1994-05-24 10:09:53 +00:00
|
|
|
/*-
|
|
|
|
* Copyright (c) 1982, 1986, 1989, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to Berkeley by
|
|
|
|
* Mike Karels at Berkeley Software Design, Inc.
|
|
|
|
*
|
1995-12-04 16:48:58 +00:00
|
|
|
* Quite extensively rewritten by Poul-Henning Kamp of the FreeBSD
|
|
|
|
* project, to make these variables more userfriendly.
|
|
|
|
*
|
1994-05-24 10:09:53 +00:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* This product includes software developed by the University of
|
|
|
|
* California, Berkeley and its contributors.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* @(#)kern_sysctl.c 8.4 (Berkeley) 4/14/94
|
1999-08-28 01:08:13 +00:00
|
|
|
* $FreeBSD$
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
|
|
|
|
1997-12-16 17:40:42 +00:00
|
|
|
#include "opt_compat.h"
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/param.h>
|
1999-06-27 11:44:22 +00:00
|
|
|
#include <sys/systm.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/kernel.h>
|
|
|
|
#include <sys/sysctl.h>
|
1995-12-04 16:48:58 +00:00
|
|
|
#include <sys/malloc.h>
|
1995-12-07 12:48:31 +00:00
|
|
|
#include <sys/proc.h>
|
2001-09-01 18:19:21 +00:00
|
|
|
#include <sys/lock.h>
|
|
|
|
#include <sys/mutex.h>
|
2002-04-02 04:20:38 +00:00
|
|
|
#include <sys/sx.h>
|
1996-04-07 13:03:06 +00:00
|
|
|
#include <sys/sysproto.h>
|
1995-12-05 21:51:45 +00:00
|
|
|
#include <vm/vm.h>
|
1995-12-07 12:48:31 +00:00
|
|
|
#include <vm/vm_extern.h>
|
1995-12-05 21:51:45 +00:00
|
|
|
|
1997-10-12 20:26:33 +00:00
|
|
|
static MALLOC_DEFINE(M_SYSCTL, "sysctl", "sysctl internal magic");
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
static MALLOC_DEFINE(M_SYSCTLOID, "sysctloid", "sysctl dynamic oids");
|
1997-10-11 18:31:40 +00:00
|
|
|
|
1995-11-20 12:42:39 +00:00
|
|
|
/*
|
2002-04-02 05:50:07 +00:00
|
|
|
* Locking - this locks the sysctl tree in memory.
|
1995-11-20 12:42:39 +00:00
|
|
|
*/
|
2002-04-02 05:50:07 +00:00
|
|
|
static struct sx sysctllock;
|
2002-04-02 04:20:38 +00:00
|
|
|
|
2002-04-02 05:50:07 +00:00
|
|
|
#define SYSCTL_LOCK() sx_xlock(&sysctllock)
|
|
|
|
#define SYSCTL_UNLOCK() sx_xunlock(&sysctllock)
|
|
|
|
#define SYSCTL_INIT() sx_init(&sysctllock, "sysctl sysctllock")
|
1995-11-20 12:42:39 +00:00
|
|
|
|
2000-07-04 11:25:35 +00:00
|
|
|
static int sysctl_root(SYSCTL_HANDLER_ARGS);
|
1995-11-20 12:42:39 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid_list sysctl__children; /* root list */
|
1995-11-08 08:48:36 +00:00
|
|
|
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
static struct sysctl_oid *
|
|
|
|
sysctl_find_oidname(const char *name, struct sysctl_oid_list *list)
|
|
|
|
{
|
|
|
|
struct sysctl_oid *oidp;
|
|
|
|
|
|
|
|
SLIST_FOREACH(oidp, list, oid_link) {
|
|
|
|
if (strcmp(oidp->oid_name, name) == 0) {
|
|
|
|
return (oidp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return (NULL);
|
|
|
|
}
|
|
|
|
|
1995-12-04 16:48:58 +00:00
|
|
|
/*
|
|
|
|
* Initialization of the MIB tree.
|
|
|
|
*
|
1999-02-16 10:49:55 +00:00
|
|
|
* Order by number in each list.
|
1995-12-04 16:48:58 +00:00
|
|
|
*/
|
1995-11-20 12:42:39 +00:00
|
|
|
|
2001-07-25 17:13:58 +00:00
|
|
|
void
|
|
|
|
sysctl_register_oid(struct sysctl_oid *oidp)
|
1995-11-08 08:48:36 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid_list *parent = oidp->oid_parent;
|
|
|
|
struct sysctl_oid *p;
|
|
|
|
struct sysctl_oid *q;
|
|
|
|
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
/*
|
|
|
|
* First check if another oid with the same name already
|
|
|
|
* exists in the parent's list.
|
|
|
|
*/
|
|
|
|
p = sysctl_find_oidname(oidp->oid_name, parent);
|
|
|
|
if (p != NULL) {
|
|
|
|
if ((p->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
p->oid_refcnt++;
|
|
|
|
return;
|
|
|
|
} else {
|
|
|
|
printf("can't re-use a leaf (%s)!\n", p->oid_name);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
1999-02-16 10:49:55 +00:00
|
|
|
/*
|
|
|
|
* If this oid has a number OID_AUTO, give it a number which
|
2001-07-25 17:21:18 +00:00
|
|
|
* is greater than any current oid.
|
|
|
|
* NOTE: DO NOT change the starting value here, change it in
|
|
|
|
* <sys/sysctl.h>, and make sure it is at least 256 to
|
|
|
|
* accomodate e.g. net.inet.raw as a static sysctl node.
|
1999-02-16 10:49:55 +00:00
|
|
|
*/
|
|
|
|
if (oidp->oid_number == OID_AUTO) {
|
2001-07-25 17:21:18 +00:00
|
|
|
static int newoid = CTL_AUTO_START;
|
2001-01-24 04:35:13 +00:00
|
|
|
|
|
|
|
oidp->oid_number = newoid++;
|
|
|
|
if (newoid == 0x7fffffff)
|
|
|
|
panic("out of oids");
|
1999-02-16 10:49:55 +00:00
|
|
|
}
|
2001-10-12 09:16:36 +00:00
|
|
|
#if 0
|
|
|
|
else if (oidp->oid_number >= CTL_AUTO_START) {
|
|
|
|
/* do not panic; this happens when unregistering sysctl sets */
|
|
|
|
printf("static sysctl oid too high: %d", oidp->oid_number);
|
|
|
|
}
|
|
|
|
#endif
|
1995-11-11 00:09:21 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
/*
|
|
|
|
* Insert the oid into the parent's list in order.
|
|
|
|
*/
|
|
|
|
q = NULL;
|
|
|
|
SLIST_FOREACH(p, parent, oid_link) {
|
|
|
|
if (oidp->oid_number < p->oid_number)
|
|
|
|
break;
|
|
|
|
q = p;
|
|
|
|
}
|
|
|
|
if (q)
|
|
|
|
SLIST_INSERT_AFTER(q, oidp, oid_link);
|
|
|
|
else
|
|
|
|
SLIST_INSERT_HEAD(parent, oidp, oid_link);
|
1995-11-08 08:48:36 +00:00
|
|
|
}
|
|
|
|
|
2001-07-25 17:13:58 +00:00
|
|
|
void
|
|
|
|
sysctl_unregister_oid(struct sysctl_oid *oidp)
|
1995-11-08 08:48:36 +00:00
|
|
|
{
|
2000-05-26 02:09:24 +00:00
|
|
|
SLIST_REMOVE(oidp->oid_parent, oidp, sysctl_oid, oid_link);
|
1999-02-16 10:49:55 +00:00
|
|
|
}
|
1995-12-04 16:48:58 +00:00
|
|
|
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
/* Initialize a new context to keep track of dynamically added sysctls. */
|
|
|
|
int
|
|
|
|
sysctl_ctx_init(struct sysctl_ctx_list *c)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (c == NULL) {
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
TAILQ_INIT(c);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Free the context, and destroy all dynamic oids registered in this context */
|
|
|
|
int
|
|
|
|
sysctl_ctx_free(struct sysctl_ctx_list *clist)
|
|
|
|
{
|
|
|
|
struct sysctl_ctx_entry *e, *e1;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
error = 0;
|
|
|
|
/*
|
|
|
|
* First perform a "dry run" to check if it's ok to remove oids.
|
|
|
|
* XXX FIXME
|
|
|
|
* XXX This algorithm is a hack. But I don't know any
|
|
|
|
* XXX better solution for now...
|
|
|
|
*/
|
|
|
|
TAILQ_FOREACH(e, clist, link) {
|
|
|
|
error = sysctl_remove_oid(e->entry, 0, 0);
|
|
|
|
if (error)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Restore deregistered entries, either from the end,
|
|
|
|
* or from the place where error occured.
