1994-05-24 10:09:53 +00:00
|
|
|
/*-
|
|
|
|
* Copyright (c) 1982, 1986, 1989, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to Berkeley by
|
|
|
|
* Mike Karels at Berkeley Software Design, Inc.
|
|
|
|
*
|
1995-12-04 16:48:58 +00:00
|
|
|
* Quite extensively rewritten by Poul-Henning Kamp of the FreeBSD
|
|
|
|
* project, to make these variables more userfriendly.
|
|
|
|
*
|
1994-05-24 10:09:53 +00:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* This product includes software developed by the University of
|
|
|
|
* California, Berkeley and its contributors.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* @(#)kern_sysctl.c 8.4 (Berkeley) 4/14/94
|
1999-06-27 11:44:22 +00:00
|
|
|
* $Id: kern_sysctl.c,v 1.88 1999/04/28 11:37:00 phk Exp $
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
|
|
|
|
1997-12-16 17:40:42 +00:00
|
|
|
#include "opt_compat.h"
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/param.h>
|
1999-06-27 11:44:22 +00:00
|
|
|
#include <sys/systm.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/kernel.h>
|
1999-06-27 11:44:22 +00:00
|
|
|
#include <sys/buf.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/sysctl.h>
|
1995-12-04 16:48:58 +00:00
|
|
|
#include <sys/malloc.h>
|
1995-12-07 12:48:31 +00:00
|
|
|
#include <sys/proc.h>
|
1996-04-07 13:03:06 +00:00
|
|
|
#include <sys/sysproto.h>
|
1995-12-05 21:51:45 +00:00
|
|
|
#include <vm/vm.h>
|
1995-12-07 12:48:31 +00:00
|
|
|
#include <vm/vm_extern.h>
|
1995-12-05 21:51:45 +00:00
|
|
|
|
1997-10-12 20:26:33 +00:00
|
|
|
static MALLOC_DEFINE(M_SYSCTL, "sysctl", "sysctl internal magic");
|
1997-10-11 18:31:40 +00:00
|
|
|
|
1995-11-20 12:42:39 +00:00
|
|
|
/*
|
|
|
|
* Locking and stats
|
|
|
|
*/
|
|
|
|
static struct sysctl_lock {
|
|
|
|
int sl_lock;
|
|
|
|
int sl_want;
|
|
|
|
int sl_locked;
|
|
|
|
} memlock;
|
|
|
|
|
|
|
|
static int sysctl_root SYSCTL_HANDLER_ARGS;
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid_list sysctl__children; /* root list */
|
1995-11-08 08:48:36 +00:00
|
|
|
|
1995-12-04 16:48:58 +00:00
|
|
|
/*
|
|
|
|
* Initialization of the MIB tree.
|
|
|
|
*
|
1999-02-16 10:49:55 +00:00
|
|
|
* Order by number in each list.
|
1995-12-04 16:48:58 +00:00
|
|
|
*/
|
1995-11-20 12:42:39 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
void sysctl_register_oid(struct sysctl_oid *oidp)
|
1995-11-08 08:48:36 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid_list *parent = oidp->oid_parent;
|
|
|
|
struct sysctl_oid *p;
|
|
|
|
struct sysctl_oid *q;
|
|
|
|
int n;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If this oid has a number OID_AUTO, give it a number which
|
|
|
|
* is greater than any current oid. Make sure it is at least
|
|
|
|
* 100 to leave space for pre-assigned oid numbers.
|
|
|
|
*/
|
|
|
|
if (oidp->oid_number == OID_AUTO) {
|
|
|
|
/* First, find the highest oid in the parent list >99 */
|
|
|
|
n = 99;
|
|
|
|
SLIST_FOREACH(p, parent, oid_link) {
|
|
|
|
if (p->oid_number > n)
|
|
|
|
n = p->oid_number;
|
|
|
|
}
|
|
|
|
oidp->oid_number = n + 1;
|
|
|
|
}
|
1995-11-11 00:09:21 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
/*
|
|
|
|
* Insert the oid into the parent's list in order.
|
|
|
|
*/
|
|
|
|
q = NULL;
|
|
|
|
SLIST_FOREACH(p, parent, oid_link) {
|
|
|
|
if (oidp->oid_number < p->oid_number)
|
|
|
|
break;
|
|
|
|
q = p;
|
|
|
|
}
|
|
|
|
if (q)
|
|
|
|
SLIST_INSERT_AFTER(q, oidp, oid_link);
|
|
|
|
else
|
|
|
|
SLIST_INSERT_HEAD(parent, oidp, oid_link);
|
1995-11-08 08:48:36 +00:00
|
|
|
}
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
void sysctl_unregister_oid(struct sysctl_oid *oidp)
|
1995-11-08 08:48:36 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
SLIST_REMOVE(oidp->oid_parent, oidp, sysctl_oid, oid_link);
|
|
|
|
}
|
1995-12-04 16:48:58 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
/*
|
|
|
|
* Bulk-register all the oids in a linker_set.
|
|
|
|
*/
|
|
|
|
void sysctl_register_set(struct linker_set *lsp)
|
|
|
|
{
|
|
|
|
int count = lsp->ls_length;
|
|
|
|
int i;
|
|
|
|
for (i = 0; i < count; i++)
|
|
|
|
sysctl_register_oid((struct sysctl_oid *) lsp->ls_items[i]);
|
|
|
|
}
|
|
|
|
|
|
|
|
void sysctl_unregister_set(struct linker_set *lsp)
|
|
|
|
{
|
|
|
|
int count = lsp->ls_length;
|
|
|
|
int i;
|
|
|
|
for (i = 0; i < count; i++)
|
|
|
|
sysctl_unregister_oid((struct sysctl_oid *) lsp->ls_items[i]);
|
1995-11-08 08:48:36 +00:00
|
|
|
}
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
/*
|
|
|
|
* Register the kernel's oids on startup.
|
|
|
|
*/
|
|
|
|
extern struct linker_set sysctl_set;
|
1995-11-08 08:48:36 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
static void sysctl_register_all(void *arg)
|
1998-09-05 17:13:28 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
sysctl_register_set(&sysctl_set);
|
1998-09-05 17:13:28 +00:00
|
|
|
}
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
SYSINIT(sysctl, SI_SUB_KMEM, SI_ORDER_ANY, sysctl_register_all, 0);
|
|
|
|
|
1995-12-04 16:48:58 +00:00
|
|
|
/*
|
|
|
|
* "Staff-functions"
|
|
|
|
*
|
1995-12-06 13:27:39 +00:00
|
|
|
* These functions implement a presently undocumented interface
|
|
|
|
* used by the sysctl program to walk the tree, and get the type
|
|
|
|
* so it can print the value.
|
|
|
|
* This interface is under work and consideration, and should probably
|
|
|
|
* be killed with a big axe by the first person who can find the time.
|
|
|
|
* (be aware though, that the proper interface isn't as obvious as it
|
|
|
|
* may seem, there are various conflicting requirements.
|
|
|
|
*
|
1995-12-04 16:48:58 +00:00
|
|
|
* {0,0} printf the entire MIB-tree.
|
|
|
|
* {0,1,...} return the name of the "..." OID.
|
1999-01-10 07:45:33 +00:00
|
|
|
* {0,2,...} return the next OID.
