1994-05-24 10:09:53 +00:00
|
|
|
/*-
|
2017-11-20 19:43:44 +00:00
|
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
*
|
1994-05-24 10:09:53 +00:00
|
|
|
* Copyright (c) 1982, 1986, 1989, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to Berkeley by
|
|
|
|
* Mike Karels at Berkeley Software Design, Inc.
|
|
|
|
*
|
1995-12-04 16:48:58 +00:00
|
|
|
* Quite extensively rewritten by Poul-Henning Kamp of the FreeBSD
|
|
|
|
* project, to make these variables more userfriendly.
|
|
|
|
*
|
1994-05-24 10:09:53 +00:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
2016-09-15 13:16:20 +00:00
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
1994-05-24 10:09:53 +00:00
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* @(#)kern_sysctl.c 8.4 (Berkeley) 4/14/94
|
|
|
|
*/
|
|
|
|
|
2003-06-11 00:56:59 +00:00
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
2011-07-17 23:05:24 +00:00
|
|
|
#include "opt_capsicum.h"
|
2019-08-08 00:42:29 +00:00
|
|
|
#include "opt_ddb.h"
|
2009-03-11 21:48:36 +00:00
|
|
|
#include "opt_ktrace.h"
|
2020-01-06 19:47:59 +00:00
|
|
|
#include "opt_sysctl.h"
|
1997-12-16 17:40:42 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/param.h>
|
2010-11-29 18:18:07 +00:00
|
|
|
#include <sys/fail.h>
|
1999-06-27 11:44:22 +00:00
|
|
|
#include <sys/systm.h>
|
2014-03-16 10:55:57 +00:00
|
|
|
#include <sys/capsicum.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/kernel.h>
|
2019-08-08 00:42:29 +00:00
|
|
|
#include <sys/limits.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/sysctl.h>
|
1995-12-04 16:48:58 +00:00
|
|
|
#include <sys/malloc.h>
|
2006-11-06 13:42:10 +00:00
|
|
|
#include <sys/priv.h>
|
1995-12-07 12:48:31 +00:00
|
|
|
#include <sys/proc.h>
|
2009-06-17 15:01:01 +00:00
|
|
|
#include <sys/jail.h>
|
2019-08-08 01:37:41 +00:00
|
|
|
#include <sys/kdb.h>
|
2001-09-01 18:19:21 +00:00
|
|
|
#include <sys/lock.h>
|
|
|
|
#include <sys/mutex.h>
|
2015-09-15 23:06:56 +00:00
|
|
|
#include <sys/rmlock.h>
|
2010-09-16 16:13:12 +00:00
|
|
|
#include <sys/sbuf.h>
|
2002-04-02 04:20:38 +00:00
|
|
|
#include <sys/sx.h>
|
1996-04-07 13:03:06 +00:00
|
|
|
#include <sys/sysproto.h>
|
2008-12-12 12:06:28 +00:00
|
|
|
#include <sys/uio.h>
|
2009-03-11 21:48:36 +00:00
|
|
|
#ifdef KTRACE
|
|
|
|
#include <sys/ktrace.h>
|
|
|
|
#endif
|
2006-10-22 11:52:19 +00:00
|
|
|
|
2019-08-08 00:42:29 +00:00
|
|
|
#ifdef DDB
|
|
|
|
#include <ddb/ddb.h>
|
|
|
|
#include <ddb/db_lex.h>
|
|
|
|
#endif
|
|
|
|
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
#include <net/vnet.h>
|
|
|
|
|
2006-10-22 11:52:19 +00:00
|
|
|
#include <security/mac/mac_framework.h>
|
|
|
|
|
1995-12-05 21:51:45 +00:00
|
|
|
#include <vm/vm.h>
|
1995-12-07 12:48:31 +00:00
|
|
|
#include <vm/vm_extern.h>
|
1995-12-05 21:51:45 +00:00
|
|
|
|
1997-10-12 20:26:33 +00:00
|
|
|
static MALLOC_DEFINE(M_SYSCTL, "sysctl", "sysctl internal magic");
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
static MALLOC_DEFINE(M_SYSCTLOID, "sysctloid", "sysctl dynamic oids");
|
2002-07-28 21:06:14 +00:00
|
|
|
static MALLOC_DEFINE(M_SYSCTLTMP, "sysctltmp", "sysctl temp output buffer");
|
1997-10-11 18:31:40 +00:00
|
|
|
|
1995-11-20 12:42:39 +00:00
|
|
|
/*
|
2009-02-06 14:51:32 +00:00
|
|
|
* The sysctllock protects the MIB tree. It also protects sysctl
|
|
|
|
* contexts used with dynamic sysctls. The sysctl_register_oid() and
|
|
|
|
* sysctl_unregister_oid() routines require the sysctllock to already
|
2015-09-15 23:06:56 +00:00
|
|
|
* be held, so the sysctl_wlock() and sysctl_wunlock() routines are
|
2009-02-06 14:51:32 +00:00
|
|
|
* provided for the few places in the kernel which need to use that
|
|
|
|
* API rather than using the dynamic API. Use of the dynamic API is
|
|
|
|
* strongly encouraged for most code.
|
|
|
|
*
|
2009-05-14 22:01:32 +00:00
|
|
|
* The sysctlmemlock is used to limit the amount of user memory wired for
|
|
|
|
* sysctl requests. This is implemented by serializing any userland
|
|
|
|
* sysctl requests larger than a single page via an exclusive lock.
|
2020-02-06 12:45:58 +00:00
|
|
|
*
|
|
|
|
* The sysctlstringlock is used to protect concurrent access to writable
|
|
|
|
* string nodes in sysctl_handle_string().
|
1995-11-20 12:42:39 +00:00
|
|
|
*/
|
2015-09-15 23:06:56 +00:00
|
|
|
static struct rmlock sysctllock;
|
2017-09-27 01:27:43 +00:00
|
|
|
static struct sx __exclusive_cache_line sysctlmemlock;
|
2020-02-06 12:45:58 +00:00
|
|
|
static struct sx sysctlstringlock;
|
2002-04-02 04:20:38 +00:00
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
#define SYSCTL_WLOCK() rm_wlock(&sysctllock)
|
|
|
|
#define SYSCTL_WUNLOCK() rm_wunlock(&sysctllock)
|
|
|
|
#define SYSCTL_RLOCK(tracker) rm_rlock(&sysctllock, (tracker))
|
|
|
|
#define SYSCTL_RUNLOCK(tracker) rm_runlock(&sysctllock, (tracker))
|
|
|
|
#define SYSCTL_WLOCKED() rm_wowned(&sysctllock)
|
|
|
|
#define SYSCTL_ASSERT_LOCKED() rm_assert(&sysctllock, RA_LOCKED)
|
|
|
|
#define SYSCTL_ASSERT_WLOCKED() rm_assert(&sysctllock, RA_WLOCKED)
|
|
|
|
#define SYSCTL_ASSERT_RLOCKED() rm_assert(&sysctllock, RA_RLOCKED)
|
|
|
|
#define SYSCTL_INIT() rm_init_flags(&sysctllock, "sysctl lock", \
|
|
|
|
RM_SLEEPABLE)
|
2010-11-29 18:18:07 +00:00
|
|
|
#define SYSCTL_SLEEP(ch, wmesg, timo) \
|
2015-09-15 23:06:56 +00:00
|
|
|
rm_sleep(ch, &sysctllock, 0, wmesg, timo)
|
1995-11-20 12:42:39 +00:00
|
|
|
|
2000-07-04 11:25:35 +00:00
|
|
|
static int sysctl_root(SYSCTL_HANDLER_ARGS);
|
1995-11-20 12:42:39 +00:00
|
|
|
|
2014-06-28 03:56:17 +00:00
|
|
|
/* Root list */
|
|
|
|
struct sysctl_oid_list sysctl__children = SLIST_HEAD_INITIALIZER(&sysctl__children);
|
1995-11-08 08:48:36 +00:00
|
|
|
|
2009-02-06 14:51:32 +00:00
|
|
|
static int sysctl_remove_oid_locked(struct sysctl_oid *oidp, int del,
|
|
|
|
int recurse);
|
2014-06-28 03:56:17 +00:00
|
|
|
static int sysctl_old_kernel(struct sysctl_req *, const void *, size_t);
|
|
|
|
static int sysctl_new_kernel(struct sysctl_req *, void *, size_t);
|
2009-02-06 14:51:32 +00:00
|
|
|
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
static struct sysctl_oid *
|
|
|
|
sysctl_find_oidname(const char *name, struct sysctl_oid_list *list)
|
|
|
|
{
|
|
|
|
struct sysctl_oid *oidp;
|
|
|
|
|
2014-10-21 19:05:44 +00:00
|
|
|
SYSCTL_ASSERT_LOCKED();
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
SLIST_FOREACH(oidp, list, oid_link) {
|
|
|
|
if (strcmp(oidp->oid_name, name) == 0) {
|
|
|
|
return (oidp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return (NULL);
|
|
|
|
}
|
|
|
|
|
1995-12-04 16:48:58 +00:00
|
|
|
/*
|
|
|
|
* Initialization of the MIB tree.
|
|
|
|
*
|
1999-02-16 10:49:55 +00:00
|
|
|
* Order by number in each list.
|
1995-12-04 16:48:58 +00:00
|
|
|
*/
|
2009-02-06 14:51:32 +00:00
|
|
|
void
|
2015-09-15 23:06:56 +00:00
|
|
|
sysctl_wlock(void)
|
2009-02-06 14:51:32 +00:00
|
|
|
{
|
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WLOCK();
|
2009-02-06 14:51:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2015-09-15 23:06:56 +00:00
|
|
|
sysctl_wunlock(void)
|
2009-02-06 14:51:32 +00:00
|
|
|
{
|
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WUNLOCK();
|
2009-02-06 14:51:32 +00:00
|
|
|
}
|
1995-11-20 12:42:39 +00:00
|
|
|
|
2014-06-28 03:56:17 +00:00
|
|
|
static int
|
2015-11-07 18:26:32 +00:00
|
|
|
sysctl_root_handler_locked(struct sysctl_oid *oid, void *arg1, intmax_t arg2,
|
2015-09-15 23:06:56 +00:00
|
|
|
struct sysctl_req *req, struct rm_priotracker *tracker)
|
2014-06-28 03:56:17 +00:00
|
|
|
{
|
|
|
|
int error;
|
|
|
|
|
2014-12-28 19:24:01 +00:00
|
|
|
if (oid->oid_kind & CTLFLAG_DYN)
|
|
|
|
atomic_add_int(&oid->oid_running, 1);
|
2015-09-15 23:06:56 +00:00
|
|
|
|
|
|
|
if (tracker != NULL)
|
|
|
|
SYSCTL_RUNLOCK(tracker);
|
|
|
|
else
|
|
|
|
SYSCTL_WUNLOCK();
|
2014-06-28 03:56:17 +00:00
|
|
|
|
2020-02-06 12:45:58 +00:00
|
|
|
/*
|
|
|
|
* Treat set CTLFLAG_NEEDGIANT and unset CTLFLAG_MPSAFE flags the same,
|
|
|
|
* untill we're ready to remove all traces of Giant from sysctl(9).
|
|
|
|
*/
|
|
|
|
if ((oid->oid_kind & CTLFLAG_NEEDGIANT) ||
|
|
|
|
(!(oid->oid_kind & CTLFLAG_MPSAFE)))
|
2014-06-28 03:56:17 +00:00
|
|
|
mtx_lock(&Giant);
|
|
|
|
error = oid->oid_handler(oid, arg1, arg2, req);
|
2020-02-06 12:45:58 +00:00
|
|
|
if ((oid->oid_kind & CTLFLAG_NEEDGIANT) ||
|
|
|
|
(!(oid->oid_kind & CTLFLAG_MPSAFE)))
|
2014-06-28 03:56:17 +00:00
|
|
|
mtx_unlock(&Giant);
|
|
|
|
|
2016-01-26 01:15:18 +00:00
|
|
|
KFAIL_POINT_ERROR(_debug_fail_point, sysctl_running, error);
|
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
if (tracker != NULL)
|
|
|
|
SYSCTL_RLOCK(tracker);
|
|
|
|
else
|
|
|
|
SYSCTL_WLOCK();
|
|
|
|
|
2014-12-28 19:24:01 +00:00
|
|
|
if (oid->oid_kind & CTLFLAG_DYN) {
|
|
|
|
if (atomic_fetchadd_int(&oid->oid_running, -1) == 1 &&
|
|
|
|
(oid->oid_kind & CTLFLAG_DYING) != 0)
|
|
|
|
wakeup(&oid->oid_running);
|
|
|
|
}
|
2014-06-28 03:56:17 +00:00
|
|
|
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
sysctl_load_tunable_by_oid_locked(struct sysctl_oid *oidp)
|
|
|
|
{
|
|
|
|
struct sysctl_req req;
|
|
|
|
struct sysctl_oid *curr;
|
2014-07-05 06:12:48 +00:00
|
|
|
char *penv = NULL;
|
2018-02-02 12:42:46 +00:00
|
|
|
char path[96];
|
2014-06-28 03:56:17 +00:00
|
|
|
ssize_t rem = sizeof(path);
|
|
|
|
ssize_t len;
|
2018-06-20 20:04:20 +00:00
|
|
|
uint8_t data[512] __aligned(sizeof(uint64_t));
|
|
|
|
int size;
|
2014-06-28 03:56:17 +00:00
|
|
|
int error;
|
|
|
|
|
|
|
|
path[--rem] = 0;
|
|
|
|
|
|
|
|
for (curr = oidp; curr != NULL; curr = SYSCTL_PARENT(curr)) {
|
|
|
|
len = strlen(curr->oid_name);
|
|
|
|
rem -= len;
|
|
|
|
if (curr != oidp)
|
|
|
|
rem -= 1;
|
|
|
|
if (rem < 0) {
|
|
|
|
printf("OID path exceeds %d bytes\n", (int)sizeof(path));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
memcpy(path + rem, curr->oid_name, len);
|
|
|
|
if (curr != oidp)
|
|
|
|
path[rem + len] = '.';
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&req, 0, sizeof(req));
|
|
|
|
|
|
|
|
req.td = curthread;
|
|
|
|
req.oldfunc = sysctl_old_kernel;
|
|
|
|
req.newfunc = sysctl_new_kernel;
|
|
|
|
req.lock = REQ_UNWIRED;
|
|
|
|
|
|
|
|
switch (oidp->oid_kind & CTLTYPE) {
|
|
|
|
case CTLTYPE_INT:
|
2018-06-20 20:04:20 +00:00
|
|
|
if (getenv_array(path + rem, data, sizeof(data), &size,
|
|
|
|
sizeof(int), GETENV_SIGNED) == 0)
|
2014-07-05 06:12:48 +00:00
|
|
|
return;
|
2018-06-20 20:04:20 +00:00
|
|
|
req.newlen = size;
|
|
|
|
req.newptr = data;
|
2014-06-28 03:56:17 +00:00
|
|
|
break;
|
|
|
|
case CTLTYPE_UINT:
|
2018-06-20 20:04:20 +00:00
|
|
|
if (getenv_array(path + rem, data, sizeof(data), &size,
|
|
|
|
sizeof(int), GETENV_UNSIGNED) == 0)
|
2014-07-05 06:12:48 +00:00
|
|
|
return;
|
2018-06-20 20:04:20 +00:00
|
|
|
req.newlen = size;
|
|
|
|
req.newptr = data;
|
2014-06-28 03:56:17 +00:00
|
|
|
break;
|
|
|
|
case CTLTYPE_LONG:
|
2018-06-20 20:04:20 +00:00
|
|
|
if (getenv_array(path + rem, data, sizeof(data), &size,
|
|
|
|
sizeof(long), GETENV_SIGNED) == 0)
|
2014-07-05 06:12:48 +00:00
|
|
|
return;
|
2018-06-20 20:04:20 +00:00
|
|
|
req.newlen = size;
|
|
|
|
req.newptr = data;
|
2014-06-28 03:56:17 +00:00
|
|
|
break;
|
|
|
|
case CTLTYPE_ULONG:
|
2018-06-20 20:04:20 +00:00
|
|
|
if (getenv_array(path + rem, data, sizeof(data), &size,
|
|
|
|
sizeof(long), GETENV_UNSIGNED) == 0)
|
2014-07-05 06:12:48 +00:00
|
|
|
return;
|
2018-06-20 20:04:20 +00:00
|
|
|
req.newlen = size;
|
|
|
|
req.newptr = data;
|
2014-06-28 03:56:17 +00:00
|
|
|
break;
|
2015-11-07 18:26:32 +00:00
|
|
|
case CTLTYPE_S8:
|
2018-06-20 20:04:20 +00:00
|
|
|
if (getenv_array(path + rem, data, sizeof(data), &size,
|
|
|
|
sizeof(int8_t), GETENV_SIGNED) == 0)
|
2015-11-07 18:26:32 +00:00
|
|
|
return;
|
2018-06-20 20:04:20 +00:00
|
|
|
req.newlen = size;
|
|
|
|
req.newptr = data;
|
2015-11-07 18:26:32 +00:00
|
|
|
break;
|
|
|
|
case CTLTYPE_S16:
|
2018-06-20 20:04:20 +00:00
|
|
|
if (getenv_array(path + rem, data, sizeof(data), &size,
|
|
|
|
sizeof(int16_t), GETENV_SIGNED) == 0)
|
2015-11-07 18:26:32 +00:00
|
|
|
return;
|
2018-06-20 20:04:20 +00:00
|
|
|
req.newlen = size;
|
|
|
|
req.newptr = data;
|
2015-11-07 18:26:32 +00:00
|
|
|
break;
|
|
|
|
case CTLTYPE_S32:
|
2018-06-20 20:04:20 +00:00
|
|
|
if (getenv_array(path + rem, data, sizeof(data), &size,
|
|
|
|
sizeof(int32_t), GETENV_SIGNED) == 0)
|
2015-11-07 18:26:32 +00:00
|
|
|
return;
|
2018-06-20 20:04:20 +00:00
|
|
|
req.newlen = size;
|
|
|
|
req.newptr = data;
|
2015-11-07 18:26:32 +00:00
|
|
|
break;
|
2014-06-28 03:56:17 +00:00
|
|
|
case CTLTYPE_S64:
|
2018-06-20 20:04:20 +00:00
|
|
|
if (getenv_array(path + rem, data, sizeof(data), &size,
|
|
|
|
sizeof(int64_t), GETENV_SIGNED) == 0)
