xref: /netbsd-src/sys/compat/linux/common/linux_ipc.c (revision 81b108b45f75f89f1e3ffad9fb6f074e771c0935)
1 /*	$NetBSD: linux_ipc.c,v 1.10 1996/04/05 00:01:44 christos Exp $	*/
2 
3 /*
4  * Copyright (c) 1995 Frank van der Linden
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. All advertising materials mentioning features or use of this software
16  *    must display the following acknowledgement:
17  *      This product includes software developed for the NetBSD Project
18  *      by Frank van der Linden
19  * 4. The name of the author may not be used to endorse or promote products
20  *    derived from this software without specific prior written permission
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
23  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
24  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
25  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
26  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
27  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
31  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32  */
33 
34 #include <sys/types.h>
35 #include <sys/param.h>
36 #include <sys/kernel.h>
37 #include <sys/shm.h>
38 #include <sys/sem.h>
39 #include <sys/msg.h>
40 #include <sys/proc.h>
41 #include <sys/uio.h>
42 #include <sys/time.h>
43 #include <sys/malloc.h>
44 #include <sys/mman.h>
45 #include <sys/systm.h>
46 #include <sys/stat.h>
47 
48 #include <sys/mount.h>
49 #include <sys/syscallargs.h>
50 
51 #include <compat/linux/linux_types.h>
52 #include <compat/linux/linux_signal.h>
53 #include <compat/linux/linux_syscallargs.h>
54 #include <compat/linux/linux_util.h>
55 #include <compat/linux/linux_ipc.h>
56 #include <compat/linux/linux_msg.h>
57 #include <compat/linux/linux_shm.h>
58 #include <compat/linux/linux_sem.h>
59 #include <compat/linux/linux_ipccall.h>
60 
61 /*
62  * Stuff to deal with the SysV ipc/shm/semaphore interface in Linux.
63  * The main difference is, that Linux handles it all via one
64  * system call, which has the usual maximum amount of 5 arguments.
65  * This results in a kludge for calls that take 6 of them.
66  *
67  * The SYSVXXXX options have to be enabled to get the appropriate
68  * functions to work.
69  */
70 
71 #ifdef SYSVSEM
72 static int linux_semop __P((struct proc *, struct linux_sys_ipc_args *,
73 				register_t *));
74 static int linux_semget __P((struct proc *, struct linux_sys_ipc_args *,
75 				register_t *));
76 static int linux_semctl __P((struct proc *, struct linux_sys_ipc_args *,
77 				register_t *));
78 static void bsd_to_linux_semid_ds __P((struct semid_ds *,
79 				       struct linux_semid_ds *));
80 static void linux_to_bsd_semid_ds __P((struct linux_semid_ds *,
81 				       struct semid_ds *));
82 #endif
83 
84 #ifdef SYSVMSG
85 static int linux_msgsnd __P((struct proc *, struct linux_sys_ipc_args *,
86 				register_t *));
87 static int linux_msgrcv __P((struct proc *, struct linux_sys_ipc_args *,
88 				register_t *));
89 static int linux_msgget __P((struct proc *, struct linux_sys_ipc_args *,
90 				register_t *));
91 static int linux_msgctl __P((struct proc *, struct linux_sys_ipc_args *,
92 				register_t *));
93 static void linux_to_bsd_msqid_ds __P((struct linux_msqid_ds *,
94 				       struct msqid_ds *));