|
1995-12-04 16:48:58 +00:00
|
|
|
* {0,3} return the OID of the name in "new"
|
1995-12-06 13:27:39 +00:00
|
|
|
* {0,4,...} return the kind & format info for the "..." OID.
|
1995-12-04 16:48:58 +00:00
|
|
|
*/
|
|
|
|
|
1995-11-08 08:48:36 +00:00
|
|
|
static void
|
1999-02-16 10:49:55 +00:00
|
|
|
sysctl_sysctl_debug_dump_node(struct sysctl_oid_list *l, int i)
|
1995-11-08 08:48:36 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
int k;
|
|
|
|
struct sysctl_oid *oidp;
|
1995-11-08 08:48:36 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
SLIST_FOREACH(oidp, l, oid_link) {
|
1995-11-08 08:48:36 +00:00
|
|
|
|
|
|
|
for (k=0; k<i; k++)
|
|
|
|
printf(" ");
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
printf("%d %s ", oidp->oid_number, oidp->oid_name);
|
1995-11-08 08:48:36 +00:00
|
|
|
|
|
|
|
printf("%c%c",
|
1999-02-16 10:49:55 +00:00
|
|
|
oidp->oid_kind & CTLFLAG_RD ? 'R':' ',
|
|
|
|
oidp->oid_kind & CTLFLAG_WR ? 'W':' ');
|
1995-11-08 08:48:36 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_handler)
|
1996-04-13 13:28:54 +00:00
|
|
|
printf(" *Handler");
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
switch (oidp->oid_kind & CTLTYPE) {
|
1995-11-12 19:52:09 +00:00
|
|
|
case CTLTYPE_NODE:
|
1996-04-13 13:28:54 +00:00
|
|
|
printf(" Node\n");
|
1999-02-16 10:49:55 +00:00
|
|
|
if (!oidp->oid_handler) {
|
1995-11-08 08:48:36 +00:00
|
|
|
sysctl_sysctl_debug_dump_node(
|
1999-02-16 10:49:55 +00:00
|
|
|
oidp->oid_arg1, i+2);
|
1995-11-08 08:48:36 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case CTLTYPE_INT: printf(" Int\n"); break;
|
|
|
|
case CTLTYPE_STRING: printf(" String\n"); break;
|
|
|
|
case CTLTYPE_QUAD: printf(" Quad\n"); break;
|
|
|
|
case CTLTYPE_OPAQUE: printf(" Opaque/struct\n"); break;
|
|
|
|
default: printf("\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
sysctl_sysctl_debug SYSCTL_HANDLER_ARGS
|
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
sysctl_sysctl_debug_dump_node(&sysctl__children, 0);
|
1995-11-08 08:48:36 +00:00
|
|
|
return ENOENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
SYSCTL_PROC(_sysctl, 0, debug, CTLTYPE_STRING|CTLFLAG_RD,
|
1995-12-04 16:48:58 +00:00
|
|
|
0, 0, sysctl_sysctl_debug, "-", "");
|
1995-11-06 16:18:52 +00:00
|
|
|
|
1995-12-04 16:48:58 +00:00
|
|
|
static int
|
|
|
|
sysctl_sysctl_name SYSCTL_HANDLER_ARGS
|
|
|
|
{
|
|
|
|
int *name = (int *) arg1;
|
|
|
|
u_int namelen = arg2;
|
1999-02-16 10:49:55 +00:00
|
|
|
int error = 0;
|
|
|
|
struct sysctl_oid *oid;
|
1999-03-23 14:23:15 +00:00
|
|
|
struct sysctl_oid_list *lsp = &sysctl__children, *lsp2;
|
1995-12-04 16:48:58 +00:00
|
|
|
char buf[10];
|
|
|
|
|
|
|
|
while (namelen) {
|
|
|
|
if (!lsp) {
|
1998-12-04 22:54:57 +00:00
|
|
|
snprintf(buf,sizeof(buf),"%d",*name);
|
1995-12-04 16:48:58 +00:00
|
|
|
if (req->oldidx)
|
|
|
|
error = SYSCTL_OUT(req, ".", 1);
|
|
|
|
if (!error)
|
|
|
|
error = SYSCTL_OUT(req, buf, strlen(buf));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
namelen--;
|
|
|
|
name++;
|
|
|
|
continue;
|
|
|
|
}
|
1999-03-23 14:23:15 +00:00
|
|
|
lsp2 = 0;
|
1999-02-16 10:49:55 +00:00
|
|
|
SLIST_FOREACH(oid, lsp, oid_link) {
|
|
|
|
if (oid->oid_number != *name)
|
1995-12-04 16:48:58 +00:00
|
|
|
continue;
|
|
|
|
|
|
|
|
if (req->oldidx)
|
|
|
|
error = SYSCTL_OUT(req, ".", 1);
|
|
|
|
if (!error)
|
1999-02-16 10:49:55 +00:00
|
|
|
error = SYSCTL_OUT(req, oid->oid_name,
|
|
|
|
strlen(oid->oid_name));
|
1995-12-04 16:48:58 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
namelen--;
|
|
|
|
name++;
|
|
|
|
|
1999-03-23 14:23:15 +00:00
|
|
|
if ((oid->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
1995-12-04 16:48:58 +00:00
|
|
|
break;
|
1995-11-06 16:18:52 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oid->oid_handler)
|
1995-12-04 16:48:58 +00:00
|
|
|
break;
|
|
|
|
|
1999-03-23 14:23:15 +00:00
|
|
|
lsp2 = (struct sysctl_oid_list *)oid->oid_arg1;
|
1995-12-04 16:48:58 +00:00
|
|
|
break;
|
|
|
|
}
|
1999-03-23 14:23:15 +00:00
|
|
|
lsp = lsp2;
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
|
|
|
return (SYSCTL_OUT(req, "", 1));
|
|
|
|
}
|
|
|
|
|
|
|
|
SYSCTL_NODE(_sysctl, 1, name, CTLFLAG_RD, sysctl_sysctl_name, "");
|
|
|
|
|
|
|
|
static int
|
1999-02-16 10:49:55 +00:00
|
|
|
sysctl_sysctl_next_ls (struct sysctl_oid_list *lsp, int *name, u_int namelen,
|
|
|
|
int *next, int *len, int level, struct sysctl_oid **oidpp)
|
1995-12-04 16:48:58 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid *oidp;
|
1995-12-04 16:48:58 +00:00
|
|
|
|
|
|
|
*len = level;
|
1999-02-16 10:49:55 +00:00