|
2014-07-05 06:12:48 +00:00
|
|
|
return;
|
2018-06-20 20:04:20 +00:00
|
|
|
req.newlen = size;
|
|
|
|
req.newptr = data;
|
2014-06-28 03:56:17 +00:00
|
|
|
break;
|
2015-11-07 18:26:32 +00:00
|
|
|
case CTLTYPE_U8:
|
2018-06-20 20:04:20 +00:00
|
|
|
if (getenv_array(path + rem, data, sizeof(data), &size,
|
|
|
|
sizeof(uint8_t), GETENV_UNSIGNED) == 0)
|
2015-11-07 18:26:32 +00:00
|
|
|
return;
|
2018-06-20 20:04:20 +00:00
|
|
|
req.newlen = size;
|
|
|
|
req.newptr = data;
|
2015-11-07 18:26:32 +00:00
|
|
|
break;
|
|
|
|
case CTLTYPE_U16:
|
2018-06-20 20:04:20 +00:00
|
|
|
if (getenv_array(path + rem, data, sizeof(data), &size,
|
|
|
|
sizeof(uint16_t), GETENV_UNSIGNED) == 0)
|
2015-11-07 18:26:32 +00:00
|
|
|
return;
|
2018-06-20 20:04:20 +00:00
|
|
|
req.newlen = size;
|
|
|
|
req.newptr = data;
|
2015-11-07 18:26:32 +00:00
|
|
|
break;
|
|
|
|
case CTLTYPE_U32:
|
2018-06-20 20:04:20 +00:00
|
|
|
if (getenv_array(path + rem, data, sizeof(data), &size,
|
|
|
|
sizeof(uint32_t), GETENV_UNSIGNED) == 0)
|
2015-11-07 18:26:32 +00:00
|
|
|
return;
|
2018-06-20 20:04:20 +00:00
|
|
|
req.newlen = size;
|
|
|
|
req.newptr = data;
|
2015-11-07 18:26:32 +00:00
|
|
|
break;
|
2014-06-28 03:56:17 +00:00
|
|
|
case CTLTYPE_U64:
|
2018-06-20 20:04:20 +00:00
|
|
|
if (getenv_array(path + rem, data, sizeof(data), &size,
|
|
|
|
sizeof(uint64_t), GETENV_UNSIGNED) == 0)
|
2014-07-05 06:12:48 +00:00
|
|
|
return;
|
2018-06-20 20:04:20 +00:00
|
|
|
req.newlen = size;
|
|
|
|
req.newptr = data;
|
2014-06-28 03:56:17 +00:00
|
|
|
break;
|
|
|
|
case CTLTYPE_STRING:
|
2014-10-16 18:04:43 +00:00
|
|
|
penv = kern_getenv(path + rem);
|
2014-07-05 06:12:48 +00:00
|
|
|
if (penv == NULL)
|
|
|
|
return;
|
2014-06-28 03:56:17 +00:00
|
|
|
req.newlen = strlen(penv);
|
|
|
|
req.newptr = penv;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
error = sysctl_root_handler_locked(oidp, oidp->oid_arg1,
|
2015-09-15 23:06:56 +00:00
|
|
|
oidp->oid_arg2, &req, NULL);
|
2014-10-23 22:42:56 +00:00
|
|
|
if (error != 0)
|
2015-03-24 16:37:19 +00:00
|
|
|
printf("Setting sysctl %s failed: %d\n", path + rem, error);
|
2014-10-23 22:42:56 +00:00
|
|
|
if (penv != NULL)
|
|
|
|
freeenv(penv);
|
2014-06-28 03:56:17 +00:00
|
|
|
}
|
|
|
|
|
2017-08-27 17:12:30 +00:00
|
|
|
/*
|
|
|
|
* Locate the path to a given oid. Returns the length of the resulting path,
|
|
|
|
* or -1 if the oid was not found. nodes must have room for CTL_MAXNAME
|
|
|
|
* elements and be NULL initialized.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
sysctl_search_oid(struct sysctl_oid **nodes, struct sysctl_oid *needle)
|
|
|
|
{
|
|
|
|
int indx;
|
|
|
|
|
|
|
|
SYSCTL_ASSERT_LOCKED();
|
|
|
|
indx = 0;
|
|
|
|
while (indx < CTL_MAXNAME && indx >= 0) {
|
|
|
|
if (nodes[indx] == NULL && indx == 0)
|
|
|
|
nodes[indx] = SLIST_FIRST(&sysctl__children);
|
|
|
|
else if (nodes[indx] == NULL)
|
|
|
|
nodes[indx] = SLIST_FIRST(&nodes[indx - 1]->oid_children);
|
|
|
|
else
|
|
|
|
nodes[indx] = SLIST_NEXT(nodes[indx], oid_link);
|
|
|
|
|
|
|
|
if (nodes[indx] == needle)
|
|
|
|
return (indx + 1);
|
|
|
|
|
|
|
|
if (nodes[indx] == NULL) {
|
|
|
|
indx--;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((nodes[indx]->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
indx++;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
sysctl_warn_reuse(const char *func, struct sysctl_oid *leaf)
|
|
|
|
{
|
|
|
|
struct sysctl_oid *nodes[CTL_MAXNAME];
|
|
|
|
char buf[128];
|
|
|
|
struct sbuf sb;
|
|
|
|
int rc, i;
|
|
|
|
|
|
|
|
(void)sbuf_new(&sb, buf, sizeof(buf), SBUF_FIXEDLEN | SBUF_INCLUDENUL);
|
|
|
|
sbuf_set_drain(&sb, sbuf_printf_drain, NULL);
|
|
|
|
|
|
|
|
sbuf_printf(&sb, "%s: can't re-use a leaf (", __func__);
|
|
|
|
|
|
|
|
memset(nodes, 0, sizeof(nodes));
|
|
|
|
rc = sysctl_search_oid(nodes, leaf);
|
|
|
|
if (rc > 0) {
|
|
|
|
for (i = 0; i < rc; i++)
|
|
|
|
sbuf_printf(&sb, "%s%.*s", nodes[i]->oid_name,
|
|
|
|
i != (rc - 1), ".");
|
|
|
|
} else {
|
|
|
|
sbuf_printf(&sb, "%s", leaf->oid_name);
|
|
|
|
}
|
|
|
|
sbuf_printf(&sb, ")!\n");
|
|
|
|
|
|
|
|
(void)sbuf_finish(&sb);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef SYSCTL_DEBUG
|
|
|
|
static int
|
|
|
|
sysctl_reuse_test(SYSCTL_HANDLER_ARGS)
|
|
|
|
{
|
|
|
|
struct rm_priotracker tracker;
|
|
|
|
|
|
|
|
SYSCTL_RLOCK(&tracker);
|
|
|
|
sysctl_warn_reuse(__func__, oidp);
|
|
|
|
SYSCTL_RUNLOCK(&tracker);
|
|
|
|
return (0);
|
|
|
|
}
|
2020-01-06 19:47:59 +00:00
|
|
|
SYSCTL_PROC(_sysctl, OID_AUTO, reuse_test,
|
|
|
|
CTLTYPE_STRING | CTLFLAG_RD | CTLFLAG_MPSAFE, 0, 0, sysctl_reuse_test, "-",
|
|
|
|
"");
|
2017-08-27 17:12:30 +00:00
|
|
|
#endif
|
|
|
|
|
2017-10-01 16:37:54 +00:00
|
|
|
void
|
|
|
|
sysctl_register_oid(struct sysctl_oid *oidp)
|
1995-11-08 08:48:36 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid_list *parent = oidp->oid_parent;
|
|
|
|
struct sysctl_oid *p;
|
|
|
|
struct sysctl_oid *q;
|
2015-03-25 08:55:34 +00:00
|
|
|
int oid_number;
|
|
|
|
int timeout = 2;
|
1999-02-16 10:49:55 +00:00
|
|
|
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
/*
|
|
|
|
* First check if another oid with the same name already
|
|
|
|
* exists in the parent's list.
|
|
|
|
*/
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_ASSERT_WLOCKED();
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
p = sysctl_find_oidname(oidp->oid_name, parent);
|
|
|
|
if (p != NULL) {
|
|
|
|
if ((p->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
p->oid_refcnt++;
|
|
|
|
return;
|
|
|
|
} else {
|
2017-08-27 17:12:30 +00:00
|
|
|
sysctl_warn_reuse(__func__, p);
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2015-03-25 08:55:34 +00:00
|
|
|
/* get current OID number */
|
|
|
|
oid_number = oidp->oid_number;
|
|
|
|
|
|
|
|
#if (OID_AUTO >= 0)
|
|
|
|
#error "OID_AUTO is expected to be a negative value"
|
|
|
|
#endif
|
1999-02-16 10:49:55 +00:00
|
|
|
/*
|
2015-03-25 08:55:34 +00:00
|
|
|
* Any negative OID number qualifies as OID_AUTO. Valid OID
|
|
|
|
* numbers should always be positive.
|
|
|
|
*
|
2001-07-25 17:21:18 +00:00
|
|
|
* NOTE: DO NOT change the starting value here, change it in
|
|
|
|
* <sys/sysctl.h>, and make sure it is at least 256 to
|
2016-04-29 22:15:33 +00:00
|
|
|
* accommodate e.g. net.inet.raw as a static sysctl node.
|
1999-02-16 10:49:55 +00:00
|
|
|
*/
|
2015-03-25 08:55:34 +00:00
|
|
|
if (oid_number < 0) {
|
|
|
|
static int newoid;
|
2001-01-24 04:35:13 +00:00
|
|
|
|
2015-03-25 08:55:34 +00:00
|
|
|
/*
|
|
|
|
* By decrementing the next OID number we spend less
|
|
|
|
* time inserting the OIDs into a sorted list.
|
|
|
|
*/
|
|
|
|
if (--newoid < CTL_AUTO_START)
|
|
|
|
newoid = 0x7fffffff;
|
|
|
|
|
|
|
|
oid_number = newoid;
|
2001-10-12 09:16:36 +00:00
|
|
|
}
|
1995-11-11 00:09:21 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
/*
|
2015-03-25 08:55:34 +00:00
|
|
|
* Insert the OID into the parent's list sorted by OID number.
|
1999-02-16 10:49:55 +00:00
|
|
|
*/
|
2015-03-25 08:55:34 +00:00
|
|
|
retry:
|
1999-02-16 10:49:55 +00:00
|
|
|
q = NULL;
|
|
|
|
SLIST_FOREACH(p, parent, oid_link) {
|
2015-03-25 08:55:34 +00:00
|
|
|
/* check if the current OID number is in use */
|
|
|
|
if (oid_number == p->oid_number) {
|
|
|
|
/* get the next valid OID number */
|
|
|
|
if (oid_number < CTL_AUTO_START ||
|
|
|
|
oid_number == 0x7fffffff) {
|
|
|
|
/* wraparound - restart */
|
|
|
|
oid_number = CTL_AUTO_START;
|
|
|
|
/* don't loop forever */
|
|
|
|
if (!timeout--)
|
|
|
|
panic("sysctl: Out of OID numbers\n");
|
|
|
|
goto retry;
|
|
|
|
} else {
|
|
|
|
oid_number++;
|
|
|
|
}
|
|
|
|
} else if (oid_number < p->oid_number)
|
1999-02-16 10:49:55 +00:00
|
|
|
break;
|
|
|
|
q = p;
|
|
|
|
}
|
2015-03-25 08:55:34 +00:00
|
|
|
/* check for non-auto OID number collision */
|
|
|
|
if (oidp->oid_number >= 0 && oidp->oid_number < CTL_AUTO_START &&
|
|
|
|
oid_number >= CTL_AUTO_START) {
|
|
|
|
printf("sysctl: OID number(%d) is already in use for '%s'\n",
|
|
|
|
oidp->oid_number, oidp->oid_name);
|
|
|
|
}
|
|
|
|
/* update the OID number, if any */
|
|
|
|
oidp->oid_number = oid_number;
|
|
|
|
if (q != NULL)
|
1999-02-16 10:49:55 +00:00
|
|
|
SLIST_INSERT_AFTER(q, oidp, oid_link);
|
|
|
|
else
|
|
|
|
SLIST_INSERT_HEAD(parent, oidp, oid_link);
|
2014-06-28 03:56:17 +00:00
|
|
|
|
|
|
|
if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE &&
|
|
|
|
#ifdef VIMAGE
|
|
|
|
(oidp->oid_kind & CTLFLAG_VNET) == 0 &&
|
|
|
|
#endif
|
|
|
|
(oidp->oid_kind & CTLFLAG_TUN) != 0 &&
|
|
|
|
(oidp->oid_kind & CTLFLAG_NOFETCH) == 0) {
|
2015-03-24 17:42:53 +00:00
|
|
|
/* only fetch value once */
|
|
|
|
oidp->oid_kind |= CTLFLAG_NOFETCH;
|
|
|
|
/* try to fetch value from kernel environment */
|
2014-06-28 03:56:17 +00:00
|
|
|
sysctl_load_tunable_by_oid_locked(oidp);
|
|
|
|
}
|
1995-11-08 08:48:36 +00:00
|
|
|
}
|
|
|
|
|
2017-10-05 12:32:14 +00:00
|
|
|
void
|
|
|
|
sysctl_register_disabled_oid(struct sysctl_oid *oidp)
|
|
|
|
{
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Mark the leaf as dormant if it's not to be immediately enabled.
|
|
|
|
* We do not disable nodes as they can be shared between modules
|
|
|
|
* and it is always safe to access a node.
|
|
|
|
*/
|
|
|
|
KASSERT((oidp->oid_kind & CTLFLAG_DORMANT) == 0,
|
|
|
|
("internal flag is set in oid_kind"));
|
|
|
|
if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
|
|
|
oidp->oid_kind |= CTLFLAG_DORMANT;
|
|
|
|
sysctl_register_oid(oidp);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
sysctl_enable_oid(struct sysctl_oid *oidp)
|
|
|
|
{
|
|
|
|
|
|
|
|
SYSCTL_ASSERT_WLOCKED();
|
|
|
|
if ((oidp->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
KASSERT((oidp->oid_kind & CTLFLAG_DORMANT) == 0,
|
|
|
|
("sysctl node is marked as dormant"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
KASSERT((oidp->oid_kind & CTLFLAG_DORMANT) != 0,
|
|
|
|
("enabling already enabled sysctl oid"));
|
|
|
|
oidp->oid_kind &= ~CTLFLAG_DORMANT;
|
|
|
|
}
|
|
|
|
|
2001-07-25 17:13:58 +00:00
|
|
|
void
|
|
|
|
sysctl_unregister_oid(struct sysctl_oid *oidp)
|
1995-11-08 08:48:36 +00:00
|
|
|
{
|
2003-05-29 21:19:18 +00:00
|
|
|
struct sysctl_oid *p;
|
|
|
|
int error;
|
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_ASSERT_WLOCKED();
|
2003-05-29 21:19:18 +00:00
|
|
|
if (oidp->oid_number == OID_AUTO) {
|
|
|
|
error = EINVAL;
|
|
|
|
} else {
|
2018-11-19 09:36:09 +00:00
|
|
|
error = ENOENT;
|
2003-05-29 21:19:18 +00:00
|
|
|
SLIST_FOREACH(p, oidp->oid_parent, oid_link) {
|
|
|
|
if (p == oidp) {
|
|
|
|
SLIST_REMOVE(oidp->oid_parent, oidp,
|
|
|
|
sysctl_oid, oid_link);
|
|
|
|
error = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This can happen when a module fails to register and is
|
|
|
|
* being unloaded afterwards. It should not be a panic()
|
|
|
|
* for normal use.
|
|
|
|
*/
|
2018-11-19 09:35:16 +00:00
|
|
|
if (error) {
|
|
|
|
printf("%s: failed(%d) to unregister sysctl(%s)\n",
|
|
|
|
__func__, error, oidp->oid_name);
|
|
|
|
}
|
1999-02-16 10:49:55 +00:00
|
|
|
}
|
1995-12-04 16:48:58 +00:00
|
|
|
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
/* Initialize a new context to keep track of dynamically added sysctls. */
|
|
|
|
int
|
|
|
|
sysctl_ctx_init(struct sysctl_ctx_list *c)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (c == NULL) {
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
2009-02-06 14:51:32 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* No locking here, the caller is responsible for not adding
|
|
|
|
* new nodes to a context until after this function has
|
|
|
|
* returned.
|
|
|
|
*/
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
TAILQ_INIT(c);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Free the context, and destroy all dynamic oids registered in this context */
|
|
|
|
int
|
|
|
|
sysctl_ctx_free(struct sysctl_ctx_list *clist)
|
|
|
|
{
|
|
|
|
struct sysctl_ctx_entry *e, *e1;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
error = 0;
|
|
|
|
/*
|
|
|
|
* First perform a "dry run" to check if it's ok to remove oids.
|
|
|
|
* XXX FIXME
|
|
|
|
* XXX This algorithm is a hack. But I don't know any
|
|
|
|
* XXX better solution for now...
|
|
|
|
*/
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WLOCK();
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
TAILQ_FOREACH(e, clist, link) {
|
2009-02-06 14:51:32 +00:00
|
|
|
error = sysctl_remove_oid_locked(e->entry, 0, 0);
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
if (error)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Restore deregistered entries, either from the end,
|
2016-04-29 22:15:33 +00:00
|
|
|
* or from the place where error occurred.
