netbsd32_netbsd.c revision 1.60.2.3 1 /* $NetBSD: netbsd32_netbsd.c,v 1.60.2.3 2002/09/06 08:43:23 jdolecek Exp $ */
2
3 /*
4 * Copyright (c) 1998, 2001 Matthew R. Green
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. The name of the author may not be used to endorse or promote products
16 * derived from this software without specific prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
19 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
20 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
21 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
22 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
23 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
24 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
25 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
26 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 * SUCH DAMAGE.
29 */
30
31 #include <sys/cdefs.h>
32 __KERNEL_RCSID(0, "$NetBSD: netbsd32_netbsd.c,v 1.60.2.3 2002/09/06 08:43:23 jdolecek Exp $");
33
34 #if defined(_KERNEL_OPT)
35 #include "opt_ddb.h"
36 #include "opt_ktrace.h"
37 #include "opt_ntp.h"
38 #include "opt_compat_netbsd.h"
39 #include "opt_compat_43.h"
40 #include "opt_sysv.h"
41
42 #include "fs_lfs.h"
43 #include "fs_nfs.h"
44 #endif
45
46 /*
47 * Though COMPAT_OLDSOCK is needed only for COMPAT_43, SunOS, Linux,
48 * HP-UX, FreeBSD, Ultrix, OSF1, we define it unconditionally so that
49 * this would be LKM-safe.
50 */
51 #define COMPAT_OLDSOCK /* used by <sys/socket.h> */
52
53 #include <sys/param.h>
54 #include <sys/systm.h>
55 #include <sys/kernel.h>
56 //#define msg __msg /* Don't ask me! */
57 #include <sys/malloc.h>
58 #include <sys/mount.h>
59 #include <sys/socket.h>
60 #include <sys/sockio.h>
61 #include <sys/socketvar.h>
62 #include <sys/mbuf.h>
63 #include <sys/stat.h>
64 #include <sys/time.h>
65 #include <sys/signalvar.h>
66 #include <sys/ptrace.h>
67 #include <sys/ktrace.h>
68 #include <sys/trace.h>
69 #include <sys/resourcevar.h>
70 #include <sys/pool.h>
71 #include <sys/vnode.h>
72 #include <sys/file.h>
73 #include <sys/filedesc.h>
74 #include <sys/namei.h>
75
76 #include <uvm/uvm_extern.h>
77
78 #include <sys/syscallargs.h>
79 #include <sys/proc.h>
80 #include <sys/acct.h>
81 #include <sys/exec.h>
82
83 #include <net/if.h>
84
85 #include <compat/netbsd32/netbsd32.h>
86 #include <compat/netbsd32/netbsd32_syscall.h>
87 #include <compat/netbsd32/netbsd32_syscallargs.h>
88 #include <compat/netbsd32/netbsd32_conv.h>
89
90 #include <machine/frame.h>
91
92 #if defined(DDB)
93 #include <ddb/ddbvar.h>
94 #endif
95
96 extern char netbsd32_sigcode[], netbsd32_esigcode[];
97 extern struct sysent netbsd32_sysent[];
98 #ifdef SYSCALL_DEBUG
99 extern const char * const netbsd32_syscallnames[];
100 #endif
101 #ifdef __HAVE_SYSCALL_INTERN
102 void netbsd32_syscall_intern __P((struct proc *));
103 #else
104 void syscall __P((void));
105 #endif
106
107 const struct emul emul_netbsd32 = {
108 "netbsd32",
109 "/emul/netbsd32",
110 #ifndef __HAVE_MINIMAL_EMUL
111 0,
112 NULL,
113 netbsd32_SYS_syscall,
114 netbsd32_SYS_MAXSYSCALL,
115 #endif
116 netbsd32_sysent,
117 #ifdef SYSCALL_DEBUG
118 netbsd32_syscallnames,
119 #else
120 NULL,
121 #endif
122 netbsd32_sendsig,
123 trapsignal,
124 netbsd32_sigcode,
125 netbsd32_esigcode,
126 netbsd32_setregs,
127 NULL,
128 NULL,
129 NULL,
130 #ifdef __HAVE_SYSCALL_INTERN
131 netbsd32_syscall_intern,
132 #else
133 syscall,
134 #endif
135 };
136
137 /*
138 * below are all the standard NetBSD system calls, in the 32bit
139 * environment, with the necessary conversions to 64bit before
140 * calling the real syscall. anything that needs special
141 * attention is handled elsewhere.
142 */
143
144 int
145 netbsd32_exit(p, v, retval)
146 struct proc *p;
147 void *v;
148 register_t *retval;
149 {
150 struct netbsd32_exit_args /* {
151 syscallarg(int) rval;
152 } */ *uap = v;
153 struct sys_exit_args ua;
154
155 NETBSD32TO64_UAP(rval);
156 return sys_exit(p, &ua, retval);
157 }
158
159 int
160 netbsd32_read(p, v, retval)
161 struct proc *p;
162 void *v;
163 register_t *retval;
164 {
165 struct netbsd32_read_args /* {
166 syscallarg(int) fd;
167 syscallarg(netbsd32_voidp) buf;
168 syscallarg(netbsd32_size_t) nbyte;
169 } */ *uap = v;
170 struct sys_read_args ua;
171
172 NETBSD32TO64_UAP(fd);
173 NETBSD32TOP_UAP(buf, void *);
174 NETBSD32TOX_UAP(nbyte, size_t);
175 return sys_read(p, &ua, retval);
176 }
177
178 int
179 netbsd32_write(p, v, retval)
180 struct proc *p;
181 void *v;
182 register_t *retval;
183 {
184 struct netbsd32_write_args /* {
185 syscallarg(int) fd;
186 syscallarg(const netbsd32_voidp) buf;
187 syscallarg(netbsd32_size_t) nbyte;
188 } */ *uap = v;
189 struct sys_write_args ua;
190
191 NETBSD32TO64_UAP(fd);
192 NETBSD32TOP_UAP(buf, void *);
193 NETBSD32TOX_UAP(nbyte, size_t);
194 return sys_write(p, &ua, retval);
195 }
196
197 int
198 netbsd32_close(p, v, retval)
199 struct proc *p;
200 void *v;
201 register_t *retval;
202 {
203 struct netbsd32_close_args /* {
204 syscallarg(int) fd;
205 } */ *uap = v;
206 struct sys_close_args ua;
207
208 NETBSD32TO64_UAP(fd);
209 return sys_close(p, &ua, retval);
210 }
211
212 int
213 netbsd32_open(p, v, retval)
214 struct proc *p;
215 void *v;
216 register_t *retval;
217 {
218 struct netbsd32_open_args /* {
219 syscallarg(const netbsd32_charp) path;
220 syscallarg(int) flags;
221 syscallarg(mode_t) mode;
222 } */ *uap = v;
223 struct sys_open_args ua;
224 caddr_t sg;
225
226 NETBSD32TOP_UAP(path, const char);
227 NETBSD32TO64_UAP(flags);
228 NETBSD32TO64_UAP(mode);
229 sg = stackgap_init(p, 0);
230 CHECK_ALT_EXIST(p, &sg, SCARG(&ua, path));
231
232 return (sys_open(p, &ua, retval));
233 }
234
235 int
236 netbsd32_link(p, v, retval)
237 struct proc *p;
238 void *v;
239 register_t *retval;
240 {
241 struct netbsd32_link_args /* {
242 syscallarg(const netbsd32_charp) path;
243 syscallarg(const netbsd32_charp) link;
244 } */ *uap = v;
245 struct sys_link_args ua;
246
247 NETBSD32TOP_UAP(path, const char);
248 NETBSD32TOP_UAP(link, const char);
249 return (sys_link(p, &ua, retval));
250 }
251
252 int
253 netbsd32_unlink(p, v, retval)
254 struct proc *p;
255 void *v;
256 register_t *retval;
257 {
258 struct netbsd32_unlink_args /* {
259 syscallarg(const netbsd32_charp) path;
260 } */ *uap = v;
261 struct sys_unlink_args ua;
262
263 NETBSD32TOP_UAP(path, const char);
264
265 return (sys_unlink(p, &ua, retval));
266 }
267
268 int
269 netbsd32_chdir(p, v, retval)
270 struct proc *p;
271 void *v;
272 register_t *retval;
273 {