|
|
|
SLIST_FOREACH(oidp, lsp, oid_link) {
|
|
|
|
*next = oidp->oid_number;
|
|
|
|
*oidpp = oidp;
|
1995-12-04 16:48:58 +00:00
|
|
|
|
|
|
|
if (!namelen) {
|
1999-02-16 10:49:55 +00:00
|
|
|
if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
1995-12-04 16:48:58 +00:00
|
|
|
return 0;
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_handler)
|
1995-12-04 16:48:58 +00:00
|
|
|
/* We really should call the handler here...*/
|
|
|
|
return 0;
|
1999-02-16 10:49:55 +00:00
|
|
|
lsp = (struct sysctl_oid_list *)oidp->oid_arg1;
|
1996-04-13 13:28:54 +00:00
|
|
|
if (!sysctl_sysctl_next_ls (lsp, 0, 0, next+1,
|
1999-02-16 10:49:55 +00:00
|
|
|
len, level+1, oidpp))
|
1996-04-13 13:28:54 +00:00
|
|
|
return 0;
|
|
|
|
goto next;
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_number < *name)
|
1995-12-04 16:48:58 +00:00
|
|
|
continue;
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_number > *name) {
|
|
|
|
if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
1995-12-04 16:48:58 +00:00
|
|
|
return 0;
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_handler)
|
1995-12-04 16:48:58 +00:00
|
|
|
return 0;
|
1999-02-16 10:49:55 +00:00
|
|
|
lsp = (struct sysctl_oid_list *)oidp->oid_arg1;
|
1995-12-04 16:48:58 +00:00
|
|
|
if (!sysctl_sysctl_next_ls (lsp, name+1, namelen-1,
|
1999-02-16 10:49:55 +00:00
|
|
|
next+1, len, level+1, oidpp))
|
1995-12-04 16:48:58 +00:00
|
|
|
return (0);
|
1996-04-13 13:28:54 +00:00
|
|
|
goto next;
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
1999-02-16 10:49:55 +00:00
|
|
|
if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
1995-12-04 16:48:58 +00:00
|
|
|
continue;
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_handler)
|
1995-12-04 16:48:58 +00:00
|
|
|
continue;
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
lsp = (struct sysctl_oid_list *)oidp->oid_arg1;
|
1995-12-04 16:48:58 +00:00
|
|
|
if (!sysctl_sysctl_next_ls (lsp, name+1, namelen-1, next+1,
|
1999-02-16 10:49:55 +00:00
|
|
|
len, level+1, oidpp))
|
1995-12-04 16:48:58 +00:00
|
|
|
return (0);
|
1996-04-13 13:28:54 +00:00
|
|
|
next:
|
1995-12-04 16:48:58 +00:00
|
|
|
namelen = 1;
|
|
|
|
*len = level;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
sysctl_sysctl_next SYSCTL_HANDLER_ARGS
|
|
|
|
{
|
|
|
|
int *name = (int *) arg1;
|
|
|
|
u_int namelen = arg2;
|
|
|
|
int i, j, error;
|
|
|
|
struct sysctl_oid *oid;
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid_list *lsp = &sysctl__children;
|
1995-12-04 16:48:58 +00:00
|
|
|
int newoid[CTL_MAXNAME];
|
|
|
|
|
|
|
|
i = sysctl_sysctl_next_ls (lsp, name, namelen, newoid, &j, 1, &oid);
|
|
|
|
if (i)
|
|
|
|
return ENOENT;
|
1995-12-06 13:27:39 +00:00
|
|
|
error = SYSCTL_OUT(req, newoid, j * sizeof (int));
|
1995-12-04 16:48:58 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
SYSCTL_NODE(_sysctl, 2, next, CTLFLAG_RD, sysctl_sysctl_next, "");
|
|
|
|
|
|
|
|
static int
|
1999-02-16 10:49:55 +00:00
|
|
|
name2oid (char *name, int *oid, int *len, struct sysctl_oid **oidpp)
|
1995-12-04 16:48:58 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
int i;
|
|
|
|
struct sysctl_oid *oidp;
|
|
|
|
struct sysctl_oid_list *lsp = &sysctl__children;
|
1995-12-04 16:48:58 +00:00
|
|
|
char *p;
|
|
|
|
|
|
|
|
if (!*name)
|
|
|
|
return ENOENT;
|
|
|
|
|
|
|
|
p = name + strlen(name) - 1 ;
|
|
|
|
if (*p == '.')
|
|
|
|
*p = '\0';
|
|
|
|
|
|
|
|
*len = 0;
|
|
|
|
|
|
|
|
for (p = name; *p && *p != '.'; p++)
|
|
|
|
;
|
|
|
|
i = *p;
|
|
|
|
if (i == '.')
|
|
|
|
*p = '\0';
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
oidp = SLIST_FIRST(lsp);
|
1995-12-04 16:48:58 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
while (oidp && *len < CTL_MAXNAME) {
|
|
|
|
if (strcmp(name, oidp->oid_name)) {
|
|
|
|
oidp = SLIST_NEXT(oidp, oid_link);
|
1995-12-04 16:48:58 +00:00
|
|
|
continue;
|
|
|
|
}
|
1999-02-16 10:49:55 +00:00
|
|
|
*oid++ = oidp->oid_number;
|
1995-12-04 16:48:58 +00:00
|
|
|
(*len)++;
|
|
|
|
|
|
|
|
if (!i) {
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidpp)
|
|
|
|
*oidpp = oidp;
|
1995-12-04 16:48:58 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
1995-12-04 16:48:58 +00:00
|
|
|
break;
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_handler)
|
1995-12-04 16:48:58 +00:00
|
|
|
break;
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
lsp = (struct sysctl_oid_list *)oidp->oid_arg1;
|
|
|
|
oidp = SLIST_FIRST(lsp);
|
1995-12-04 16:48:58 +00:00
|
|
|
name = p+1;
|
|
|
|
for (p = name; *p && *p != '.'; p++)
|
|
|
|
;
|
|
|
|
i = *p;
|
|
|
|
if (i == '.')