|
|
|
|
* e contains the entry that was not unregistered
|
|
|
|
*/
|
|
|
|
if (error)
|
|
|
|
e1 = TAILQ_PREV(e, sysctl_ctx_list, link);
|
|
|
|
else
|
|
|
|
e1 = TAILQ_LAST(clist, sysctl_ctx_list);
|
|
|
|
while (e1 != NULL) {
|
|
|
|
sysctl_register_oid(e1->entry);
|
|
|
|
e1 = TAILQ_PREV(e1, sysctl_ctx_list, link);
|
|
|
|
}
|
|
|
|
if (error)
|
|
|
|
return(EBUSY);
|
|
|
|
/* Now really delete the entries */
|
|
|
|
e = TAILQ_FIRST(clist);
|
|
|
|
while (e != NULL) {
|
|
|
|
e1 = TAILQ_NEXT(e, link);
|
|
|
|
error = sysctl_remove_oid(e->entry, 1, 0);
|
|
|
|
if (error)
|
|
|
|
panic("sysctl_remove_oid: corrupt tree, entry: %s",
|
|
|
|
e->entry->oid_name);
|
|
|
|
free(e, M_SYSCTLOID);
|
|
|
|
e = e1;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Add an entry to the context */
|
|
|
|
struct sysctl_ctx_entry *
|
|
|
|
sysctl_ctx_entry_add(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp)
|
|
|
|
{
|
|
|
|
struct sysctl_ctx_entry *e;
|
|
|
|
|
|
|
|
if (clist == NULL || oidp == NULL)
|
|
|
|
return(NULL);
|
2000-07-28 22:40:04 +00:00
|
|
|
e = malloc(sizeof(struct sysctl_ctx_entry), M_SYSCTLOID, M_WAITOK);
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
e->entry = oidp;
|
|
|
|
TAILQ_INSERT_HEAD(clist, e, link);
|
|
|
|
return (e);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Find an entry in the context */
|
|
|
|
struct sysctl_ctx_entry *
|
|
|
|
sysctl_ctx_entry_find(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp)
|
|
|
|
{
|
|
|
|
struct sysctl_ctx_entry *e;
|
|
|
|
|
|
|
|
if (clist == NULL || oidp == NULL)
|
|
|
|
return(NULL);
|
2001-02-04 13:13:25 +00:00
|
|
|
TAILQ_FOREACH(e, clist, link) {
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
if(e->entry == oidp)
|
|
|
|
return(e);
|
|
|
|
}
|
|
|
|
return (e);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Delete an entry from the context.
|
|
|
|
* NOTE: this function doesn't free oidp! You have to remove it
|
|
|
|
* with sysctl_remove_oid().
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
sysctl_ctx_entry_del(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp)
|
|
|
|
{
|
|
|
|
struct sysctl_ctx_entry *e;
|
|
|
|
|
|
|
|
if (clist == NULL || oidp == NULL)
|
|
|
|
return (EINVAL);
|
|
|
|
e = sysctl_ctx_entry_find(clist, oidp);
|
|
|
|
if (e != NULL) {
|
|
|
|
TAILQ_REMOVE(clist, e, link);
|
|
|
|
free(e, M_SYSCTLOID);
|
|
|
|
return (0);
|
|
|
|
} else
|
|
|
|
return (ENOENT);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Remove dynamically created sysctl trees.
|
|
|
|
* oidp - top of the tree to be removed
|
|
|
|
* del - if 0 - just deregister, otherwise free up entries as well
|
|
|
|
* recurse - if != 0 traverse the subtree to be deleted
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
sysctl_remove_oid(struct sysctl_oid *oidp, int del, int recurse)
|
|
|
|
{
|
|
|
|
struct sysctl_oid *p;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
if (oidp == NULL)
|
|
|
|
return(EINVAL);
|
|
|
|
if ((oidp->oid_kind & CTLFLAG_DYN) == 0) {
|
|
|
|
printf("can't remove non-dynamic nodes!\n");
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* WARNING: normal method to do this should be through
|
|
|
|
* sysctl_ctx_free(). Use recursing as the last resort
|
|
|
|
* method to purge your sysctl tree of leftovers...
|
|
|
|
* However, if some other code still references these nodes,
|
|
|
|
* it will panic.
|
|
|
|
*/
|
|
|
|
if ((oidp->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
if (oidp->oid_refcnt == 1) {
|
|
|
|
SLIST_FOREACH(p, SYSCTL_CHILDREN(oidp), oid_link) {
|
|
|
|
if (!recurse)
|
|
|
|
return (ENOTEMPTY);
|
|
|
|
error = sysctl_remove_oid(p, del, recurse);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
if (del)
|
|
|
|
free(SYSCTL_CHILDREN(oidp), M_SYSCTLOID);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (oidp->oid_refcnt > 1 ) {
|
|
|
|
oidp->oid_refcnt--;
|
|
|
|
} else {
|
|
|
|
if (oidp->oid_refcnt == 0) {
|
|
|
|
printf("Warning: bad oid_refcnt=%u (%s)!\n",
|
|
|
|
oidp->oid_refcnt, oidp->oid_name);
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
sysctl_unregister_oid(oidp);
|
|
|
|
if (del) {
|
2001-12-16 02:55:41 +00:00
|
|
|
if (oidp->descr)
|
2002-07-15 17:28:34 +00:00
|
|
|
free((void *)(uintptr_t)(const void *)oidp->descr, M_SYSCTLOID);
|
2000-07-28 22:40:04 +00:00
|
|
|
free((void *)(uintptr_t)(const void *)oidp->oid_name,
|
|
|
|
M_SYSCTLOID);
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
free(oidp, M_SYSCTLOID);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create new sysctls at run time.
|
|
|
|
* clist may point to a valid context initialized with sysctl_ctx_init().
|
|
|
|
*/
|
|
|
|
struct sysctl_oid *
|
|
|
|
sysctl_add_oid(struct sysctl_ctx_list *clist, struct sysctl_oid_list *parent,
|
2001-01-05 07:00:45 +00:00
|
|
|
int number, const char *name, int kind, void *arg1, int arg2,
|
|
|
|
int (*handler)(SYSCTL_HANDLER_ARGS), const char *fmt, const char *descr)
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
{
|
|
|
|
struct sysctl_oid *oidp;
|
|
|
|
ssize_t len;
|
2000-07-28 22:40:04 +00:00
|
|
|
char *newname;
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
|
|
|
|
/* You have to hook up somewhere.. */
|
|
|
|
if (parent == NULL)
|
|
|
|
return(NULL);
|
|
|
|
/* Check if the node already exists, otherwise create it */
|
|
|
|
oidp = sysctl_find_oidname(name, parent);
|
|
|
|
if (oidp != NULL) {
|
|
|
|
if ((oidp->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
oidp->oid_refcnt++;
|
|
|
|
/* Update the context */
|
|
|
|
if (clist != NULL)
|
|
|
|
sysctl_ctx_entry_add(clist, oidp);
|
|
|
|
return (oidp);
|
|
|
|
} else {
|
|
|
|
printf("can't re-use a leaf (%s)!\n", name);
|
|
|
|
return (NULL);
|
|
|
|
}
|
|
|
|
}
|
2000-12-08 21:51:06 +00:00
|
|
|
oidp = malloc(sizeof(struct sysctl_oid), M_SYSCTLOID, M_WAITOK|M_ZERO);
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
oidp->oid_parent = parent;
|
|
|
|
SLIST_NEXT(oidp, oid_link) = NULL;
|
|
|
|
oidp->oid_number = number;
|
|
|
|
oidp->oid_refcnt = 1;
|
|
|
|
len = strlen(name);
|
2000-07-28 22:40:04 +00:00
|
|
|
newname = malloc(len + 1, M_SYSCTLOID, M_WAITOK);
|
|
|
|
bcopy(name, newname, len + 1);
|
|
|
|
newname[len] = '\0';
|
|
|
|
oidp->oid_name = newname;
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
oidp->oid_handler = handler;
|
|
|
|
oidp->oid_kind = CTLFLAG_DYN | kind;
|
|
|
|
if ((kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
/* Allocate space for children */
|
|
|
|
SYSCTL_CHILDREN(oidp) = malloc(sizeof(struct sysctl_oid_list),
|
|
|
|
M_SYSCTLOID, M_WAITOK);
|
|
|
|
SLIST_INIT(SYSCTL_CHILDREN(oidp));
|
|
|
|
} else {
|
|
|
|
oidp->oid_arg1 = arg1;
|
|
|
|
oidp->oid_arg2 = arg2;
|
|
|
|
}
|
|
|
|
oidp->oid_fmt = fmt;
|
2001-12-16 02:55:41 +00:00
|
|
|
if (descr) {
|
|
|
|
int len = strlen(descr) + 1;
|
|
|
|
oidp->descr = malloc(len, M_SYSCTLOID, M_WAITOK);
|
|
|
|
if (oidp->descr)
|
2002-07-15 17:28:34 +00:00
|
|
|
strcpy((char *)(uintptr_t)(const void *)oidp->descr, descr);
|
2001-12-16 02:55:41 +00:00
|
|
|
}
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
/* Update the context, if used */
|
|
|
|
if (clist != NULL)
|
|
|
|
sysctl_ctx_entry_add(clist, oidp);
|
|
|
|
/* Register this oid */
|
|
|
|
sysctl_register_oid(oidp);
|
|
|
|
return (oidp);
|
|
|
|
}
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
/*
|
|
|
|
* Register the kernel's oids on startup.