274 struct netbsd32_chdir_args /* {
275 syscallarg(const netbsd32_charp) path;
276 } */ *uap = v;
277 struct sys_chdir_args ua;
278
279 NETBSD32TOP_UAP(path, const char);
280
281 return (sys_chdir(p, &ua, retval));
282 }
283
284 int
285 netbsd32_fchdir(p, v, retval)
286 struct proc *p;
287 void *v;
288 register_t *retval;
289 {
290 struct netbsd32_fchdir_args /* {
291 syscallarg(int) fd;
292 } */ *uap = v;
293 struct sys_fchdir_args ua;
294
295 NETBSD32TO64_UAP(fd);
296
297 return (sys_fchdir(p, &ua, retval));
298 }
299
300 int
301 netbsd32_mknod(p, v, retval)
302 struct proc *p;
303 void *v;
304 register_t *retval;
305 {
306 struct netbsd32_mknod_args /* {
307 syscallarg(const netbsd32_charp) path;
308 syscallarg(mode_t) mode;
309 syscallarg(dev_t) dev;
310 } */ *uap = v;
311 struct sys_mknod_args ua;
312
313 NETBSD32TOP_UAP(path, const char);
314 NETBSD32TO64_UAP(dev);
315 NETBSD32TO64_UAP(mode);
316
317 return (sys_mknod(p, &ua, retval));
318 }
319
320 int
321 netbsd32_chmod(p, v, retval)
322 struct proc *p;
323 void *v;
324 register_t *retval;
325 {
326 struct netbsd32_chmod_args /* {
327 syscallarg(const netbsd32_charp) path;
328 syscallarg(mode_t) mode;
329 } */ *uap = v;
330 struct sys_chmod_args ua;
331
332 NETBSD32TOP_UAP(path, const char);
333 NETBSD32TO64_UAP(mode);
334
335 return (sys_chmod(p, &ua, retval));
336 }
337
338 int
339 netbsd32_chown(p, v, retval)
340 struct proc *p;
341 void *v;
342 register_t *retval;
343 {
344 struct netbsd32_chown_args /* {
345 syscallarg(const netbsd32_charp) path;
346 syscallarg(uid_t) uid;
347 syscallarg(gid_t) gid;
348 } */ *uap = v;
349 struct sys_chown_args ua;
350
351 NETBSD32TOP_UAP(path, const char);
352 NETBSD32TO64_UAP(uid);
353 NETBSD32TO64_UAP(gid);
354
355 return (sys_chown(p, &ua, retval));
356 }
357
358 int
359 netbsd32_break(p, v, retval)
360 struct proc *p;
361 void *v;
362 register_t *retval;
363 {
364 struct netbsd32_break_args /* {
365 syscallarg(netbsd32_charp) nsize;
366 } */ *uap = v;
367 struct sys_obreak_args ua;
368
369 SCARG(&ua, nsize) = (char *)(u_long)SCARG(uap, nsize);
370 NETBSD32TOP_UAP(nsize, char);
371 return (sys_obreak(p, &ua, retval));
372 }
373
374 int
375 netbsd32_mount(p, v, retval)
376 struct proc *p;
377 void *v;
378 register_t *retval;
379 {
380 struct netbsd32_mount_args /* {
381 syscallarg(const netbsd32_charp) type;
382 syscallarg(const netbsd32_charp) path;
383 syscallarg(int) flags;
384 syscallarg(netbsd32_voidp) data;
385 } */ *uap = v;
386 struct sys_mount_args ua;
387
388 NETBSD32TOP_UAP(type, const char);
389 NETBSD32TOP_UAP(path, const char);
390 NETBSD32TO64_UAP(flags);
391 NETBSD32TOP_UAP(data, void);
392 return (sys_mount(p, &ua, retval));
393 }
394
395 int
396 netbsd32_unmount(p, v, retval)
397 struct proc *p;
398 void *v;
399 register_t *retval;
400 {
401 struct netbsd32_unmount_args /* {
402 syscallarg(const netbsd32_charp) path;
403 syscallarg(int) flags;
404 } */ *uap = v;
405 struct sys_unmount_args ua;
406
407 NETBSD32TOP_UAP(path, const char);
408 NETBSD32TO64_UAP(flags);
409 return (sys_unmount(p, &ua, retval));
410 }
411
412 int
413 netbsd32_setuid(p, v, retval)
414 struct proc *p;
415 void *v;
416 register_t *retval;
417 {
418 struct netbsd32_setuid_args /* {
419 syscallarg(uid_t) uid;
420 } */ *uap = v;
421 struct sys_setuid_args ua;
422
423 NETBSD32TO64_UAP(uid);
424 return (sys_setuid(p, &ua, retval));
425 }
426
427 int
428 netbsd32_ptrace(p, v, retval)
429 struct proc *p;
430 void *v;
431 register_t *retval;
432 {
433 struct netbsd32_ptrace_args /* {
434 syscallarg(int) req;
435 syscallarg(pid_t) pid;
436 syscallarg(netbsd32_caddr_t) addr;
437 syscallarg(int) data;
438 } */ *uap = v;
439 struct sys_ptrace_args ua;
440
441 NETBSD32TO64_UAP(req);
442 NETBSD32TO64_UAP(pid);
443 NETBSD32TOX64_UAP(addr, caddr_t);
444 NETBSD32TO64_UAP(data);
445 return (sys_ptrace(p, &ua, retval));
446 }
447
448 int
449 netbsd32_accept(p, v, retval)
450 struct proc *p;
451 void *v;
452 register_t *retval;
453 {
454 struct netbsd32_accept_args /* {
455 syscallarg(int) s;
456 syscallarg(netbsd32_sockaddrp_t) name;
457 syscallarg(netbsd32_intp) anamelen;
458 } */ *uap = v;
459 struct sys_accept_args ua;
460
461 NETBSD32TO64_UAP(s);
462 NETBSD32TOP_UAP(name, struct sockaddr);
463 NETBSD32TOP_UAP(anamelen, int);
464 return (sys_accept(p, &ua, retval));
465 }
466
467 int
468 netbsd32_getpeername(p, v, retval)
469 struct proc *p;
470 void *v;
471 register_t *retval;
472 {
473 struct netbsd32_getpeername_args /* {
474 syscallarg(int) fdes;
475 syscallarg(netbsd32_sockaddrp_t) asa;
476 syscallarg(netbsd32_intp) alen;
477 } */ *uap = v;
478 struct sys_getpeername_args ua;
479
480 NETBSD32TO64_UAP(fdes);
481 NETBSD32TOP_UAP(asa, struct sockaddr);
482 NETBSD32TOP_UAP(alen, int);
483 /* NB: do the protocol specific sockaddrs need to be converted? */
484 return (sys_getpeername(p, &ua, retval));
485 }
486
487 int
488 netbsd32_getsockname(p, v, retval)
489 struct proc *p;
490 void *v;
491 register_t *retval;
492 {
493 struct netbsd32_getsockname_args /* {
494 syscallarg(int) fdes;
495 syscallarg(netbsd32_sockaddrp_t) asa;
496 syscallarg(netbsd32_intp) alen;
497 } */ *uap = v;
498 struct sys_getsockname_args ua;
499
500 NETBSD32TO64_UAP(fdes);
501 NETBSD32TOP_UAP(asa, struct sockaddr);
502 NETBSD32TOP_UAP(alen, int);
503 return (sys_getsockname(p, &ua, retval));
504 }
505
506 int
507 netbsd32_access(p, v, retval)
508 struct proc *p;
509 void *v;
510 register_t *retval;
511 {
512 struct netbsd32_access_args /* {
513 syscallarg(const netbsd32_charp) path;
514 syscallarg(int) flags;
515 } */ *uap = v;
516 struct sys_access_args ua;
517 caddr_t sg;
518
519 NETBSD32TOP_UAP(path, const char);
520 NETBSD32TO64_UAP(flags);
521 sg = stackgap_init(p, 0);
522 CHECK_ALT_EXIST(p, &sg, SCARG(&ua, path));
523
524 return (sys_access(p, &ua, retval));
525 }
526
527 int
528 netbsd32_chflags(p, v, retval)
529 struct proc *p;
530 void *v;
531 register_t *retval;
532 {
533 struct netbsd32_chflags_args /* {
534 syscallarg(const netbsd32_charp) path;
535 syscallarg(netbsd32_u_long) flags;
536 } */ *uap = v;
537 struct sys_chflags_args ua;
538
539 NETBSD32TOP_UAP(path, const char);
540 NETBSD32TO64_UAP(flags);
541
542 return (sys_chflags(p, &ua, retval));
543 }
544
545 int
546 netbsd32_fchflags(p, v, retval)
547 struct proc *p;
548 void *v;
549 register_t *retval;
550 {
551 struct netbsd32_fchflags_args /* {
552 syscallarg(int) fd;
553 syscallarg(netbsd32_u_long) flags;
554 } */ *uap = v;
555 struct sys_fchflags_args ua;
556
557 NETBSD32TO64_UAP(fd);