|
|
|
|
*p = '\0';
|
|
|
|
}
|
|
|
|
return ENOENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
sysctl_sysctl_name2oid SYSCTL_HANDLER_ARGS
|
|
|
|
{
|
|
|
|
char *p;
|
|
|
|
int error, oid[CTL_MAXNAME], len;
|
|
|
|
struct sysctl_oid *op = 0;
|
|
|
|
|
|
|
|
if (!req->newlen)
|
|
|
|
return ENOENT;
|
1999-03-30 09:00:45 +00:00
|
|
|
if (req->newlen >= MAXPATHLEN) /* XXX arbitrary, undocumented */
|
|
|
|
return (ENAMETOOLONG);
|
1995-12-04 16:48:58 +00:00
|
|
|
|
|
|
|
p = malloc(req->newlen+1, M_SYSCTL, M_WAITOK);
|
|
|
|
|
|
|
|
error = SYSCTL_IN(req, p, req->newlen);
|
|
|
|
if (error) {
|
|
|
|
free(p, M_SYSCTL);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
p [req->newlen] = '\0';
|
|
|
|
|
|
|
|
error = name2oid(p, oid, &len, &op);
|
|
|
|
|
|
|
|
free(p, M_SYSCTL);
|
|
|
|
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
1995-12-06 13:27:39 +00:00
|
|
|
error = SYSCTL_OUT(req, oid, len * sizeof *oid);
|
1995-12-04 16:48:58 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1995-12-17 21:11:22 +00:00
|
|
|
SYSCTL_PROC(_sysctl, 3, name2oid, CTLFLAG_RW|CTLFLAG_ANYBODY, 0, 0,
|
1995-12-04 16:48:58 +00:00
|
|
|
sysctl_sysctl_name2oid, "I", "");
|
|
|
|
|
|
|
|
static int
|
|
|
|
sysctl_sysctl_oidfmt SYSCTL_HANDLER_ARGS
|
|
|
|
{
|
1995-12-06 13:27:39 +00:00
|
|
|
int *name = (int *) arg1, error;
|
1995-12-04 16:48:58 +00:00
|
|
|
u_int namelen = arg2;
|
1999-02-16 10:49:55 +00:00
|
|
|
int indx;
|
|
|
|
struct sysctl_oid *oid;
|
|
|
|
struct sysctl_oid_list *lsp = &sysctl__children;
|
1995-12-04 16:48:58 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
oid = SLIST_FIRST(lsp);
|
1995-12-04 16:48:58 +00:00
|
|
|
|
|
|
|
indx = 0;
|
1999-02-16 10:49:55 +00:00
|
|
|
while (oid && indx < CTL_MAXNAME) {
|
|
|
|
if (oid->oid_number == name[indx]) {
|
1995-12-04 16:48:58 +00:00
|
|
|
indx++;
|
1999-02-16 10:49:55 +00:00
|
|
|
if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
if (oid->oid_handler)
|
1995-12-04 16:48:58 +00:00
|
|
|
goto found;
|
|
|
|
if (indx == namelen)
|
1995-12-06 13:27:39 +00:00
|
|
|
goto found;
|
1999-02-16 10:49:55 +00:00
|
|
|
lsp = (struct sysctl_oid_list *)oid->oid_arg1;
|
|
|
|
oid = SLIST_FIRST(lsp);
|
1995-12-04 16:48:58 +00:00
|
|
|
} else {
|
|
|
|
if (indx != namelen)
|
|
|
|
return EISDIR;
|
|
|
|
goto found;
|
|
|
|
}
|
|
|
|
} else {
|
1999-02-16 10:49:55 +00:00
|
|
|
oid = SLIST_NEXT(oid, oid_link);
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return ENOENT;
|
|
|
|
found:
|
1999-02-16 10:49:55 +00:00
|
|
|
if (!oid->oid_fmt)
|
1995-12-04 16:48:58 +00:00
|
|
|
return ENOENT;
|
1995-12-06 13:27:39 +00:00
|
|
|
error = SYSCTL_OUT(req,
|
1999-02-16 10:49:55 +00:00
|
|
|
&oid->oid_kind, sizeof(oid->oid_kind));
|
1995-12-06 13:27:39 +00:00
|
|
|
if (!error)
|
1999-02-16 10:49:55 +00:00
|
|
|
error = SYSCTL_OUT(req, oid->oid_fmt,
|
|
|
|
strlen(oid->oid_fmt)+1);
|
1995-12-06 13:27:39 +00:00
|
|
|
return (error);
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
|
|
|
|
1999-01-10 05:33:43 +00:00
|
|
|
|
1999-01-10 07:45:33 +00:00
|
|
|
SYSCTL_NODE(_sysctl, 4, oidfmt, CTLFLAG_RD, sysctl_sysctl_oidfmt, "");
|
1999-01-10 05:33:43 +00:00
|
|
|
|
1995-12-04 16:48:58 +00:00
|
|
|
/*
|
|
|
|
* Default "handler" functions.
|
|
|
|
*/
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
/*
|
1998-12-27 18:03:29 +00:00
|
|
|
* Handle an int, signed or unsigned.
|
1995-11-12 19:52:09 +00:00
|
|
|
* Two cases:
|
|
|
|
* a variable: point arg1 at it.
|
|
|
|
* a constant: pass it in arg2.
|
|
|
|
*/
|
|
|
|
|
1995-10-28 13:07:28 +00:00
|
|
|
int
|
|
|
|
sysctl_handle_int SYSCTL_HANDLER_ARGS
|
1995-10-28 12:59:25 +00:00
|
|
|
{
|
1995-11-12 19:52:09 +00:00
|
|
|
int error = 0;
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
if (arg1)
|
|
|
|
error = SYSCTL_OUT(req, arg1, sizeof(int));
|
1996-12-15 14:38:46 +00:00
|
|
|
else
|
1995-11-12 19:52:09 +00:00
|
|
|
error = SYSCTL_OUT(req, &arg2, sizeof(int));
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
if (!arg1)
|
|
|
|
error = EPERM;
|
|
|
|
else
|
|
|
|
error = SYSCTL_IN(req, arg1, sizeof(int));
|
|
|
|
return (error);
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
|
|
|
|
1998-08-24 08:39:39 +00:00
|
|
|
/*
|
1999-03-30 09:00:45 +00:00
|
|
|
* Handle a long, signed or unsigned. arg1 points to it.
|
1998-08-24 08:39:39 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
|
|
|
sysctl_handle_long SYSCTL_HANDLER_ARGS
|
|
|
|
{
|
|
|
|
int error = 0;
|
|
|
|
|
1999-03-30 09:00:45 +00:00
|
|
|
if (!arg1)
|
|
|
|
return (EINVAL);
|
1998-12-27 18:03:29 +00:00
|
|
|
error = SYSCTL_OUT(req, arg1, sizeof(long));
|
1998-08-24 08:39:39 +00:00
|
|
|
|
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
|
|
|
|
1999-03-30 09:00:45 +00:00
|
|
|
error = SYSCTL_IN(req, arg1, sizeof(long));
|
1998-08-24 08:39:39 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
/*
|
|
|
|
* Handle our generic '\0' terminated 'C' string.
|
|
|
|
* Two cases:
|
|
|
|
* a variable string: point arg1 at it, arg2 is max length.
|
|
|
|
* a constant string: point arg1 at it, arg2 is zero.
|
|
|
|
*/
|
|
|
|
|
1995-10-28 13:07:28 +00:00
|
|
|
int
|
|
|
|
sysctl_handle_string SYSCTL_HANDLER_ARGS
|
1995-10-28 12:59:25 +00:00
|
|
|
{
|
1995-11-12 19:52:09 +00:00
|
|
|
int error=0;
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-14 20:43:29 +00:00
|
|
|
error = SYSCTL_OUT(req, arg1, strlen((char *)arg1)+1);
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1999-03-30 09:00:45 +00:00
|
|
|
if (error || !req->newptr)
|
1995-11-12 19:52:09 +00:00
|
|
|
return (error);
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1999-03-30 09:00:45 +00:00
|
|
|
if ((req->newlen - req->newidx) >= arg2) {
|
|
|
|
error = EINVAL;
|
1995-11-12 19:52:09 +00:00
|
|
|
} else {
|
|
|
|
arg2 = (req->newlen - req->newidx);
|
|
|
|
error = SYSCTL_IN(req, arg1, arg2);
|
|
|
|
((char *)arg1)[arg2] = '\0';
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
1995-11-06 16:18:52 +00:00
|
|
|
|
|
|
|
return (error);
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
/*
|
|
|
|
* Handle any kind of opaque data.
|
|
|
|
* arg1 points to it, arg2 is the size.
|
|
|
|
*/
|
|
|
|
|
1995-10-28 13:07:28 +00:00
|
|
|
int
|
|
|
|
sysctl_handle_opaque SYSCTL_HANDLER_ARGS
|
1995-10-28 12:59:25 +00:00
|
|
|
{
|
1995-11-12 19:52:09 +00:00
|
|
|
int error;
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
error = SYSCTL_OUT(req, arg1, arg2);
|
|
|
|
|
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
error = SYSCTL_IN(req, arg1, arg2);
|
|
|
|
|
|
|
|
return (error);
|
|
|
|
}
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
/*
|
|
|
|
* Transfer functions to/from kernel space.