|
|
|
|
*/
|
2001-06-13 10:58:39 +00:00
|
|
|
SET_DECLARE(sysctl_set, struct sysctl_oid);
|
1995-11-08 08:48:36 +00:00
|
|
|
|
2001-07-25 17:13:58 +00:00
|
|
|
static void
|
|
|
|
sysctl_register_all(void *arg)
|
1998-09-05 17:13:28 +00:00
|
|
|
{
|
2001-06-13 10:58:39 +00:00
|
|
|
struct sysctl_oid **oidp;
|
1998-09-05 17:13:28 +00:00
|
|
|
|
2002-04-02 05:50:07 +00:00
|
|
|
SYSCTL_INIT();
|
2001-06-13 10:58:39 +00:00
|
|
|
SET_FOREACH(oidp, sysctl_set)
|
|
|
|
sysctl_register_oid(*oidp);
|
|
|
|
}
|
1999-02-16 10:49:55 +00:00
|
|
|
SYSINIT(sysctl, SI_SUB_KMEM, SI_ORDER_ANY, sysctl_register_all, 0);
|
|
|
|
|
1995-12-04 16:48:58 +00:00
|
|
|
/*
|
|
|
|
* "Staff-functions"
|
|
|
|
*
|
1995-12-06 13:27:39 +00:00
|
|
|
* These functions implement a presently undocumented interface
|
|
|
|
* used by the sysctl program to walk the tree, and get the type
|
|
|
|
* so it can print the value.
|
|
|
|
* This interface is under work and consideration, and should probably
|
|
|
|
* be killed with a big axe by the first person who can find the time.
|
|
|
|
* (be aware though, that the proper interface isn't as obvious as it
|
|
|
|
* may seem, there are various conflicting requirements.
|
|
|
|
*
|
1995-12-04 16:48:58 +00:00
|
|
|
* {0,0} printf the entire MIB-tree.
|
|
|
|
* {0,1,...} return the name of the "..." OID.
|
1999-01-10 07:45:33 +00:00
|
|
|
* {0,2,...} return the next OID.
|
1995-12-04 16:48:58 +00:00
|
|
|
* {0,3} return the OID of the name in "new"
|
1995-12-06 13:27:39 +00:00
|
|
|
* {0,4,...} return the kind & format info for the "..." OID.
|
2001-12-16 02:55:41 +00:00
|
|
|
* {0,5,...} return the description the "..." OID.
|
1995-12-04 16:48:58 +00:00
|
|
|
*/
|
|
|
|
|
1995-11-08 08:48:36 +00:00
|
|
|
static void
|
1999-02-16 10:49:55 +00:00
|
|
|
sysctl_sysctl_debug_dump_node(struct sysctl_oid_list *l, int i)
|
1995-11-08 08:48:36 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
int k;
|
|
|
|
struct sysctl_oid *oidp;
|
1995-11-08 08:48:36 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
SLIST_FOREACH(oidp, l, oid_link) {
|
1995-11-08 08:48:36 +00:00
|
|
|
|
|
|
|
for (k=0; k<i; k++)
|
|
|
|
printf(" ");
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
printf("%d %s ", oidp->oid_number, oidp->oid_name);
|
1995-11-08 08:48:36 +00:00
|
|
|
|
|
|
|
printf("%c%c",
|
1999-02-16 10:49:55 +00:00
|
|
|
oidp->oid_kind & CTLFLAG_RD ? 'R':' ',
|
|
|
|
oidp->oid_kind & CTLFLAG_WR ? 'W':' ');
|
1995-11-08 08:48:36 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_handler)
|
1996-04-13 13:28:54 +00:00
|
|
|
printf(" *Handler");
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
switch (oidp->oid_kind & CTLTYPE) {
|
1995-11-12 19:52:09 +00:00
|
|
|
case CTLTYPE_NODE:
|
1996-04-13 13:28:54 +00:00
|
|
|
printf(" Node\n");
|
1999-02-16 10:49:55 +00:00
|
|
|
if (!oidp->oid_handler) {
|
1995-11-08 08:48:36 +00:00
|
|
|
sysctl_sysctl_debug_dump_node(
|
1999-02-16 10:49:55 +00:00
|
|
|
oidp->oid_arg1, i+2);
|
1995-11-08 08:48:36 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case CTLTYPE_INT: printf(" Int\n"); break;
|
|
|
|
case CTLTYPE_STRING: printf(" String\n"); break;
|
|
|
|
case CTLTYPE_QUAD: printf(" Quad\n"); break;
|
|
|
|
case CTLTYPE_OPAQUE: printf(" Opaque/struct\n"); break;
|
|
|
|
default: printf("\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_sysctl_debug(SYSCTL_HANDLER_ARGS)
|
1995-11-08 08:48:36 +00:00
|
|
|
{
|
2001-11-28 03:11:16 +00:00
|
|
|
int error;
|
|
|
|
|
2002-04-01 21:31:13 +00:00
|
|
|
error = suser(req->td);
|
2001-11-28 03:11:16 +00:00
|
|
|
if (error)
|
|
|
|
return error;
|
1999-02-16 10:49:55 +00:00
|
|
|
sysctl_sysctl_debug_dump_node(&sysctl__children, 0);
|
1995-11-08 08:48:36 +00:00
|
|
|
return ENOENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
SYSCTL_PROC(_sysctl, 0, debug, CTLTYPE_STRING|CTLFLAG_RD,
|
1995-12-04 16:48:58 +00:00
|
|
|
0, 0, sysctl_sysctl_debug, "-", "");
|
1995-11-06 16:18:52 +00:00
|
|
|
|
1995-12-04 16:48:58 +00:00
|
|
|
static int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_sysctl_name(SYSCTL_HANDLER_ARGS)
|
1995-12-04 16:48:58 +00:00
|
|
|
{
|
|
|
|
int *name = (int *) arg1;
|
|
|
|
u_int namelen = arg2;
|
1999-02-16 10:49:55 +00:00
|
|
|
int error = 0;
|
|
|
|
struct sysctl_oid *oid;
|
1999-03-23 14:23:15 +00:00
|
|
|
struct sysctl_oid_list *lsp = &sysctl__children, *lsp2;
|
1995-12-04 16:48:58 +00:00
|
|
|
char buf[10];
|
|
|
|
|
|
|
|
while (namelen) {
|
|
|
|
if (!lsp) {
|
1998-12-04 22:54:57 +00:00
|
|
|
snprintf(buf,sizeof(buf),"%d",*name);
|
1995-12-04 16:48:58 +00:00
|
|
|
if (req->oldidx)
|
|
|
|
error = SYSCTL_OUT(req, ".", 1);
|
|
|
|
if (!error)
|
|
|
|
error = SYSCTL_OUT(req, buf, strlen(buf));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
namelen--;
|
|
|
|
name++;
|
|
|
|
continue;
|
|
|
|
}
|
1999-03-23 14:23:15 +00:00
|
|
|
lsp2 = 0;
|
1999-02-16 10:49:55 +00:00
|
|
|
SLIST_FOREACH(oid, lsp, oid_link) {
|
|
|
|
if (oid->oid_number != *name)
|
1995-12-04 16:48:58 +00:00
|
|
|
continue;
|
|
|
|
|
|
|
|
if (req->oldidx)
|
|
|
|
error = SYSCTL_OUT(req, ".", 1);
|
|
|
|
if (!error)
|
1999-02-16 10:49:55 +00:00
|
|
|
error = SYSCTL_OUT(req, oid->oid_name,
|
|
|
|
strlen(oid->oid_name));
|
1995-12-04 16:48:58 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
namelen--;
|
|
|
|
name++;
|
|
|
|
|
1999-03-23 14:23:15 +00:00
|
|
|
if ((oid->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
1995-12-04 16:48:58 +00:00
|
|
|
break;
|
1995-11-06 16:18:52 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oid->oid_handler)
|
1995-12-04 16:48:58 +00:00
|
|
|
break;
|
|
|
|
|
1999-03-23 14:23:15 +00:00
|
|
|
lsp2 = (struct sysctl_oid_list *)oid->oid_arg1;
|
1995-12-04 16:48:58 +00:00
|
|
|
break;
|
|
|
|
}
|
1999-03-23 14:23:15 +00:00
|
|
|
lsp = lsp2;
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
|
|
|
return (SYSCTL_OUT(req, "", 1));
|
|
|
|
}
|
|
|
|
|
|
|
|
SYSCTL_NODE(_sysctl, 1, name, CTLFLAG_RD, sysctl_sysctl_name, "");
|
|
|
|
|
|
|
|
static int
|
2000-07-28 22:40:04 +00:00
|
|
|
sysctl_sysctl_next_ls(struct sysctl_oid_list *lsp, int *name, u_int namelen,
|
1999-02-16 10:49:55 +00:00
|
|
|
int *next, int *len, int level, struct sysctl_oid **oidpp)
|
1995-12-04 16:48:58 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid *oidp;
|
1995-12-04 16:48:58 +00:00
|
|
|
|
|
|
|
*len = level;
|
1999-02-16 10:49:55 +00:00
|
|
|
SLIST_FOREACH(oidp, lsp, oid_link) {
|
|
|
|
*next = oidp->oid_number;
|
|
|
|
*oidpp = oidp;
|
1995-12-04 16:48:58 +00:00
|
|
|
|
|
|
|
if (!namelen) {
|
1999-02-16 10:49:55 +00:00
|
|
|
if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
1995-12-04 16:48:58 +00:00
|
|
|
return 0;
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_handler)
|
1995-12-04 16:48:58 +00:00
|
|
|
/* We really should call the handler here...*/
|
|
|
|
return 0;
|
1999-02-16 10:49:55 +00:00
|
|
|
lsp = (struct sysctl_oid_list *)oidp->oid_arg1;
|
2000-07-28 22:40:04 +00:00
|
|
|