558 NETBSD32TO64_UAP(flags);
559
560 return (sys_fchflags(p, &ua, retval));
561 }
562
563 int
564 netbsd32_lchflags(p, v, retval)
565 struct proc *p;
566 void *v;
567 register_t *retval;
568 {
569 struct netbsd32_lchflags_args /* {
570 syscallarg(int) fd;
571 syscallarg(netbsd32_u_long) flags;
572 } */ *uap = v;
573 struct sys_lchflags_args ua;
574
575 NETBSD32TOP_UAP(path, const char);
576 NETBSD32TO64_UAP(flags);
577
578 return (sys_lchflags(p, &ua, retval));
579 }
580
581 int
582 netbsd32_kill(p, v, retval)
583 struct proc *p;
584 void *v;
585 register_t *retval;
586 {
587 struct netbsd32_kill_args /* {
588 syscallarg(int) pid;
589 syscallarg(int) signum;
590 } */ *uap = v;
591 struct sys_kill_args ua;
592
593 NETBSD32TO64_UAP(pid);
594 NETBSD32TO64_UAP(signum);
595
596 return (sys_kill(p, &ua, retval));
597 }
598
599 int
600 netbsd32_dup(p, v, retval)
601 struct proc *p;
602 void *v;
603 register_t *retval;
604 {
605 struct netbsd32_dup_args /* {
606 syscallarg(int) fd;
607 } */ *uap = v;
608 struct sys_dup_args ua;
609
610 NETBSD32TO64_UAP(fd);
611
612 return (sys_dup(p, &ua, retval));
613 }
614
615 int
616 netbsd32_profil(p, v, retval)
617 struct proc *p;
618 void *v;
619 register_t *retval;
620 {
621 struct netbsd32_profil_args /* {
622 syscallarg(netbsd32_caddr_t) samples;
623 syscallarg(netbsd32_size_t) size;
624 syscallarg(netbsd32_u_long) offset;
625 syscallarg(u_int) scale;
626 } */ *uap = v;
627 struct sys_profil_args ua;
628
629 NETBSD32TOX64_UAP(samples, caddr_t);
630 NETBSD32TOX_UAP(size, size_t);
631 NETBSD32TOX_UAP(offset, u_long);
632 NETBSD32TO64_UAP(scale);
633 return (sys_profil(p, &ua, retval));
634 }
635
636 #ifdef KTRACE
637 int
638 netbsd32_ktrace(p, v, retval)
639 struct proc *p;
640 void *v;
641 register_t *retval;
642 {
643 struct netbsd32_ktrace_args /* {
644 syscallarg(const netbsd32_charp) fname;
645 syscallarg(int) ops;
646 syscallarg(int) facs;
647 syscallarg(int) pid;
648 } */ *uap = v;
649 struct sys_ktrace_args ua;
650
651 NETBSD32TOP_UAP(fname, const char);
652 NETBSD32TO64_UAP(ops);
653 NETBSD32TO64_UAP(facs);
654 NETBSD32TO64_UAP(pid);
655 return (sys_ktrace(p, &ua, retval));
656 }
657 #endif /* KTRACE */
658
659 int
660 netbsd32_utrace(p, v, retval)
661 struct proc *p;
662 void *v;
663 register_t *retval;
664 {
665 struct netbsd32_utrace_args /* {
666 syscallarg(const netbsd32_charp) label;
667 syscallarg(netbsd32_voidp) addr;
668 syscallarg(netbsd32_size_t) len;
669 } */ *uap = v;
670 struct sys_utrace_args ua;
671
672 NETBSD32TOP_UAP(label, const char);
673 NETBSD32TOP_UAP(addr, void);
674 NETBSD32TO64_UAP(len);
675 return (sys_utrace(p, &ua, retval));
676 }
677
678 int
679 netbsd32___getlogin(p, v, retval)
680 struct proc *p;
681 void *v;
682 register_t *retval;
683 {
684 struct netbsd32___getlogin_args /* {
685 syscallarg(netbsd32_charp) namebuf;
686 syscallarg(u_int) namelen;
687 } */ *uap = v;
688 struct sys___getlogin_args ua;
689
690 NETBSD32TOP_UAP(namebuf, char);
691 NETBSD32TO64_UAP(namelen);
692 return (sys___getlogin(p, &ua, retval));
693 }
694
695 int
696 netbsd32_setlogin(p, v, retval)
697 struct proc *p;
698 void *v;
699 register_t *retval;
700 {
701 struct netbsd32_setlogin_args /* {
702 syscallarg(const netbsd32_charp) namebuf;
703 } */ *uap = v;
704 struct sys_setlogin_args ua;
705
706 NETBSD32TOP_UAP(namebuf, char);
707 return (sys_setlogin(p, &ua, retval));
708 }
709
710 int
711 netbsd32_acct(p, v, retval)
712 struct proc *p;
713 void *v;
714 register_t *retval;
715 {
716 struct netbsd32_acct_args /* {
717 syscallarg(const netbsd32_charp) path;
718 } */ *uap = v;
719 struct sys_acct_args ua;
720
721 NETBSD32TOP_UAP(path, const char);
722 return (sys_acct(p, &ua, retval));
723 }
724
725 int
726 netbsd32_revoke(p, v, retval)
727 struct proc *p;
728 void *v;
729 register_t *retval;
730 {
731 struct netbsd32_revoke_args /* {
732 syscallarg(const netbsd32_charp) path;
733 } */ *uap = v;
734 struct sys_revoke_args ua;
735 caddr_t sg;
736
737 NETBSD32TOP_UAP(path, const char);
738 sg = stackgap_init(p, 0);
739 CHECK_ALT_EXIST(p, &sg, SCARG(&ua, path));
740
741 return (sys_revoke(p, &ua, retval));
742 }
743
744 int
745 netbsd32_symlink(p, v, retval)
746 struct proc *p;
747 void *v;
748 register_t *retval;
749 {
750 struct netbsd32_symlink_args /* {
751 syscallarg(const netbsd32_charp) path;
752 syscallarg(const netbsd32_charp) link;
753 } */ *uap = v;
754 struct sys_symlink_args ua;
755
756 NETBSD32TOP_UAP(path, const char);
757 NETBSD32TOP_UAP(link, const char);
758
759 return (sys_symlink(p, &ua, retval));
760 }
761
762 int
763 netbsd32_readlink(p, v, retval)
764 struct proc *p;
765 void *v;
766 register_t *retval;
767 {
768 struct netbsd32_readlink_args /* {
769 syscallarg(const netbsd32_charp) path;
770 syscallarg(netbsd32_charp) buf;
771 syscallarg(netbsd32_size_t) count;
772 } */ *uap = v;
773 struct sys_readlink_args ua;
774 caddr_t sg;
775
776 NETBSD32TOP_UAP(path, const char);
777 NETBSD32TOP_UAP(buf, char);
778 NETBSD32TOX_UAP(count, size_t);
779 sg = stackgap_init(p, 0);
780 CHECK_ALT_SYMLINK(p, &sg, SCARG(&ua, path));
781
782 return (sys_readlink(p, &ua, retval));
783 }
784
785 int
786 netbsd32_umask(p, v, retval)
787 struct proc *p;
788 void *v;
789 register_t *retval;
790 {
791 struct netbsd32_umask_args /* {
792 syscallarg(mode_t) newmask;
793 } */ *uap = v;
794 struct sys_umask_args ua;
795
796 NETBSD32TO64_UAP(newmask);
797 return (sys_umask(p, &ua, retval));
798 }
799
800 int
801 netbsd32_chroot(p, v, retval)
802 struct proc *p;
803 void *v;
804 register_t *retval;
805 {
806 struct netbsd32_chroot_args /* {
807 syscallarg(const netbsd32_charp) path;
808 } */ *uap = v;
809 struct sys_chroot_args ua;
810
811 NETBSD32TOP_UAP(path, const char);
812 return (sys_chroot(p, &ua, retval));
813 }
814
815 int
816 netbsd32_sbrk(p, v, retval)
817 struct proc *p;
818 void *v;
819 register_t *retval;
820 {
821 struct netbsd32_sbrk_args /* {
822 syscallarg(int) incr;
823 } */ *uap = v;
824 struct sys_sbrk_args ua;
825
826 NETBSD32TO64_UAP(incr);
827 return (sys_sbrk(p, &ua, retval));
828 }
829
830 int
831 netbsd32_sstk(p, v, retval)
832 struct proc *p;
833 void *v;
834 register_t *retval;
835 {
836 struct netbsd32_sstk_args /* {
837 syscallarg(int) incr;
838 } */ *uap = v;
839 struct sys_sstk_args ua;
840
841 NETBSD32TO64_UAP(incr);
842 return (sys_sstk(p, &ua, retval));
843 }
844
845 int
846 netbsd32_munmap(p, v, retval)
847 struct proc *p;
848 void *v;
849 register_t *retval;
850 {
851 struct netbsd32_munmap_args /* {
852 syscallarg(netbsd32_voidp) addr;