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
* e contains the entry that was not unregistered
|
|
|
|
*/
|
|
|
|
if (error)
|
|
|
|
e1 = TAILQ_PREV(e, sysctl_ctx_list, link);
|
|
|
|
else
|
|
|
|
e1 = TAILQ_LAST(clist, sysctl_ctx_list);
|
|
|
|
while (e1 != NULL) {
|
|
|
|
sysctl_register_oid(e1->entry);
|
|
|
|
e1 = TAILQ_PREV(e1, sysctl_ctx_list, link);
|
|
|
|
}
|
2009-02-06 14:51:32 +00:00
|
|
|
if (error) {
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WUNLOCK();
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
return(EBUSY);
|
2009-02-06 14:51:32 +00:00
|
|
|
}
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
/* Now really delete the entries */
|
|
|
|
e = TAILQ_FIRST(clist);
|
|
|
|
while (e != NULL) {
|
|
|
|
e1 = TAILQ_NEXT(e, link);
|
2009-02-06 14:51:32 +00:00
|
|
|
error = sysctl_remove_oid_locked(e->entry, 1, 0);
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
if (error)
|
|
|
|
panic("sysctl_remove_oid: corrupt tree, entry: %s",
|
|
|
|
e->entry->oid_name);
|
|
|
|
free(e, M_SYSCTLOID);
|
|
|
|
e = e1;
|
|
|
|
}
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WUNLOCK();
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Add an entry to the context */
|
|
|
|
struct sysctl_ctx_entry *
|
|
|
|
sysctl_ctx_entry_add(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp)
|
|
|
|
{
|
|
|
|
struct sysctl_ctx_entry *e;
|
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_ASSERT_WLOCKED();
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
if (clist == NULL || oidp == NULL)
|
|
|
|
return(NULL);
|
2003-02-19 05:47:46 +00:00
|
|
|
e = malloc(sizeof(struct sysctl_ctx_entry), M_SYSCTLOID, M_WAITOK);
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
e->entry = oidp;
|
|
|
|
TAILQ_INSERT_HEAD(clist, e, link);
|
|
|
|
return (e);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Find an entry in the context */
|
|
|
|
struct sysctl_ctx_entry *
|
|
|
|
sysctl_ctx_entry_find(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp)
|
|
|
|
{
|
|
|
|
struct sysctl_ctx_entry *e;
|
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_ASSERT_WLOCKED();
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
if (clist == NULL || oidp == NULL)
|
|
|
|
return(NULL);
|
2001-02-04 13:13:25 +00:00
|
|
|
TAILQ_FOREACH(e, clist, link) {
|
2021-04-18 17:19:15 +00:00
|
|
|
if (e->entry == oidp)
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
return(e);
|
|
|
|
}
|
|
|
|
return (e);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Delete an entry from the context.
|
|
|
|
* NOTE: this function doesn't free oidp! You have to remove it
|
|
|
|
* with sysctl_remove_oid().
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
sysctl_ctx_entry_del(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp)
|
|
|
|
{
|
|
|
|
struct sysctl_ctx_entry *e;
|
|
|
|
|
|
|
|
if (clist == NULL || oidp == NULL)
|
|
|
|
return (EINVAL);
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WLOCK();
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
e = sysctl_ctx_entry_find(clist, oidp);
|
|
|
|
if (e != NULL) {
|
|
|
|
TAILQ_REMOVE(clist, e, link);
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WUNLOCK();
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
free(e, M_SYSCTLOID);
|
|
|
|
return (0);
|
2009-02-06 14:51:32 +00:00
|
|
|
} else {
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WUNLOCK();
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
return (ENOENT);
|
2009-02-06 14:51:32 +00:00
|
|
|
}
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Remove dynamically created sysctl trees.
|
|
|
|
* oidp - top of the tree to be removed
|
|
|
|
* del - if 0 - just deregister, otherwise free up entries as well
|
|
|
|
* recurse - if != 0 traverse the subtree to be deleted
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
sysctl_remove_oid(struct sysctl_oid *oidp, int del, int recurse)
|
2009-02-06 14:51:32 +00:00
|
|
|
{
|
|
|
|
int error;
|
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WLOCK();
|
2009-02-06 14:51:32 +00:00
|
|
|
error = sysctl_remove_oid_locked(oidp, del, recurse);
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WUNLOCK();
|
2009-02-06 14:51:32 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2011-03-21 09:40:01 +00:00
|
|
|
int
|
|
|
|
sysctl_remove_name(struct sysctl_oid *parent, const char *name,
|
|
|
|
int del, int recurse)
|
|
|
|
{
|
|
|
|
struct sysctl_oid *p, *tmp;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
error = ENOENT;
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WLOCK();
|
2011-03-21 09:40:01 +00:00
|
|
|
SLIST_FOREACH_SAFE(p, SYSCTL_CHILDREN(parent), oid_link, tmp) {
|
|
|
|
if (strcmp(p->oid_name, name) == 0) {
|
|
|
|
error = sysctl_remove_oid_locked(p, del, recurse);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WUNLOCK();
|
2011-03-21 09:40:01 +00:00
|
|
|
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2009-02-06 14:51:32 +00:00
|
|
|
static int
|
|
|
|
sysctl_remove_oid_locked(struct sysctl_oid *oidp, int del, int recurse)
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
{
|
2011-03-21 09:40:01 +00:00
|
|
|
struct sysctl_oid *p, *tmp;
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
int error;
|
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_ASSERT_WLOCKED();
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
if (oidp == NULL)
|
|
|
|
return(EINVAL);
|
|
|
|
if ((oidp->oid_kind & CTLFLAG_DYN) == 0) {
|
2017-03-22 05:27:20 +00:00
|
|
|
printf("Warning: can't remove non-dynamic nodes (%s)!\n",
|
|
|
|
oidp->oid_name);
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* WARNING: normal method to do this should be through
|
|
|
|
* sysctl_ctx_free(). Use recursing as the last resort
|
|
|
|
* method to purge your sysctl tree of leftovers...
|
|
|
|
* However, if some other code still references these nodes,
|
|
|
|
* it will panic.
|
|
|
|
*/
|
|
|
|
if ((oidp->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
if (oidp->oid_refcnt == 1) {
|
2011-03-21 09:40:01 +00:00
|
|
|
SLIST_FOREACH_SAFE(p,
|
|
|
|
SYSCTL_CHILDREN(oidp), oid_link, tmp) {
|
2013-08-09 01:04:44 +00:00
|
|
|
if (!recurse) {
|
|
|
|
printf("Warning: failed attempt to "
|
|
|
|
"remove oid %s with child %s\n",
|
|
|
|
oidp->oid_name, p->oid_name);
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
return (ENOTEMPTY);
|
2013-08-09 01:04:44 +00:00
|
|
|
}
|
2009-02-06 14:51:32 +00:00
|
|
|
error = sysctl_remove_oid_locked(p, del,
|
|
|
|
recurse);
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (oidp->oid_refcnt > 1 ) {
|
|
|
|
oidp->oid_refcnt--;
|
|
|
|
} else {
|
|
|
|
if (oidp->oid_refcnt == 0) {
|
|
|
|
printf("Warning: bad oid_refcnt=%u (%s)!\n",
|
|
|
|
oidp->oid_refcnt, oidp->oid_name);
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
sysctl_unregister_oid(oidp);
|
|
|
|
if (del) {
|
2010-11-29 18:18:07 +00:00
|
|
|
/*
|
|
|
|
* Wait for all threads running the handler to drain.
|
|
|
|
* This preserves the previous behavior when the
|
|
|
|
* sysctl lock was held across a handler invocation,
|
|
|
|
* and is necessary for module unload correctness.
|
|
|
|
*/
|
|
|
|
while (oidp->oid_running > 0) {
|
|
|
|
oidp->oid_kind |= CTLFLAG_DYING;
|
|
|
|
SYSCTL_SLEEP(&oidp->oid_running, "oidrm", 0);
|
|
|
|
}
|
2005-02-07 07:40:39 +00:00
|
|
|
if (oidp->oid_descr)
|
2013-03-01 18:49:14 +00:00
|
|
|
free(__DECONST(char *, oidp->oid_descr),
|
|
|
|
M_SYSCTLOID);
|
2016-12-14 12:47:34 +00:00
|
|
|
if (oidp->oid_label)
|
|
|
|
free(__DECONST(char *, oidp->oid_label),
|
|
|
|
M_SYSCTLOID);
|
2013-03-01 18:49:14 +00:00
|
|
|
free(__DECONST(char *, oidp->oid_name), M_SYSCTLOID);
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
free(oidp, M_SYSCTLOID);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Create new sysctls at run time.
|
|
|
|
* clist may point to a valid context initialized with sysctl_ctx_init().
|
|
|
|
*/
|
|
|
|
struct sysctl_oid *
|
|
|
|
sysctl_add_oid(struct sysctl_ctx_list *clist, struct sysctl_oid_list *parent,
|
2015-11-07 01:43:01 +00:00
|
|
|
int number, const char *name, int kind, void *arg1, intmax_t arg2,
|
2016-12-14 12:47:34 +00:00
|
|
|
int (*handler)(SYSCTL_HANDLER_ARGS), const char *fmt, const char *descr,
|
|
|
|
const char *label)
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
{
|
|
|
|
struct sysctl_oid *oidp;
|
|
|
|
|
|
|
|
/* You have to hook up somewhere.. */
|
|
|
|
if (parent == NULL)
|
|
|
|
return(NULL);
|
|
|
|
/* Check if the node already exists, otherwise create it */
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WLOCK();
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
oidp = sysctl_find_oidname(name, parent);
|
|
|
|
if (oidp != NULL) {
|
|
|
|
if ((oidp->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
oidp->oid_refcnt++;
|
|
|
|
/* Update the context */
|
|
|
|
if (clist != NULL)
|
|
|
|
sysctl_ctx_entry_add(clist, oidp);
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WUNLOCK();
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
return (oidp);
|
|
|
|
} else {
|
2017-08-27 17:12:30 +00:00
|
|
|
sysctl_warn_reuse(__func__, oidp);
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WUNLOCK();
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
return (NULL);
|
|
|
|
}
|
|
|
|
}
|
2003-02-19 05:47:46 +00:00
|
|
|
oidp = malloc(sizeof(struct sysctl_oid), M_SYSCTLOID, M_WAITOK|M_ZERO);
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
oidp->oid_parent = parent;
|
2014-06-28 03:56:17 +00:00
|
|
|
SLIST_INIT(&oidp->oid_children);
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
oidp->oid_number = number;
|
|
|
|
oidp->oid_refcnt = 1;
|
2013-03-01 18:49:14 +00:00
|
|
|
oidp->oid_name = strdup(name, M_SYSCTLOID);
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
oidp->oid_handler = handler;
|
|
|
|
oidp->oid_kind = CTLFLAG_DYN | kind;
|
2014-06-28 03:56:17 +00:00
|
|
|
oidp->oid_arg1 = arg1;
|
|
|
|
oidp->oid_arg2 = arg2;
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
oidp->oid_fmt = fmt;
|
2014-06-28 03:56:17 +00:00
|
|
|
if (descr != NULL)
|
2013-03-01 18:49:14 +00:00
|
|
|
oidp->oid_descr = strdup(descr, M_SYSCTLOID);
|
2016-12-14 12:47:34 +00:00
|
|
|
if (label != NULL)
|
|
|
|
oidp->oid_label = strdup(label, M_SYSCTLOID);
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
/* Update the context, if used */
|
|
|
|
if (clist != NULL)
|
|
|
|
sysctl_ctx_entry_add(clist, oidp);
|
|
|
|
/* Register this oid */
|
|
|
|
sysctl_register_oid(oidp);
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WUNLOCK();
|
These patches implement dynamic sysctls. It's possible now to add
and remove sysctl oids at will during runtime - they don't rely on
linker sets. Also, the node oids can be referenced by more than
one kernel user, which means that it's possible to create partially
overlapping trees.
Add sysctl contexts to help programmers manage multiple dynamic
oids in convenient way.
Please see the manpages for detailed discussion, and example module
for typical use.
This work is based on ideas and code snippets coming from many
people, among them: Arun Sharma, Jonathan Lemon, Doug Rabson,
Brian Feldman, Kelly Yancey, Poul-Henning Kamp and others. I'd like
to specially thank Brian Feldman for detailed review and style
fixes.
PR: kern/16928
Reviewed by: dfr, green, phk
2000-07-15 10:26:04 +00:00
|
|
|
return (oidp);
|
|
|
|
}
|
|
|
|
|
2007-11-30 21:29:08 +00:00
|
|
|
/*
|
|
|
|
* Rename an existing oid.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
sysctl_rename_oid(struct sysctl_oid *oidp, const char *name)
|
|
|
|
{
|
|
|
|
char *newname;
|
2013-03-01 18:49:14 +00:00
|
|
|
char *oldname;
|
2007-11-30 21:29:08 +00:00
|
|
|
|
2013-03-01 18:49:14 +00:00
|
|
|
newname = strdup(name, M_SYSCTLOID);
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WLOCK();
|
2013-03-01 18:49:14 +00:00
|
|
|
oldname = __DECONST(char *, oidp->oid_name);
|
2007-11-30 21:29:08 +00:00
|
|
|
oidp->oid_name = newname;
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WUNLOCK();
|
2007-11-30 21:29:08 +00:00
|
|
|
free(oldname, M_SYSCTLOID);
|
|
|
|
}
|
|
|
|
|
2004-02-27 17:13:23 +00:00
|
|
|
/*
|
|
|
|
* Reparent an existing oid.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
sysctl_move_oid(struct sysctl_oid *oid, struct sysctl_oid_list *parent)
|
|
|
|
{
|
|
|
|
struct sysctl_oid *oidp;
|
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WLOCK();
|
2009-02-06 14:51:32 +00:00
|
|
|
if (oid->oid_parent == parent) {
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WUNLOCK();
|
2004-02-27 17:13:23 +00:00
|
|
|
return (0);
|
2009-02-06 14:51:32 +00:00
|
|
|
}
|
2004-02-27 17:13:23 +00:00
|
|
|
oidp = sysctl_find_oidname(oid->oid_name, parent);
|
2009-02-06 14:51:32 +00:00
|
|
|
if (oidp != NULL) {
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WUNLOCK();
|
2004-02-27 17:13:23 +00:00
|
|
|
return (EEXIST);
|
2009-02-06 14:51:32 +00:00
|
|
|
}
|
2004-02-27 17:13:23 +00:00
|
|
|
sysctl_unregister_oid(oid);
|
|
|
|
oid->oid_parent = parent;
|
|
|
|
oid->oid_number = OID_AUTO;
|
|
|
|
sysctl_register_oid(oid);
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WUNLOCK();
|
2004-02-27 17:13:23 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
/*
|
|
|
|
* Register the kernel's oids on startup.
|
|
|
|
*/
|
2001-06-13 10:58:39 +00:00
|
|
|
SET_DECLARE(sysctl_set, struct sysctl_oid);
|
1995-11-08 08:48:36 +00:00
|
|
|
|
2001-07-25 17:13:58 +00:00
|
|
|
static void
|
|
|
|
sysctl_register_all(void *arg)
|
1998-09-05 17:13:28 +00:00
|
|
|
{
|
2001-06-13 10:58:39 +00:00
|
|
|
struct sysctl_oid **oidp;
|
1998-09-05 17:13:28 +00:00
|
|
|
|
2009-05-14 22:01:32 +00:00
|
|
|
sx_init(&sysctlmemlock, "sysctl mem");
|
2020-02-06 12:45:58 +00:00
|
|
|
sx_init(&sysctlstringlock, "sysctl string handler");
|
2002-04-02 05:50:07 +00:00
|
|
|
SYSCTL_INIT();
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WLOCK();
|
2001-06-13 10:58:39 +00:00
|
|
|
SET_FOREACH(oidp, sysctl_set)
|
|
|
|
sysctl_register_oid(*oidp);
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_WUNLOCK();
|
2001-06-13 10:58:39 +00:00
|
|
|
}
|
2018-05-18 17:58:09 +00:00
|
|
|
SYSINIT(sysctl, SI_SUB_KMEM, SI_ORDER_FIRST, sysctl_register_all, NULL);
|
1999-02-16 10:49:55 +00:00
|
|
|
|
1995-12-04 16:48:58 +00:00
|
|
|
/*
|
|
|
|
* "Staff-functions"
|
|
|
|
*
|
1995-12-06 13:27:39 +00:00
|
|
|
* These functions implement a presently undocumented interface
|
|
|
|
* used by the sysctl program to walk the tree, and get the type
|
|
|
|
* so it can print the value.
|
|
|
|
* This interface is under work and consideration, and should probably
|
|
|
|
* be killed with a big axe by the first person who can find the time.
|
|
|
|
* (be aware though, that the proper interface isn't as obvious as it
|
|
|
|
* may seem, there are various conflicting requirements.
|
|
|
|
*
|
2019-09-18 16:13:10 +00:00
|
|
|
* {CTL_SYSCTL, CTL_SYSCTL_DEBUG} printf the entire MIB-tree.
|
|
|
|
* {CTL_SYSCTL, CTL_SYSCTL_NAME, ...} return the name of the "..."
|
|
|
|
* OID.
|
2020-10-05 20:13:22 +00:00
|
|
|
* {CTL_SYSCTL, CTL_SYSCTL_NEXT, ...} return the next OID, honoring
|
|
|
|
* CTLFLAG_SKIP.
|
2019-09-18 16:13:10 +00:00
|
|
|
* {CTL_SYSCTL, CTL_SYSCTL_NAME2OID} return the OID of the name in
|
|
|
|
* "new"
|
|
|
|
* {CTL_SYSCTL, CTL_SYSCTL_OIDFMT, ...} return the kind & format info
|
|
|
|
* for the "..." OID.
|
|
|
|
* {CTL_SYSCTL, CTL_SYSCTL_OIDDESCR, ...} return the description of the
|
|
|
|
* "..." OID.
|
|
|
|
* {CTL_SYSCTL, CTL_SYSCTL_OIDLABEL, ...} return the aggregation label of
|
|
|
|
* the "..." OID.
|
2020-10-05 20:13:22 +00:00
|
|
|
* {CTL_SYSCTL, CTL_SYSCTL_NEXTNOSKIP, ...} return the next OID, ignoring
|
|
|
|
* CTLFLAG_SKIP.