if (!sysctl_sysctl_next_ls(lsp, 0, 0, next+1,
|
1999-02-16 10:49:55 +00:00
|
|
|
len, level+1, oidpp))
|
1996-04-13 13:28:54 +00:00
|
|
|
return 0;
|
|
|
|
goto next;
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_number < *name)
|
1995-12-04 16:48:58 +00:00
|
|
|
continue;
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_number > *name) {
|
|
|
|
if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
1995-12-04 16:48:58 +00:00
|
|
|
return 0;
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_handler)
|
1995-12-04 16:48:58 +00:00
|
|
|
return 0;
|
1999-02-16 10:49:55 +00:00
|
|
|
lsp = (struct sysctl_oid_list *)oidp->oid_arg1;
|
2000-07-28 22:40:04 +00:00
|
|
|
if (!sysctl_sysctl_next_ls(lsp, name+1, namelen-1,
|
1999-02-16 10:49:55 +00:00
|
|
|
next+1, len, level+1, oidpp))
|
1995-12-04 16:48:58 +00:00
|
|
|
return (0);
|
1996-04-13 13:28:54 +00:00
|
|
|
goto next;
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
1999-02-16 10:49:55 +00:00
|
|
|
if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
1995-12-04 16:48:58 +00:00
|
|
|
continue;
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_handler)
|
1995-12-04 16:48:58 +00:00
|
|
|
continue;
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
lsp = (struct sysctl_oid_list *)oidp->oid_arg1;
|
2000-07-28 22:40:04 +00:00
|
|
|
if (!sysctl_sysctl_next_ls(lsp, name+1, namelen-1, next+1,
|
1999-02-16 10:49:55 +00:00
|
|
|
len, level+1, oidpp))
|
1995-12-04 16:48:58 +00:00
|
|
|
return (0);
|
1996-04-13 13:28:54 +00:00
|
|
|
next:
|
1995-12-04 16:48:58 +00:00
|
|
|
namelen = 1;
|
|
|
|
*len = level;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_sysctl_next(SYSCTL_HANDLER_ARGS)
|
1995-12-04 16:48:58 +00:00
|
|
|
{
|
|
|
|
int *name = (int *) arg1;
|
|
|
|
u_int namelen = arg2;
|
|
|
|
int i, j, error;
|
|
|
|
struct sysctl_oid *oid;
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid_list *lsp = &sysctl__children;
|
1995-12-04 16:48:58 +00:00
|
|
|
int newoid[CTL_MAXNAME];
|
|
|
|
|
2000-07-28 22:40:04 +00:00
|
|
|
i = sysctl_sysctl_next_ls(lsp, name, namelen, newoid, &j, 1, &oid);
|
1995-12-04 16:48:58 +00:00
|
|
|
if (i)
|
|
|
|
return ENOENT;
|
1995-12-06 13:27:39 +00:00
|
|
|
error = SYSCTL_OUT(req, newoid, j * sizeof (int));
|
1995-12-04 16:48:58 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
SYSCTL_NODE(_sysctl, 2, next, CTLFLAG_RD, sysctl_sysctl_next, "");
|
|
|
|
|
|
|
|
static int
|
1999-02-16 10:49:55 +00:00
|
|
|
name2oid (char *name, int *oid, int *len, struct sysctl_oid **oidpp)
|
1995-12-04 16:48:58 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
int i;
|
|
|
|
struct sysctl_oid *oidp;
|
|
|
|
struct sysctl_oid_list *lsp = &sysctl__children;
|
1995-12-04 16:48:58 +00:00
|
|
|
char *p;
|
|
|
|
|
|
|
|
if (!*name)
|
|
|
|
return ENOENT;
|
|
|
|
|
|
|
|
p = name + strlen(name) - 1 ;
|
|
|
|
if (*p == '.')
|
|
|
|
*p = '\0';
|
|
|
|
|
|
|
|
*len = 0;
|
|
|
|
|
|
|
|
for (p = name; *p && *p != '.'; p++)
|
|
|
|
;
|
|
|
|
i = *p;
|
|
|
|
if (i == '.')
|
|
|
|
*p = '\0';
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
oidp = SLIST_FIRST(lsp);
|
1995-12-04 16:48:58 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
while (oidp && *len < CTL_MAXNAME) {
|
|
|
|
if (strcmp(name, oidp->oid_name)) {
|
|
|
|
oidp = SLIST_NEXT(oidp, oid_link);
|
1995-12-04 16:48:58 +00:00
|
|
|
continue;
|
|
|
|
}
|
1999-02-16 10:49:55 +00:00
|
|
|
*oid++ = oidp->oid_number;
|
1995-12-04 16:48:58 +00:00
|
|
|
(*len)++;
|
|
|
|
|
|
|
|
if (!i) {
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidpp)
|
|
|
|
*oidpp = oidp;
|
1995-12-04 16:48:58 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
1995-12-04 16:48:58 +00:00
|
|
|
break;
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_handler)
|
1995-12-04 16:48:58 +00:00
|
|
|
break;
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
lsp = (struct sysctl_oid_list *)oidp->oid_arg1;
|
|
|
|
oidp = SLIST_FIRST(lsp);
|
1995-12-04 16:48:58 +00:00
|
|
|
name = p+1;
|
|
|
|
for (p = name; *p && *p != '.'; p++)
|
|
|
|
;
|
|
|
|
i = *p;
|
|
|
|
if (i == '.')
|
|
|
|
*p = '\0';
|
|
|
|
}
|
|
|
|
return ENOENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_sysctl_name2oid(SYSCTL_HANDLER_ARGS)
|
1995-12-04 16:48:58 +00:00
|
|
|
{
|
|
|
|
char *p;
|
|
|
|
int error, oid[CTL_MAXNAME], len;
|
|
|
|
struct sysctl_oid *op = 0;
|
|
|
|
|
|
|
|
if (!req->newlen)
|
|
|
|
return ENOENT;
|
1999-03-30 09:00:45 +00:00
|
|
|
if (req->newlen >= MAXPATHLEN) /* XXX arbitrary, undocumented */
|
|
|
|
return (ENAMETOOLONG);
|
1995-12-04 16:48:58 +00:00
|
|
|
|
|
|
|
p = malloc(req->newlen+1, M_SYSCTL, M_WAITOK);
|
|
|
|
|
|
|
|
error = SYSCTL_IN(req, p, req->newlen);
|
|
|
|
if (error) {
|
|
|
|
free(p, M_SYSCTL);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
p [req->newlen] = '\0';
|
|
|
|
|
|
|
|
error = name2oid(p, oid, &len, &op);
|
|
|
|
|
|
|
|
free(p, M_SYSCTL);
|
|
|
|
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
1995-12-06 13:27:39 +00:00
|
|
|
error = SYSCTL_OUT(req, oid, len * sizeof *oid);
|
1995-12-04 16:48:58 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1995-12-17 21:11:22 +00:00
|
|
|
SYSCTL_PROC(_sysctl, 3, name2oid, CTLFLAG_RW|CTLFLAG_ANYBODY, 0, 0,
|
1995-12-04 16:48:58 +00:00
|
|
|
sysctl_sysctl_name2oid, "I", "");
|
|
|
|
|
|
|
|
static int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_sysctl_oidfmt(SYSCTL_HANDLER_ARGS)
|
1995-12-04 16:48:58 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid *oid;
|
1999-12-01 02:25:19 +00:00
|
|
|
int error;
|
1995-12-04 16:48:58 +00:00
|
|
|
|
1999-12-01 02:25:19 +00:00
|
|
|
error = sysctl_find_oid(arg1, arg2, &oid, NULL, req);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
1995-12-04 16:48:58 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (!oid->oid_fmt)
|
1999-12-01 02:25:19 +00:00
|
|
|
return (ENOENT);
|
|
|
|
error = SYSCTL_OUT(req, &oid->oid_kind, sizeof(oid->oid_kind));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
error = SYSCTL_OUT(req, oid->oid_fmt, strlen(oid->oid_fmt) + 1);
|
1995-12-06 13:27:39 +00:00
|
|
|
return (error);
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
|
|
|
|
1999-01-10 05:33:43 +00:00
|
|
|
|
1999-01-10 07:45:33 +00:00
|
|
|
SYSCTL_NODE(_sysctl, 4, oidfmt, CTLFLAG_RD, sysctl_sysctl_oidfmt, "");
|
1999-01-10 05:33:43 +00:00
|
|
|
|
2001-12-16 02:55:41 +00:00
|
|
|
static int
|
|
|
|
sysctl_sysctl_oiddescr(SYSCTL_HANDLER_ARGS)
|
|
|
|
{
|
|
|
|
struct sysctl_oid *oid;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
error = sysctl_find_oid(arg1, arg2, &oid, NULL, req);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
if (!oid->descr)
|
|
|
|
return (ENOENT);
|
|
|
|
error = SYSCTL_OUT(req, oid->descr, strlen(oid->descr) + 1);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
SYSCTL_NODE(_sysctl, 5, oiddescr, CTLFLAG_RD, sysctl_sysctl_oiddescr, "");
|
|
|
|
|
1995-12-04 16:48:58 +00:00
|
|
|
/*
|
|
|
|
* Default "handler" functions.