853 syscallarg(netbsd32_size_t) len;
854 } */ *uap = v;
855 struct sys_munmap_args ua;
856
857 NETBSD32TOP_UAP(addr, void);
858 NETBSD32TOX_UAP(len, size_t);
859 return (sys_munmap(p, &ua, retval));
860 }
861
862 int
863 netbsd32_mprotect(p, v, retval)
864 struct proc *p;
865 void *v;
866 register_t *retval;
867 {
868 struct netbsd32_mprotect_args /* {
869 syscallarg(netbsd32_voidp) addr;
870 syscallarg(netbsd32_size_t) len;
871 syscallarg(int) prot;
872 } */ *uap = v;
873 struct sys_mprotect_args ua;
874
875 NETBSD32TOP_UAP(addr, void);
876 NETBSD32TOX_UAP(len, size_t);
877 NETBSD32TO64_UAP(prot);
878 return (sys_mprotect(p, &ua, retval));
879 }
880
881 int
882 netbsd32_madvise(p, v, retval)
883 struct proc *p;
884 void *v;
885 register_t *retval;
886 {
887 struct netbsd32_madvise_args /* {
888 syscallarg(netbsd32_voidp) addr;
889 syscallarg(netbsd32_size_t) len;
890 syscallarg(int) behav;
891 } */ *uap = v;
892 struct sys_madvise_args ua;
893
894 NETBSD32TOP_UAP(addr, void);
895 NETBSD32TOX_UAP(len, size_t);
896 NETBSD32TO64_UAP(behav);
897 return (sys_madvise(p, &ua, retval));
898 }
899
900 int
901 netbsd32_mincore(p, v, retval)
902 struct proc *p;
903 void *v;
904 register_t *retval;
905 {
906 struct netbsd32_mincore_args /* {
907 syscallarg(netbsd32_caddr_t) addr;
908 syscallarg(netbsd32_size_t) len;
909 syscallarg(netbsd32_charp) vec;
910 } */ *uap = v;
911 struct sys_mincore_args ua;
912
913 NETBSD32TOX64_UAP(addr, caddr_t);
914 NETBSD32TOX_UAP(len, size_t);
915 NETBSD32TOP_UAP(vec, char);
916 return (sys_mincore(p, &ua, retval));
917 }
918
919 /* XXX MOVE ME XXX ? */
920 int
921 netbsd32_getgroups(p, v, retval)
922 struct proc *p;
923 void *v;
924 register_t *retval;
925 {
926 struct netbsd32_getgroups_args /* {
927 syscallarg(int) gidsetsize;
928 syscallarg(netbsd32_gid_tp) gidset;
929 } */ *uap = v;
930 struct pcred *pc = p->p_cred;
931 int ngrp;
932 int error;
933
934 ngrp = SCARG(uap, gidsetsize);
935 if (ngrp == 0) {
936 *retval = pc->pc_ucred->cr_ngroups;
937 return (0);
938 }
939 if (ngrp < pc->pc_ucred->cr_ngroups)
940 return (EINVAL);
941 ngrp = pc->pc_ucred->cr_ngroups;
942 /* Should convert gid_t to netbsd32_gid_t, but they're the same */
943 error = copyout((caddr_t)pc->pc_ucred->cr_groups,
944 (caddr_t)(u_long)SCARG(uap, gidset),
945 ngrp * sizeof(gid_t));
946 if (error)
947 return (error);
948 *retval = ngrp;
949 return (0);
950 }
951
952 int
953 netbsd32_setgroups(p, v, retval)
954 struct proc *p;
955 void *v;
956 register_t *retval;
957 {
958 struct netbsd32_setgroups_args /* {
959 syscallarg(int) gidsetsize;
960 syscallarg(const netbsd32_gid_tp) gidset;
961 } */ *uap = v;
962 struct sys_setgroups_args ua;
963
964 NETBSD32TO64_UAP(gidsetsize);
965 NETBSD32TOP_UAP(gidset, gid_t);
966 return (sys_setgroups(p, &ua, retval));
967 }
968
969 int
970 netbsd32_setpgid(p, v, retval)
971 struct proc *p;
972 void *v;
973 register_t *retval;
974 {
975 struct netbsd32_setpgid_args /* {
976 syscallarg(int) pid;
977 syscallarg(int) pgid;
978 } */ *uap = v;
979 struct sys_setpgid_args ua;
980
981 NETBSD32TO64_UAP(pid);
982 NETBSD32TO64_UAP(pgid);
983 return (sys_setpgid(p, &ua, retval));
984 }
985
986 int
987 netbsd32_fcntl(p, v, retval)
988 struct proc *p;
989 void *v;
990 register_t *retval;
991 {
992 struct netbsd32_fcntl_args /* {
993 syscallarg(int) fd;
994 syscallarg(int) cmd;
995 syscallarg(netbsd32_voidp) arg;
996 } */ *uap = v;
997 struct sys_fcntl_args ua;
998
999 NETBSD32TO64_UAP(fd);
1000 NETBSD32TO64_UAP(cmd);
1001 NETBSD32TOP_UAP(arg, void);
1002 /* we can do this because `struct flock' doesn't change */
1003 return (sys_fcntl(p, &ua, retval));
1004 }
1005
1006 int
1007 netbsd32_dup2(p, v, retval)
1008 struct proc *p;
1009 void *v;
1010 register_t *retval;
1011 {
1012 struct netbsd32_dup2_args /* {
1013 syscallarg(int) from;
1014 syscallarg(int) to;
1015 } */ *uap = v;
1016 struct sys_dup2_args ua;
1017
1018 NETBSD32TO64_UAP(from);
1019 NETBSD32TO64_UAP(to);
1020 return (sys_dup2(p, &ua, retval));
1021 }
1022
1023 int
1024 netbsd32_fsync(p, v, retval)
1025 struct proc *p;
1026 void *v;
1027 register_t *retval;
1028 {
1029 struct netbsd32_fsync_args /* {
1030 syscallarg(int) fd;
1031 } */ *uap = v;
1032 struct sys_fsync_args ua;
1033
1034 NETBSD32TO64_UAP(fd);
1035 return (sys_fsync(p, &ua, retval));
1036 }
1037
1038 int
1039 netbsd32_setpriority(p, v, retval)
1040 struct proc *p;
1041 void *v;
1042 register_t *retval;
1043 {
1044 struct netbsd32_setpriority_args /* {
1045 syscallarg(int) which;
1046 syscallarg(int) who;
1047 syscallarg(int) prio;
1048 } */ *uap = v;
1049 struct sys_setpriority_args ua;
1050
1051 NETBSD32TO64_UAP(which);
1052 NETBSD32TO64_UAP(who);
1053 NETBSD32TO64_UAP(prio);
1054 return (sys_setpriority(p, &ua, retval));
1055 }
1056
1057 int
1058 netbsd32_socket(p, v, retval)
1059 struct proc *p;
1060 void *v;
1061 register_t *retval;
1062 {
1063 struct netbsd32_socket_args /* {
1064 syscallarg(int) domain;
1065 syscallarg(int) type;
1066 syscallarg(int) protocol;
1067 } */ *uap = v;
1068 struct sys_socket_args ua;
1069
1070 NETBSD32TO64_UAP(domain);
1071 NETBSD32TO64_UAP(type);
1072 NETBSD32TO64_UAP(protocol);
1073 return (sys_socket(p, &ua, retval));
1074 }
1075
1076 int
1077 netbsd32_connect(p, v, retval)
1078 struct proc *p;
1079 void *v;
1080 register_t *retval;
1081 {
1082 struct netbsd32_connect_args /* {
1083 syscallarg(int) s;
1084 syscallarg(const netbsd32_sockaddrp_t) name;
1085 syscallarg(int) namelen;
1086 } */ *uap = v;
1087 struct sys_connect_args ua;
1088
1089 NETBSD32TO64_UAP(s);
1090 NETBSD32TOP_UAP(name, struct sockaddr);
1091 NETBSD32TO64_UAP(namelen);
1092 return (sys_connect(p, &ua, retval));
1093 }
1094
1095 int
1096 netbsd32_getpriority(p, v, retval)
1097 struct proc *p;
1098 void *v;
1099 register_t *retval;
1100 {
1101 struct netbsd32_getpriority_args /* {
1102 syscallarg(int) which;
1103 syscallarg(int) who;
1104 } */ *uap = v;
1105 struct sys_getpriority_args ua;
1106
1107 NETBSD32TO64_UAP(which);
1108 NETBSD32TO64_UAP(who);
1109 return (sys_getpriority(p, &ua, retval));
1110 }
1111
1112 int
1113 netbsd32_bind(p, v, retval)
1114 struct proc *p;
1115 void *v;
1116 register_t *retval;
1117 {
1118 struct netbsd32_bind_args /* {
1119 syscallarg(int) s;
1120 syscallarg(const netbsd32_sockaddrp_t) name;
1121 syscallarg(int) namelen;
1122 } */ *uap = v;
1123 struct sys_bind_args ua;
1124
1125 NETBSD32TO64_UAP(s);
1126 NETBSD32TOP_UAP(name, struct sockaddr);
1127 NETBSD32TO64_UAP(namelen);
1128 return (sys_bind(p, &ua, retval));
1129 }
1130