|
|
|
|
* XXX: rather untested at this point
|
|
|
|
*/
|
|
|
|
static int
|
1998-08-24 08:39:39 +00:00
|
|
|
sysctl_old_kernel(struct sysctl_req *req, const void *p, size_t l)
|
1995-11-12 19:52:09 +00:00
|
|
|
{
|
1998-08-24 08:39:39 +00:00
|
|
|
size_t i = 0;
|
1995-11-13 13:54:09 +00:00
|
|
|
|
|
|
|
if (req->oldptr) {
|
1998-08-24 08:39:39 +00:00
|
|
|
i = l;
|
|
|
|
if (i > req->oldlen - req->oldidx)
|
|
|
|
i = req->oldlen - req->oldidx;
|
1995-11-13 13:54:09 +00:00
|
|
|
if (i > 0)
|
1996-08-31 14:48:13 +00:00
|
|
|
bcopy(p, (char *)req->oldptr + req->oldidx, i);
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
1995-11-13 13:54:09 +00:00
|
|
|
req->oldidx += l;
|
1996-06-10 16:23:42 +00:00
|
|
|
if (req->oldptr && i != l)
|
1995-11-12 19:52:09 +00:00
|
|
|
return (ENOMEM);
|
1995-11-13 13:54:09 +00:00
|
|
|
return (0);
|
1995-11-12 19:52:09 +00:00
|
|
|
}
|
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
static int
|
1998-08-24 08:39:39 +00:00
|
|
|
sysctl_new_kernel(struct sysctl_req *req, void *p, size_t l)
|
1995-11-12 19:52:09 +00:00
|
|
|
{
|
1995-11-13 13:54:09 +00:00
|
|
|
if (!req->newptr)
|
|
|
|
return 0;
|
|
|
|
if (req->newlen - req->newidx < l)
|
1995-11-12 19:52:09 +00:00
|
|
|
return (EINVAL);
|
1996-08-31 14:48:13 +00:00
|
|
|
bcopy((char *)req->newptr + req->newidx, p, l);
|
1995-11-12 19:52:09 +00:00
|
|
|
req->newidx += l;
|
1995-11-06 16:18:52 +00:00
|
|
|
return (0);
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
|
|
|
|
1996-06-10 16:23:42 +00:00
|
|
|
int
|
1998-08-24 08:39:39 +00:00
|
|
|
kernel_sysctl(struct proc *p, int *name, u_int namelen, void *old, size_t *oldlenp, void *new, size_t newlen, size_t *retval)
|
1996-06-10 16:23:42 +00:00
|
|
|
{
|
|
|
|
int error = 0;
|
|
|
|
struct sysctl_req req;
|
|
|
|
|
|
|
|
bzero(&req, sizeof req);
|
|
|
|
|
|
|
|
req.p = p;
|
|
|
|
|
|
|
|
if (oldlenp) {
|
|
|
|
req.oldlen = *oldlenp;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (old) {
|
|
|
|
req.oldptr= old;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (newlen) {
|
|
|
|
req.newlen = newlen;
|
|
|
|
req.newptr = new;
|
|
|
|
}
|
|
|
|
|
|
|
|
req.oldfunc = sysctl_old_kernel;
|
|
|
|
req.newfunc = sysctl_new_kernel;
|
|
|
|
req.lock = 1;
|
|
|
|
|
|
|
|
/* XXX this should probably be done in a general way */
|
|
|
|
while (memlock.sl_lock) {
|
|
|
|
memlock.sl_want = 1;
|
|
|
|
(void) tsleep((caddr_t)&memlock, PRIBIO+1, "sysctl", 0);
|
|
|
|
memlock.sl_locked++;
|
|
|
|
}
|
|
|
|
memlock.sl_lock = 1;
|
|
|
|
|
|
|
|
error = sysctl_root(0, name, namelen, &req);
|
|
|
|
|
|
|
|
if (req.lock == 2)
|
|
|
|
vsunlock(req.oldptr, req.oldlen, B_WRITE);
|
|
|
|
|
|
|
|
memlock.sl_lock = 0;
|
|
|
|
|
|
|
|
if (memlock.sl_want) {
|
|
|
|
memlock.sl_want = 0;
|
|
|
|
wakeup((caddr_t)&memlock);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (error && error != ENOMEM)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
if (retval) {
|
|
|
|
if (req.oldptr && req.oldidx > req.oldlen)
|
|
|
|
*retval = req.oldlen;
|
|
|
|
else
|
|
|
|
*retval = req.oldidx;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
/*
|
|
|
|
* Transfer function to/from user space.
|
|
|
|
*/
|
|
|
|
static int
|
1998-08-24 08:39:39 +00:00
|
|
|
sysctl_old_user(struct sysctl_req *req, const void *p, size_t l)
|
1995-11-12 19:52:09 +00:00
|
|
|
{
|
1998-08-24 08:39:39 +00:00
|
|
|
int error = 0;
|
|
|
|
size_t i = 0;
|
1995-11-12 19:52:09 +00:00
|
|
|
|
1995-11-20 12:42:39 +00:00
|
|
|
if (req->lock == 1 && req->oldptr) {
|
|
|
|
vslock(req->oldptr, req->oldlen);
|
|
|
|
req->lock = 2;
|
|
|
|
}
|
1995-11-13 13:54:09 +00:00
|
|
|
if (req->oldptr) {
|
1998-08-24 08:39:39 +00:00
|
|
|
i = l;
|
|
|
|
if (i > req->oldlen - req->oldidx)
|
|
|
|
i = req->oldlen - req->oldidx;
|
1995-11-13 13:54:09 +00:00
|
|
|
if (i > 0)
|
1996-08-31 14:48:13 +00:00
|
|
|
error = copyout(p, (char *)req->oldptr + req->oldidx,
|
|
|
|
i);
|
1995-11-13 13:54:09 +00:00
|
|
|
}
|
|
|
|
req->oldidx += l;
|
1995-11-12 19:52:09 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
1995-11-13 13:54:09 +00:00
|
|
|
if (req->oldptr && i < l)
|
1995-11-12 19:52:09 +00:00
|
|
|
return (ENOMEM);
|
1995-11-13 13:54:09 +00:00
|
|
|
return (0);
|
1995-11-12 19:52:09 +00:00
|
|
|
}
|
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
static int
|
1998-08-24 08:39:39 +00:00
|
|
|
sysctl_new_user(struct sysctl_req *req, void *p, size_t l)
|
1995-11-12 19:52:09 +00:00
|
|
|
{
|
1995-11-14 09:26:17 +00:00
|
|
|
int error;
|
1995-11-13 13:54:09 +00:00
|
|
|
|
|
|
|
if (!req->newptr)
|
|
|
|
return 0;
|
|
|
|
if (req->newlen - req->newidx < l)
|
1995-11-12 19:52:09 +00:00
|
|
|
return (EINVAL);
|
1996-08-31 14:48:13 +00:00
|
|
|
error = copyin((char *)req->newptr + req->newidx, p, l);
|
1995-11-12 19:52:09 +00:00
|
|
|
req->newidx += l;
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1995-11-06 16:18:52 +00:00
|
|
|
/*
|
|
|
|
* Traverse our tree, and find the right node, execute whatever it points
|
|
|
|
* at, and return the resulting error code.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
|
|
|
sysctl_root SYSCTL_HANDLER_ARGS
|
|
|
|
{
|
|
|
|
int *name = (int *) arg1;
|
1995-12-04 16:48:58 +00:00
|
|
|
u_int namelen = arg2;
|
1999-02-16 10:49:55 +00:00
|
|
|
int indx, i;
|
|
|
|
struct sysctl_oid *oid;
|
|
|
|
struct sysctl_oid_list *lsp = &sysctl__children;
|
1995-11-06 16:18:52 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
oid = SLIST_FIRST(lsp);
