   1.6       eeh 	void *v;
   5437   1.6       eeh 	register_t *retval;
   5438   1.6       eeh {
   5439  1.25  augustss 	struct netbsd32_fhstatfs_args /* {
   5440  1.20       eeh 		syscallarg(const netbsd32_fhandlep_t) fhp;
   5441  1.20       eeh 		syscallarg(struct statfs *) buf;
   5442   1.6       eeh 	} */ *uap = v;
   5443  1.20       eeh 	struct sys_fhstatfs_args ua;
   5444   1.1       mrg 
   5445  1.20       eeh 	NETBSD32TOP_UAP(fhp, const fhandle_t);
   5446  1.20       eeh 	NETBSD32TOP_UAP(buf, struct statfs);
   5447  1.20       eeh 	return (sys_fhstatfs(p, &ua, retval));
   5448   1.1       mrg }
   5449  1.37    martin 
   5450  1.37    martin /* virtual memory syscalls */
   5451  1.37    martin int
   5452  1.37    martin netbsd32_ovadvise(p, v, retval)
   5453  1.37    martin 	struct proc *p;
   5454  1.37    martin 	void *v;
   5455  1.37    martin 	register_t *retval;
   5456  1.37    martin {
   5457  1.37    martin 	struct netbsd32_ovadvise_args /* {
   5458  1.37    martin 		syscallarg(int) anom;
   5459  1.37    martin 	} */ *uap = v;
   5460  1.37    martin 	struct sys_ovadvise_args ua;
   5461  1.37    martin 
   5462  1.37    martin 	NETBSD32TO64_UAP(anom);
   5463  1.37    martin 	return (sys_ovadvise(p, &ua, retval));
   5464  1.37    martin }
   5465  1.37    martin 
   5466