1131 int
1132 netbsd32_setsockopt(p, v, retval)
1133 struct proc *p;
1134 void *v;
1135 register_t *retval;
1136 {
1137 struct netbsd32_setsockopt_args /* {
1138 syscallarg(int) s;
1139 syscallarg(int) level;
1140 syscallarg(int) name;
1141 syscallarg(const netbsd32_voidp) val;
1142 syscallarg(int) valsize;
1143 } */ *uap = v;
1144 struct sys_setsockopt_args ua;
1145
1146 NETBSD32TO64_UAP(s);
1147 NETBSD32TO64_UAP(level);
1148 NETBSD32TO64_UAP(name);
1149 NETBSD32TOP_UAP(val, void);
1150 NETBSD32TO64_UAP(valsize);
1151 /* may be more efficient to do this inline. */
1152 return (sys_setsockopt(p, &ua, retval));
1153 }
1154
1155 int
1156 netbsd32_listen(p, v, retval)
1157 struct proc *p;
1158 void *v;
1159 register_t *retval;
1160 {
1161 struct netbsd32_listen_args /* {
1162 syscallarg(int) s;
1163 syscallarg(int) backlog;
1164 } */ *uap = v;
1165 struct sys_listen_args ua;
1166
1167 NETBSD32TO64_UAP(s);
1168 NETBSD32TO64_UAP(backlog);
1169 return (sys_listen(p, &ua, retval));
1170 }
1171
1172 int
1173 netbsd32_fchown(p, v, retval)
1174 struct proc *p;
1175 void *v;
1176 register_t *retval;
1177 {
1178 struct netbsd32_fchown_args /* {
1179 syscallarg(int) fd;
1180 syscallarg(uid_t) uid;
1181 syscallarg(gid_t) gid;
1182 } */ *uap = v;
1183 struct sys_fchown_args ua;
1184
1185 NETBSD32TO64_UAP(fd);
1186 NETBSD32TO64_UAP(uid);
1187 NETBSD32TO64_UAP(gid);
1188 return (sys_fchown(p, &ua, retval));
1189 }
1190
1191 int
1192 netbsd32_fchmod(p, v, retval)
1193 struct proc *p;
1194 void *v;
1195 register_t *retval;
1196 {
1197 struct netbsd32_fchmod_args /* {
1198 syscallarg(int) fd;
1199 syscallarg(mode_t) mode;
1200 } */ *uap = v;
1201 struct sys_fchmod_args ua;
1202
1203 NETBSD32TO64_UAP(fd);
1204 NETBSD32TO64_UAP(mode);
1205 return (sys_fchmod(p, &ua, retval));
1206 }
1207
1208 int
1209 netbsd32_setreuid(p, v, retval)
1210 struct proc *p;
1211 void *v;
1212 register_t *retval;
1213 {
1214 struct netbsd32_setreuid_args /* {
1215 syscallarg(uid_t) ruid;
1216 syscallarg(uid_t) euid;
1217 } */ *uap = v;
1218 struct sys_setreuid_args ua;
1219
1220 NETBSD32TO64_UAP(ruid);
1221 NETBSD32TO64_UAP(euid);
1222 return (sys_setreuid(p, &ua, retval));
1223 }
1224
1225 int
1226 netbsd32_setregid(p, v, retval)
1227 struct proc *p;
1228 void *v;
1229 register_t *retval;
1230 {
1231 struct netbsd32_setregid_args /* {
1232 syscallarg(gid_t) rgid;
1233 syscallarg(gid_t) egid;
1234 } */ *uap = v;
1235 struct sys_setregid_args ua;
1236
1237 NETBSD32TO64_UAP(rgid);
1238 NETBSD32TO64_UAP(egid);
1239 return (sys_setregid(p, &ua, retval));
1240 }
1241
1242 int
1243 netbsd32_getsockopt(p, v, retval)
1244 struct proc *p;
1245 void *v;
1246 register_t *retval;
1247 {
1248 struct netbsd32_getsockopt_args /* {
1249 syscallarg(int) s;
1250 syscallarg(int) level;
1251 syscallarg(int) name;
1252 syscallarg(netbsd32_voidp) val;
1253 syscallarg(netbsd32_intp) avalsize;
1254 } */ *uap = v;
1255 struct sys_getsockopt_args ua;
1256
1257 NETBSD32TO64_UAP(s);
1258 NETBSD32TO64_UAP(level);
1259 NETBSD32TO64_UAP(name);
1260 NETBSD32TOP_UAP(val, void);
1261 NETBSD32TOP_UAP(avalsize, int);
1262 return (sys_getsockopt(p, &ua, retval));
1263 }
1264
1265 int
1266 netbsd32_rename(p, v, retval)
1267 struct proc *p;
1268 void *v;
1269 register_t *retval;
1270 {
1271 struct netbsd32_rename_args /* {
1272 syscallarg(const netbsd32_charp) from;
1273 syscallarg(const netbsd32_charp) to;
1274 } */ *uap = v;
1275 struct sys_rename_args ua;
1276
1277 NETBSD32TOP_UAP(from, const char);
1278 NETBSD32TOP_UAP(to, const char)
1279
1280 return (sys_rename(p, &ua, retval));
1281 }
1282
1283 int
1284 netbsd32_flock(p, v, retval)
1285 struct proc *p;
1286 void *v;
1287 register_t *retval;
1288 {
1289 struct netbsd32_flock_args /* {
1290 syscallarg(int) fd;
1291 syscallarg(int) how;
1292 } */ *uap = v;
1293 struct sys_flock_args ua;
1294
1295 NETBSD32TO64_UAP(fd);
1296 NETBSD32TO64_UAP(how)
1297
1298 return (sys_flock(p, &ua, retval));
1299 }
1300
1301 int
1302 netbsd32_mkfifo(p, v, retval)
1303 struct proc *p;
1304 void *v;
1305 register_t *retval;
1306 {
1307 struct netbsd32_mkfifo_args /* {
1308 syscallarg(const netbsd32_charp) path;
1309 syscallarg(mode_t) mode;
1310 } */ *uap = v;
1311 struct sys_mkfifo_args ua;
1312
1313 NETBSD32TOP_UAP(path, const char)
1314 NETBSD32TO64_UAP(mode);
1315 return (sys_mkfifo(p, &ua, retval));
1316 }
1317
1318 int
1319 netbsd32_shutdown(p, v, retval)
1320 struct proc *p;
1321 void *v;
1322 register_t *retval;
1323 {
1324 struct netbsd32_shutdown_args /* {
1325 syscallarg(int) s;
1326 syscallarg(int) how;
1327 } */ *uap = v;
1328 struct sys_shutdown_args ua;
1329
1330 NETBSD32TO64_UAP(s)
1331 NETBSD32TO64_UAP(how);
1332 return (sys_shutdown(p, &ua, retval));
1333 }
1334
1335 int
1336 netbsd32_socketpair(p, v, retval)
1337 struct proc *p;
1338 void *v;
1339 register_t *retval;
1340 {
1341 struct netbsd32_socketpair_args /* {
1342 syscallarg(int) domain;
1343 syscallarg(int) type;
1344 syscallarg(int) protocol;
1345 syscallarg(netbsd32_intp) rsv;
1346 } */ *uap = v;
1347 struct sys_socketpair_args ua;
1348
1349 NETBSD32TO64_UAP(domain);
1350 NETBSD32TO64_UAP(type);
1351 NETBSD32TO64_UAP(protocol);
1352 NETBSD32TOP_UAP(rsv, int);
1353 /* Since we're just copying out two `int's we can do this */
1354 return (sys_socketpair(p, &ua, retval));
1355 }
1356
1357 int
1358 netbsd32_mkdir(p, v, retval)
1359 struct proc *p;
1360 void *v;
1361 register_t *retval;
1362 {
1363 struct netbsd32_mkdir_args /* {
1364 syscallarg(const netbsd32_charp) path;
1365 syscallarg(mode_t) mode;
1366 } */ *uap = v;
1367 struct sys_mkdir_args ua;
1368
1369 NETBSD32TOP_UAP(path, const char)
1370 NETBSD32TO64_UAP(mode);
1371 return (sys_mkdir(p, &ua, retval));
1372 }
1373
1374 int
1375 netbsd32_rmdir(p, v, retval)
1376 struct proc *p;
1377 void *v;
1378 register_t *retval;
1379 {
1380 struct netbsd32_rmdir_args /* {
1381 syscallarg(const netbsd32_charp) path;
1382 } */ *uap = v;
1383 struct sys_rmdir_args ua;
1384
1385 NETBSD32TOP_UAP(path, const char);
1386 return (sys_rmdir(p, &ua, retval));
1387 }
1388
1389 int
1390 netbsd32_quotactl(p, v, retval)
1391 struct proc *p;
1392 void *v;
1393 register_t *retval;
1394 {
1395 struct netbsd32_quotactl_args /* {
1396 syscallarg(const netbsd32_charp) path;
1397 syscallarg(int) cmd;
1398 syscallarg(int) uid;
1399 syscallarg(netbsd32_caddr_t) arg;
1400 } */ *uap = v;
1401 struct sys_quotactl_args ua;
1402
1403 NETBSD32TOP_UAP(path, const char);
1404 NETBSD32TO64_UAP(cmd);
1405 NETBSD32TO64_UAP(uid);
1406 NETBSD32TOX64_UAP(arg, caddr_t);