|
|
|
|
*/
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
/*
|
1998-12-27 18:03:29 +00:00
|
|
|
* Handle an int, signed or unsigned.
|
1995-11-12 19:52:09 +00:00
|
|
|
* Two cases:
|
|
|
|
* a variable: point arg1 at it.
|
|
|
|
* a constant: pass it in arg2.
|
|
|
|
*/
|
|
|
|
|
1995-10-28 13:07:28 +00:00
|
|
|
int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_handle_int(SYSCTL_HANDLER_ARGS)
|
1995-10-28 12:59:25 +00:00
|
|
|
{
|
1995-11-12 19:52:09 +00:00
|
|
|
int error = 0;
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
if (arg1)
|
|
|
|
error = SYSCTL_OUT(req, arg1, sizeof(int));
|
1996-12-15 14:38:46 +00:00
|
|
|
else
|
1995-11-12 19:52:09 +00:00
|
|
|
error = SYSCTL_OUT(req, &arg2, sizeof(int));
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
if (!arg1)
|
|
|
|
error = EPERM;
|
|
|
|
else
|
|
|
|
error = SYSCTL_IN(req, arg1, sizeof(int));
|
|
|
|
return (error);
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
|
|
|
|
1998-08-24 08:39:39 +00:00
|
|
|
/*
|
1999-03-30 09:00:45 +00:00
|
|
|
* Handle a long, signed or unsigned. arg1 points to it.
|
1998-08-24 08:39:39 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_handle_long(SYSCTL_HANDLER_ARGS)
|
1998-08-24 08:39:39 +00:00
|
|
|
{
|
|
|
|
int error = 0;
|
|
|
|
|
1999-03-30 09:00:45 +00:00
|
|
|
if (!arg1)
|
|
|
|
return (EINVAL);
|
1998-12-27 18:03:29 +00:00
|
|
|
error = SYSCTL_OUT(req, arg1, sizeof(long));
|
1998-08-24 08:39:39 +00:00
|
|
|
|
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
|
|
|
|
1999-03-30 09:00:45 +00:00
|
|
|
error = SYSCTL_IN(req, arg1, sizeof(long));
|
1998-08-24 08:39:39 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
/*
|
|
|
|
* Handle our generic '\0' terminated 'C' string.
|
|
|
|
* Two cases:
|
|
|
|
* a variable string: point arg1 at it, arg2 is max length.
|
|
|
|
* a constant string: point arg1 at it, arg2 is zero.
|
|
|
|
*/
|
|
|
|
|
1995-10-28 13:07:28 +00:00
|
|
|
int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_handle_string(SYSCTL_HANDLER_ARGS)
|
1995-10-28 12:59:25 +00:00
|
|
|
{
|
1995-11-12 19:52:09 +00:00
|
|
|
int error=0;
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-14 20:43:29 +00:00
|
|
|
error = SYSCTL_OUT(req, arg1, strlen((char *)arg1)+1);
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1999-03-30 09:00:45 +00:00
|
|
|
if (error || !req->newptr)
|
1995-11-12 19:52:09 +00:00
|
|
|
return (error);
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1999-03-30 09:00:45 +00:00
|
|
|
if ((req->newlen - req->newidx) >= arg2) {
|
|
|
|
error = EINVAL;
|
1995-11-12 19:52:09 +00:00
|
|
|
} else {
|
|
|
|
arg2 = (req->newlen - req->newidx);
|
|
|
|
error = SYSCTL_IN(req, arg1, arg2);
|
|
|
|
((char *)arg1)[arg2] = '\0';
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
1995-11-06 16:18:52 +00:00
|
|
|
|
|
|
|
return (error);
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
/*
|
|
|
|
* Handle any kind of opaque data.
|
|
|
|
* arg1 points to it, arg2 is the size.
|
|
|
|
*/
|
|
|
|
|
1995-10-28 13:07:28 +00:00
|
|
|
int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_handle_opaque(SYSCTL_HANDLER_ARGS)
|
1995-10-28 12:59:25 +00:00
|
|
|
{
|
1995-11-12 19:52:09 +00:00
|
|
|
int error;
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
error = SYSCTL_OUT(req, arg1, arg2);
|
|
|
|
|
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
error = SYSCTL_IN(req, arg1, arg2);
|
|
|
|
|
|
|
|
return (error);
|
|
|
|
}
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
/*
|
|
|
|
* Transfer functions to/from kernel space.
|
|
|
|
* XXX: rather untested at this point
|
|
|
|
*/
|
|
|
|
static int
|
1998-08-24 08:39:39 +00:00
|
|
|
sysctl_old_kernel(struct sysctl_req *req, const void *p, size_t l)
|
1995-11-12 19:52:09 +00:00
|
|
|
{
|
1998-08-24 08:39:39 +00:00
|
|
|
size_t i = 0;
|
1995-11-13 13:54:09 +00:00
|
|
|
|
|
|
|
if (req->oldptr) {
|
1998-08-24 08:39:39 +00:00
|
|
|
i = l;
|
2001-03-08 01:20:43 +00:00
|
|
|
if (req->oldlen <= req->oldidx)
|
|
|
|
i = 0;
|
|
|
|
else
|
|
|
|
if (i > req->oldlen - req->oldidx)
|
|
|
|
i = req->oldlen - req->oldidx;
|
1995-11-13 13:54:09 +00:00
|
|
|
if (i > 0)
|
1996-08-31 14:48:13 +00:00
|
|
|
bcopy(p, (char *)req->oldptr + req->oldidx, i);
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
1995-11-13 13:54:09 +00:00
|
|
|
req->oldidx += l;
|
1996-06-10 16:23:42 +00:00
|
|
|
if (req->oldptr && i != l)
|
1995-11-12 19:52:09 +00:00
|
|
|
return (ENOMEM);
|
1995-11-13 13:54:09 +00:00
|
|
|
return (0);
|
1995-11-12 19:52:09 +00:00
|
|
|
}
|
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
static int
|
1998-08-24 08:39:39 +00:00
|
|
|
sysctl_new_kernel(struct sysctl_req *req, void *p, size_t l)
|
1995-11-12 19:52:09 +00:00
|
|
|
{
|
1995-11-13 13:54:09 +00:00
|
|
|
if (!req->newptr)
|
|
|
|
return 0;
|
|
|
|
if (req->newlen - req->newidx < l)
|
1995-11-12 19:52:09 +00:00
|
|
|
return (EINVAL);
|
1996-08-31 14:48:13 +00:00
|
|
|
bcopy((char *)req->newptr + req->newidx, p, l);
|
1995-11-12 19:52:09 +00:00
|
|
|
req->newidx += l;
|
1995-11-06 16:18:52 +00:00
|
|
|
return (0);
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
|
|
|
|
1996-06-10 16:23:42 +00:00
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
kernel_sysctl(struct thread *td, int *name, u_int namelen, void *old,
|
2001-05-19 05:45:55 +00:00
|
|
|
size_t *oldlenp, void *new, size_t newlen, size_t *retval)
|
1996-06-10 16:23:42 +00:00
|
|
|
{
|
|
|
|
int error = 0;
|
|
|
|
struct sysctl_req req;
|
|
|
|
|
|
|
|
bzero(&req, sizeof req);
|
|
|
|
|
2001-11-08 02:13:18 +00:00
|
|
|
req.td = td;
|
1996-06-10 16:23:42 +00:00
|
|
|
|
|
|
|
if (oldlenp) {
|
|
|
|
req.oldlen = *oldlenp;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (old) {
|
|
|
|
req.oldptr= old;
|
|
|
|
}
|
|
|
|
|
2001-06-03 04:58:51 +00:00
|
|
|
if (new != NULL) {
|
1996-06-10 16:23:42 +00:00
|
|
|
req.newlen = newlen;
|
|
|
|
req.newptr = new;
|
|
|
|
}
|
|
|
|
|
|
|
|
req.oldfunc = sysctl_old_kernel;
|
|
|
|
req.newfunc = sysctl_new_kernel;
|
|
|
|
req.lock = 1;
|
|
|
|
|
2002-04-02 05:50:07 +00:00
|
|
|
SYSCTL_LOCK();
|
1996-06-10 16:23:42 +00:00
|
|
|
|
|
|
|
error = sysctl_root(0, name, namelen, &req);
|
|
|
|
|
|
|
|
if (req.lock == 2)
|
2000-03-13 10:47:24 +00:00
|
|
|
vsunlock(req.oldptr, req.oldlen);
|
1996-06-10 16:23:42 +00:00
|
|
|
|
2002-04-02 05:50:07 +00:00
|
|
|
SYSCTL_UNLOCK();
|
1996-06-10 16:23:42 +00:00
|
|
|
|
|
|
|
if (error && error != ENOMEM)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
if (retval) {
|
|
|
|
if (req.oldptr && req.oldidx > req.oldlen)
|
|
|
|
*retval = req.oldlen;
|
|
|
|
else
|
|
|
|
*retval = req.oldidx;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2001-05-19 05:45:55 +00:00
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
kernel_sysctlbyname(struct thread *td, char *name, void *old, size_t *oldlenp,
|
2001-05-19 05:45:55 +00:00
|
|
|
void *new, size_t newlen, size_t *retval)
|
|
|
|
{
|
|
|
|
int oid[CTL_MAXNAME];
|
2001-06-22 19:54:38 +00:00
|
|
|
size_t oidlen, plen;
|
|
|
|
int error;
|
2001-05-19 05:45:55 +00:00
|
|
|
|
|
|
|
oid[0] = 0; /* sysctl internal magic */
|
|
|
|
oid[1] = 3; /* name2oid */
|
|
|
|
oidlen = sizeof(oid);
|
|
|
|
|
2001-09-12 08:38:13 +00:00
|
|
|
error = kernel_sysctl(td, oid, 2, oid, &oidlen,
|
2001-05-19 05:45:55 +00:00
|
|
|
(void *)name, strlen(name), &plen);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
2001-09-12 08:38:13 +00:00
|
|
|
error = kernel_sysctl(td, oid, plen / sizeof(int), old, oldlenp,
|
2001-05-19 05:45:55 +00:00
|
|
|
new, newlen, retval);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
/*
|
|
|
|
* Transfer function to/from user space.