|
1995-12-04 16:48:58 +00:00
|
|
|
*/
|
|
|
|
|
2004-10-27 19:26:01 +00:00
|
|
|
#ifdef SYSCTL_DEBUG
|
1995-11-08 08:48:36 +00:00
|
|
|
static void
|
1999-02-16 10:49:55 +00:00
|
|
|
sysctl_sysctl_debug_dump_node(struct sysctl_oid_list *l, int i)
|
1995-11-08 08:48:36 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
int k;
|
|
|
|
struct sysctl_oid *oidp;
|
1995-11-08 08:48:36 +00:00
|
|
|
|
2014-10-21 21:08:45 +00:00
|
|
|
SYSCTL_ASSERT_LOCKED();
|
1999-02-16 10:49:55 +00:00
|
|
|
SLIST_FOREACH(oidp, l, oid_link) {
|
1995-11-08 08:48:36 +00:00
|
|
|
for (k=0; k<i; k++)
|
|
|
|
printf(" ");
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
printf("%d %s ", oidp->oid_number, oidp->oid_name);
|
1995-11-08 08:48:36 +00:00
|
|
|
|
|
|
|
printf("%c%c",
|
1999-02-16 10:49:55 +00:00
|
|
|
oidp->oid_kind & CTLFLAG_RD ? 'R':' ',
|
|
|
|
oidp->oid_kind & CTLFLAG_WR ? 'W':' ');
|
1995-11-08 08:48:36 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_handler)
|
1996-04-13 13:28:54 +00:00
|
|
|
printf(" *Handler");
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
switch (oidp->oid_kind & CTLTYPE) {
|
1995-11-12 19:52:09 +00:00
|
|
|
case CTLTYPE_NODE:
|
1996-04-13 13:28:54 +00:00
|
|
|
printf(" Node\n");
|
1999-02-16 10:49:55 +00:00
|
|
|
if (!oidp->oid_handler) {
|
1995-11-08 08:48:36 +00:00
|
|
|
sysctl_sysctl_debug_dump_node(
|
2014-06-28 03:56:17 +00:00
|
|
|
SYSCTL_CHILDREN(oidp), i + 2);
|
1995-11-08 08:48:36 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case CTLTYPE_INT: printf(" Int\n"); break;
|
2011-01-19 23:00:25 +00:00
|
|
|
case CTLTYPE_UINT: printf(" u_int\n"); break;
|
|
|
|
case CTLTYPE_LONG: printf(" Long\n"); break;
|
|
|
|
case CTLTYPE_ULONG: printf(" u_long\n"); break;
|
1995-11-08 08:48:36 +00:00
|
|
|
case CTLTYPE_STRING: printf(" String\n"); break;
|
2015-11-07 18:26:32 +00:00
|
|
|
case CTLTYPE_S8: printf(" int8_t\n"); break;
|
|
|
|
case CTLTYPE_S16: printf(" int16_t\n"); break;
|
|
|
|
case CTLTYPE_S32: printf(" int32_t\n"); break;
|
2011-01-19 23:00:25 +00:00
|
|
|
case CTLTYPE_S64: printf(" int64_t\n"); break;
|
2015-11-07 18:26:32 +00:00
|
|
|
case CTLTYPE_U8: printf(" uint8_t\n"); break;
|
|
|
|
case CTLTYPE_U16: printf(" uint16_t\n"); break;
|
|
|
|
case CTLTYPE_U32: printf(" uint32_t\n"); break;
|
|
|
|
case CTLTYPE_U64: printf(" uint64_t\n"); break;
|
1995-11-08 08:48:36 +00:00
|
|
|
case CTLTYPE_OPAQUE: printf(" Opaque/struct\n"); break;
|
|
|
|
default: printf("\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_sysctl_debug(SYSCTL_HANDLER_ARGS)
|
1995-11-08 08:48:36 +00:00
|
|
|
{
|
2015-09-15 23:06:56 +00:00
|
|
|
struct rm_priotracker tracker;
|
2001-11-28 03:11:16 +00:00
|
|
|
int error;
|
|
|
|
|
2006-11-06 13:42:10 +00:00
|
|
|
error = priv_check(req->td, PRIV_SYSCTL_DEBUG);
|
2001-11-28 03:11:16 +00:00
|
|
|
if (error)
|
2004-12-31 14:52:53 +00:00
|
|
|
return (error);
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_RLOCK(&tracker);
|
1999-02-16 10:49:55 +00:00
|
|
|
sysctl_sysctl_debug_dump_node(&sysctl__children, 0);
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_RUNLOCK(&tracker);
|
2004-12-31 14:52:53 +00:00
|
|
|
return (ENOENT);
|
1995-11-08 08:48:36 +00:00
|
|
|
}
|
|
|
|
|
2019-09-18 16:13:10 +00:00
|
|
|
SYSCTL_PROC(_sysctl, CTL_SYSCTL_DEBUG, debug, CTLTYPE_STRING | CTLFLAG_RD |
|
|
|
|
CTLFLAG_MPSAFE, 0, 0, sysctl_sysctl_debug, "-", "");
|
2004-10-27 19:26:01 +00:00
|
|
|
#endif
|
1995-11-06 16:18:52 +00:00
|
|
|
|
1995-12-04 16:48:58 +00:00
|
|
|
static int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_sysctl_name(SYSCTL_HANDLER_ARGS)
|
1995-12-04 16:48:58 +00:00
|
|
|
{
|
|
|
|
int *name = (int *) arg1;
|
|
|
|
u_int namelen = arg2;
|
2019-11-25 07:38:27 +00:00
|
|
|
int error;
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid *oid;
|
1999-03-23 14:23:15 +00:00
|
|
|
struct sysctl_oid_list *lsp = &sysctl__children, *lsp2;
|
2015-09-15 23:06:56 +00:00
|
|
|
struct rm_priotracker tracker;
|
1995-12-04 16:48:58 +00:00
|
|
|
char buf[10];
|
|
|
|
|
2019-11-25 07:38:27 +00:00
|
|
|
error = sysctl_wire_old_buffer(req, 0);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_RLOCK(&tracker);
|
1995-12-04 16:48:58 +00:00
|
|
|
while (namelen) {
|
|
|
|
if (!lsp) {
|
1998-12-04 22:54:57 +00:00
|
|
|
snprintf(buf,sizeof(buf),"%d",*name);
|
1995-12-04 16:48:58 +00:00
|
|
|
if (req->oldidx)
|
|
|
|
error = SYSCTL_OUT(req, ".", 1);
|
|
|
|
if (!error)
|
|
|
|
error = SYSCTL_OUT(req, buf, strlen(buf));
|
|
|
|
if (error)
|
2010-11-29 18:18:07 +00:00
|
|
|
goto out;
|
1995-12-04 16:48:58 +00:00
|
|
|
namelen--;
|
|
|
|
name++;
|
|
|
|
continue;
|
|
|
|
}
|
2016-04-15 16:10:11 +00:00
|
|
|
lsp2 = NULL;
|
1999-02-16 10:49:55 +00:00
|
|
|
SLIST_FOREACH(oid, lsp, oid_link) {
|
|
|
|
if (oid->oid_number != *name)
|
1995-12-04 16:48:58 +00:00
|
|
|
continue;
|
|
|
|
|
|
|
|
if (req->oldidx)
|
|
|
|
error = SYSCTL_OUT(req, ".", 1);
|
|
|
|
if (!error)
|
1999-02-16 10:49:55 +00:00
|
|
|
error = SYSCTL_OUT(req, oid->oid_name,
|
|
|
|
strlen(oid->oid_name));
|
1995-12-04 16:48:58 +00:00
|
|
|
if (error)
|
2010-11-29 18:18:07 +00:00
|
|
|
goto out;
|
1995-12-04 16:48:58 +00:00
|
|
|
|
|
|
|
namelen--;
|
|
|
|
name++;
|
|
|
|
|
1999-03-23 14:23:15 +00:00
|
|
|
if ((oid->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
1995-12-04 16:48:58 +00:00
|
|
|
break;
|
1995-11-06 16:18:52 +00:00
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oid->oid_handler)
|
1995-12-04 16:48:58 +00:00
|
|
|
break;
|
|
|
|
|
2010-11-29 18:17:53 +00:00
|
|
|
lsp2 = SYSCTL_CHILDREN(oid);
|
1995-12-04 16:48:58 +00:00
|
|
|
break;
|
|
|
|
}
|
1999-03-23 14:23:15 +00:00
|
|
|
lsp = lsp2;
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
2010-11-29 18:18:07 +00:00
|
|
|
error = SYSCTL_OUT(req, "", 1);
|
|
|
|
out:
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_RUNLOCK(&tracker);
|
2010-11-29 18:18:07 +00:00
|
|
|
return (error);
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
|
|
|
|
2011-07-17 23:05:24 +00:00
|
|
|
/*
|
|
|
|
* XXXRW/JA: Shouldn't return name data for nodes that we don't permit in
|
|
|
|
* capability mode.
|
|
|
|
*/
|
2019-09-18 16:13:10 +00:00
|
|
|
static SYSCTL_NODE(_sysctl, CTL_SYSCTL_NAME, name, CTLFLAG_RD |
|
|
|
|
CTLFLAG_MPSAFE | CTLFLAG_CAPRD, sysctl_sysctl_name, "");
|
1995-12-04 16:48:58 +00:00
|
|
|
|
2020-11-30 21:59:52 +00:00
|
|
|
enum sysctl_iter_action {
|
|
|
|
ITER_SIBLINGS, /* Not matched, continue iterating siblings */
|
|
|
|
ITER_CHILDREN, /* Node has children we need to iterate over them */
|
|
|
|
ITER_FOUND, /* Matching node was found */
|
|
|
|
};
|
|
|
|
|
2020-10-24 14:46:38 +00:00
|
|
|
/*
|
2020-11-30 21:59:52 +00:00
|
|
|
* Tries to find the next node for @name and @namelen.
|
|
|
|
*
|
|
|
|
* Returns next action to take.
|
2020-10-24 14:46:38 +00:00
|
|
|
*/
|
2020-11-30 21:59:52 +00:00
|
|
|
static enum sysctl_iter_action
|
|
|
|
sysctl_sysctl_next_node(struct sysctl_oid *oidp, int *name, unsigned int namelen,
|
|
|
|
bool honor_skip)
|
1995-12-04 16:48:58 +00:00
|
|
|
{
|
|
|
|
|
2020-11-30 21:59:52 +00:00
|
|
|
if ((oidp->oid_kind & CTLFLAG_DORMANT) != 0)
|
|
|
|
return (ITER_SIBLINGS);
|
1995-12-04 16:48:58 +00:00
|
|
|
|
2020-11-30 21:59:52 +00:00
|
|
|
if (honor_skip && (oidp->oid_kind & CTLFLAG_SKIP) != 0)
|
|
|
|
return (ITER_SIBLINGS);
|
1995-12-04 16:48:58 +00:00
|
|
|
|
2020-11-30 21:59:52 +00:00
|
|
|
if (namelen == 0) {
|
2020-10-24 14:46:38 +00:00
|
|
|
/*
|
2020-11-30 21:59:52 +00:00
|
|
|
* We have reached a node with a full name match and are
|
|
|
|
* looking for the next oid in its children.
|
|
|
|
*
|
|
|
|
* For CTL_SYSCTL_NEXTNOSKIP we are done.
|
2020-10-24 14:46:38 +00:00
|
|
|
*
|
2020-11-30 21:59:52 +00:00
|
|
|
* For CTL_SYSCTL_NEXT we skip CTLTYPE_NODE (unless it
|
|
|
|
* has a handler) and move on to the children.
|
|
|
|
*/
|
|
|
|
if (!honor_skip)
|
|
|
|
return (ITER_FOUND);
|
|
|
|
if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
|
|
|
return (ITER_FOUND);
|
|
|
|
/* If node does not have an iterator, treat it as leaf */
|
|
|
|
if (oidp->oid_handler)
|
|
|
|
return (ITER_FOUND);
|
|
|
|
|
|
|
|
/* Report oid as a node to iterate */
|
|
|
|
return (ITER_CHILDREN);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* No match yet. Continue seeking the given name.
|
|
|
|
*
|
|
|
|
* We are iterating in order by oid_number, so skip oids lower
|
|
|
|
* than the one we are looking for.
|
|
|
|
*
|
|
|
|
* When the current oid_number is higher than the one we seek,
|
|
|
|
* that means we have reached the next oid in the sequence and
|
|
|
|
* should return it.
|
|
|
|
*
|
|
|
|
* If the oid_number matches the name at this level then we
|
|
|
|
* have to find a node to continue searching at the next level.
|
|
|
|
*/
|
|
|
|
if (oidp->oid_number < *name)
|
|
|
|
return (ITER_SIBLINGS);
|
|
|
|
if (oidp->oid_number > *name) {
|
|
|
|
/*
|
|
|
|
* We have reached the next oid.
|
2020-10-24 14:46:38 +00:00
|
|
|
*
|
2020-11-30 21:59:52 +00:00
|
|
|
* For CTL_SYSCTL_NEXTNOSKIP we are done.
|
2020-10-24 14:46:38 +00:00
|
|
|
*
|
2020-11-30 21:59:52 +00:00
|
|
|
* For CTL_SYSCTL_NEXT we skip CTLTYPE_NODE (unless it
|
|
|
|
* has a handler) and move on to the children.
|
2020-10-24 14:46:38 +00:00
|
|
|
*/
|
2020-11-30 21:59:52 +00:00
|
|
|
if (!honor_skip)
|
|
|
|
return (ITER_FOUND);
|
1999-02-16 10:49:55 +00:00
|
|
|
if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
2020-11-30 21:59:52 +00:00
|
|
|
return (ITER_FOUND);
|
|
|
|
/* If node does not have an iterator, treat it as leaf */
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_handler)
|
2020-11-30 21:59:52 +00:00
|
|
|
return (ITER_FOUND);
|
|
|
|
return (ITER_CHILDREN);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* match at a current level */
|
|
|
|
if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
|
|
|
return (ITER_SIBLINGS);
|
|
|
|
if (oidp->oid_handler)
|
|
|
|
return (ITER_SIBLINGS);
|
|
|
|
|
|
|
|
return (ITER_CHILDREN);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Recursively walk the sysctl subtree at lsp until we find the given name.
|
|
|
|
* Returns true and fills in next oid data in @next and @len if oid is found.
|
|
|
|
*/
|
|
|
|
static bool
|
|
|
|
sysctl_sysctl_next_action(struct sysctl_oid_list *lsp, int *name, u_int namelen,
|
|
|
|
int *next, int *len, int level, bool honor_skip)
|
|
|
|
{
|
|
|
|
struct sysctl_oid *oidp;
|
|
|
|
bool success = false;
|
|
|
|
enum sysctl_iter_action action;
|
|
|
|
|
|
|
|
SYSCTL_ASSERT_LOCKED();
|
|
|
|
SLIST_FOREACH(oidp, lsp, oid_link) {
|
|
|
|
action = sysctl_sysctl_next_node(oidp, name, namelen, honor_skip);
|
|
|
|
if (action == ITER_SIBLINGS)
|
1995-12-04 16:48:58 +00:00
|
|
|
continue;
|
2020-11-30 21:59:52 +00:00
|
|
|
if (action == ITER_FOUND) {
|
|
|
|
success = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
KASSERT((action== ITER_CHILDREN), ("ret(%d)!=ITER_CHILDREN", action));
|
|
|
|
|
2010-11-29 18:17:53 +00:00
|
|
|
lsp = SYSCTL_CHILDREN(oidp);
|
2020-11-30 21:59:52 +00:00
|
|
|
if (namelen == 0) {
|
|
|
|
success = sysctl_sysctl_next_action(lsp, NULL, 0,
|
|
|
|
next + 1, len, level + 1, honor_skip);
|
|
|
|
} else {
|
|
|
|
success = sysctl_sysctl_next_action(lsp, name + 1, namelen - 1,
|
|
|
|
next + 1, len, level + 1, honor_skip);
|
|
|
|
if (!success) {
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We maintain the invariant that current node oid
|
|
|
|
* is >= the oid provided in @name.
|
|
|
|
* As there are no usable children at this node,
|
|
|
|
* current node oid is strictly > than the requested
|
|
|
|
* oid.
|
|
|
|
* Hence, reduce namelen to 0 to allow for picking first
|
|
|
|
* nodes/leafs in the next node in list.
|
|
|
|
*/
|
|
|
|
namelen = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (success)
|
|
|
|
break;
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
2020-11-30 21:59:52 +00:00
|
|
|
|
|
|
|
if (success) {
|
|
|
|
*next = oidp->oid_number;
|
|
|
|
if (level > *len)
|
|
|
|
*len = level;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (success);
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_sysctl_next(SYSCTL_HANDLER_ARGS)
|
1995-12-04 16:48:58 +00:00
|
|
|
{
|
|
|
|
int *name = (int *) arg1;
|
|
|
|
u_int namelen = arg2;
|
2020-10-05 20:13:22 +00:00
|
|
|
int len, error;
|
2020-11-30 21:59:52 +00:00
|
|
|
bool success;
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid_list *lsp = &sysctl__children;
|
2015-09-15 23:06:56 +00:00
|
|
|
struct rm_priotracker tracker;
|
2020-10-05 20:13:22 +00:00
|
|
|
int next[CTL_MAXNAME];
|
1995-12-04 16:48:58 +00:00
|
|
|
|
2020-11-30 21:59:52 +00:00
|
|
|
len = 0;
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_RLOCK(&tracker);
|
2020-11-30 21:59:52 +00:00
|
|
|
success = sysctl_sysctl_next_action(lsp, name, namelen, next, &len, 1,
|
2020-10-05 20:13:22 +00:00
|
|
|
oidp->oid_number == CTL_SYSCTL_NEXT);
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_RUNLOCK(&tracker);
|
2020-11-30 21:59:52 +00:00
|
|
|
if (!success)
|
|
|
|
return (ENOENT);
|
2020-10-05 20:13:22 +00:00
|
|
|
error = SYSCTL_OUT(req, next, len * sizeof (int));
|
1995-12-04 16:48:58 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2011-07-17 23:05:24 +00:00
|
|
|
/*
|
|
|
|
* XXXRW/JA: Shouldn't return next data for nodes that we don't permit in
|
|
|
|
* capability mode.