1407 return (sys_quotactl(p, &ua, retval));
1408 }
1409
1410 #if defined(NFS) || defined(NFSSERVER)
1411 int
1412 netbsd32_nfssvc(p, v, retval)
1413 struct proc *p;
1414 void *v;
1415 register_t *retval;
1416 {
1417 #if 0
1418 struct netbsd32_nfssvc_args /* {
1419 syscallarg(int) flag;
1420 syscallarg(netbsd32_voidp) argp;
1421 } */ *uap = v;
1422 struct sys_nfssvc_args ua;
1423
1424 NETBSD32TO64_UAP(flag);
1425 NETBSD32TOP_UAP(argp, void);
1426 return (sys_nfssvc(p, &ua, retval));
1427 #else
1428 /* Why would we want to support a 32-bit nfsd? */
1429 return (ENOSYS);
1430 #endif
1431 }
1432 #endif
1433
1434 #if defined(NFS) || defined(NFSSERVER)
1435 int
1436 netbsd32_getfh(p, v, retval)
1437 struct proc *p;
1438 void *v;
1439 register_t *retval;
1440 {
1441 struct netbsd32_getfh_args /* {
1442 syscallarg(const netbsd32_charp) fname;
1443 syscallarg(netbsd32_fhandlep_t) fhp;
1444 } */ *uap = v;
1445 struct sys_getfh_args ua;
1446
1447 NETBSD32TOP_UAP(fname, const char);
1448 NETBSD32TOP_UAP(fhp, struct fhandle);
1449 /* Lucky for us a fhandlep_t doesn't change sizes */
1450 return (sys_getfh(p, &ua, retval));
1451 }
1452 #endif
1453
1454 int
1455 netbsd32_pread(p, v, retval)
1456 struct proc *p;
1457 void *v;
1458 register_t *retval;
1459 {
1460 struct netbsd32_pread_args /* {
1461 syscallarg(int) fd;
1462 syscallarg(netbsd32_voidp) buf;
1463 syscallarg(netbsd32_size_t) nbyte;
1464 syscallarg(int) pad;
1465 syscallarg(off_t) offset;
1466 } */ *uap = v;
1467 struct sys_pread_args ua;
1468 ssize_t rt;
1469 int error;
1470
1471 NETBSD32TO64_UAP(fd);
1472 NETBSD32TOP_UAP(buf, void);
1473 NETBSD32TOX_UAP(nbyte, size_t);
1474 NETBSD32TO64_UAP(pad);
1475 NETBSD32TO64_UAP(offset);
1476 error = sys_pread(p, &ua, (register_t *)&rt);
1477 *retval = rt;
1478 return (error);
1479 }
1480
1481 int
1482 netbsd32_pwrite(p, v, retval)
1483 struct proc *p;
1484 void *v;
1485 register_t *retval;
1486 {
1487 struct netbsd32_pwrite_args /* {
1488 syscallarg(int) fd;
1489 syscallarg(const netbsd32_voidp) buf;
1490 syscallarg(netbsd32_size_t) nbyte;
1491 syscallarg(int) pad;
1492 syscallarg(off_t) offset;
1493 } */ *uap = v;
1494 struct sys_pwrite_args ua;
1495 ssize_t rt;
1496 int error;
1497
1498 NETBSD32TO64_UAP(fd);
1499 NETBSD32TOP_UAP(buf, void);
1500 NETBSD32TOX_UAP(nbyte, size_t);
1501 NETBSD32TO64_UAP(pad);
1502 NETBSD32TO64_UAP(offset);
1503 error = sys_pwrite(p, &ua, (register_t *)&rt);
1504 *retval = rt;
1505 return (error);
1506 }
1507
1508 int
1509 netbsd32_setgid(p, v, retval)
1510 struct proc *p;
1511 void *v;
1512 register_t *retval;
1513 {
1514 struct netbsd32_setgid_args /* {
1515 syscallarg(gid_t) gid;
1516 } */ *uap = v;
1517 struct sys_setgid_args ua;
1518
1519 NETBSD32TO64_UAP(gid);
1520 return (sys_setgid(p, v, retval));
1521 }
1522
1523 int
1524 netbsd32_setegid(p, v, retval)
1525 struct proc *p;
1526 void *v;
1527 register_t *retval;
1528 {
1529 struct netbsd32_setegid_args /* {
1530 syscallarg(gid_t) egid;
1531 } */ *uap = v;
1532 struct sys_setegid_args ua;
1533
1534 NETBSD32TO64_UAP(egid);
1535 return (sys_setegid(p, v, retval));
1536 }
1537
1538 int
1539 netbsd32_seteuid(p, v, retval)
1540 struct proc *p;
1541 void *v;
1542 register_t *retval;
1543 {
1544 struct netbsd32_seteuid_args /* {
1545 syscallarg(gid_t) euid;
1546 } */ *uap = v;
1547 struct sys_seteuid_args ua;
1548
1549 NETBSD32TO64_UAP(euid);
1550 return (sys_seteuid(p, v, retval));
1551 }
1552
1553 #ifdef LFS
1554 int
1555 netbsd32_sys_lfs_bmapv(p, v, retval)
1556 struct proc *p;
1557 void *v;
1558 register_t *retval;
1559 {
1560
1561 return (ENOSYS); /* XXX */
1562 }
1563
1564 int
1565 netbsd32_sys_lfs_markv(p, v, retval)
1566 struct proc *p;
1567 void *v;
1568 register_t *retval;
1569 {
1570
1571 return (ENOSYS); /* XXX */
1572 }
1573
1574 int
1575 netbsd32_sys_lfs_segclean(p, v, retval)
1576 struct proc *p;
1577 void *v;
1578 register_t *retval;
1579 {
1580
1581 return (ENOSYS); /* XXX */
1582 }
1583
1584 int
1585 netbsd32_sys_lfs_segwait(p, v, retval)
1586 struct proc *p;
1587 void *v;
1588 register_t *retval;
1589 {
1590
1591 return (ENOSYS); /* XXX */
1592 }
1593 #endif
1594
1595 int
1596 netbsd32_pathconf(p, v, retval)
1597 struct proc *p;
1598 void *v;
1599 register_t *retval;
1600 {
1601 struct netbsd32_pathconf_args /* {
1602 syscallarg(int) fd;
1603 syscallarg(int) name;
1604 } */ *uap = v;
1605 struct sys_pathconf_args ua;
1606 long rt;
1607 int error;
1608
1609 NETBSD32TOP_UAP(path, const char);
1610 NETBSD32TO64_UAP(name);
1611 error = sys_pathconf(p, &ua, (register_t *)&rt);
1612 *retval = rt;
1613 return (error);
1614 }
1615
1616 int
1617 netbsd32_fpathconf(p, v, retval)
1618 struct proc *p;
1619 void *v;
1620 register_t *retval;
1621 {
1622 struct netbsd32_fpathconf_args /* {
1623 syscallarg(int) fd;
1624 syscallarg(int) name;
1625 } */ *uap = v;
1626 struct sys_fpathconf_args ua;
1627 long rt;
1628 int error;
1629
1630 NETBSD32TO64_UAP(fd);
1631 NETBSD32TO64_UAP(name);
1632 error = sys_fpathconf(p, &ua, (register_t *)&rt);
1633 *retval = rt;
1634 return (error);
1635 }
1636
1637 int
1638 netbsd32_getrlimit(p, v, retval)
1639 struct proc *p;
1640 void *v;
1641 register_t *retval;
1642 {
1643 struct netbsd32_getrlimit_args /* {
1644 syscallarg(int) which;
1645 syscallarg(netbsd32_rlimitp_t) rlp;
1646 } */ *uap = v;
1647 int which = SCARG(uap, which);
1648
1649 if ((u_int)which >= RLIM_NLIMITS)
1650 return (EINVAL);
1651 return (copyout(&p->p_rlimit[which], (caddr_t)(u_long)SCARG(uap, rlp),
1652 sizeof(struct rlimit)));
1653 }
1654
1655 int
1656 netbsd32_setrlimit(p, v, retval)
1657 struct proc *p;
1658 void *v;
1659 register_t *retval;
1660 {
1661 struct netbsd32_setrlimit_args /* {
1662 syscallarg(int) which;
1663 syscallarg(const netbsd32_rlimitp_t) rlp;
1664 } */ *uap = v;
1665 int which = SCARG(uap, which);
1666 struct rlimit alim;
1667 int error;
1668
1669 error = copyin((caddr_t)(u_long)SCARG(uap, rlp), &alim, sizeof(struct rlimit));
1670 if (error)
1671 return (error);
1672 return (dosetrlimit(p, p->p_cred, which, &alim));
1673 }
1674
1675 int
1676 netbsd32_mmap(p, v, retval)
1677 struct proc *p;
1678 void *v;
1679 register_t *retval;
1680 {
1681 struct netbsd32_mmap_args /* {
1682 syscallarg(netbsd32_voidp) addr;
1683 syscallarg(netbsd32_size_t) len;
1684 syscallarg(int) prot;
1685 syscallarg(int) flags;
1686 syscallarg(int) fd;
1687 syscallarg(netbsd32_long) pad;
1688 syscallarg(off_t) pos;
1689 } */ *uap = v;
1690 struct sys_mmap_args ua;
1691 void *rt;
1692 int error;
1693
1694 NETBSD32TOP_UAP(addr, void);