95 static void bsd_to_linux_msqid_ds __P((struct msqid_ds *,
96 				       struct linux_msqid_ds *));
97 #endif
98 
99 #ifdef SYSVSHM
100 static int linux_shmat __P((struct proc *, struct linux_sys_ipc_args *,
101 				register_t *));
102 static int linux_shmdt __P((struct proc *, struct linux_sys_ipc_args *,
103 				register_t *));
104 static int linux_shmget __P((struct proc *, struct linux_sys_ipc_args *,
105 				register_t *));
106 static int linux_shmctl __P((struct proc *, struct linux_sys_ipc_args *,
107 				register_t *));
108 static void linux_to_bsd_shmid_ds __P((struct linux_shmid_ds *,
109 				       struct shmid_ds *));
110 static void bsd_to_linux_shmid_ds __P((struct shmid_ds *,
111 				       struct linux_shmid_ds *));
112 #endif
113 
114 
115 static void linux_to_bsd_ipc_perm __P((struct linux_ipc_perm *,
116 				       struct ipc_perm *));
117 static void bsd_to_linux_ipc_perm __P((struct ipc_perm *,
118 				       struct linux_ipc_perm *));
119 
120 int
121 linux_sys_ipc(p, v, retval)
122 	struct proc *p;
123 	void *v;
124 	register_t *retval;
125 {
126 	struct linux_sys_ipc_args /* {
127 		syscallarg(int) what;
128 		syscallarg(int) a1;
129 		syscallarg(int) a2;
130 		syscallarg(int) a3;
131 		syscallarg(caddr_t) ptr;
132 	} */ *uap = v;
133 
134 	switch (SCARG(uap, what)) {
135 #ifdef SYSVSEM
136 	case LINUX_SYS_semop:
137 		return linux_semop(p, uap, retval);
138 	case LINUX_SYS_semget:
139 		return linux_semget(p, uap, retval);
140 	case LINUX_SYS_semctl:
141 		return linux_semctl(p, uap, retval);
142 #endif
143 #ifdef SYSVMSG
144 	case LINUX_SYS_msgsnd:
145 		return linux_msgsnd(p, uap, retval);
146 	case LINUX_SYS_msgrcv:
147 		return linux_msgrcv(p, uap, retval);
148 	case LINUX_SYS_msgget:
149 		return linux_msgget(p, uap, retval);
150 	case LINUX_SYS_msgctl:
151 		return linux_msgctl(p, uap, retval);
152 #endif
153 #ifdef SYSVSHM
154 	case LINUX_SYS_shmat:
155 		return linux_shmat(p, uap, retval);
156 	case LINUX_SYS_shmdt:
157 		return linux_shmdt(p, uap, retval);
158 	case LINUX_SYS_shmget:
159 		return linux_shmget(p, uap, retval);
160 	case LINUX_SYS_shmctl:
161 		return linux_shmctl(p, uap, retval);
162 #endif
163 	default:
164 		return ENOSYS;
165 	}
166 }
167 
168 /*
169  * Convert between Linux and NetBSD ipc_perm structures. Only the
170  * order of the fields is different.
171  */
172 static void
173 linux_to_bsd_ipc_perm(lpp, bpp)
174 	struct linux_ipc_perm *lpp;
175 	struct ipc_perm *bpp;
176 {
177 
178 	bpp->key = lpp->l_key;
179 	bpp->uid = lpp->l_uid;
180 	bpp->gid = lpp->l_gid;
181 	bpp->cuid = lpp->l_cuid;
182 	bpp->cgid = lpp->l_cgid;
183 	bpp->mode = lpp->l_mode;
184 	bpp->seq = lpp->l_seq;
185 }
186 
187 static void
188 bsd_to_linux_ipc_perm(bpp, lpp)
189 	struct ipc_perm *bpp;
190 	struct linux_ipc_perm *lpp;
191 {
192 
193 	lpp->l_key = bpp->key;
194 	lpp->l_uid = bpp->uid;
195 	lpp->l_gid = bpp->gid;
196 	lpp->l_cuid = bpp->cuid;
197 	lpp->l_cgid = bpp->cgid;
198 	lpp->l_mode = bpp->mode;
199 	lpp->l_seq = bpp->seq;
200 }
201 
202 #ifdef SYSVSEM
203 /*
204  * Semaphore operations. Most constants and structures are the same on
205  * both systems. Only semctl() needs some extra work.
206  */
207 
208 /*
209  * Convert between Linux and NetBSD semid_ds structures.