|
|
|
|
*/
|
|
|
|
static int
|
1998-08-24 08:39:39 +00:00
|
|
|
sysctl_old_user(struct sysctl_req *req, const void *p, size_t l)
|
1995-11-12 19:52:09 +00:00
|
|
|
{
|
1998-08-24 08:39:39 +00:00
|
|
|
int error = 0;
|
|
|
|
size_t i = 0;
|
1995-11-12 19:52:09 +00:00
|
|
|
|
1995-11-20 12:42:39 +00:00
|
|
|
if (req->lock == 1 && req->oldptr) {
|
|
|
|
vslock(req->oldptr, req->oldlen);
|
|
|
|
req->lock = 2;
|
|
|
|
}
|
1995-11-13 13:54:09 +00:00
|
|
|
if (req->oldptr) {
|
1998-08-24 08:39:39 +00:00
|
|
|
i = l;
|
2001-03-08 01:20:43 +00:00
|
|
|
if (req->oldlen <= req->oldidx)
|
|
|
|
i = 0;
|
|
|
|
else
|
|
|
|
if (i > req->oldlen - req->oldidx)
|
|
|
|
i = req->oldlen - req->oldidx;
|
1995-11-13 13:54:09 +00:00
|
|
|
if (i > 0)
|
1996-08-31 14:48:13 +00:00
|
|
|
error = copyout(p, (char *)req->oldptr + req->oldidx,
|
|
|
|
i);
|
1995-11-13 13:54:09 +00:00
|
|
|
}
|
|
|
|
req->oldidx += l;
|
1995-11-12 19:52:09 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
1995-11-13 13:54:09 +00:00
|
|
|
if (req->oldptr && i < l)
|
1995-11-12 19:52:09 +00:00
|
|
|
return (ENOMEM);
|
1995-11-13 13:54:09 +00:00
|
|
|
return (0);
|
1995-11-12 19:52:09 +00:00
|
|
|
}
|
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
static int
|
1998-08-24 08:39:39 +00:00
|
|
|
sysctl_new_user(struct sysctl_req *req, void *p, size_t l)
|
1995-11-12 19:52:09 +00:00
|
|
|
{
|
1995-11-14 09:26:17 +00:00
|
|
|
int error;
|
1995-11-13 13:54:09 +00:00
|
|
|
|
|
|
|
if (!req->newptr)
|
|
|
|
return 0;
|
|
|
|
if (req->newlen - req->newidx < l)
|
1995-11-12 19:52:09 +00:00
|
|
|
return (EINVAL);
|
1996-08-31 14:48:13 +00:00
|
|
|
error = copyin((char *)req->newptr + req->newidx, p, l);
|
1995-11-12 19:52:09 +00:00
|
|
|
req->newidx += l;
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1995-11-06 16:18:52 +00:00
|
|
|
int
|
1999-12-01 02:25:19 +00:00
|
|
|
sysctl_find_oid(int *name, u_int namelen, struct sysctl_oid **noid,
|
|
|
|
int *nindx, struct sysctl_req *req)
|
1995-11-06 16:18:52 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid *oid;
|
1999-12-01 02:25:19 +00:00
|
|
|
int indx;
|
1995-11-06 16:18:52 +00:00
|
|
|
|
1999-12-01 02:25:19 +00:00
|
|
|
oid = SLIST_FIRST(&sysctl__children);
|
1995-11-06 16:18:52 +00:00
|
|
|
indx = 0;
|
1999-02-16 10:49:55 +00:00
|
|
|
while (oid && indx < CTL_MAXNAME) {
|
|
|
|
if (oid->oid_number == name[indx]) {
|
1995-11-06 16:18:52 +00:00
|
|
|
indx++;
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oid->oid_kind & CTLFLAG_NOLOCK)
|
1995-11-20 12:42:39 +00:00
|
|
|
req->lock = 0;
|
1999-02-16 10:49:55 +00:00
|
|
|
if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
1999-12-01 02:25:19 +00:00
|
|
|
if (oid->oid_handler != NULL ||
|
|
|
|
indx == namelen) {
|
|
|
|
*noid = oid;
|
|
|
|
if (nindx != NULL)
|
|
|
|
*nindx = indx;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
oid = SLIST_FIRST(
|
|
|
|
(struct sysctl_oid_list *)oid->oid_arg1);
|
|
|
|
} else if (indx == namelen) {
|
|
|
|
*noid = oid;
|
|
|
|
if (nindx != NULL)
|
|
|
|
*nindx = indx;
|
|
|
|
return (0);
|
1995-11-06 16:18:52 +00:00
|
|
|
} else {
|
1999-12-01 02:25:19 +00:00
|
|
|
return (ENOTDIR);
|
1995-11-06 16:18:52 +00:00
|
|
|
}
|
|
|
|
} else {
|
1999-02-16 10:49:55 +00:00
|
|
|
oid = SLIST_NEXT(oid, oid_link);
|
1995-11-06 16:18:52 +00:00
|
|
|
}
|
|
|
|
}
|
1999-12-01 02:25:19 +00:00
|
|
|
return (ENOENT);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Traverse our tree, and find the right node, execute whatever it points
|
|
|
|
* to, and return the resulting error code.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_root(SYSCTL_HANDLER_ARGS)
|
1999-12-01 02:25:19 +00:00
|
|
|
{
|
|
|
|
struct sysctl_oid *oid;
|
|
|
|
int error, indx;
|
|
|
|
|
|
|
|
error = sysctl_find_oid(arg1, arg2, &oid, &indx, req);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
/*
|
|
|
|
* You can't call a sysctl when it's a node, but has
|
|
|
|
* no handler. Inform the user that it's a node.
|
|
|
|
* The indx may or may not be the same as namelen.