1695 NETBSD32TOX_UAP(len, size_t);
1696 NETBSD32TO64_UAP(prot);
1697 NETBSD32TO64_UAP(flags);
1698 NETBSD32TO64_UAP(fd);
1699 NETBSD32TOX_UAP(pad, long);
1700 NETBSD32TOX_UAP(pos, off_t);
1701 error = sys_mmap(p, &ua, (register_t *)&rt);
1702 if ((u_long)rt > (u_long)UINT_MAX) {
1703 printf("netbsd32_mmap: retval out of range: %p", rt);
1704 /* Should try to recover and return an error here. */
1705 }
1706 *retval = (netbsd32_voidp)(u_long)rt;
1707 return (error);
1708 }
1709
1710 int
1711 netbsd32_lseek(p, v, retval)
1712 struct proc *p;
1713 void *v;
1714 register_t *retval;
1715 {
1716 struct netbsd32_lseek_args /* {
1717 syscallarg(int) fd;
1718 syscallarg(int) pad;
1719 syscallarg(off_t) offset;
1720 syscallarg(int) whence;
1721 } */ *uap = v;
1722 struct sys_lseek_args ua;
1723
1724 NETBSD32TO64_UAP(fd);
1725 NETBSD32TO64_UAP(pad);
1726 NETBSD32TO64_UAP(offset);
1727 NETBSD32TO64_UAP(whence);
1728 return (sys_lseek(p, &ua, retval));
1729 }
1730
1731 int
1732 netbsd32_truncate(p, v, retval)
1733 struct proc *p;
1734 void *v;
1735 register_t *retval;
1736 {
1737 struct netbsd32_truncate_args /* {
1738 syscallarg(const netbsd32_charp) path;
1739 syscallarg(int) pad;
1740 syscallarg(off_t) length;
1741 } */ *uap = v;
1742 struct sys_truncate_args ua;
1743
1744 NETBSD32TOP_UAP(path, const char);
1745 NETBSD32TO64_UAP(pad);
1746 NETBSD32TO64_UAP(length);
1747 return (sys_truncate(p, &ua, retval));
1748 }
1749
1750 int
1751 netbsd32_ftruncate(p, v, retval)
1752 struct proc *p;
1753 void *v;
1754 register_t *retval;
1755 {
1756 struct netbsd32_ftruncate_args /* {
1757 syscallarg(int) fd;
1758 syscallarg(int) pad;
1759 syscallarg(off_t) length;
1760 } */ *uap = v;
1761 struct sys_ftruncate_args ua;
1762
1763 NETBSD32TO64_UAP(fd);
1764 NETBSD32TO64_UAP(pad);
1765 NETBSD32TO64_UAP(length);
1766 return (sys_ftruncate(p, &ua, retval));
1767 }
1768
1769 int
1770 netbsd32_mlock(p, v, retval)
1771 struct proc *p;
1772 void *v;
1773 register_t *retval;
1774 {
1775 struct netbsd32_mlock_args /* {
1776 syscallarg(const netbsd32_voidp) addr;
1777 syscallarg(netbsd32_size_t) len;
1778 } */ *uap = v;
1779 struct sys_mlock_args ua;
1780
1781 NETBSD32TOP_UAP(addr, const void);
1782 NETBSD32TO64_UAP(len);
1783 return (sys_mlock(p, &ua, retval));
1784 }
1785
1786 int
1787 netbsd32_munlock(p, v, retval)
1788 struct proc *p;
1789 void *v;
1790 register_t *retval;
1791 {
1792 struct netbsd32_munlock_args /* {
1793 syscallarg(const netbsd32_voidp) addr;
1794 syscallarg(netbsd32_size_t) len;
1795 } */ *uap = v;
1796 struct sys_munlock_args ua;
1797
1798 NETBSD32TOP_UAP(addr, const void);
1799 NETBSD32TO64_UAP(len);
1800 return (sys_munlock(p, &ua, retval));
1801 }
1802
1803 int
1804 netbsd32_undelete(p, v, retval)
1805 struct proc *p;
1806 void *v;
1807 register_t *retval;
1808 {
1809 struct netbsd32_undelete_args /* {
1810 syscallarg(const netbsd32_charp) path;
1811 } */ *uap = v;
1812 struct sys_undelete_args ua;
1813
1814 NETBSD32TOP_UAP(path, const char);
1815 return (sys_undelete(p, &ua, retval));
1816 }
1817
1818 int
1819 netbsd32_getpgid(p, v, retval)
1820 struct proc *p;
1821 void *v;
1822 register_t *retval;
1823 {
1824 struct netbsd32_getpgid_args /* {
1825 syscallarg(pid_t) pid;
1826 } */ *uap = v;
1827 struct sys_getpgid_args ua;
1828
1829 NETBSD32TO64_UAP(pid);
1830 return (sys_getpgid(p, &ua, retval));
1831 }
1832
1833 int
1834 netbsd32_reboot(p, v, retval)
1835 struct proc *p;
1836 void *v;
1837 register_t *retval;
1838 {
1839 struct netbsd32_reboot_args /* {
1840 syscallarg(int) opt;
1841 syscallarg(netbsd32_charp) bootstr;
1842 } */ *uap = v;
1843 struct sys_reboot_args ua;
1844
1845 NETBSD32TO64_UAP(opt);
1846 NETBSD32TOP_UAP(bootstr, char);
1847 return (sys_reboot(p, &ua, retval));
1848 }
1849
1850 int
1851 netbsd32_poll(p, v, retval)
1852 struct proc *p;
1853 void *v;
1854 register_t *retval;
1855 {
1856 struct netbsd32_poll_args /* {
1857 syscallarg(netbsd32_pollfdp_t) fds;
1858 syscallarg(u_int) nfds;
1859 syscallarg(int) timeout;
1860 } */ *uap = v;
1861 struct sys_poll_args ua;
1862
1863 NETBSD32TOP_UAP(fds, struct pollfd);
1864 NETBSD32TO64_UAP(nfds);
1865 NETBSD32TO64_UAP(timeout);
1866 return (sys_poll(p, &ua, retval));
1867 }
1868
1869 int
1870 netbsd32_fdatasync(p, v, retval)
1871 struct proc *p;
1872 void *v;
1873 register_t *retval;
1874 {
1875 struct netbsd32_fdatasync_args /* {
1876 syscallarg(int) fd;
1877 } */ *uap = v;
1878 struct sys_fdatasync_args ua;
1879
1880 NETBSD32TO64_UAP(fd);
1881 return (sys_fdatasync(p, &ua, retval));
1882 }
1883
1884 int
1885 netbsd32___posix_rename(p, v, retval)
1886 struct proc *p;
1887 void *v;
1888 register_t *retval;
1889 {
1890 struct netbsd32___posix_rename_args /* {
1891 syscallarg(const netbsd32_charp) from;
1892 syscallarg(const netbsd32_charp) to;
1893 } */ *uap = v;
1894 struct sys___posix_rename_args ua;
1895
1896 NETBSD32TOP_UAP(from, const char);
1897 NETBSD32TOP_UAP(to, const char);
1898 return (sys___posix_rename(p, &ua, retval));
1899 }
1900
1901 int
1902 netbsd32_swapctl(p, v, retval)
1903 struct proc *p;
1904 void *v;
1905 register_t *retval;
1906 {
1907 struct netbsd32_swapctl_args /* {
1908 syscallarg(int) cmd;
1909 syscallarg(const netbsd32_voidp) arg;
1910 syscallarg(int) misc;
1911 } */ *uap = v;
1912 struct sys_swapctl_args ua;
1913
1914 NETBSD32TO64_UAP(cmd);
1915 NETBSD32TOP_UAP(arg, const void);
1916 NETBSD32TO64_UAP(misc);
1917 return (sys_swapctl(p, &ua, retval));
1918 }
1919
1920 int
1921 netbsd32_minherit(p, v, retval)
1922 struct proc *p;
1923 void *v;
1924 register_t *retval;
1925 {
1926 struct netbsd32_minherit_args /* {
1927 syscallarg(netbsd32_voidp) addr;
1928 syscallarg(netbsd32_size_t) len;
1929 syscallarg(int) inherit;
1930 } */ *uap = v;
1931 struct sys_minherit_args ua;
1932
1933 NETBSD32TOP_UAP(addr, void);
1934 NETBSD32TOX_UAP(len, size_t);
1935 NETBSD32TO64_UAP(inherit);
1936 return (sys_minherit(p, &ua, retval));
1937 }
1938
1939 int
1940 netbsd32_lchmod(p, v, retval)
1941 struct proc *p;
1942 void *v;
1943 register_t *retval;
1944 {
1945 struct netbsd32_lchmod_args /* {
1946 syscallarg(const netbsd32_charp) path;
1947 syscallarg(mode_t) mode;
1948 } */ *uap = v;
1949 struct sys_lchmod_args ua;
1950
1951 NETBSD32TOP_UAP(path, const char);
1952 NETBSD32TO64_UAP(mode);
1953 return (sys_lchmod(p, &ua, retval));
1954 }
1955
1956 int
1957 netbsd32_lchown(p, v, retval)
1958 struct proc *p;
1959 void *v;
1960 register_t *retval;
1961 {
1962 struct netbsd32_lchown_args /* {
1963 syscallarg(const netbsd32_charp) path;