210  */
211 static void
212 bsd_to_linux_semid_ds(bs, ls)
213 	struct semid_ds *bs;
214 	struct linux_semid_ds *ls;
215 {
216 
217 	bsd_to_linux_ipc_perm(&bs->sem_perm, &ls->l_sem_perm);
218 	ls->l_sem_otime = bs->sem_otime;
219 	ls->l_sem_ctime = bs->sem_ctime;
220 	ls->l_sem_nsems = bs->sem_nsems;
221 	ls->l_sem_base = bs->sem_base;
222 }
223 
224 static void
225 linux_to_bsd_semid_ds(ls, bs)
226 	struct linux_semid_ds *ls;
227 	struct semid_ds *bs;
228 {
229 
230 	linux_to_bsd_ipc_perm(&ls->l_sem_perm, &bs->sem_perm);
231 	bs->sem_otime = ls->l_sem_otime;
232 	bs->sem_ctime = ls->l_sem_ctime;
233 	bs->sem_nsems = ls->l_sem_nsems;
234 	bs->sem_base = ls->l_sem_base;
235 }
236 
237 int
238 linux_semop(p, uap, retval)
239 	struct proc *p;
240 	struct linux_sys_ipc_args /* {
241 		syscallarg(int) what;
242 		syscallarg(int) a1;
243 		syscallarg(int) a2;
244 		syscallarg(int) a3;
245 		syscallarg(caddr_t) ptr;
246 	} */ *uap;
247 	register_t *retval;
248 {
249 	struct sys_semop_args bsa;
250 
251 	SCARG(&bsa, semid) = SCARG(uap, a1);
252 	SCARG(&bsa, sops) = (struct sembuf *)SCARG(uap, ptr);
253 	SCARG(&bsa, nsops) = SCARG(uap, a2);
254 
255 	return sys_semop(p, &bsa, retval);
256 }
257 
258 int
259 linux_semget(p, uap, retval)
260 	struct proc *p;
261 	struct linux_sys_ipc_args /* {
262 		syscallarg(int) what;
263 		syscallarg(int) a1;
264 		syscallarg(int) a2;
265 		syscallarg(int) a3;
266 		syscallarg(caddr_t) ptr;
267 	} */ *uap;
268 	register_t *retval;
269 {
270 	struct sys_semget_args bsa;
271 
272 	SCARG(&bsa, key) = (key_t)SCARG(uap, a1);
273 	SCARG(&bsa, nsems) = SCARG(uap, a2);
274 	SCARG(&bsa, semflg) = SCARG(uap, a3);
275 
276 	return sys_semget(p, &bsa, retval);
277 }
278 
279 /*
280  * Most of this can be handled by directly passing the arguments on,
281  * buf IPC_* require a lot of copy{in,out} because of the extra indirection
282  * (we are passed a pointer to a union cointaining a pointer to a semid_ds
283  * structure.
284  */
285 int
286 linux_semctl(p, uap, retval)
287 	struct proc *p;
288 	struct linux_sys_ipc_args /* {
289 		syscallarg(int) what;
290 		syscallarg(int) a1;
291 		syscallarg(int) a2;
292 		syscallarg(int) a3;
293 		syscallarg(caddr_t) ptr;
294 	} */ *uap;
295 	register_t *retval;
296 {
297 	caddr_t sg, unptr, dsp, ldsp;
298 	int error, cmd;
299 	struct sys___semctl_args bsa;
300 	struct linux_semid_ds lm;
301 	struct semid_ds bm;
302 
303 	SCARG(&bsa, semid) = SCARG(uap, a1);
304 	SCARG(&bsa, semnum) = SCARG(uap, a2);
305 	SCARG(&bsa, cmd) = SCARG(uap, a3);
306 	SCARG(&bsa, arg) = (union semun *)SCARG(uap, ptr);
307 	switch(SCARG(uap, a3)) {
308 	case LINUX_GETVAL:
309 		cmd = GETVAL;
310 		break;
311 	case LINUX_GETPID:
312 		cmd = GETPID;
313 		break;
314 	case LINUX_GETNCNT:
315 		cmd = GETNCNT;
316 		break;
317 	case LINUX_GETZCNT:
318 		cmd = GETZCNT;
319 		break;
320 	case LINUX_SETVAL:
321 		cmd = SETVAL;
322 		break;
323 	case LINUX_IPC_RMID:
324 		cmd = IPC_RMID;
325 		break;
326 	case LINUX_IPC_SET:
327 		if ((error = copyin(SCARG(uap, ptr), &ldsp, sizeof ldsp)))