|
1995-11-06 16:18:52 +00:00
|
|
|
|
|
|
|
indx = 0;
|
1999-02-16 10:49:55 +00:00
|
|
|
while (oid && indx < CTL_MAXNAME) {
|
|
|
|
if (oid->oid_number == name[indx]) {
|
1995-11-06 16:18:52 +00:00
|
|
|
indx++;
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oid->oid_kind & CTLFLAG_NOLOCK)
|
1995-11-20 12:42:39 +00:00
|
|
|
req->lock = 0;
|
1999-02-16 10:49:55 +00:00
|
|
|
if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
if (oid->oid_handler)
|
1995-11-06 16:18:52 +00:00
|
|
|
goto found;
|
1995-11-12 19:52:09 +00:00
|
|
|
if (indx == namelen)
|
1995-11-06 16:18:52 +00:00
|
|
|
return ENOENT;
|
1999-02-16 10:49:55 +00:00
|
|
|
lsp = (struct sysctl_oid_list *)oid->oid_arg1;
|
|
|
|
oid = SLIST_FIRST(lsp);
|
1995-11-06 16:18:52 +00:00
|
|
|
} else {
|
1995-11-12 19:52:09 +00:00
|
|
|
if (indx != namelen)
|
1995-11-06 16:18:52 +00:00
|
|
|
return EISDIR;
|
|
|
|
goto found;
|
|
|
|
}
|
|
|
|
} else {
|
1999-02-16 10:49:55 +00:00
|
|
|
oid = SLIST_NEXT(oid, oid_link);
|
1995-11-06 16:18:52 +00:00
|
|
|
}
|
|
|
|
}
|
1995-11-13 13:54:09 +00:00
|
|
|
return ENOENT;
|
1995-11-06 16:18:52 +00:00
|
|
|
found:
|
|
|
|
/* If writing isn't allowed */
|
1999-02-16 10:49:55 +00:00
|
|
|
if (req->newptr && (!(oid->oid_kind & CTLFLAG_WR) ||
|
|
|
|
((oid->oid_kind & CTLFLAG_SECURE) && securelevel > 0)))
|
1995-11-06 16:18:52 +00:00
|
|
|
return (EPERM);
|
|
|
|
|
1995-12-17 21:11:22 +00:00
|
|
|
/* Most likely only root can write */
|
1999-02-16 10:49:55 +00:00
|
|
|
if (!(oid->oid_kind & CTLFLAG_ANYBODY) &&
|
1995-12-17 21:11:22 +00:00
|
|
|
req->newptr && req->p &&
|
This Implements the mumbled about "Jail" feature.
This is a seriously beefed up chroot kind of thing. The process
is jailed along the same lines as a chroot does it, but with
additional tough restrictions imposed on what the superuser can do.
For all I know, it is safe to hand over the root bit inside a
prison to the customer living in that prison, this is what
it was developed for in fact: "real virtual servers".
Each prison has an ip number associated with it, which all IP
communications will be coerced to use and each prison has its own
hostname.
Needless to say, you need more RAM this way, but the advantage is
that each customer can run their own particular version of apache
and not stomp on the toes of their neighbors.
It generally does what one would expect, but setting up a jail
still takes a little knowledge.
A few notes:
I have no scripts for setting up a jail, don't ask me for them.
The IP number should be an alias on one of the interfaces.
mount a /proc in each jail, it will make ps more useable.
/proc/<pid>/status tells the hostname of the prison for
jailed processes.
Quotas are only sensible if you have a mountpoint per prison.
There are no privisions for stopping resource-hogging.
Some "#ifdef INET" and similar may be missing (send patches!)
If somebody wants to take it from here and develop it into
more of a "virtual machine" they should be most welcome!
Tools, comments, patches & documentation most welcome.
Have fun...
Sponsored by: http://www.rndassociates.com/
Run for almost a year by: http://www.servetheweb.com/
1999-04-28 11:38:52 +00:00
|
|
|
(i = suser_xxx(0, req->p,
|
|
|
|
(oid->oid_kind & CTLFLAG_PRISON) ? PRISON_ROOT : 0)))
|
1995-12-17 21:11:22 +00:00
|
|
|
return (i);
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (!oid->oid_handler)
|
1995-11-06 16:18:52 +00:00
|
|
|
return EINVAL;
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
i = (oid->oid_handler) (oid,
|
1995-11-06 16:18:52 +00:00
|
|
|
name + indx, namelen - indx,
|
1995-11-12 19:52:09 +00:00
|
|
|
req);
|
1995-11-06 16:18:52 +00:00
|
|
|
} else {
|
1999-02-16 10:49:55 +00:00
|
|
|
i = (oid->oid_handler) (oid,
|
|
|
|
oid->oid_arg1, oid->oid_arg2,
|
1995-11-12 19:52:09 +00:00
|
|
|
req);
|
1995-11-06 16:18:52 +00:00
|
|
|
}
|
|
|
|
return (i);
|
|
|
|
}
|
|
|
|
|
1995-11-12 06:43:28 +00:00
|
|
|
#ifndef _SYS_SYSPROTO_H_
|
1995-11-09 20:22:12 +00:00
|
|
|
struct sysctl_args {
|
|
|
|
int *name;
|
|
|
|
u_int namelen;
|
|
|
|
void *old;
|
|
|
|
size_t *oldlenp;
|
|
|
|
void *new;
|
|
|
|
size_t newlen;
|
|
|
|
};
|
1995-11-12 06:43:28 +00:00
|
|
|
#endif
|
1995-11-09 20:22:12 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
int
|
1997-11-06 19:29:57 +00:00
|
|
|
__sysctl(struct proc *p, struct sysctl_args *uap)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
1998-08-24 08:39:39 +00:00
|
|
|
int error, i, name[CTL_MAXNAME];
|
|
|
|
size_t j;
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
if (uap->namelen > CTL_MAXNAME || uap->namelen < 2)
|
|
|
|
return (EINVAL);
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1994-10-02 17:35:40 +00:00
|
|
|
error = copyin(uap->name, &name, uap->namelen * sizeof(int));
|
|
|
|
if (error)
|
1994-05-24 10:09:53 +00:00
|
|
|
return (error);
|
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
error = userland_sysctl(p, name, uap->namelen,
|
1995-11-09 20:22:12 +00:00
|
|
|
uap->old, uap->oldlenp, 0,
|
1995-11-13 13:54:09 +00:00
|
|
|
uap->new, uap->newlen, &j);
|
|
|
|
if (error && error != ENOMEM)
|
|
|
|
return (error);
|
|
|
|
if (uap->oldlenp) {
|
|
|
|
i = copyout(&j, uap->oldlenp, sizeof(j));
|
|
|
|
if (i)
|
|
|
|
return (i);
|
|
|
|
}
|
|
|
|
return (error);
|
1995-11-09 20:22:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This is used from various compatibility syscalls too. That's why name
|
|
|
|
* must be in kernel space.