|
|
|
|
*/
|
2019-09-18 16:13:10 +00:00
|
|
|
static SYSCTL_NODE(_sysctl, CTL_SYSCTL_NEXT, next, CTLFLAG_RD |
|
|
|
|
CTLFLAG_MPSAFE | CTLFLAG_CAPRD, sysctl_sysctl_next, "");
|
1995-12-04 16:48:58 +00:00
|
|
|
|
2020-10-05 20:13:22 +00:00
|
|
|
static SYSCTL_NODE(_sysctl, CTL_SYSCTL_NEXTNOSKIP, nextnoskip, CTLFLAG_RD |
|
|
|
|
CTLFLAG_MPSAFE | CTLFLAG_CAPRD, sysctl_sysctl_next, "");
|
|
|
|
|
1995-12-04 16:48:58 +00:00
|
|
|
static int
|
2009-03-11 21:48:36 +00:00
|
|
|
name2oid(char *name, int *oid, int *len, struct sysctl_oid **oidpp)
|
1995-12-04 16:48:58 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid *oidp;
|
|
|
|
struct sysctl_oid_list *lsp = &sysctl__children;
|
1995-12-04 16:48:58 +00:00
|
|
|
char *p;
|
|
|
|
|
2014-10-21 19:05:44 +00:00
|
|
|
SYSCTL_ASSERT_LOCKED();
|
2008-12-29 12:58:45 +00:00
|
|
|
|
2013-03-01 18:49:14 +00:00
|
|
|
for (*len = 0; *len < CTL_MAXNAME;) {
|
|
|
|
p = strsep(&name, ".");
|
1995-12-04 16:48:58 +00:00
|
|
|
|
2013-03-01 18:49:14 +00:00
|
|
|
oidp = SLIST_FIRST(lsp);
|
|
|
|
for (;; oidp = SLIST_NEXT(oidp, oid_link)) {
|
|
|
|
if (oidp == NULL)
|
|
|
|
return (ENOENT);
|
|
|
|
if (strcmp(p, oidp->oid_name) == 0)
|
|
|
|
break;
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
1999-02-16 10:49:55 +00:00
|
|
|
*oid++ = oidp->oid_number;
|
1995-12-04 16:48:58 +00:00
|
|
|
(*len)++;
|
|
|
|
|
2013-03-01 18:49:14 +00:00
|
|
|
if (name == NULL || *name == '\0') {
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidpp)
|
|
|
|
*oidpp = oidp;
|
1995-12-04 16:48:58 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE)
|
1995-12-04 16:48:58 +00:00
|
|
|
break;
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
if (oidp->oid_handler)
|
1995-12-04 16:48:58 +00:00
|
|
|
break;
|
|
|
|
|
2010-11-29 18:17:53 +00:00
|
|
|
lsp = SYSCTL_CHILDREN(oidp);
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
2004-12-31 14:52:53 +00:00
|
|
|
return (ENOENT);
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_sysctl_name2oid(SYSCTL_HANDLER_ARGS)
|
1995-12-04 16:48:58 +00:00
|
|
|
{
|
|
|
|
char *p;
|
2010-11-29 21:53:21 +00:00
|
|
|
int error, oid[CTL_MAXNAME], len = 0;
|
2016-04-15 16:10:11 +00:00
|
|
|
struct sysctl_oid *op = NULL;
|
2015-09-15 23:06:56 +00:00
|
|
|
struct rm_priotracker tracker;
|
2017-11-11 21:50:36 +00:00
|
|
|
char buf[32];
|
1995-12-04 16:48:58 +00:00
|
|
|
|
|
|
|
if (!req->newlen)
|
2004-12-31 14:52:53 +00:00
|
|
|
return (ENOENT);
|
1999-03-30 09:00:45 +00:00
|
|
|
if (req->newlen >= MAXPATHLEN) /* XXX arbitrary, undocumented */
|
|
|
|
return (ENAMETOOLONG);
|
1995-12-04 16:48:58 +00:00
|
|
|
|
2017-11-11 21:50:36 +00:00
|
|
|
p = buf;
|
|
|
|
if (req->newlen >= sizeof(buf))
|
|
|
|
p = malloc(req->newlen+1, M_SYSCTL, M_WAITOK);
|
1995-12-04 16:48:58 +00:00
|
|
|
|
|
|
|
error = SYSCTL_IN(req, p, req->newlen);
|
|
|
|
if (error) {
|
2017-11-11 21:50:36 +00:00
|
|
|
if (p != buf)
|
|
|
|
free(p, M_SYSCTL);
|
1995-12-04 16:48:58 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
p [req->newlen] = '\0';
|
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_RLOCK(&tracker);
|
1995-12-04 16:48:58 +00:00
|
|
|
error = name2oid(p, oid, &len, &op);
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_RUNLOCK(&tracker);
|
1995-12-04 16:48:58 +00:00
|
|
|
|
2017-11-11 21:50:36 +00:00
|
|
|
if (p != buf)
|
|
|
|
free(p, M_SYSCTL);
|
1995-12-04 16:48:58 +00:00
|
|
|
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
1995-12-06 13:27:39 +00:00
|
|
|
error = SYSCTL_OUT(req, oid, len * sizeof *oid);
|
1995-12-04 16:48:58 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2011-07-17 23:05:24 +00:00
|
|
|
/*
|
|
|
|
* XXXRW/JA: Shouldn't return name2oid data for nodes that we don't permit in
|
|
|
|
* capability mode.
|
|
|
|
*/
|
2019-09-18 16:13:10 +00:00
|
|
|
SYSCTL_PROC(_sysctl, CTL_SYSCTL_NAME2OID, name2oid, CTLTYPE_INT | CTLFLAG_RW |
|
|
|
|
CTLFLAG_ANYBODY | CTLFLAG_MPSAFE | CTLFLAG_CAPRW, 0, 0,
|
|
|
|
sysctl_sysctl_name2oid, "I", "");
|
1995-12-04 16:48:58 +00:00
|
|
|
|
|
|
|
static int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_sysctl_oidfmt(SYSCTL_HANDLER_ARGS)
|
1995-12-04 16:48:58 +00:00
|
|
|
{
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid *oid;
|
2015-09-15 23:06:56 +00:00
|
|
|
struct rm_priotracker tracker;
|
1999-12-01 02:25:19 +00:00
|
|
|
int error;
|
1995-12-04 16:48:58 +00:00
|
|
|
|
2019-11-25 07:38:27 +00:00
|
|
|
error = sysctl_wire_old_buffer(req, 0);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_RLOCK(&tracker);
|
1999-12-01 02:25:19 +00:00
|
|
|
error = sysctl_find_oid(arg1, arg2, &oid, NULL, req);
|
|
|
|
if (error)
|
2010-11-29 18:18:07 +00:00
|
|
|
goto out;
|
1995-12-04 16:48:58 +00:00
|
|
|
|
2010-11-29 18:18:07 +00:00
|
|
|
if (oid->oid_fmt == NULL) {
|
|
|
|
error = ENOENT;
|
|
|
|
goto out;
|
|
|
|
}
|
1999-12-01 02:25:19 +00:00
|
|
|
error = SYSCTL_OUT(req, &oid->oid_kind, sizeof(oid->oid_kind));
|
|
|
|
if (error)
|
2010-11-29 18:18:07 +00:00
|
|
|
goto out;
|
1999-12-01 02:25:19 +00:00
|
|
|
error = SYSCTL_OUT(req, oid->oid_fmt, strlen(oid->oid_fmt) + 1);
|
2010-11-29 18:18:07 +00:00
|
|
|
out:
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_RUNLOCK(&tracker);
|
1995-12-06 13:27:39 +00:00
|
|
|
return (error);
|
1995-12-04 16:48:58 +00:00
|
|
|
}
|
|
|
|
|
2019-09-18 16:13:10 +00:00
|
|
|
static SYSCTL_NODE(_sysctl, CTL_SYSCTL_OIDFMT, oidfmt, CTLFLAG_RD |
|
|
|
|
CTLFLAG_MPSAFE | CTLFLAG_CAPRD, sysctl_sysctl_oidfmt, "");
|
1999-01-10 05:33:43 +00:00
|
|
|
|
2001-12-16 02:55:41 +00:00
|
|
|
static int
|
|
|
|
sysctl_sysctl_oiddescr(SYSCTL_HANDLER_ARGS)
|
|
|
|
{
|
|
|
|
struct sysctl_oid *oid;
|
2015-09-15 23:06:56 +00:00
|
|
|
struct rm_priotracker tracker;
|
2001-12-16 02:55:41 +00:00
|
|
|
int error;
|
|
|
|
|
2019-11-25 07:38:27 +00:00
|
|
|
error = sysctl_wire_old_buffer(req, 0);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_RLOCK(&tracker);
|
2001-12-16 02:55:41 +00:00
|
|
|
error = sysctl_find_oid(arg1, arg2, &oid, NULL, req);
|
|
|
|
if (error)
|
2010-11-29 18:18:07 +00:00
|
|
|
goto out;
|
2001-12-16 02:55:41 +00:00
|
|
|
|
2010-11-29 18:18:07 +00:00
|
|
|
if (oid->oid_descr == NULL) {
|
|
|
|
error = ENOENT;
|
|
|
|
goto out;
|
|
|
|
}
|
2005-02-07 07:40:39 +00:00
|
|
|
error = SYSCTL_OUT(req, oid->oid_descr, strlen(oid->oid_descr) + 1);
|
2010-11-29 18:18:07 +00:00
|
|
|
out:
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_RUNLOCK(&tracker);
|
2001-12-16 02:55:41 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2019-09-18 16:13:10 +00:00
|
|
|
static SYSCTL_NODE(_sysctl, CTL_SYSCTL_OIDDESCR, oiddescr, CTLFLAG_RD |
|
|
|
|
CTLFLAG_MPSAFE|CTLFLAG_CAPRD, sysctl_sysctl_oiddescr, "");
|
2001-12-16 02:55:41 +00:00
|
|
|
|
2016-12-14 12:47:34 +00:00
|
|
|
static int
|
|
|
|
sysctl_sysctl_oidlabel(SYSCTL_HANDLER_ARGS)
|
|
|
|
{
|
|
|
|
struct sysctl_oid *oid;
|
|
|
|
struct rm_priotracker tracker;
|
|
|
|
int error;
|
|
|
|
|
2019-11-25 07:38:27 +00:00
|
|
|
error = sysctl_wire_old_buffer(req, 0);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
2016-12-14 12:47:34 +00:00
|
|
|
SYSCTL_RLOCK(&tracker);
|
|
|
|
error = sysctl_find_oid(arg1, arg2, &oid, NULL, req);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (oid->oid_label == NULL) {
|
|
|
|
error = ENOENT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
error = SYSCTL_OUT(req, oid->oid_label, strlen(oid->oid_label) + 1);
|
|
|
|
out:
|
|
|
|
SYSCTL_RUNLOCK(&tracker);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2019-09-18 16:13:10 +00:00
|
|
|
static SYSCTL_NODE(_sysctl, CTL_SYSCTL_OIDLABEL, oidlabel, CTLFLAG_RD |
|
|
|
|
CTLFLAG_MPSAFE | CTLFLAG_CAPRD, sysctl_sysctl_oidlabel, "");
|
2016-12-14 12:47:34 +00:00
|
|
|
|
1995-12-04 16:48:58 +00:00
|
|
|
/*
|
|
|
|
* Default "handler" functions.
|
|
|
|
*/
|
1995-10-28 12:59:25 +00:00
|
|
|
|
2016-05-26 08:41:55 +00:00
|
|
|
/*
|
|
|
|
* Handle a bool.
|
|
|
|
* Two cases:
|
|
|
|
* a variable: point arg1 at it.
|
|
|
|
* a constant: pass it in arg2.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
|
|
|
sysctl_handle_bool(SYSCTL_HANDLER_ARGS)
|
|
|
|
{
|
|
|
|
uint8_t temp;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Attempt to get a coherent snapshot by making a copy of the data.
|
|
|
|
*/
|
|
|
|
if (arg1)
|
|
|
|
temp = *(bool *)arg1 ? 1 : 0;
|
|
|
|
else
|
|
|
|
temp = arg2 ? 1 : 0;
|
|
|
|
|
|
|
|
error = SYSCTL_OUT(req, &temp, sizeof(temp));
|
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
if (!arg1)
|
|
|
|
error = EPERM;
|
|
|
|
else {
|
|
|
|
error = SYSCTL_IN(req, &temp, sizeof(temp));
|
|
|
|
if (!error)
|
|
|
|
*(bool *)arg1 = temp ? 1 : 0;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2015-10-22 23:03:06 +00:00
|
|
|
/*
|
|
|
|
* Handle an int8_t, signed or unsigned.
|
|
|
|
* Two cases:
|
|
|
|
* a variable: point arg1 at it.
|
|
|
|
* a constant: pass it in arg2.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
|
|
|
sysctl_handle_8(SYSCTL_HANDLER_ARGS)
|
|
|
|
{
|
|
|
|
int8_t tmpout;
|
|
|
|
int error = 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Attempt to get a coherent snapshot by making a copy of the data.
|
|
|
|
*/
|
|
|
|
if (arg1)
|
|
|
|
tmpout = *(int8_t *)arg1;
|
|
|
|
else
|
|
|
|
tmpout = arg2;
|
|
|
|
error = SYSCTL_OUT(req, &tmpout, sizeof(tmpout));
|
|
|
|
|
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
if (!arg1)
|
|
|
|
error = EPERM;
|
|
|
|
else
|
|
|
|
error = SYSCTL_IN(req, arg1, sizeof(tmpout));
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Handle an int16_t, signed or unsigned.
|
|
|
|
* Two cases:
|
|
|
|
* a variable: point arg1 at it.
|
|
|
|
* a constant: pass it in arg2.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
|
|
|
sysctl_handle_16(SYSCTL_HANDLER_ARGS)
|
|
|
|
{
|
|
|
|
int16_t tmpout;
|
|
|
|
int error = 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Attempt to get a coherent snapshot by making a copy of the data.
|
|
|
|
*/
|
|
|
|
if (arg1)
|
|
|
|
tmpout = *(int16_t *)arg1;
|
|
|
|
else
|
|
|
|
tmpout = arg2;
|
|
|
|
error = SYSCTL_OUT(req, &tmpout, sizeof(tmpout));
|
|
|
|
|
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
if (!arg1)
|
|
|
|
error = EPERM;
|
|
|
|
else
|
|
|
|
error = SYSCTL_IN(req, arg1, sizeof(tmpout));
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2015-11-07 01:43:01 +00:00
|
|
|
/*
|
|
|
|
* Handle an int32_t, signed or unsigned.
|
|
|
|
* Two cases:
|
|
|
|
* a variable: point arg1 at it.
|
|
|
|
* a constant: pass it in arg2.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
|
|
|
sysctl_handle_32(SYSCTL_HANDLER_ARGS)
|
|
|
|
{
|
|
|
|
int32_t tmpout;
|
|
|
|
int error = 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Attempt to get a coherent snapshot by making a copy of the data.
|
|
|
|
*/
|
|
|
|
if (arg1)
|
|
|
|
tmpout = *(int32_t *)arg1;
|
|
|
|
else
|
|
|
|
tmpout = arg2;
|
|
|
|
error = SYSCTL_OUT(req, &tmpout, sizeof(tmpout));
|
|
|
|
|
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
if (!arg1)
|
|
|
|
error = EPERM;
|
|
|
|
else
|
|
|
|
error = SYSCTL_IN(req, arg1, sizeof(tmpout));
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
/*
|
1998-12-27 18:03:29 +00:00
|
|
|
* Handle an int, signed or unsigned.
|
1995-11-12 19:52:09 +00:00
|
|
|
* Two cases:
|
|
|
|
* a variable: point arg1 at it.
|
|
|
|
* a constant: pass it in arg2.
|
|
|
|
*/
|
|
|
|
|
1995-10-28 13:07:28 +00:00
|
|
|
int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_handle_int(SYSCTL_HANDLER_ARGS)
|
1995-10-28 12:59:25 +00:00
|
|
|
{
|
2002-07-28 21:06:14 +00:00
|
|
|
int tmpout, error = 0;
|
1995-10-28 12:59:25 +00:00
|
|
|
|
2002-07-28 21:06:14 +00:00
|
|
|
/*
|
|
|
|
* Attempt to get a coherent snapshot by making a copy of the data.
|
|
|
|
*/
|
1995-11-12 19:52:09 +00:00
|
|
|
if (arg1)
|
2002-07-28 21:06:14 +00:00
|
|
|
tmpout = *(int *)arg1;
|
1996-12-15 14:38:46 +00:00
|
|
|
else
|
2002-07-28 21:06:14 +00:00
|
|
|
tmpout = arg2;
|
|
|
|
error = SYSCTL_OUT(req, &tmpout, sizeof(int));
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
if (!arg1)
|
|
|
|
error = EPERM;
|
|
|
|
else
|
|
|
|
error = SYSCTL_IN(req, arg1, sizeof(int));
|
|
|
|
return (error);
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
|
|
|
|
2006-02-16 15:40:36 +00:00
|
|
|
/*
|
|
|
|
* Based on on sysctl_handle_int() convert milliseconds into ticks.
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
* Note: this is used by TCP.
|
2006-02-16 15:40:36 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
|
|
|
sysctl_msec_to_ticks(SYSCTL_HANDLER_ARGS)
|
|
|
|
{
|
|
|
|
int error, s, tt;
|
|
|
|
|
Permit buiding kernels with options VIMAGE, restricted to only a single
active network stack instance. Turning on options VIMAGE at compile
time yields the following changes relative to default kernel build:
1) V_ accessor macros for virtualized variables resolve to structure
fields via base pointers, instead of being resolved as fields in global
structs or plain global variables. As an example, V_ifnet becomes:
options VIMAGE: ((struct vnet_net *) vnet_net)->_ifnet
default build: vnet_net_0._ifnet
options VIMAGE_GLOBALS: ifnet
2) INIT_VNET_* macros will declare and set up base pointers to be used
by V_ accessor macros, instead of resolving to whitespace:
INIT_VNET_NET(ifp->if_vnet); becomes
struct vnet_net *vnet_net = (ifp->if_vnet)->mod_data[VNET_MOD_NET];
3) Memory for vnet modules registered via vnet_mod_register() is now
allocated at run time in sys/kern/kern_vimage.c, instead of per vnet
module structs being declared as globals. If required, vnet modules
can now request the framework to provide them with allocated bzeroed
memory by filling in the vmi_size field in their vmi_modinfo structures.