328 			return error;
329 		if ((error = copyin(ldsp, (caddr_t)&lm, sizeof lm)))
330 			return error;
331 		linux_to_bsd_semid_ds(&lm, &bm);
332 		sg = stackgap_init(p->p_emul);
333 		unptr = stackgap_alloc(&sg, sizeof (union semun));
334 		dsp = stackgap_alloc(&sg, sizeof (struct semid_ds));
335 		if ((error = copyout((caddr_t)&bm, dsp, sizeof bm)))
336 			return error;
337 		if ((error = copyout((caddr_t)&dsp, unptr, sizeof dsp)))
338 			return error;
339 		SCARG(&bsa, arg) = (union semun *)unptr;
340 		return sys___semctl(p, &bsa, retval);
341 	case LINUX_IPC_STAT:
342 		sg = stackgap_init(p->p_emul);
343 		unptr = stackgap_alloc(&sg, sizeof (union semun *));
344 		dsp = stackgap_alloc(&sg, sizeof (struct semid_ds));
345 		if ((error = copyout((caddr_t)&dsp, unptr, sizeof dsp)))
346 			return error;
347 		SCARG(&bsa, arg) = (union semun *)unptr;
348 		if ((error = sys___semctl(p, &bsa, retval)))
349 			return error;
350 		if ((error = copyin(dsp, (caddr_t)&bm, sizeof bm)))
351 			return error;
352 		bsd_to_linux_semid_ds(&bm, &lm);
353 		if ((error = copyin(SCARG(uap, ptr), &ldsp, sizeof ldsp)))
354 			return error;
355 		return copyout((caddr_t)&lm, ldsp, sizeof lm);
356 	default:
357 		return EINVAL;
358 	}
359 	SCARG(&bsa, cmd) = cmd;
360 
361 	return sys___semctl(p, &bsa, retval);
362 }
363 #endif /* SYSVSEM */
364 
365 #ifdef SYSVMSG
366 
367 static void
368 linux_to_bsd_msqid_ds(lmp, bmp)
369 	struct linux_msqid_ds *lmp;
370 	struct msqid_ds *bmp;
371 {
372 
373 	linux_to_bsd_ipc_perm(&lmp->l_msg_perm, &bmp->msg_perm);
374 	bmp->msg_first = lmp->l_msg_first;
375 	bmp->msg_last = lmp->l_msg_last;
376 	bmp->msg_cbytes = lmp->l_msg_cbytes;
377 	bmp->msg_qnum = lmp->l_msg_qnum;
378 	bmp->msg_qbytes = lmp->l_msg_qbytes;
379 	bmp->msg_lspid = lmp->l_msg_lspid;
380 	bmp->msg_lrpid = lmp->l_msg_lrpid;
381 	bmp->msg_stime = lmp->l_msg_stime;
382 	bmp->msg_rtime = lmp->l_msg_rtime;
383 	bmp->msg_ctime = lmp->l_msg_ctime;
384 }
385 
386 static void
387 bsd_to_linux_msqid_ds(bmp, lmp)
388 	struct msqid_ds *bmp;
389 	struct linux_msqid_ds *lmp;
390 {
391 
392 	bsd_to_linux_ipc_perm(&bmp->msg_perm, &lmp->l_msg_perm);
393 	lmp->l_msg_first = bmp->msg_first;
394 	lmp->l_msg_last = bmp->msg_last;
395 	lmp->l_msg_cbytes = bmp->msg_cbytes;
396 	lmp->l_msg_qnum = bmp->msg_qnum;
397 	lmp->l_msg_qbytes = bmp->msg_qbytes;
398 	lmp->l_msg_lspid = bmp->msg_lspid;
399 	lmp->l_msg_lrpid = bmp->msg_lrpid;
400 	lmp->l_msg_stime = bmp->msg_stime;
401 	lmp->l_msg_rtime = bmp->msg_rtime;
402 	lmp->l_msg_ctime = bmp->msg_ctime;
403 }
404 
405 static int
406 linux_msgsnd(p, uap, retval)
407 	struct proc *p;
408 	struct linux_sys_ipc_args /* {
409 		syscallarg(int) what;
410 		syscallarg(int) a1;
411 		syscallarg(int) a2;
412 		syscallarg(int) a3;
413 		syscallarg(caddr_t) ptr;
414 	} */ *uap;
415 	register_t *retval;
416 {
417 	struct sys_msgsnd_args bma;
418 
419 	SCARG(&bma, msqid) = SCARG(uap, a1);
420 	SCARG(&bma, msgp) = SCARG(uap, ptr);
421 	SCARG(&bma, msgsz) = SCARG(uap, a2);