|
|
|
|
*/
|
|
|
|
if (oid->oid_handler == NULL)
|
|
|
|
return (EISDIR);
|
|
|
|
}
|
|
|
|
|
2001-09-26 19:51:25 +00:00
|
|
|
/* Is this sysctl writable? */
|
|
|
|
if (req->newptr && !(oid->oid_kind & CTLFLAG_WR))
|
1995-11-06 16:18:52 +00:00
|
|
|
return (EPERM);
|
|
|
|
|
2002-03-22 14:58:27 +00:00
|
|
|
KASSERT(req->td != NULL, ("sysctl_root(): req->td == NULL"));
|
|
|
|
|
2001-09-26 19:51:25 +00:00
|
|
|
/* Is this sysctl sensitive to securelevels? */
|
|
|
|
if (req->newptr && (oid->oid_kind & CTLFLAG_SECURE)) {
|
2002-03-22 14:58:27 +00:00
|
|
|
error = securelevel_gt(req->td->td_ucred, 0);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
2001-09-26 19:51:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Is this sysctl writable by only privileged users? */
|
|
|
|
if (req->newptr && !(oid->oid_kind & CTLFLAG_ANYBODY)) {
|
2002-03-22 14:58:27 +00:00
|
|
|
int flags;
|
|
|
|
|
|
|
|
if (oid->oid_kind & CTLFLAG_PRISON)
|
|
|
|
flags = PRISON_ROOT;
|
|
|
|
else
|
|
|
|
flags = 0;
|
2002-04-01 21:31:13 +00:00
|
|
|
error = suser_cred(req->td->td_ucred, flags);
|
2002-03-22 14:58:27 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
2001-09-26 19:51:25 +00:00
|
|
|
}
|
1995-12-17 21:11:22 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (!oid->oid_handler)
|
1995-11-06 16:18:52 +00:00
|
|
|
return EINVAL;
|
|
|
|
|
1999-12-01 02:25:19 +00:00
|
|
|
if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE)
|
|
|
|
error = oid->oid_handler(oid, (int *)arg1 + indx, arg2 - indx,
|
|
|
|
req);
|
|
|
|
else
|
|
|
|
error = oid->oid_handler(oid, oid->oid_arg1, oid->oid_arg2,
|
|
|
|
req);
|
|
|
|
return (error);
|
1995-11-06 16:18:52 +00:00
|
|
|
}
|
|
|
|
|
1995-11-12 06:43:28 +00:00
|
|
|
#ifndef _SYS_SYSPROTO_H_
|
1995-11-09 20:22:12 +00:00
|
|
|
struct sysctl_args {
|
|
|
|
int *name;
|
|
|
|
u_int namelen;
|
|
|
|
void *old;
|
|
|
|
size_t *oldlenp;
|
|
|
|
void *new;
|
|
|
|
size_t newlen;
|
|
|
|
};
|
1995-11-12 06:43:28 +00:00
|
|
|
#endif
|
1995-11-09 20:22:12 +00:00
|
|
|
|
2001-09-01 18:19:21 +00:00
|
|
|
/*
|
|
|
|
* MPSAFE
|
|
|
|
*/
|
1994-05-24 10:09:53 +00:00
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
__sysctl(struct thread *td, struct sysctl_args *uap)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2001-09-01 18:19:21 +00:00
|
|
|
int error, name[CTL_MAXNAME];
|
1998-08-24 08:39:39 +00:00
|
|
|
size_t j;
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
if (uap->namelen > CTL_MAXNAME || uap->namelen < 2)
|
|
|
|
return (EINVAL);
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1994-10-02 17:35:40 +00:00
|
|
|
error = copyin(uap->name, &name, uap->namelen * sizeof(int));
|
|
|
|
if (error)
|
1994-05-24 10:09:53 +00:00
|
|
|
return (error);
|
|
|
|
|
2001-09-01 18:19:21 +00:00
|
|
|
mtx_lock(&Giant);
|
|
|
|
|
2001-09-12 08:38:13 +00:00
|
|
|
error = userland_sysctl(td, name, uap->namelen,
|
1995-11-09 20:22:12 +00:00
|
|
|
uap->old, uap->oldlenp, 0,
|
1995-11-13 13:54:09 +00:00
|
|
|
uap->new, uap->newlen, &j);
|
|
|
|
if (error && error != ENOMEM)
|
2001-09-01 18:19:21 +00:00
|
|
|
goto done2;
|
1995-11-13 13:54:09 +00:00
|
|
|
if (uap->oldlenp) {
|
2001-09-01 18:19:21 +00:00
|
|
|
int i = copyout(&j, uap->oldlenp, sizeof(j));
|
1995-11-13 13:54:09 +00:00
|
|
|
if (i)
|
2001-09-01 18:19:21 +00:00
|
|
|
error = i;
|
1995-11-13 13:54:09 +00:00
|
|
|
}
|
2001-09-01 18:19:21 +00:00
|
|
|
done2:
|
|
|
|
mtx_unlock(&Giant);
|
1995-11-13 13:54:09 +00:00
|
|
|
return (error);
|
1995-11-09 20:22:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This is used from various compatibility syscalls too. That's why name
|
|
|
|
* must be in kernel space.
|
|
|
|
*/
|
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
userland_sysctl(struct thread *td, int *name, u_int namelen, void *old,
|
2001-07-25 17:13:58 +00:00
|
|
|
size_t *oldlenp, int inkernel, void *new, size_t newlen, size_t *retval)
|
1995-11-09 20:22:12 +00:00
|
|
|
{
|
1995-11-20 12:42:39 +00:00
|
|
|
int error = 0;
|
1996-06-06 17:17:54 +00:00
|
|
|
struct sysctl_req req, req2;
|
1995-11-12 19:52:09 +00:00
|
|
|
|
|
|
|
bzero(&req, sizeof req);
|
1995-11-09 20:22:12 +00:00
|
|
|
|
2001-11-08 02:13:18 +00:00
|
|
|
req.td = td;
|
1995-11-14 09:26:17 +00:00
|
|
|
|
1995-11-09 20:22:12 +00:00
|
|
|
if (oldlenp) {
|
|
|
|
if (inkernel) {
|
1995-11-12 19:52:09 +00:00
|
|
|
req.oldlen = *oldlenp;
|
1995-11-09 20:22:12 +00:00
|
|
|
} else {
|
1995-11-13 13:54:09 +00:00
|
|
|
error = copyin(oldlenp, &req.oldlen, sizeof(*oldlenp));
|
1995-11-09 20:22:12 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
if (old) {
|
1999-10-30 06:32:05 +00:00
|
|
|
if (!useracc(old, req.oldlen, VM_PROT_WRITE))
|
1995-11-12 19:52:09 +00:00
|
|
|
return (EFAULT);
|
|
|
|
req.oldptr= old;
|
|
|
|
}
|
1995-11-06 16:18:52 +00:00
|
|
|
|
2001-06-03 04:58:51 +00:00
|
|
|
if (new != NULL) {
|
1999-10-30 06:32:05 +00:00
|
|
|
if (!useracc(new, req.newlen, VM_PROT_READ))
|
1995-11-12 19:52:09 +00:00
|
|
|
return (EFAULT);
|
|
|
|
req.newlen = newlen;
|
|
|
|
req.newptr = new;
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
req.oldfunc = sysctl_old_user;
|
|
|
|
req.newfunc = sysctl_new_user;
|
1995-11-20 12:42:39 +00:00
|
|
|
req.lock = 1;
|
|
|
|
|
2002-04-02 05:50:07 +00:00
|
|
|
SYSCTL_LOCK();
|
1995-11-12 19:52:09 +00:00
|
|
|
|
1996-06-06 17:17:54 +00:00
|
|
|
do {
|
|
|
|
req2 = req;
|
|
|
|
error = sysctl_root(0, name, namelen, &req2);
|
|
|
|
} while (error == EAGAIN);
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1996-06-06 17:17:54 +00:00
|
|
|
req = req2;
|
1995-11-20 12:42:39 +00:00
|
|
|
if (req.lock == 2)
|
2000-03-13 10:47:24 +00:00
|
|
|
vsunlock(req.oldptr, req.oldlen);
|
1995-11-20 12:42:39 +00:00
|
|
|
|
2002-04-02 05:50:07 +00:00
|
|
|
SYSCTL_UNLOCK();
|
1995-11-20 12:42:39 +00:00
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
if (error && error != ENOMEM)
|
1995-11-06 16:18:52 +00:00
|
|
|
return (error);
|
1995-11-13 13:54:09 +00:00
|
|
|
|
|
|
|
if (retval) {
|
|
|
|
if (req.oldptr && req.oldidx > req.oldlen)
|
|
|
|
*retval = req.oldlen;
|
|
|
|
else
|
|
|
|
*retval = req.oldidx;
|
1995-11-06 16:18:52 +00:00
|
|
|
}
|
1995-11-13 13:54:09 +00:00
|
|
|
return (error);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef COMPAT_43
|
|
|
|
#include <sys/socket.h>
|
1996-04-07 13:03:06 +00:00
|
|
|
#include <vm/vm_param.h>
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
#define KINFO_PROC (0<<8)
|
|
|
|
#define KINFO_RT (1<<8)
|
|
|
|
#define KINFO_VNODE (2<<8)
|
|
|
|
#define KINFO_FILE (3<<8)
|
|
|
|
#define KINFO_METER (4<<8)
|
|
|
|
#define KINFO_LOADAVG (5<<8)
|
|
|
|
#define KINFO_CLOCKRATE (6<<8)
|
|
|
|
|
1995-07-09 02:49:30 +00:00
|
|
|
/* Non-standard BSDI extension - only present on their 4.3 net-2 releases */
|
|
|
|
#define KINFO_BSDI_SYSINFO (101<<8)
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX this is bloat, but I hope it's better here than on the potentially
|
|
|
|
* limited kernel stack... -Peter
|
|
|
|
*/
|
|
|
|
|
1995-12-14 08:32:45 +00:00
|
|
|
static struct {
|
1995-07-09 02:49:30 +00:00
|
|
|
int bsdi_machine; /* "i386" on BSD/386 */
|
|
|
|
/* ^^^ this is an offset to the string, relative to the struct start */
|
|
|
|
char *pad0;
|
|
|
|
long pad1;
|
|
|
|
long pad2;
|
|
|
|
long pad3;
|
|
|
|
u_long pad4;
|
|
|
|
u_long pad5;
|
|
|
|
u_long pad6;
|
|
|
|
|
|
|
|
int bsdi_ostype; /* "BSD/386" on BSD/386 */
|
|
|
|
int bsdi_osrelease; /* "1.1" on BSD/386 */
|
|
|
|
long pad7;
|
|
|
|
long pad8;
|
|
|
|
char *pad9;
|
|
|
|
|
|
|
|
long pad10;
|
|
|
|
long pad11;
|
|
|
|
int pad12;
|
|
|
|
long pad13;
|
|
|
|
quad_t pad14;
|
|
|
|
long pad15;
|
|
|
|
|
|
|
|
struct timeval pad16;
|
|
|
|
/* we dont set this, because BSDI's uname used gethostname() instead */
|
|
|
|
int bsdi_hostname; /* hostname on BSD/386 */
|
|
|
|
|
|
|
|
/* the actual string data is appended here */
|
|
|
|
|
|
|
|
} bsdi_si;
|
|
|
|
/*
|
|
|
|
* this data is appended to the end of the bsdi_si structure during copyout.