4) structs socket, ifnet, inpcbinfo, tcpcb and syncache_head are
extended to hold a pointer to the parent vnet. options VIMAGE builds
will fill in those fields as required.
5) curvnet is introduced as a new global variable in options VIMAGE
builds, always pointing to the default and only struct vnet.
6) struct sysctl_oid has been extended with additional two fields to
store major and minor virtualization module identifiers, oid_v_subs and
oid_v_mod. SYSCTL_V_* family of macros will fill in those fields
accordingly, and store the offset in the appropriate vnet container
struct in oid_arg1.
In sysctl handlers dealing with virtualized sysctls, the
SYSCTL_RESOLVE_V_ARG1() macro will compute the address of the target
variable and make it available in arg1 variable for further processing.
Unused fields in structs vnet_inet, vnet_inet6 and vnet_ipfw have
been deleted.
Reviewed by: bz, rwatson
Approved by: julian (mentor)
2009-04-30 13:36:26 +00:00
|
|
|
tt = *(int *)arg1;
|
2006-02-16 15:40:36 +00:00
|
|
|
s = (int)((int64_t)tt * 1000 / hz);
|
|
|
|
|
|
|
|
error = sysctl_handle_int(oidp, &s, 0, req);
|
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
tt = (int)((int64_t)s * hz / 1000);
|
|
|
|
if (tt < 1)
|
|
|
|
return (EINVAL);
|
|
|
|
|
Permit buiding kernels with options VIMAGE, restricted to only a single
active network stack instance. Turning on options VIMAGE at compile
time yields the following changes relative to default kernel build:
1) V_ accessor macros for virtualized variables resolve to structure
fields via base pointers, instead of being resolved as fields in global
structs or plain global variables. As an example, V_ifnet becomes:
options VIMAGE: ((struct vnet_net *) vnet_net)->_ifnet
default build: vnet_net_0._ifnet
options VIMAGE_GLOBALS: ifnet
2) INIT_VNET_* macros will declare and set up base pointers to be used
by V_ accessor macros, instead of resolving to whitespace:
INIT_VNET_NET(ifp->if_vnet); becomes
struct vnet_net *vnet_net = (ifp->if_vnet)->mod_data[VNET_MOD_NET];
3) Memory for vnet modules registered via vnet_mod_register() is now
allocated at run time in sys/kern/kern_vimage.c, instead of per vnet
module structs being declared as globals. If required, vnet modules
can now request the framework to provide them with allocated bzeroed
memory by filling in the vmi_size field in their vmi_modinfo structures.
4) structs socket, ifnet, inpcbinfo, tcpcb and syncache_head are
extended to hold a pointer to the parent vnet. options VIMAGE builds
will fill in those fields as required.
5) curvnet is introduced as a new global variable in options VIMAGE
builds, always pointing to the default and only struct vnet.
6) struct sysctl_oid has been extended with additional two fields to
store major and minor virtualization module identifiers, oid_v_subs and
oid_v_mod. SYSCTL_V_* family of macros will fill in those fields
accordingly, and store the offset in the appropriate vnet container
struct in oid_arg1.
In sysctl handlers dealing with virtualized sysctls, the
SYSCTL_RESOLVE_V_ARG1() macro will compute the address of the target
variable and make it available in arg1 variable for further processing.
Unused fields in structs vnet_inet, vnet_inet6 and vnet_ipfw have
been deleted.
Reviewed by: bz, rwatson
Approved by: julian (mentor)
2009-04-30 13:36:26 +00:00
|
|
|
*(int *)arg1 = tt;
|
2006-02-16 15:40:36 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
1998-08-24 08:39:39 +00:00
|
|
|
/*
|
2013-02-11 23:05:10 +00:00
|
|
|
* Handle a long, signed or unsigned.
|
|
|
|
* Two cases:
|
|
|
|
* a variable: point arg1 at it.
|
|
|
|
* a constant: pass it in arg2.
|
1998-08-24 08:39:39 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_handle_long(SYSCTL_HANDLER_ARGS)
|
1998-08-24 08:39:39 +00:00
|
|
|
{
|
|
|
|
int error = 0;
|
2004-10-11 22:04:16 +00:00
|
|
|
long tmplong;
|
|
|
|
#ifdef SCTL_MASK32
|
|
|
|
int tmpint;
|
|
|
|
#endif
|
1998-08-24 08:39:39 +00:00
|
|
|
|
2002-07-28 21:06:14 +00:00
|
|
|
/*
|
|
|
|
* Attempt to get a coherent snapshot by making a copy of the data.
|
|
|
|
*/
|
2013-02-11 21:50:00 +00:00
|
|
|
if (arg1)
|
|
|
|
tmplong = *(long *)arg1;
|
|
|
|
else
|
|
|
|
tmplong = arg2;
|
2004-10-11 22:04:16 +00:00
|
|
|
#ifdef SCTL_MASK32
|
|
|
|
if (req->flags & SCTL_MASK32) {
|
|
|
|
tmpint = tmplong;
|
|
|
|
error = SYSCTL_OUT(req, &tmpint, sizeof(int));
|
|
|
|
} else
|
|
|
|
#endif
|
|
|
|
error = SYSCTL_OUT(req, &tmplong, sizeof(long));
|
1998-08-24 08:39:39 +00:00
|
|
|
|
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
|
|
|
|
2013-02-11 21:50:00 +00:00
|
|
|
if (!arg1)
|
|
|
|
error = EPERM;
|
2004-10-11 22:04:16 +00:00
|
|
|
#ifdef SCTL_MASK32
|
2013-02-11 21:50:00 +00:00
|
|
|
else if (req->flags & SCTL_MASK32) {
|
2004-10-11 22:04:16 +00:00
|
|
|
error = SYSCTL_IN(req, &tmpint, sizeof(int));
|
|
|
|
*(long *)arg1 = (long)tmpint;
|
2013-02-11 21:50:00 +00:00
|
|
|
}
|
2004-10-11 22:04:16 +00:00
|
|
|
#endif
|
2013-02-11 21:50:00 +00:00
|
|
|
else
|
2004-10-11 22:04:16 +00:00
|
|
|
error = SYSCTL_IN(req, arg1, sizeof(long));
|
1998-08-24 08:39:39 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2007-06-04 18:14:28 +00:00
|
|
|
/*
|
2013-02-11 23:05:10 +00:00
|
|
|
* Handle a 64 bit int, signed or unsigned.
|
|
|
|
* Two cases:
|
|
|
|
* a variable: point arg1 at it.
|
|
|
|
* a constant: pass it in arg2.
|
2007-06-04 18:14:28 +00:00
|
|
|
*/
|
|
|
|
int
|
2011-01-19 23:00:25 +00:00
|
|
|
sysctl_handle_64(SYSCTL_HANDLER_ARGS)
|
2007-06-04 18:14:28 +00:00
|
|
|
{
|
|
|
|
int error = 0;
|
|
|
|
uint64_t tmpout;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Attempt to get a coherent snapshot by making a copy of the data.
|
|
|
|
*/
|
2013-02-11 21:50:00 +00:00
|
|
|
if (arg1)
|
|
|
|
tmpout = *(uint64_t *)arg1;
|
|
|
|
else
|
|
|
|
tmpout = arg2;
|
2007-06-04 18:14:28 +00:00
|
|
|
error = SYSCTL_OUT(req, &tmpout, sizeof(uint64_t));
|
|
|
|
|
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
|
|
|
|
2013-02-11 21:50:00 +00:00
|
|
|
if (!arg1)
|
|
|
|
error = EPERM;
|
|
|
|
else
|
|
|
|
error = SYSCTL_IN(req, arg1, sizeof(uint64_t));
|
2007-06-04 18:14:28 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
/*
|
|
|
|
* Handle our generic '\0' terminated 'C' string.
|
|
|
|
* Two cases:
|
|
|
|
* a variable string: point arg1 at it, arg2 is max length.
|
|
|
|
* a constant string: point arg1 at it, arg2 is zero.
|
|
|
|
*/
|
|
|
|
|
1995-10-28 13:07:28 +00:00
|
|
|
int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_handle_string(SYSCTL_HANDLER_ARGS)
|
1995-10-28 12:59:25 +00:00
|
|
|
{
|
2020-02-06 12:45:58 +00:00
|
|
|
char *tmparg;
|
2002-07-28 21:06:14 +00:00
|
|
|
size_t outlen;
|
2014-07-10 21:46:57 +00:00
|
|
|
int error = 0, ro_string = 0;
|
2002-10-17 20:03:38 +00:00
|
|
|
|
2014-06-28 03:59:04 +00:00
|
|
|
/*
|
2020-04-15 16:33:55 +00:00
|
|
|
* If the sysctl isn't writable and isn't a preallocated tunable that
|
|
|
|
* can be modified by kenv(2), microoptimise and treat it as a
|
|
|
|
* read-only string.
|
2014-06-28 03:59:04 +00:00
|
|
|
* A zero-length buffer indicates a fixed size read-only
|
2019-08-08 00:42:29 +00:00
|
|
|
* string. In ddb, don't worry about trying to make a malloced
|
|
|
|
* snapshot.
|
2014-06-28 03:59:04 +00:00
|
|
|
*/
|
2020-04-16 17:24:13 +00:00
|
|
|
if ((oidp->oid_kind & (CTLFLAG_WR | CTLFLAG_TUN)) == 0 ||
|
|
|
|
arg2 == 0 || kdb_active) {
|
2014-06-28 03:59:04 +00:00
|
|
|
arg2 = strlen((char *)arg1) + 1;
|
2014-07-10 21:46:57 +00:00
|
|
|
ro_string = 1;
|
|
|
|
}
|
1995-10-28 12:59:25 +00:00
|
|
|
|
2014-06-28 03:56:17 +00:00
|
|
|
if (req->oldptr != NULL) {
|
2014-07-10 21:46:57 +00:00
|
|
|
if (ro_string) {
|
|
|
|
tmparg = arg1;
|
2020-02-06 12:45:58 +00:00
|
|
|
outlen = strlen(tmparg) + 1;
|
2014-07-10 21:46:57 +00:00
|
|
|
} else {
|
|
|
|
tmparg = malloc(arg2, M_SYSCTLTMP, M_WAITOK);
|
2020-02-06 12:45:58 +00:00
|
|
|
sx_slock(&sysctlstringlock);
|
2014-07-10 21:46:57 +00:00
|
|
|
memcpy(tmparg, arg1, arg2);
|
2020-02-06 12:45:58 +00:00
|
|
|
sx_sunlock(&sysctlstringlock);
|
|
|
|
outlen = strlen(tmparg) + 1;
|
2014-07-10 21:46:57 +00:00
|
|
|
}
|
2014-06-27 22:05:21 +00:00
|
|
|
|
2014-06-28 03:56:17 +00:00
|
|
|
error = SYSCTL_OUT(req, tmparg, outlen);
|
2014-06-27 22:05:21 +00:00
|
|
|
|
2014-07-10 21:46:57 +00:00
|
|
|
if (!ro_string)
|
|
|
|
free(tmparg, M_SYSCTLTMP);
|
2014-06-28 03:56:17 +00:00
|
|
|
} else {
|
2020-02-06 12:45:58 +00:00
|
|
|
if (!ro_string)
|
|
|
|
sx_slock(&sysctlstringlock);
|
|
|
|
outlen = strlen((char *)arg1) + 1;
|
|
|
|
if (!ro_string)
|
|
|
|
sx_sunlock(&sysctlstringlock);
|
2014-06-28 03:56:17 +00:00
|
|
|
error = SYSCTL_OUT(req, NULL, outlen);
|
|
|
|
}
|
1999-03-30 09:00:45 +00:00
|
|
|
if (error || !req->newptr)
|
1995-11-12 19:52:09 +00:00
|
|
|
return (error);
|
1995-10-28 12:59:25 +00:00
|
|
|
|
2020-02-06 12:45:58 +00:00
|
|
|
if (req->newlen - req->newidx >= arg2 ||
|
2020-02-10 20:53:59 +00:00
|
|
|
req->newlen - req->newidx < 0) {
|
1999-03-30 09:00:45 +00:00
|
|
|
error = EINVAL;
|
2020-02-10 20:53:59 +00:00
|
|
|
} else if (req->newlen - req->newidx == 0) {
|
|
|
|
sx_xlock(&sysctlstringlock);
|
|
|
|
((char *)arg1)[0] = '\0';
|
|
|
|
sx_xunlock(&sysctlstringlock);
|
2021-04-18 16:09:30 +00:00
|
|
|
} else if (req->newfunc == sysctl_new_kernel) {
|
|
|
|
arg2 = req->newlen - req->newidx;
|
|
|
|
sx_xlock(&sysctlstringlock);
|
|
|
|
error = SYSCTL_IN(req, arg1, arg2);
|
|
|
|
if (error == 0) {
|
|
|
|
((char *)arg1)[arg2] = '\0';
|
|
|
|
req->newidx += arg2;
|
|
|
|
}
|
|
|
|
sx_xunlock(&sysctlstringlock);
|
1995-11-12 19:52:09 +00:00
|
|
|
} else {
|
2020-02-06 12:45:58 +00:00
|
|
|
arg2 = req->newlen - req->newidx;
|
|
|
|
tmparg = malloc(arg2, M_SYSCTLTMP, M_WAITOK);
|
|
|
|
|
2020-04-15 16:33:55 +00:00
|
|
|
error = SYSCTL_IN(req, tmparg, arg2);
|
2020-02-06 12:45:58 +00:00
|
|
|
if (error) {
|
|
|
|
free(tmparg, M_SYSCTLTMP);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
sx_xlock(&sysctlstringlock);
|
|
|
|
memcpy(arg1, tmparg, arg2);
|
1995-11-12 19:52:09 +00:00
|
|
|
((char *)arg1)[arg2] = '\0';
|
2020-02-06 12:45:58 +00:00
|
|
|
sx_xunlock(&sysctlstringlock);
|
|
|
|
free(tmparg, M_SYSCTLTMP);
|
|
|
|
req->newidx += arg2;
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
1995-11-06 16:18:52 +00:00
|
|
|
return (error);
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
/*
|
|
|
|
* Handle any kind of opaque data.
|
|
|
|
* arg1 points to it, arg2 is the size.
|
|
|
|
*/
|
|
|
|
|
1995-10-28 13:07:28 +00:00
|
|
|
int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_handle_opaque(SYSCTL_HANDLER_ARGS)
|
1995-10-28 12:59:25 +00:00
|
|
|
{
|
2003-10-05 09:37:47 +00:00
|
|
|
int error, tries;
|
|
|
|
u_int generation;
|
2003-10-05 13:31:33 +00:00
|
|
|
struct sysctl_req req2;
|
1995-10-28 12:59:25 +00:00
|
|
|
|
2002-07-28 21:06:14 +00:00
|
|
|
/*
|
2003-10-05 09:37:47 +00:00
|
|
|
* Attempt to get a coherent snapshot, by using the thread
|
|
|
|
* pre-emption counter updated from within mi_switch() to
|
|
|
|
* determine if we were pre-empted during a bcopy() or
|
|
|
|
* copyout(). Make 3 attempts at doing this before giving up.
|
|
|
|
* If we encounter an error, stop immediately.
|
2002-07-28 21:06:14 +00:00
|
|
|
*/
|
2003-10-05 09:37:47 +00:00
|
|
|
tries = 0;
|
2003-10-05 13:31:33 +00:00
|
|
|
req2 = *req;
|
|
|
|
retry:
|
|
|
|
generation = curthread->td_generation;
|
|
|
|
error = SYSCTL_OUT(req, arg1, arg2);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
tries++;
|
|
|
|
if (generation != curthread->td_generation && tries < 3) {
|
|
|
|
*req = req2;
|
|
|
|
goto retry;
|
|
|
|
}
|
1995-11-12 19:52:09 +00:00
|
|
|
|
|
|
|
error = SYSCTL_IN(req, arg1, arg2);
|
|
|
|
|
|
|
|
return (error);
|
|
|
|
}
|
1995-10-28 12:59:25 +00:00
|
|
|
|
2018-11-02 17:50:57 +00:00
|
|
|
/*
|
|
|
|
* Based on on sysctl_handle_int() convert microseconds to a sbintime.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
sysctl_usec_to_sbintime(SYSCTL_HANDLER_ARGS)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
int64_t tt;
|
|
|
|
sbintime_t sb;
|
|
|
|
|
|
|
|
tt = *(int64_t *)arg1;
|
2018-11-15 16:02:24 +00:00
|
|
|
sb = sbttous(tt);
|
2018-11-02 17:50:57 +00:00
|
|
|
|
|
|
|
error = sysctl_handle_64(oidp, &sb, 0, req);
|
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
|
|
|
|
2018-11-15 16:02:24 +00:00
|
|
|
tt = ustosbt(sb);
|
2018-11-02 17:50:57 +00:00
|
|
|
*(int64_t *)arg1 = tt;
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Based on on sysctl_handle_int() convert milliseconds to a sbintime.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
sysctl_msec_to_sbintime(SYSCTL_HANDLER_ARGS)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
int64_t tt;
|
|
|
|
sbintime_t sb;
|
|
|
|
|
|
|
|
tt = *(int64_t *)arg1;
|
2018-11-15 16:02:24 +00:00
|
|
|
sb = sbttoms(tt);
|
2018-11-02 17:50:57 +00:00
|
|
|
|
|
|
|
error = sysctl_handle_64(oidp, &sb, 0, req);
|
|
|
|
if (error || !req->newptr)
|
|
|
|
return (error);
|
|
|
|
|
2018-11-15 16:02:24 +00:00
|
|
|
tt = mstosbt(sb);
|
2018-11-02 17:50:57 +00:00
|
|
|
*(int64_t *)arg1 = tt;
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2019-06-11 23:00:55 +00:00
|
|
|
/*
|
|
|
|
* Convert seconds to a struct timeval. Intended for use with
|
|
|
|
* intervals and thus does not permit negative seconds.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
sysctl_sec_to_timeval(SYSCTL_HANDLER_ARGS)
|
|
|
|
{
|
|
|
|
struct timeval *tv;
|
|
|
|
int error, secs;
|
|
|
|
|
|
|
|
tv = arg1;
|
|
|
|
secs = tv->tv_sec;
|
|
|
|
|
|
|
|
error = sysctl_handle_int(oidp, &secs, 0, req);
|
|
|
|
if (error || req->newptr == NULL)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
if (secs < 0)
|
|
|
|
return (EINVAL);
|
|
|
|
tv->tv_sec = secs;
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
2018-11-02 17:50:57 +00:00
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
/*
|
|
|
|
* Transfer functions to/from kernel space.