422 	SCARG(&bma, msgflg) = SCARG(uap, a3);
423 
424 	return sys_msgsnd(p, &bma, retval);
425 }
426 
427 static int
428 linux_msgrcv(p, uap, retval)
429 	struct proc *p;
430 	struct linux_sys_ipc_args /* {
431 		syscallarg(int) what;
432 		syscallarg(int) a1;
433 		syscallarg(int) a2;
434 		syscallarg(int) a3;
435 		syscallarg(caddr_t) ptr;
436 	} */ *uap;
437 	register_t *retval;
438 {
439 	struct sys_msgrcv_args bma;
440 	struct linux_msgrcv_msgarg kluge;
441 	int error;
442 
443 	if ((error = copyin(SCARG(uap, ptr), &kluge, sizeof kluge)))
444 		return error;
445 
446 	SCARG(&bma, msqid) = SCARG(uap, a1);
447 	SCARG(&bma, msgp) = kluge.msg;
448 	SCARG(&bma, msgsz) = SCARG(uap, a2);
449 	SCARG(&bma, msgtyp) = kluge.type;
450 	SCARG(&bma, msgflg) = SCARG(uap, a3);
451 
452 	return sys_msgrcv(p, &bma, retval);
453 }
454 
455 static int
456 linux_msgget(p, uap, retval)
457 	struct proc *p;
458 	struct linux_sys_ipc_args /* {
459 		syscallarg(int) what;
460 		syscallarg(int) a1;
461 		syscallarg(int) a2;
462 		syscallarg(int) a3;
463 		syscallarg(caddr_t) ptr;
464 	} */ *uap;
465 	register_t *retval;
466 {
467 	struct sys_msgget_args bma;
468 
469 	SCARG(&bma, key) = (key_t)SCARG(uap, a1);
470 	SCARG(&bma, msgflg) = SCARG(uap, a2);
471 
472 	return sys_msgget(p, &bma, retval);
473 }
474 
475 static int
476 linux_msgctl(p, uap, retval)
477 	struct proc *p;
478 	struct linux_sys_ipc_args /* {
479 		syscallarg(int) what;
480 		syscallarg(int) a1;
481 		syscallarg(int) a2;
482 		syscallarg(int) a3;
483 		syscallarg(caddr_t) ptr;
484 	} */ *uap;
485 	register_t *retval;
486 {
487 	struct sys_msgctl_args bma;
488 	caddr_t umsgptr, sg;
489 	struct linux_msqid_ds lm;
490 	struct msqid_ds bm;
491 	int error;
492 
493 	SCARG(&bma, msqid) = SCARG(uap, a1);
494 	SCARG(&bma, cmd) = SCARG(uap, a2);
495 	switch (SCARG(uap, a2)) {
496 	case LINUX_IPC_RMID:
497 		return sys_msgctl(p, &bma, retval);
498 	case LINUX_IPC_SET:
499 		if ((error = copyin(SCARG(uap, ptr), (caddr_t)&lm, sizeof lm)))
500 			return error;
501 		linux_to_bsd_msqid_ds(&lm, &bm);
502 		sg = stackgap_init(p->p_emul);
503 		umsgptr = stackgap_alloc(&sg, sizeof bm);
504 		if ((error = copyout((caddr_t)&bm, umsgptr, sizeof bm)))
505 			return error;
506 		SCARG(&bma, buf) = (struct msqid_ds *)umsgptr;
507 		return sys_msgctl(p, &bma, retval);
508 	case LINUX_IPC_STAT:
509 		sg = stackgap_init(p->p_emul);
510 		umsgptr = stackgap_alloc(&sg, sizeof (struct msqid_ds));
511 		SCARG(&bma, buf) = (struct msqid_ds *)umsgptr;
512 		if ((error = sys_msgctl(p, &bma, retval)))
513 			return error;
514 		if ((error = copyin(umsgptr, (caddr_t)&bm, sizeof bm)))
515 			return error;
516 		bsd_to_linux_msqid_ds(&bm, &lm);
517 		return copyout((caddr_t)&lm, SCARG(uap, ptr), sizeof lm);
518 	}
519 	return EINVAL;
520 }
521 #endif /* SYSVMSG */
522 
523 #ifdef SYSVSHM
524 /*
525  * shmat(2). Very straightforward, except that Linux passes a pointer
526  * in which the return value is to be passed. This is subsequently
527  * handled by libc, apparently.