|
|
|
|
* The "char *" offsets are relative to the base of the bsdi_si struct.
|
|
|
|
* This contains "FreeBSD\02.0-BUILT-nnnnnn\0i386\0", and these strings
|
|
|
|
* should not exceed the length of the buffer here... (or else!! :-)
|
|
|
|
*/
|
1995-12-14 08:32:45 +00:00
|
|
|
static char bsdi_strings[80]; /* It had better be less than this! */
|
1995-07-09 02:49:30 +00:00
|
|
|
|
1995-11-12 06:43:28 +00:00
|
|
|
#ifndef _SYS_SYSPROTO_H_
|
1994-05-24 10:09:53 +00:00
|
|
|
struct getkerninfo_args {
|
|
|
|
int op;
|
|
|
|
char *where;
|
1998-09-05 14:30:11 +00:00
|
|
|
size_t *size;
|
1994-05-24 10:09:53 +00:00
|
|
|
int arg;
|
|
|
|
};
|
1995-11-12 06:43:28 +00:00
|
|
|
#endif
|
1994-05-24 10:09:53 +00:00
|
|
|
|
2001-09-01 18:19:21 +00:00
|
|
|
/*
|
|
|
|
* MPSAFE
|
|
|
|
*/
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
ogetkerninfo(struct thread *td, struct getkerninfo_args *uap)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
1995-11-09 20:22:12 +00:00
|
|
|
int error, name[6];
|
1998-08-24 08:39:39 +00:00
|
|
|
size_t size;
|
2001-08-29 11:47:53 +00:00
|
|
|
u_int needed = 0;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
2001-09-01 18:19:21 +00:00
|
|
|
mtx_lock(&Giant);
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
switch (uap->op & 0xff00) {
|
|
|
|
|
|
|
|
case KINFO_RT:
|
1995-11-09 20:22:12 +00:00
|
|
|
name[0] = CTL_NET;
|
|
|
|
name[1] = PF_ROUTE;
|
|
|
|
name[2] = 0;
|
|
|
|
name[3] = (uap->op & 0xff0000) >> 16;
|
|
|
|
name[4] = uap->op & 0xff;
|
|
|
|
name[5] = uap->arg;
|
2001-09-12 08:38:13 +00:00
|
|
|
error = userland_sysctl(td, name, 6, uap->where, uap->size,
|
1995-11-20 12:42:39 +00:00
|
|
|
0, 0, 0, &size);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case KINFO_VNODE:
|
1995-11-09 20:22:12 +00:00
|
|
|
name[0] = CTL_KERN;
|
|
|
|
name[1] = KERN_VNODE;
|
2001-09-12 08:38:13 +00:00
|
|
|
error = userland_sysctl(td, name, 2, uap->where, uap->size,
|
1995-11-20 12:42:39 +00:00
|
|
|
0, 0, 0, &size);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case KINFO_PROC:
|
1995-11-09 20:22:12 +00:00
|
|
|
name[0] = CTL_KERN;
|
|
|
|
name[1] = KERN_PROC;
|
|
|
|
name[2] = uap->op & 0xff;
|
|
|
|
name[3] = uap->arg;
|
2001-09-12 08:38:13 +00:00
|
|
|
error = userland_sysctl(td, name, 4, uap->where, uap->size,
|
1995-11-20 12:42:39 +00:00
|
|
|
0, 0, 0, &size);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case KINFO_FILE:
|
1995-11-09 20:22:12 +00:00
|
|
|
name[0] = CTL_KERN;
|
|
|
|
name[1] = KERN_FILE;
|
2001-09-12 08:38:13 +00:00
|
|
|
error = userland_sysctl(td, name, 2, uap->where, uap->size,
|
1995-11-20 12:42:39 +00:00
|
|
|
0, 0, 0, &size);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case KINFO_METER:
|
1995-11-09 20:22:12 +00:00
|
|
|
name[0] = CTL_VM;
|
|
|
|
name[1] = VM_METER;
|
2001-09-12 08:38:13 +00:00
|
|
|
error = userland_sysctl(td, name, 2, uap->where, uap->size,
|
1995-11-20 12:42:39 +00:00
|
|
|
0, 0, 0, &size);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case KINFO_LOADAVG:
|
1995-11-09 20:22:12 +00:00
|
|
|
name[0] = CTL_VM;
|
|
|
|
name[1] = VM_LOADAVG;
|
2001-09-12 08:38:13 +00:00
|
|
|
error = userland_sysctl(td, name, 2, uap->where, uap->size,
|
1995-11-20 12:42:39 +00:00
|
|
|
0, 0, 0, &size);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case KINFO_CLOCKRATE:
|
1995-11-09 20:22:12 +00:00
|
|
|
name[0] = CTL_KERN;
|
|
|
|
name[1] = KERN_CLOCKRATE;
|
2001-09-12 08:38:13 +00:00
|
|
|
error = userland_sysctl(td, name, 2, uap->where, uap->size,
|
1995-11-20 12:42:39 +00:00
|
|
|
0, 0, 0, &size);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
1995-07-09 02:49:30 +00:00
|
|
|
case KINFO_BSDI_SYSINFO: {
|
|
|
|
/*
|
|
|
|
* this is pretty crude, but it's just enough for uname()
|
|
|
|
* from BSDI's 1.x libc to work.
|
|
|
|
*
|
2001-08-29 11:47:53 +00:00
|
|
|
* *size gives the size of the buffer before the call, and
|
|
|
|
* the amount of data copied after a successful call.
|
|
|
|
* If successful, the return value is the amount of data
|
|
|
|
* available, which can be larger than *size.
|
|
|
|
*
|
|
|
|
* BSDI's 2.x product apparently fails with ENOMEM if *size
|
|
|
|
* is too small.
|
1995-07-09 02:49:30 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
u_int left;
|
|
|
|
char *s;
|
|
|
|
|
|
|
|
bzero((char *)&bsdi_si, sizeof(bsdi_si));
|
|
|
|
bzero(bsdi_strings, sizeof(bsdi_strings));
|
|
|
|
|
|
|
|
s = bsdi_strings;
|
|
|
|
|
|
|
|
bsdi_si.bsdi_ostype = (s - bsdi_strings) + sizeof(bsdi_si);
|
|
|
|
strcpy(s, ostype);
|
|
|
|
s += strlen(s) + 1;
|
|
|
|
|
|
|
|
bsdi_si.bsdi_osrelease = (s - bsdi_strings) + sizeof(bsdi_si);
|
|
|
|
strcpy(s, osrelease);
|
|
|
|
s += strlen(s) + 1;
|
|
|
|
|
|
|
|
bsdi_si.bsdi_machine = (s - bsdi_strings) + sizeof(bsdi_si);
|
|
|
|
strcpy(s, machine);
|
|
|
|
s += strlen(s) + 1;
|
|
|
|
|
|
|
|
needed = sizeof(bsdi_si) + (s - bsdi_strings);
|
|
|
|
|
2001-08-29 11:47:53 +00:00
|
|
|
if ((uap->where == NULL) || (uap->size == NULL)) {
|
1995-07-09 02:49:30 +00:00
|
|
|
/* process is asking how much buffer to supply.. */
|
|
|
|
size = needed;
|
|
|
|
error = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2001-08-29 11:47:53 +00:00
|
|
|
if ((error = copyin(uap->size, &size, sizeof(size))) != 0)
|
|
|
|
break;
|
1995-07-09 02:49:30 +00:00
|
|
|
|
|
|
|
/* if too much buffer supplied, trim it down */
|
|
|
|
if (size > needed)
|
|
|
|
size = needed;
|
|
|
|
|
|
|
|
/* how much of the buffer is remaining */
|
|
|
|
left = size;
|
|
|
|
|
|
|
|
if ((error = copyout((char *)&bsdi_si, uap->where, left)) != 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* is there any point in continuing? */
|
|
|
|
if (left > sizeof(bsdi_si)) {
|
|
|
|
left -= sizeof(bsdi_si);
|
|
|
|
error = copyout(&bsdi_strings,
|
|
|
|
uap->where + sizeof(bsdi_si), left);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
default:
|
2001-09-01 18:19:21 +00:00
|
|
|
error = EOPNOTSUPP;
|
|
|
|
break;
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
2001-09-01 18:19:21 +00:00
|
|
|
if (error == 0) {
|
2001-09-12 08:38:13 +00:00
|
|
|
td->td_retval[0] = needed ? needed : size;
|
2001-09-01 18:19:21 +00:00
|
|
|
if (uap->size) {
|
2002-06-29 02:00:02 +00:00
|
|
|
error = copyout(&size, uap->size, sizeof(size));
|
2001-09-01 18:19:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
mtx_unlock(&Giant);
|
1994-05-24 10:09:53 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
#endif /* COMPAT_43 */
|