|
|
|
|
*/
|
|
|
|
int
|
1998-08-24 08:39:39 +00:00
|
|
|
userland_sysctl(struct proc *p, int *name, u_int namelen, void *old, size_t *oldlenp, int inkernel, void *new, size_t newlen, size_t *retval)
|
1995-11-09 20:22:12 +00:00
|
|
|
{
|
1995-11-20 12:42:39 +00:00
|
|
|
int error = 0;
|
1996-06-06 17:17:54 +00:00
|
|
|
struct sysctl_req req, req2;
|
1995-11-12 19:52:09 +00:00
|
|
|
|
|
|
|
bzero(&req, sizeof req);
|
1995-11-09 20:22:12 +00:00
|
|
|
|
1995-11-14 09:26:17 +00:00
|
|
|
req.p = p;
|
|
|
|
|
1995-11-09 20:22:12 +00:00
|
|
|
if (oldlenp) {
|
|
|
|
if (inkernel) {
|
1995-11-12 19:52:09 +00:00
|
|
|
req.oldlen = *oldlenp;
|
1995-11-09 20:22:12 +00:00
|
|
|
} else {
|
1995-11-13 13:54:09 +00:00
|
|
|
error = copyin(oldlenp, &req.oldlen, sizeof(*oldlenp));
|
1995-11-09 20:22:12 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
if (old) {
|
|
|
|
if (!useracc(old, req.oldlen, B_WRITE))
|
|
|
|
return (EFAULT);
|
|
|
|
req.oldptr= old;
|
|
|
|
}
|
1995-11-06 16:18:52 +00:00
|
|
|
|
1995-11-09 20:22:12 +00:00
|
|
|
if (newlen) {
|
1995-11-12 19:52:09 +00:00
|
|
|
if (!useracc(new, req.newlen, B_READ))
|
|
|
|
return (EFAULT);
|
|
|
|
req.newlen = newlen;
|
|
|
|
req.newptr = new;
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
req.oldfunc = sysctl_old_user;
|
|
|
|
req.newfunc = sysctl_new_user;
|
1995-11-20 12:42:39 +00:00
|
|
|
req.lock = 1;
|
|
|
|
|
|
|
|
/* XXX this should probably be done in a general way */
|
|
|
|
while (memlock.sl_lock) {
|
|
|
|
memlock.sl_want = 1;
|
|
|
|
(void) tsleep((caddr_t)&memlock, PRIBIO+1, "sysctl", 0);
|
|
|
|
memlock.sl_locked++;
|
|
|
|
}
|
|
|
|
memlock.sl_lock = 1;
|
1995-11-12 19:52:09 +00:00
|
|
|
|
1996-06-06 17:17:54 +00:00
|
|
|
do {
|
|
|
|
req2 = req;
|
|
|
|
error = sysctl_root(0, name, namelen, &req2);
|
|
|
|
} while (error == EAGAIN);
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1996-06-06 17:17:54 +00:00
|
|
|
req = req2;
|
1995-11-20 12:42:39 +00:00
|
|
|
if (req.lock == 2)
|
|
|
|
vsunlock(req.oldptr, req.oldlen, B_WRITE);
|
|
|
|
|
|
|
|
memlock.sl_lock = 0;
|
|
|
|
|
|
|
|
if (memlock.sl_want) {
|
|
|
|
memlock.sl_want = 0;
|
|
|
|
wakeup((caddr_t)&memlock);
|
|
|
|
}
|
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
if (error && error != ENOMEM)
|
1995-11-06 16:18:52 +00:00
|
|
|
return (error);
|
1995-11-13 13:54:09 +00:00
|
|
|
|
|
|
|
if (retval) {
|
|
|
|
if (req.oldptr && req.oldidx > req.oldlen)
|
|
|
|
*retval = req.oldlen;
|
|
|
|
else
|
|
|
|
*retval = req.oldidx;
|
1995-11-06 16:18:52 +00:00
|
|
|
}
|
1995-11-13 13:54:09 +00:00
|
|
|
return (error);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef COMPAT_43
|
|
|
|
#include <sys/socket.h>
|
1996-04-07 13:03:06 +00:00
|
|
|
#include <vm/vm_param.h>
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
#define KINFO_PROC (0<<8)
|
|
|
|
#define KINFO_RT (1<<8)
|
|
|
|
#define KINFO_VNODE (2<<8)
|
|
|
|
#define KINFO_FILE (3<<8)
|
|
|
|
#define KINFO_METER (4<<8)
|
|
|
|
#define KINFO_LOADAVG (5<<8)
|
|
|
|
#define KINFO_CLOCKRATE (6<<8)
|
|
|
|
|
1995-07-09 02:49:30 +00:00
|
|
|
/* Non-standard BSDI extension - only present on their 4.3 net-2 releases */
|
|
|
|
#define KINFO_BSDI_SYSINFO (101<<8)
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX this is bloat, but I hope it's better here than on the potentially
|
|
|
|
* limited kernel stack... -Peter
|
|
|
|
*/
|
|
|
|
|
1995-12-14 08:32:45 +00:00
|
|
|
static struct {
|
1995-07-09 02:49:30 +00:00
|
|
|
int bsdi_machine; /* "i386" on BSD/386 */
|
|
|
|
/* ^^^ this is an offset to the string, relative to the struct start */
|
|
|
|
char *pad0;
|
|
|
|
long pad1;
|
|
|
|
long pad2;
|
|
|
|
long pad3;
|
|
|
|
u_long pad4;
|
|
|
|
u_long pad5;
|
|
|
|
u_long pad6;
|
|
|
|
|
|
|
|
int bsdi_ostype; /* "BSD/386" on BSD/386 */
|
|
|
|
int bsdi_osrelease; /* "1.1" on BSD/386 */
|
|
|
|
long pad7;
|
|
|
|
long pad8;
|
|
|
|
char *pad9;
|
|
|
|
|
|
|
|
long pad10;
|
|
|
|
long pad11;
|
|
|
|
int pad12;
|
|
|
|
long pad13;
|
|
|
|
quad_t pad14;
|
|
|
|
long pad15;
|
|
|
|
|
|
|
|
struct timeval pad16;
|
|
|
|
/* we dont set this, because BSDI's uname used gethostname() instead */
|
|
|
|
int bsdi_hostname; /* hostname on BSD/386 */
|
|
|
|
|
|
|
|
/* the actual string data is appended here */
|
|
|
|
|
|
|
|
} bsdi_si;
|
|
|
|
/*
|
|
|
|
* this data is appended to the end of the bsdi_si structure during copyout.
|
|
|
|
* The "char *" offsets are relative to the base of the bsdi_si struct.