528  */
529 static int
530 linux_shmat(p, uap, retval)
531 	struct proc *p;
532 	struct linux_sys_ipc_args /* {
533 		syscallarg(int) what;
534 		syscallarg(int) a1;
535 		syscallarg(int) a2;
536 		syscallarg(int) a3;
537 		syscallarg(caddr_t) ptr;
538 	} */ *uap;
539 	register_t *retval;
540 {
541 	struct sys_shmat_args bsa;
542 	int error;
543 
544 	SCARG(&bsa, shmid) = SCARG(uap, a1);
545 	SCARG(&bsa, shmaddr) = SCARG(uap, ptr);
546 	SCARG(&bsa, shmflg) = SCARG(uap, a2);
547 
548 	if ((error = sys_shmat(p, &bsa, retval)))
549 		return error;
550 
551 	if ((error = copyout(&retval[0], (caddr_t) SCARG(uap, a3),
552 	     sizeof retval[0])))
553 		return error;
554 
555 	retval[0] = 0;
556 	return 0;
557 }
558 
559 /*
560  * shmdt(): this could have been mapped directly, if it wasn't for
561  * the extra indirection by the linux_ipc system call.
562  */
563 static int
564 linux_shmdt(p, uap, retval)
565 	struct proc *p;
566 	struct linux_sys_ipc_args /* {
567 		syscallarg(int) what;
568 		syscallarg(int) a1;
569 		syscallarg(int) a2;
570 		syscallarg(int) a3;
571 		syscallarg(caddr_t) ptr;
572 	} */ *uap;
573 	register_t *retval;
574 {
575 	struct sys_shmdt_args bsa;
576 
577 	SCARG(&bsa, shmaddr) = SCARG(uap, ptr);
578 
579 	return sys_shmdt(p, &bsa, retval);
580 }
581 
582 /*
583  * Same story as shmdt.
584  */
585 static int
586 linux_shmget(p, uap, retval)
587 	struct proc *p;
588 	struct linux_sys_ipc_args /* {
589 		syscallarg(int) what;
590 		syscallarg(int) a1;
591 		syscallarg(int) a2;
592 		syscallarg(int) a3;
593 		syscallarg(caddr_t) ptr;
594 	} */ *uap;
595 	register_t *retval;
596 {
597 	struct sys_shmget_args bsa;
598 
599 	SCARG(&bsa, key) = SCARG(uap, a1);
600 	SCARG(&bsa, size) = SCARG(uap, a2);
601 	SCARG(&bsa, shmflg) = SCARG(uap, a3);
602 
603 	return sys_shmget(p, &bsa, retval);
604 }
605 
606 /*
607  * Convert between Linux and NetBSD shmid_ds structures.
608  * The order of the fields is once again the difference, and
609  * we also need a place to store the internal data pointer
610  * in, which is unfortunately stored in this structure.
611  *
612  * We abuse a Linux internal field for that.
613  */
614 static void
615 linux_to_bsd_shmid_ds(lsp, bsp)
616 	struct linux_shmid_ds *lsp;
617 	struct shmid_ds *bsp;
618 {
619 
620 	linux_to_bsd_ipc_perm(&lsp->l_shm_perm, &bsp->shm_perm);
621 	bsp->shm_segsz = lsp->l_shm_segsz;
622 	bsp->shm_lpid = lsp->l_shm_lpid;
623 	bsp->shm_cpid = lsp->l_shm_cpid;
624 	bsp->shm_nattch = lsp->l_shm_nattch;
625 	bsp->shm_atime = lsp->l_shm_atime;
626 	bsp->shm_dtime = lsp->l_shm_dtime;
627 	bsp->shm_ctime = lsp->l_shm_ctime;
628 	bsp->shm_internal = lsp->l_private2;	/* XXX Oh well. */
629 }
630 
631 static void
632 bsd_to_linux_shmid_ds(bsp, lsp)
633 	struct shmid_ds *bsp;
634 	struct linux_shmid_ds *lsp;
635 {
636 
637 	bsd_to_linux_ipc_perm(&bsp->shm_perm, &lsp->l_shm_perm);
638 	lsp->l_shm_segsz = bsp->shm_segsz;
639 	lsp->l_shm_lpid = bsp->shm_lpid;
640 	lsp->l_shm_cpid = bsp->shm_cpid;
641 	lsp->l_shm_nattch = bsp->shm_nattch;
642 	lsp->l_shm_atime = bsp->shm_atime;
643 	lsp->l_shm_dtime = bsp->shm_dtime;
644 	lsp->l_shm_ctime = bsp->shm_ctime;
645 	lsp->l_private2 = bsp->shm_internal;	/* XXX */
646 }
647 
648 /*
649  * shmctl. Not implemented (for now): IPC_INFO, SHM_INFO, SHM_STAT
650  * SHM_LOCK and SHM_UNLOCK are passed on, but currently not implemented
651  * by NetBSD itself.