|
|
|
|
* XXX: rather untested at this point
|
|
|
|
*/
|
|
|
|
static int
|
1998-08-24 08:39:39 +00:00
|
|
|
sysctl_old_kernel(struct sysctl_req *req, const void *p, size_t l)
|
1995-11-12 19:52:09 +00:00
|
|
|
{
|
1998-08-24 08:39:39 +00:00
|
|
|
size_t i = 0;
|
1995-11-13 13:54:09 +00:00
|
|
|
|
|
|
|
if (req->oldptr) {
|
1998-08-24 08:39:39 +00:00
|
|
|
i = l;
|
2001-03-08 01:20:43 +00:00
|
|
|
if (req->oldlen <= req->oldidx)
|
|
|
|
i = 0;
|
|
|
|
else
|
|
|
|
if (i > req->oldlen - req->oldidx)
|
|
|
|
i = req->oldlen - req->oldidx;
|
1995-11-13 13:54:09 +00:00
|
|
|
if (i > 0)
|
1996-08-31 14:48:13 +00:00
|
|
|
bcopy(p, (char *)req->oldptr + req->oldidx, i);
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
2009-05-15 14:41:44 +00:00
|
|
|
req->oldidx += l;
|
1996-06-10 16:23:42 +00:00
|
|
|
if (req->oldptr && i != l)
|
1995-11-12 19:52:09 +00:00
|
|
|
return (ENOMEM);
|
1995-11-13 13:54:09 +00:00
|
|
|
return (0);
|
1995-11-12 19:52:09 +00:00
|
|
|
}
|
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
static int
|
1998-08-24 08:39:39 +00:00
|
|
|
sysctl_new_kernel(struct sysctl_req *req, void *p, size_t l)
|
1995-11-12 19:52:09 +00:00
|
|
|
{
|
1995-11-13 13:54:09 +00:00
|
|
|
if (!req->newptr)
|
2004-12-31 14:52:53 +00:00
|
|
|
return (0);
|
1995-11-13 13:54:09 +00:00
|
|
|
if (req->newlen - req->newidx < l)
|
1995-11-12 19:52:09 +00:00
|
|
|
return (EINVAL);
|
2018-12-18 12:44:38 +00:00
|
|
|
bcopy((const char *)req->newptr + req->newidx, p, l);
|
1995-11-12 19:52:09 +00:00
|
|
|
req->newidx += l;
|
1995-11-06 16:18:52 +00:00
|
|
|
return (0);
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
|
|
|
|
1996-06-10 16:23:42 +00:00
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
kernel_sysctl(struct thread *td, int *name, u_int namelen, void *old,
|
2004-10-11 22:04:16 +00:00
|
|
|
size_t *oldlenp, void *new, size_t newlen, size_t *retval, int flags)
|
1996-06-10 16:23:42 +00:00
|
|
|
{
|
|
|
|
int error = 0;
|
|
|
|
struct sysctl_req req;
|
|
|
|
|
|
|
|
bzero(&req, sizeof req);
|
|
|
|
|
2001-11-08 02:13:18 +00:00
|
|
|
req.td = td;
|
2004-10-11 22:04:16 +00:00
|
|
|
req.flags = flags;
|
1996-06-10 16:23:42 +00:00
|
|
|
|
|
|
|
if (oldlenp) {
|
|
|
|
req.oldlen = *oldlenp;
|
|
|
|
}
|
2004-03-16 06:53:03 +00:00
|
|
|
req.validlen = req.oldlen;
|
1996-06-10 16:23:42 +00:00
|
|
|
|
|
|
|
if (old) {
|
|
|
|
req.oldptr= old;
|
|
|
|
}
|
|
|
|
|
2001-06-03 04:58:51 +00:00
|
|
|
if (new != NULL) {
|
1996-06-10 16:23:42 +00:00
|
|
|
req.newlen = newlen;
|
|
|
|
req.newptr = new;
|
|
|
|
}
|
|
|
|
|
|
|
|
req.oldfunc = sysctl_old_kernel;
|
|
|
|
req.newfunc = sysctl_new_kernel;
|
2011-01-26 22:48:09 +00:00
|
|
|
req.lock = REQ_UNWIRED;
|
1996-06-10 16:23:42 +00:00
|
|
|
|
|
|
|
error = sysctl_root(0, name, namelen, &req);
|
2003-10-05 13:31:33 +00:00
|
|
|
|
2004-03-16 06:53:03 +00:00
|
|
|
if (req.lock == REQ_WIRED && req.validlen > 0)
|
|
|
|
vsunlock(req.oldptr, req.validlen);
|
1996-06-10 16:23:42 +00:00
|
|
|
|
|
|
|
if (error && error != ENOMEM)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
if (retval) {
|
2004-03-16 06:53:03 +00:00
|
|
|
if (req.oldptr && req.oldidx > req.validlen)
|
|
|
|
*retval = req.validlen;
|
1996-06-10 16:23:42 +00:00
|
|
|
else
|
|
|
|
*retval = req.oldidx;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2001-05-19 05:45:55 +00:00
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
kernel_sysctlbyname(struct thread *td, char *name, void *old, size_t *oldlenp,
|
2004-10-11 22:04:16 +00:00
|
|
|
void *new, size_t newlen, size_t *retval, int flags)
|
2001-05-19 05:45:55 +00:00
|
|
|
{
|
|
|
|
int oid[CTL_MAXNAME];
|
2001-06-22 19:54:38 +00:00
|
|
|
size_t oidlen, plen;
|
|
|
|
int error;
|
2001-05-19 05:45:55 +00:00
|
|
|
|
2019-09-18 16:13:10 +00:00
|
|
|
oid[0] = CTL_SYSCTL;
|
|
|
|
oid[1] = CTL_SYSCTL_NAME2OID;
|
2001-05-19 05:45:55 +00:00
|
|
|
oidlen = sizeof(oid);
|
|
|
|
|
2001-09-12 08:38:13 +00:00
|
|
|
error = kernel_sysctl(td, oid, 2, oid, &oidlen,
|
2004-10-11 22:04:16 +00:00
|
|
|
(void *)name, strlen(name), &plen, flags);
|
2001-05-19 05:45:55 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
2001-09-12 08:38:13 +00:00
|
|
|
error = kernel_sysctl(td, oid, plen / sizeof(int), old, oldlenp,
|
2004-10-11 22:04:16 +00:00
|
|
|
new, newlen, retval, flags);
|
2001-05-19 05:45:55 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
/*
|
|
|
|
* Transfer function to/from user space.
|
|
|
|
*/
|
|
|
|
static int
|
1998-08-24 08:39:39 +00:00
|
|
|
sysctl_old_user(struct sysctl_req *req, const void *p, size_t l)
|
1995-11-12 19:52:09 +00:00
|
|
|
{
|
2004-02-26 00:27:04 +00:00
|
|
|
size_t i, len, origidx;
|
Handle spurious page faults that may occur in no-fault sections of the
kernel.
When access restrictions are added to a page table entry, we flush the
corresponding virtual address mapping from the TLB. In contrast, when
access restrictions are removed from a page table entry, we do not
flush the virtual address mapping from the TLB. This is exactly as
recommended in AMD's documentation. In effect, when access
restrictions are removed from a page table entry, AMD's MMUs will
transparently refresh a stale TLB entry. In short, this saves us from
having to perform potentially costly TLB flushes. In contrast,
Intel's MMUs are allowed to generate a spurious page fault based upon
the stale TLB entry. Usually, such spurious page faults are handled
by vm_fault() without incident. However, when we are executing
no-fault sections of the kernel, we are not allowed to execute
vm_fault(). This change introduces special-case handling for spurious
page faults that occur in no-fault sections of the kernel.
In collaboration with: kib
Tested by: gibbs (an earlier version)
I would also like to acknowledge Hiroki Sato's assistance in
diagnosing this problem.
MFC after: 1 week
2012-03-22 04:52:51 +00:00
|
|
|
int error;
|
1995-11-12 19:52:09 +00:00
|
|
|
|
2004-02-26 00:27:04 +00:00
|
|
|
origidx = req->oldidx;
|
2009-05-15 14:41:44 +00:00
|
|
|
req->oldidx += l;
|
|
|
|
if (req->oldptr == NULL)
|
2004-02-26 00:27:04 +00:00
|
|
|
return (0);
|
2005-08-08 18:54:35 +00:00
|
|
|
/*
|
|
|
|
* If we have not wired the user supplied buffer and we are currently
|
|
|
|
* holding locks, drop a witness warning, as it's possible that
|
|
|
|
* write operations to the user page can sleep.
|
|
|
|
*/
|
|
|
|
if (req->lock != REQ_WIRED)
|
2003-03-04 21:03:05 +00:00
|
|
|
WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL,
|
|
|
|
"sysctl_old_user()");
|
2004-02-26 00:27:04 +00:00
|
|
|
i = l;
|
2004-03-16 06:53:03 +00:00
|
|
|
len = req->validlen;
|
2004-02-26 00:27:04 +00:00
|
|
|
if (len <= origidx)
|
|
|
|
i = 0;
|
|
|
|
else {
|
|
|
|
if (i > len - origidx)
|
|
|
|
i = len - origidx;
|
Handle spurious page faults that may occur in no-fault sections of the
kernel.
When access restrictions are added to a page table entry, we flush the
corresponding virtual address mapping from the TLB. In contrast, when
access restrictions are removed from a page table entry, we do not
flush the virtual address mapping from the TLB. This is exactly as
recommended in AMD's documentation. In effect, when access
restrictions are removed from a page table entry, AMD's MMUs will
transparently refresh a stale TLB entry. In short, this saves us from
having to perform potentially costly TLB flushes. In contrast,
Intel's MMUs are allowed to generate a spurious page fault based upon
the stale TLB entry. Usually, such spurious page faults are handled
by vm_fault() without incident. However, when we are executing
no-fault sections of the kernel, we are not allowed to execute
vm_fault(). This change introduces special-case handling for spurious
page faults that occur in no-fault sections of the kernel.
In collaboration with: kib
Tested by: gibbs (an earlier version)
I would also like to acknowledge Hiroki Sato's assistance in
diagnosing this problem.
MFC after: 1 week
2012-03-22 04:52:51 +00:00
|
|
|
if (req->lock == REQ_WIRED) {
|
|
|
|
error = copyout_nofault(p, (char *)req->oldptr +
|
|
|
|
origidx, i);
|
|
|
|
} else
|
|
|
|
error = copyout(p, (char *)req->oldptr + origidx, i);
|
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
1995-11-13 13:54:09 +00:00
|
|
|
}
|
2004-02-26 00:27:04 +00:00
|
|
|
if (i < l)
|
1995-11-12 19:52:09 +00:00
|
|
|
return (ENOMEM);
|
1995-11-13 13:54:09 +00:00
|
|
|
return (0);
|
1995-11-12 19:52:09 +00:00
|
|
|
}
|
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
static int
|
1998-08-24 08:39:39 +00:00
|
|
|
sysctl_new_user(struct sysctl_req *req, void *p, size_t l)
|
1995-11-12 19:52:09 +00:00
|
|
|
{
|
1995-11-14 09:26:17 +00:00
|
|
|
int error;
|
1995-11-13 13:54:09 +00:00
|
|
|
|
|
|
|
if (!req->newptr)
|
2004-12-31 14:52:53 +00:00
|
|
|
return (0);
|
1995-11-13 13:54:09 +00:00
|
|
|
if (req->newlen - req->newidx < l)
|
1995-11-12 19:52:09 +00:00
|
|
|
return (EINVAL);
|
2005-08-08 21:06:42 +00:00
|
|
|
WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL,
|
|
|
|
"sysctl_new_user()");
|
2018-12-18 12:44:38 +00:00
|
|
|
error = copyin((const char *)req->newptr + req->newidx, p, l);
|
1995-11-12 19:52:09 +00:00
|
|
|
req->newidx += l;
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2002-07-22 08:25:37 +00:00
|
|
|
/*
|
|
|
|
* Wire the user space destination buffer. If set to a value greater than
|
|
|
|
* zero, the len parameter limits the maximum amount of wired memory.
|
|
|
|
*/
|
2004-02-26 00:27:04 +00:00
|
|
|
int
|
2002-07-22 08:25:37 +00:00
|
|
|
sysctl_wire_old_buffer(struct sysctl_req *req, size_t len)
|
|
|
|
{
|
2004-02-26 00:27:04 +00:00
|
|
|
int ret;
|
2009-05-15 21:34:58 +00:00
|
|
|
size_t wiredlen;
|
2004-02-26 00:27:04 +00:00
|
|
|
|
|
|
|
wiredlen = (len > 0 && len < req->oldlen) ? len : req->oldlen;
|
|
|
|
ret = 0;
|
2011-01-26 22:48:09 +00:00
|
|
|
if (req->lock != REQ_WIRED && req->oldptr &&
|
2003-10-05 05:38:30 +00:00
|
|
|
req->oldfunc == sysctl_old_user) {
|
2004-03-16 01:28:45 +00:00
|
|
|
if (wiredlen != 0) {
|
|
|
|
ret = vslock(req->oldptr, wiredlen);
|
2004-06-11 02:20:37 +00:00
|
|
|
if (ret != 0) {
|
|
|
|
if (ret != ENOMEM)
|
|
|
|
return (ret);
|
|
|
|
wiredlen = 0;
|
|
|
|
}
|
2004-02-26 00:27:04 +00:00
|
|
|
}
|
2004-03-16 01:28:45 +00:00
|
|
|
req->lock = REQ_WIRED;
|
2004-03-16 06:53:03 +00:00
|
|
|
req->validlen = wiredlen;
|
2002-07-22 08:25:37 +00:00
|
|
|
}
|
2004-03-16 01:28:45 +00:00
|
|
|
return (0);
|
2002-07-22 08:25:37 +00:00
|
|
|
}
|
|
|
|
|
1995-11-06 16:18:52 +00:00
|
|
|
int
|
1999-12-01 02:25:19 +00:00
|
|
|
sysctl_find_oid(int *name, u_int namelen, struct sysctl_oid **noid,
|
|
|
|
int *nindx, struct sysctl_req *req)
|
1995-11-06 16:18:52 +00:00
|
|
|
{
|
2010-11-29 18:18:00 +00:00
|
|
|
struct sysctl_oid_list *lsp;
|
1999-02-16 10:49:55 +00:00
|
|
|
struct sysctl_oid *oid;
|
1999-12-01 02:25:19 +00:00
|
|
|
int indx;
|
1995-11-06 16:18:52 +00:00
|
|
|
|
2014-10-21 19:05:44 +00:00
|
|
|
SYSCTL_ASSERT_LOCKED();
|
2010-11-29 18:18:00 +00:00
|
|
|
lsp = &sysctl__children;
|
1995-11-06 16:18:52 +00:00
|
|
|
indx = 0;
|
2010-11-29 18:18:00 +00:00
|
|
|
while (indx < CTL_MAXNAME) {
|
|
|
|
SLIST_FOREACH(oid, lsp, oid_link) {
|
|
|
|
if (oid->oid_number == name[indx])
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (oid == NULL)
|
|
|
|
return (ENOENT);
|
|
|
|
|
|
|
|
indx++;
|
|
|
|
if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
if (oid->oid_handler != NULL || indx == namelen) {
|
1999-12-01 02:25:19 +00:00
|
|
|
*noid = oid;
|
|
|
|
if (nindx != NULL)
|
|
|
|
*nindx = indx;
|
2010-11-29 18:18:07 +00:00
|
|
|
KASSERT((oid->oid_kind & CTLFLAG_DYING) == 0,
|
|
|
|
("%s found DYING node %p", __func__, oid));
|
1999-12-01 02:25:19 +00:00
|
|
|
return (0);
|
1995-11-06 16:18:52 +00:00
|
|
|
}
|
2010-11-29 18:18:00 +00:00
|
|
|
lsp = SYSCTL_CHILDREN(oid);
|
|
|
|
} else if (indx == namelen) {
|
2017-10-05 12:32:14 +00:00
|
|
|
if ((oid->oid_kind & CTLFLAG_DORMANT) != 0)
|
|
|
|
return (ENOENT);
|
2010-11-29 18:18:00 +00:00
|
|
|
*noid = oid;
|
|
|
|
if (nindx != NULL)
|
|
|
|
*nindx = indx;
|
2010-11-29 18:18:07 +00:00
|
|
|
KASSERT((oid->oid_kind & CTLFLAG_DYING) == 0,
|
|
|
|
("%s found DYING node %p", __func__, oid));
|
2010-11-29 18:18:00 +00:00
|
|
|
return (0);
|
1995-11-06 16:18:52 +00:00
|
|
|
} else {
|
2010-11-29 18:18:00 +00:00
|
|
|
return (ENOTDIR);
|
1995-11-06 16:18:52 +00:00
|
|
|
}
|
|
|
|
}
|
1999-12-01 02:25:19 +00:00
|
|
|
return (ENOENT);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Traverse our tree, and find the right node, execute whatever it points
|
|
|
|
* to, and return the resulting error code.