|
|
|
|
* This contains "FreeBSD\02.0-BUILT-nnnnnn\0i386\0", and these strings
|
|
|
|
* should not exceed the length of the buffer here... (or else!! :-)
|
|
|
|
*/
|
1995-12-14 08:32:45 +00:00
|
|
|
static char bsdi_strings[80]; /* It had better be less than this! */
|
1995-07-09 02:49:30 +00:00
|
|
|
|
1995-11-12 06:43:28 +00:00
|
|
|
#ifndef _SYS_SYSPROTO_H_
|
1994-05-24 10:09:53 +00:00
|
|
|
struct getkerninfo_args {
|
|
|
|
int op;
|
|
|
|
char *where;
|
1998-09-05 14:30:11 +00:00
|
|
|
size_t *size;
|
1994-05-24 10:09:53 +00:00
|
|
|
int arg;
|
|
|
|
};
|
1995-11-12 06:43:28 +00:00
|
|
|
#endif
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
1997-11-06 19:29:57 +00:00
|
|
|
ogetkerninfo(struct proc *p, struct getkerninfo_args *uap)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
1995-11-09 20:22:12 +00:00
|
|
|
int error, name[6];
|
1998-08-24 08:39:39 +00:00
|
|
|
size_t size;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
switch (uap->op & 0xff00) {
|
|
|
|
|
|
|
|
case KINFO_RT:
|
1995-11-09 20:22:12 +00:00
|
|
|
name[0] = CTL_NET;
|
|
|
|
name[1] = PF_ROUTE;
|
|
|
|
name[2] = 0;
|
|
|
|
name[3] = (uap->op & 0xff0000) >> 16;
|
|
|
|
name[4] = uap->op & 0xff;
|
|
|
|
name[5] = uap->arg;
|
|
|
|
error = userland_sysctl(p, name, 6, uap->where, uap->size,
|
1995-11-20 12:42:39 +00:00
|
|
|
0, 0, 0, &size);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case KINFO_VNODE:
|
1995-11-09 20:22:12 +00:00
|
|
|
name[0] = CTL_KERN;
|
|
|
|
name[1] = KERN_VNODE;
|
|
|
|
error = userland_sysctl(p, name, 2, uap->where, uap->size,
|
1995-11-20 12:42:39 +00:00
|
|
|
0, 0, 0, &size);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case KINFO_PROC:
|
1995-11-09 20:22:12 +00:00
|
|
|
name[0] = CTL_KERN;
|
|
|
|
name[1] = KERN_PROC;
|
|
|
|
name[2] = uap->op & 0xff;
|
|
|
|
name[3] = uap->arg;
|
|
|
|
error = userland_sysctl(p, name, 4, uap->where, uap->size,
|
1995-11-20 12:42:39 +00:00
|
|
|
0, 0, 0, &size);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case KINFO_FILE:
|
1995-11-09 20:22:12 +00:00
|
|
|
name[0] = CTL_KERN;
|
|
|
|
name[1] = KERN_FILE;
|
|
|
|
error = userland_sysctl(p, name, 2, uap->where, uap->size,
|
1995-11-20 12:42:39 +00:00
|
|
|
0, 0, 0, &size);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case KINFO_METER:
|
1995-11-09 20:22:12 +00:00
|
|
|
name[0] = CTL_VM;
|
|
|
|
name[1] = VM_METER;
|
|
|
|
error = userland_sysctl(p, name, 2, uap->where, uap->size,
|
1995-11-20 12:42:39 +00:00
|
|
|
0, 0, 0, &size);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case KINFO_LOADAVG:
|
1995-11-09 20:22:12 +00:00
|
|
|
name[0] = CTL_VM;
|
|
|
|
name[1] = VM_LOADAVG;
|
|
|
|
error = userland_sysctl(p, name, 2, uap->where, uap->size,
|
1995-11-20 12:42:39 +00:00
|
|
|
0, 0, 0, &size);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case KINFO_CLOCKRATE:
|
1995-11-09 20:22:12 +00:00
|
|
|
name[0] = CTL_KERN;
|
|
|
|
name[1] = KERN_CLOCKRATE;
|
|
|
|
error = userland_sysctl(p, name, 2, uap->where, uap->size,
|
1995-11-20 12:42:39 +00:00
|
|
|
0, 0, 0, &size);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
1995-07-09 02:49:30 +00:00
|
|
|
case KINFO_BSDI_SYSINFO: {
|
|
|
|
/*
|
|
|
|
* this is pretty crude, but it's just enough for uname()
|
|
|
|
* from BSDI's 1.x libc to work.
|
|
|
|
*
|
|
|
|
* In particular, it doesn't return the same results when
|
|
|
|
* the supplied buffer is too small. BSDI's version apparently
|
|
|
|
* will return the amount copied, and set the *size to how
|
|
|
|
* much was needed. The emulation framework here isn't capable
|
|
|
|
* of that, so we just set both to the amount copied.
|
|
|
|
* BSDI's 2.x product apparently fails with ENOMEM in this
|
|
|
|
* scenario.
|
|
|
|
*/
|
|
|
|
|
|
|
|
u_int needed;
|
|
|
|
u_int left;
|
|
|
|
char *s;
|
|
|
|
|
|
|
|
bzero((char *)&bsdi_si, sizeof(bsdi_si));
|
|
|
|
bzero(bsdi_strings, sizeof(bsdi_strings));
|
|
|
|
|
|
|
|
s = bsdi_strings;
|
|
|
|
|
|
|
|
bsdi_si.bsdi_ostype = (s - bsdi_strings) + sizeof(bsdi_si);
|
|
|
|
strcpy(s, ostype);
|
|
|
|
s += strlen(s) + 1;
|
|
|
|
|
|
|
|
bsdi_si.bsdi_osrelease = (s - bsdi_strings) + sizeof(bsdi_si);
|
|
|
|
strcpy(s, osrelease);
|
|
|
|
s += strlen(s) + 1;
|
|
|
|
|
|
|
|
bsdi_si.bsdi_machine = (s - bsdi_strings) + sizeof(bsdi_si);
|
|
|
|
strcpy(s, machine);
|
|
|
|
s += strlen(s) + 1;
|
|
|
|
|
|
|
|
needed = sizeof(bsdi_si) + (s - bsdi_strings);
|
|
|
|
|
|
|
|
if (uap->where == NULL) {
|
|
|
|
/* process is asking how much buffer to supply.. */
|
|
|
|
size = needed;
|
|
|
|
error = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* if too much buffer supplied, trim it down */
|
|
|
|
if (size > needed)
|
|
|
|
size = needed;
|
|
|
|
|
|
|
|
/* how much of the buffer is remaining */
|
|
|
|
left = size;
|
|
|
|
|
|
|
|
if ((error = copyout((char *)&bsdi_si, uap->where, left)) != 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* is there any point in continuing? */
|
|
|
|
if (left > sizeof(bsdi_si)) {
|
|
|
|
left -= sizeof(bsdi_si);
|
|
|
|
error = copyout(&bsdi_strings,
|
|
|
|
uap->where + sizeof(bsdi_si), left);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
default:
|
|
|
|
return (EOPNOTSUPP);
|
|
|
|
}
|
|
|
|
if (error)
|
|
|
|
return (error);
|
1997-11-06 19:29:57 +00:00
|
|
|
p->p_retval[0] = size;
|
1994-05-24 10:09:53 +00:00
|
|
|
if (uap->size)
|
|
|
|
error = copyout((caddr_t)&size, (caddr_t)uap->size,
|
|
|
|
sizeof(size));
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
#endif /* COMPAT_43 */
|