652  *
653  * The usual structure conversion and massaging is done.
654  */
655 static int
656 linux_shmctl(p, uap, retval)
657 	struct proc *p;
658 	struct linux_sys_ipc_args /* {
659 		syscallarg(int) what;
660 		syscallarg(int) a1;
661 		syscallarg(int) a2;
662 		syscallarg(int) a3;
663 		syscallarg(caddr_t) ptr;
664 	} */ *uap;
665 	register_t *retval;
666 {
667 	int error;
668 	caddr_t sg;
669 	struct sys_shmctl_args bsa;
670 	struct shmid_ds *bsp, bs;
671 	struct linux_shmid_ds lseg;
672 
673 	switch (SCARG(uap, a2)) {
674 	case LINUX_IPC_STAT:
675 		sg = stackgap_init(p->p_emul);
676 		bsp = stackgap_alloc(&sg, sizeof (struct shmid_ds));
677 		SCARG(&bsa, shmid) = SCARG(uap, a1);
678 		SCARG(&bsa, cmd) = IPC_STAT;
679 		SCARG(&bsa, buf) = bsp;
680 		if ((error = sys_shmctl(p, &bsa, retval)))
681 			return error;
682 		if ((error = copyin((caddr_t) &bs, (caddr_t) bsp, sizeof bs)))
683 			return error;
684 		bsd_to_linux_shmid_ds(&bs, &lseg);
685 		return copyout((caddr_t) &lseg, SCARG(uap, ptr), sizeof lseg);
686 	case LINUX_IPC_SET:
687 		if ((error = copyin(SCARG(uap, ptr), (caddr_t) &lseg,
688 		     sizeof lseg)))
689 			return error;
690 		linux_to_bsd_shmid_ds(&lseg, &bs);
691 		sg = stackgap_init(p->p_emul);
692 		bsp = stackgap_alloc(&sg, sizeof (struct shmid_ds));
693 		if ((error = copyout((caddr_t) &bs, (caddr_t) bsp, sizeof bs)))
694 			return error;
695 		SCARG(&bsa, shmid) = SCARG(uap, a1);
696 		SCARG(&bsa, cmd) = IPC_SET;
697 		SCARG(&bsa, buf) = bsp;
698 		return sys_shmctl(p, &bsa, retval);
699 	case LINUX_IPC_RMID:
700 	case LINUX_SHM_LOCK:
701 	case LINUX_SHM_UNLOCK:
702 		SCARG(&bsa, shmid) = SCARG(uap, a1);
703 		switch (SCARG(uap, a2)) {
704 		case LINUX_IPC_RMID:
705 			SCARG(&bsa, cmd) = IPC_RMID;
706 			break;
707 		case LINUX_SHM_LOCK:
708 			SCARG(&bsa, cmd) = SHM_LOCK;
709 			break;
710 		case LINUX_SHM_UNLOCK:
711 			SCARG(&bsa, cmd) = SHM_UNLOCK;
712 			break;
713 		}
714 		SCARG(&bsa, buf) = NULL;
715 		return sys_shmctl(p, &bsa, retval);
716 	case LINUX_IPC_INFO:
717 	case LINUX_SHM_STAT:
718 	case LINUX_SHM_INFO:
719 	default:
720 		return EINVAL;
721 	}
722 }
723 #endif /* SYSVSHM */
724