1964 syscallarg(uid_t) uid;
1965 syscallarg(gid_t) gid;
1966 } */ *uap = v;
1967 struct sys_lchown_args ua;
1968
1969 NETBSD32TOP_UAP(path, const char);
1970 NETBSD32TO64_UAP(uid);
1971 NETBSD32TO64_UAP(gid);
1972 return (sys_lchown(p, &ua, retval));
1973 }
1974
1975 int
1976 netbsd32___msync13(p, v, retval)
1977 struct proc *p;
1978 void *v;
1979 register_t *retval;
1980 {
1981 struct netbsd32___msync13_args /* {
1982 syscallarg(netbsd32_voidp) addr;
1983 syscallarg(netbsd32_size_t) len;
1984 syscallarg(int) flags;
1985 } */ *uap = v;
1986 struct sys___msync13_args ua;
1987
1988 NETBSD32TOP_UAP(addr, void);
1989 NETBSD32TOX_UAP(len, size_t);
1990 NETBSD32TO64_UAP(flags);
1991 return (sys___msync13(p, &ua, retval));
1992 }
1993
1994 int
1995 netbsd32___posix_chown(p, v, retval)
1996 struct proc *p;
1997 void *v;
1998 register_t *retval;
1999 {
2000 struct netbsd32___posix_chown_args /* {
2001 syscallarg(const netbsd32_charp) path;
2002 syscallarg(uid_t) uid;
2003 syscallarg(gid_t) gid;
2004 } */ *uap = v;
2005 struct sys___posix_chown_args ua;
2006
2007 NETBSD32TOP_UAP(path, const char);
2008 NETBSD32TO64_UAP(uid);
2009 NETBSD32TO64_UAP(gid);
2010 return (sys___posix_chown(p, &ua, retval));
2011 }
2012
2013 int
2014 netbsd32___posix_fchown(p, v, retval)
2015 struct proc *p;
2016 void *v;
2017 register_t *retval;
2018 {
2019 struct netbsd32___posix_fchown_args /* {
2020 syscallarg(int) fd;
2021 syscallarg(uid_t) uid;
2022 syscallarg(gid_t) gid;
2023 } */ *uap = v;
2024 struct sys___posix_fchown_args ua;
2025
2026 NETBSD32TO64_UAP(fd);
2027 NETBSD32TO64_UAP(uid);
2028 NETBSD32TO64_UAP(gid);
2029 return (sys___posix_fchown(p, &ua, retval));
2030 }
2031
2032 int
2033 netbsd32___posix_lchown(p, v, retval)
2034 struct proc *p;
2035 void *v;
2036 register_t *retval;
2037 {
2038 struct netbsd32___posix_lchown_args /* {
2039 syscallarg(const netbsd32_charp) path;
2040 syscallarg(uid_t) uid;
2041 syscallarg(gid_t) gid;
2042 } */ *uap = v;
2043 struct sys___posix_lchown_args ua;
2044
2045 NETBSD32TOP_UAP(path, const char);
2046 NETBSD32TO64_UAP(uid);
2047 NETBSD32TO64_UAP(gid);
2048 return (sys___posix_lchown(p, &ua, retval));
2049 }
2050
2051 int
2052 netbsd32_getsid(p, v, retval)
2053 struct proc *p;
2054 void *v;
2055 register_t *retval;
2056 {
2057 struct netbsd32_getsid_args /* {
2058 syscallarg(pid_t) pid;
2059 } */ *uap = v;
2060 struct sys_getsid_args ua;
2061
2062 NETBSD32TO64_UAP(pid);
2063 return (sys_getsid(p, &ua, retval));
2064 }
2065
2066 #ifdef KTRACE
2067 int
2068 netbsd32_fktrace(p, v, retval)
2069 struct proc *p;
2070 void *v;
2071 register_t *retval;
2072 {
2073 struct netbsd32_fktrace_args /* {
2074 syscallarg(const int) fd;
2075 syscallarg(int) ops;
2076 syscallarg(int) facs;
2077 syscallarg(int) pid;
2078 } */ *uap = v;
2079 #if 0
2080 struct sys_fktrace_args ua;
2081 #else
2082 /* XXXX */
2083 struct sys_fktrace_noconst_args {
2084 syscallarg(int) fd;
2085 syscallarg(int) ops;
2086 syscallarg(int) facs;
2087 syscallarg(int) pid;
2088 } ua;
2089 #endif
2090
2091 NETBSD32TOX_UAP(fd, int);
2092 NETBSD32TO64_UAP(ops);
2093 NETBSD32TO64_UAP(facs);
2094 NETBSD32TO64_UAP(pid);
2095 return (sys_fktrace(p, &ua, retval));
2096 }
2097 #endif /* KTRACE */
2098
2099 int netbsd32___sigpending14(p, v, retval)
2100 struct proc *p;
2101 void *v;
2102 register_t *retval;
2103 {
2104 struct netbsd32___sigpending14_args /* {
2105 syscallarg(sigset_t *) set;
2106 } */ *uap = v;
2107 struct sys___sigpending14_args ua;
2108
2109 NETBSD32TOP_UAP(set, sigset_t);
2110 return (sys___sigpending14(p, &ua, retval));
2111 }
2112
2113 int netbsd32___sigprocmask14(p, v, retval)
2114 struct proc *p;
2115 void *v;
2116 register_t *retval;
2117 {
2118 struct netbsd32___sigprocmask14_args /* {
2119 syscallarg(int) how;
2120 syscallarg(const sigset_t *) set;
2121 syscallarg(sigset_t *) oset;
2122 } */ *uap = v;
2123 struct sys___sigprocmask14_args ua;
2124
2125 NETBSD32TO64_UAP(how);
2126 NETBSD32TOP_UAP(set, sigset_t);
2127 NETBSD32TOP_UAP(oset, sigset_t);
2128 return (sys___sigprocmask14(p, &ua, retval));
2129 }
2130
2131 int netbsd32___sigsuspend14(p, v, retval)
2132 struct proc *p;
2133 void *v;
2134 register_t *retval;
2135 {
2136 struct netbsd32___sigsuspend14_args /* {
2137 syscallarg(const sigset_t *) set;
2138 } */ *uap = v;
2139 struct sys___sigsuspend14_args ua;
2140
2141 NETBSD32TOP_UAP(set, sigset_t);
2142 return (sys___sigsuspend14(p, &ua, retval));
2143 };
2144
2145 int netbsd32_fchroot(p, v, retval)
2146 struct proc *p;
2147 void *v;
2148 register_t *retval;
2149 {
2150 struct netbsd32_fchroot_args /* {
2151 syscallarg(int) fd;
2152 } */ *uap = v;
2153 struct sys_fchroot_args ua;
2154
2155 NETBSD32TO64_UAP(fd);
2156 return (sys_fchroot(p, &ua, retval));
2157 }
2158
2159 /*
2160 * Open a file given a file handle.
2161 *
2162 * Check permissions, allocate an open file structure,
2163 * and call the device open routine if any.
2164 */
2165 int
2166 netbsd32_fhopen(p, v, retval)
2167 struct proc *p;
2168 void *v;
2169 register_t *retval;
2170 {
2171 struct netbsd32_fhopen_args /* {
2172 syscallarg(const fhandle_t *) fhp;
2173 syscallarg(int) flags;
2174 } */ *uap = v;
2175 struct sys_fhopen_args ua;
2176
2177 NETBSD32TOP_UAP(fhp, fhandle_t);
2178 NETBSD32TO64_UAP(flags);
2179 return (sys_fhopen(p, &ua, retval));
2180 }
2181
2182 int netbsd32_fhstat(p, v, retval)
2183 struct proc *p;
2184 void *v;
2185 register_t *retval;
2186 {
2187 struct netbsd32_fhstat_args /* {
2188 syscallarg(const netbsd32_fhandlep_t) fhp;
2189 syscallarg(struct stat *) sb;
2190 } */ *uap = v;
2191 struct sys_fhstat_args ua;
2192
2193 NETBSD32TOP_UAP(fhp, const fhandle_t);
2194 NETBSD32TOP_UAP(sb, struct stat);
2195 return (sys_fhstat(p, &ua, retval));
2196 }
2197
2198 int netbsd32_fhstatfs(p, v, retval)
2199 struct proc *p;
2200 void *v;
2201 register_t *retval;
2202 {
2203 struct netbsd32_fhstatfs_args /* {
2204 syscallarg(const netbsd32_fhandlep_t) fhp;
2205 syscallarg(struct statfs *) buf;
2206 } */ *uap = v;
2207 struct sys_fhstatfs_args ua;
2208
2209 NETBSD32TOP_UAP(fhp, const fhandle_t);
2210 NETBSD32TOP_UAP(buf, struct statfs);
2211 return (sys_fhstatfs(p, &ua, retval));
2212 }
2213
2214 /* virtual memory syscalls */
2215 int
2216 netbsd32_ovadvise(p, v, retval)
2217 struct proc *p;
2218 void *v;
2219 register_t *retval;
2220 {
2221 struct netbsd32_ovadvise_args /* {
2222 syscallarg(int) anom;
2223 } */ *uap = v;
2224 struct sys_ovadvise_args ua;
2225
2226 NETBSD32TO64_UAP(anom);
2227 return (sys_ovadvise(p, &ua, retval));
2228 }
2229
2230