|
|
|
|
*/
|
|
|
|
|
2002-09-28 17:15:38 +00:00
|
|
|
static int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_root(SYSCTL_HANDLER_ARGS)
|
1999-12-01 02:25:19 +00:00
|
|
|
{
|
|
|
|
struct sysctl_oid *oid;
|
2015-09-15 23:06:56 +00:00
|
|
|
struct rm_priotracker tracker;
|
2003-01-14 19:35:33 +00:00
|
|
|
int error, indx, lvl;
|
1999-12-01 02:25:19 +00:00
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
SYSCTL_RLOCK(&tracker);
|
2008-12-29 12:58:45 +00:00
|
|
|
|
1999-12-01 02:25:19 +00:00
|
|
|
error = sysctl_find_oid(arg1, arg2, &oid, &indx, req);
|
|
|
|
if (error)
|
2015-09-15 23:06:56 +00:00
|
|
|
goto out;
|
1999-12-01 02:25:19 +00:00
|
|
|
|
|
|
|
if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
/*
|
|
|
|
* You can't call a sysctl when it's a node, but has
|
|
|
|
* no handler. Inform the user that it's a node.
|
|
|
|
* The indx may or may not be the same as namelen.
|
|
|
|
*/
|
2015-09-15 23:06:56 +00:00
|
|
|
if (oid->oid_handler == NULL) {
|
|
|
|
error = EISDIR;
|
|
|
|
goto out;
|
|
|
|
}
|
1999-12-01 02:25:19 +00:00
|
|
|
}
|
|
|
|
|
2001-09-26 19:51:25 +00:00
|
|
|
/* Is this sysctl writable? */
|
2015-09-15 23:06:56 +00:00
|
|
|
if (req->newptr && !(oid->oid_kind & CTLFLAG_WR)) {
|
|
|
|
error = EPERM;
|
|
|
|
goto out;
|
|
|
|
}
|
1995-11-06 16:18:52 +00:00
|
|
|
|
2002-03-22 14:58:27 +00:00
|
|
|
KASSERT(req->td != NULL, ("sysctl_root(): req->td == NULL"));
|
|
|
|
|
2011-07-17 23:05:24 +00:00
|
|
|
#ifdef CAPABILITY_MODE
|
|
|
|
/*
|
|
|
|
* If the process is in capability mode, then don't permit reading or
|
|
|
|
* writing unless specifically granted for the node.
|
|
|
|
*/
|
|
|
|
if (IN_CAPABILITY_MODE(req->td)) {
|
2015-09-15 23:06:56 +00:00
|
|
|
if ((req->oldptr && !(oid->oid_kind & CTLFLAG_CAPRD)) ||
|
|
|
|
(req->newptr && !(oid->oid_kind & CTLFLAG_CAPWR))) {
|
|
|
|
error = EPERM;
|
|
|
|
goto out;
|
|
|
|
}
|
2011-07-17 23:05:24 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2001-09-26 19:51:25 +00:00
|
|
|
/* Is this sysctl sensitive to securelevels? */
|
|
|
|
if (req->newptr && (oid->oid_kind & CTLFLAG_SECURE)) {
|
2003-01-14 19:35:33 +00:00
|
|
|
lvl = (oid->oid_kind & CTLMASK_SECURE) >> CTLSHIFT_SECURE;
|
|
|
|
error = securelevel_gt(req->td->td_ucred, lvl);
|
2002-03-22 14:58:27 +00:00
|
|
|
if (error)
|
2015-09-15 23:06:56 +00:00
|
|
|
goto out;
|
2001-09-26 19:51:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Is this sysctl writable by only privileged users? */
|
|
|
|
if (req->newptr && !(oid->oid_kind & CTLFLAG_ANYBODY)) {
|
2009-08-13 10:26:34 +00:00
|
|
|
int priv;
|
|
|
|
|
2002-03-22 14:58:27 +00:00
|
|
|
if (oid->oid_kind & CTLFLAG_PRISON)
|
2009-08-13 10:26:34 +00:00
|
|
|
priv = PRIV_SYSCTL_WRITEJAIL;
|
|
|
|
#ifdef VIMAGE
|
|
|
|
else if ((oid->oid_kind & CTLFLAG_VNET) &&
|
|
|
|
prison_owns_vnet(req->td->td_ucred))
|
|
|
|
priv = PRIV_SYSCTL_WRITEJAIL;
|
|
|
|
#endif
|
2002-03-22 14:58:27 +00:00
|
|
|
else
|
2009-08-13 10:26:34 +00:00
|
|
|
priv = PRIV_SYSCTL_WRITE;
|
|
|
|
error = priv_check(req->td, priv);
|
2002-03-22 14:58:27 +00:00
|
|
|
if (error)
|
2015-09-15 23:06:56 +00:00
|
|
|
goto out;
|
2001-09-26 19:51:25 +00:00
|
|
|
}
|
1995-12-17 21:11:22 +00:00
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
if (!oid->oid_handler) {
|
|
|
|
error = EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
1995-11-06 16:18:52 +00:00
|
|
|
|
2004-02-22 12:31:44 +00:00
|
|
|
if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
2004-07-28 06:42:41 +00:00
|
|
|
arg1 = (int *)arg1 + indx;
|
2004-02-22 12:31:44 +00:00
|
|
|
arg2 -= indx;
|
|
|
|
} else {
|
|
|
|
arg1 = oid->oid_arg1;
|
|
|
|
arg2 = oid->oid_arg2;
|
|
|
|
}
|
|
|
|
#ifdef MAC
|
2007-10-24 19:04:04 +00:00
|
|
|
error = mac_system_check_sysctl(req->td->td_ucred, oid, arg1, arg2,
|
2004-02-22 12:31:44 +00:00
|
|
|
req);
|
|
|
|
if (error != 0)
|
2015-09-15 23:06:56 +00:00
|
|
|
goto out;
|
2004-02-22 12:31:44 +00:00
|
|
|
#endif
|
2014-02-07 13:47:33 +00:00
|
|
|
#ifdef VIMAGE
|
|
|
|
if ((oid->oid_kind & CTLFLAG_VNET) && arg1 != NULL)
|
|
|
|
arg1 = (void *)(curvnet->vnet_data_base + (uintptr_t)arg1);
|
|
|
|
#endif
|
2015-09-15 23:06:56 +00:00
|
|
|
error = sysctl_root_handler_locked(oid, arg1, arg2, req, &tracker);
|
2004-02-22 12:31:44 +00:00
|
|
|
|
2015-09-15 23:06:56 +00:00
|
|
|
out:
|
|
|
|
SYSCTL_RUNLOCK(&tracker);
|
1999-12-01 02:25:19 +00:00
|
|
|
return (error);
|
1995-11-06 16:18:52 +00:00
|
|
|
}
|
|
|
|
|
1995-11-12 06:43:28 +00:00
|
|
|
#ifndef _SYS_SYSPROTO_H_
|
1995-11-09 20:22:12 +00:00
|
|
|
struct sysctl_args {
|
|
|
|
int *name;
|
|
|
|
u_int namelen;
|
|
|
|
void *old;
|
|
|
|
size_t *oldlenp;
|
|
|
|
void *new;
|
|
|
|
size_t newlen;
|
|
|
|
};
|
1995-11-12 06:43:28 +00:00
|
|
|
#endif
|
1994-05-24 10:09:53 +00:00
|
|
|
int
|
2011-09-16 13:58:51 +00:00
|
|
|
sys___sysctl(struct thread *td, struct sysctl_args *uap)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2009-02-06 14:51:32 +00:00
|
|
|
int error, i, name[CTL_MAXNAME];
|
1998-08-24 08:39:39 +00:00
|
|
|
size_t j;
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
if (uap->namelen > CTL_MAXNAME || uap->namelen < 2)
|
|
|
|
return (EINVAL);
|
1995-10-28 12:59:25 +00:00
|
|
|
|
1994-10-02 17:35:40 +00:00
|
|
|
error = copyin(uap->name, &name, uap->namelen * sizeof(int));
|
|
|
|
if (error)
|
1994-05-24 10:09:53 +00:00
|
|
|
return (error);
|
|
|
|
|
2001-09-12 08:38:13 +00:00
|
|
|
error = userland_sysctl(td, name, uap->namelen,
|
1995-11-09 20:22:12 +00:00
|
|
|
uap->old, uap->oldlenp, 0,
|
2004-10-11 22:04:16 +00:00
|
|
|
uap->new, uap->newlen, &j, 0);
|
1995-11-13 13:54:09 +00:00
|
|
|
if (error && error != ENOMEM)
|
2008-12-29 12:58:45 +00:00
|
|
|
return (error);
|
2009-01-01 00:19:51 +00:00
|
|
|
if (uap->oldlenp) {
|
2009-02-06 14:51:32 +00:00
|
|
|
i = copyout(&j, uap->oldlenp, sizeof(j));
|
2009-01-01 00:19:51 +00:00
|
|
|
if (i)
|
|
|
|
return (i);
|
|
|
|
}
|
1995-11-13 13:54:09 +00:00
|
|
|
return (error);
|
1995-11-09 20:22:12 +00:00
|
|
|
}
|
|
|
|
|
2019-09-03 04:16:30 +00:00
|
|
|
int
|
|
|
|
kern___sysctlbyname(struct thread *td, const char *oname, size_t namelen,
|
|
|
|
void *old, size_t *oldlenp, void *new, size_t newlen, size_t *retval,
|
|
|
|
int flags, bool inkernel)
|
|
|
|
{
|
|
|
|
int oid[CTL_MAXNAME];
|
|
|
|
char namebuf[16];
|
|
|
|
char *name;
|
|
|
|
size_t oidlen;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
if (namelen > MAXPATHLEN || namelen == 0)
|
|
|
|
return (EINVAL);
|
|
|
|
name = namebuf;
|
|
|
|
if (namelen > sizeof(namebuf))
|
|
|
|
name = malloc(namelen, M_SYSCTL, M_WAITOK);
|
|
|
|
error = copyin(oname, name, namelen);
|
|
|
|
if (error != 0)
|
|
|
|
goto out;
|
|
|
|
|
2019-09-18 16:13:10 +00:00
|
|
|
oid[0] = CTL_SYSCTL;
|
|
|
|
oid[1] = CTL_SYSCTL_NAME2OID;
|
2019-09-03 04:16:30 +00:00
|
|
|
oidlen = sizeof(oid);
|
|
|
|
error = kernel_sysctl(td, oid, 2, oid, &oidlen, (void *)name, namelen,
|
|
|
|
retval, flags);
|
|
|
|
if (error != 0)
|
|
|
|
goto out;
|
|
|
|
error = userland_sysctl(td, oid, *retval / sizeof(int), old, oldlenp,
|
|
|
|
inkernel, new, newlen, retval, flags);
|
|
|
|
|
|
|
|
out:
|
|
|
|
if (namelen > sizeof(namebuf))
|
|
|
|
free(name, M_SYSCTL);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef _SYS_SYSPROTO_H_
|
|
|
|
struct __sysctlbyname_args {
|
|
|
|
const char *name;
|
|
|
|
size_t namelen;
|
|
|
|
void *old;
|
|
|
|
size_t *oldlenp;
|
|
|
|
void *new;
|
|
|
|
size_t newlen;
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
int
|
|
|
|
sys___sysctlbyname(struct thread *td, struct __sysctlbyname_args *uap)
|
|
|
|
{
|
|
|
|
size_t rv;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
error = kern___sysctlbyname(td, uap->name, uap->namelen, uap->old,
|
|
|
|
uap->oldlenp, uap->new, uap->newlen, &rv, 0, 0);
|
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
|
|
|
if (uap->oldlenp != NULL)
|
|
|
|
error = copyout(&rv, uap->oldlenp, sizeof(rv));
|
|
|
|
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1995-11-09 20:22:12 +00:00
|
|
|
/*
|
|
|
|
* This is used from various compatibility syscalls too. That's why name
|
|
|
|
* must be in kernel space.
|
|
|
|
*/
|
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
userland_sysctl(struct thread *td, int *name, u_int namelen, void *old,
|
2018-12-18 12:44:38 +00:00
|
|
|
size_t *oldlenp, int inkernel, const void *new, size_t newlen,
|
|
|
|
size_t *retval, int flags)
|
1995-11-09 20:22:12 +00:00
|
|
|
{
|
2009-05-14 22:01:32 +00:00
|
|
|
int error = 0, memlocked;
|
2004-03-16 06:53:03 +00:00
|
|
|
struct sysctl_req req;
|
1995-11-12 19:52:09 +00:00
|
|
|
|
|
|
|
bzero(&req, sizeof req);
|
1995-11-09 20:22:12 +00:00
|
|
|
|
2001-11-08 02:13:18 +00:00
|
|
|
req.td = td;
|
2004-10-11 22:04:16 +00:00
|
|
|
req.flags = flags;
|
1995-11-14 09:26:17 +00:00
|
|
|
|
1995-11-09 20:22:12 +00:00
|
|
|
if (oldlenp) {
|
|
|
|
if (inkernel) {
|
1995-11-12 19:52:09 +00:00
|
|
|
req.oldlen = *oldlenp;
|
1995-11-09 20:22:12 +00:00
|
|
|
} else {
|
1995-11-13 13:54:09 +00:00
|
|
|
error = copyin(oldlenp, &req.oldlen, sizeof(*oldlenp));
|
1995-11-09 20:22:12 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
}
|
2004-03-16 06:53:03 +00:00
|
|
|
req.validlen = req.oldlen;
|
2017-09-27 01:31:52 +00:00
|
|
|
req.oldptr = old;
|
1995-11-06 16:18:52 +00:00
|
|
|
|
2001-06-03 04:58:51 +00:00
|
|
|
if (new != NULL) {
|
1995-11-12 19:52:09 +00:00
|
|
|
req.newlen = newlen;
|
|
|
|
req.newptr = new;
|
1995-10-28 12:59:25 +00:00
|
|
|
}
|
|
|
|
|
1995-11-12 19:52:09 +00:00
|
|
|
req.oldfunc = sysctl_old_user;
|
|
|
|
req.newfunc = sysctl_new_user;
|
2011-01-26 22:48:09 +00:00
|
|
|
req.lock = REQ_UNWIRED;
|
1995-11-20 12:42:39 +00:00
|
|
|
|
2009-03-11 21:48:36 +00:00
|
|
|
#ifdef KTRACE
|
|
|
|
if (KTRPOINT(curthread, KTR_SYSCTL))
|
|
|
|
ktrsysctl(name, namelen);
|
|
|
|
#endif
|
2017-10-19 01:38:31 +00:00
|
|
|
memlocked = 0;
|
|
|
|
if (req.oldptr && req.oldlen > 4 * PAGE_SIZE) {
|
2009-05-14 22:01:32 +00:00
|
|
|
memlocked = 1;
|
|
|
|
sx_xlock(&sysctlmemlock);
|
2017-10-19 01:38:31 +00:00
|
|
|
}
|
2009-06-15 19:01:53 +00:00
|
|
|
CURVNET_SET(TD_TO_VNET(td));
|
1995-11-12 19:52:09 +00:00
|
|
|
|
2008-12-12 12:06:28 +00:00
|
|
|
for (;;) {
|
2004-03-16 06:53:03 +00:00
|
|
|
req.oldidx = 0;
|
|
|
|
req.newidx = 0;
|
|
|
|
error = sysctl_root(0, name, namelen, &req);
|
2008-12-12 12:06:28 +00:00
|
|
|
if (error != EAGAIN)
|
|
|
|
break;
|
2011-05-13 05:27:58 +00:00
|
|
|
kern_yield(PRI_USER);
|
2008-12-12 12:06:28 +00:00
|
|
|
}
|
1995-10-28 12:59:25 +00:00
|
|
|
|
2008-11-26 22:32:07 +00:00
|
|
|
CURVNET_RESTORE();
|
1995-11-20 12:42:39 +00:00
|
|
|
|
2008-12-29 12:58:45 +00:00
|
|
|
if (req.lock == REQ_WIRED && req.validlen > 0)
|
|
|
|
vsunlock(req.oldptr, req.validlen);
|
2009-05-14 22:01:32 +00:00
|
|
|
if (memlocked)
|
|
|
|
sx_xunlock(&sysctlmemlock);
|
2008-12-29 12:58:45 +00:00
|
|
|
|
1995-11-13 13:54:09 +00:00
|
|
|
if (error && error != ENOMEM)
|
1995-11-06 16:18:52 +00:00
|
|
|
return (error);
|
1995-11-13 13:54:09 +00:00
|
|
|
|
|
|
|
if (retval) {
|
2004-03-16 06:53:03 +00:00
|
|
|
if (req.oldptr && req.oldidx > req.validlen)
|
|
|
|
*retval = req.validlen;
|
1995-11-13 13:54:09 +00:00
|
|
|
else
|
|
|
|
*retval = req.oldidx;
|
1995-11-06 16:18:52 +00:00
|
|
|
}
|
1995-11-13 13:54:09 +00:00
|
|
|
return (error);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
2010-09-16 16:13:12 +00:00
|
|
|
|
|
|
|
/*
|
2011-01-27 00:34:12 +00:00
|
|
|
* Drain into a sysctl struct. The user buffer should be wired if a page
|
|
|
|
* fault would cause issue.
|
2010-09-16 16:13:12 +00:00
|
|
|
*/
|
|
|
|
static int
|
|
|
|
sbuf_sysctl_drain(void *arg, const char *data, int len)
|
|
|
|
{
|
|
|
|
struct sysctl_req *req = arg;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
error = SYSCTL_OUT(req, data, len);
|
|
|
|
KASSERT(error >= 0, ("Got unexpected negative value %d", error));
|
|
|
|
return (error == 0 ? len : -error);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct sbuf *
|
|
|
|
sbuf_new_for_sysctl(struct sbuf *s, char *buf, int length,
|
|
|
|
struct sysctl_req *req)
|
|
|
|
{
|
|
|
|
|
2015-03-17 20:56:24 +00:00
|
|
|
/* Supply a default buffer size if none given. */
|
|
|
|
if (buf == NULL && length == 0)
|
|
|
|
length = 64;
|
2015-03-14 17:08:28 +00:00
|
|
|
s = sbuf_new(s, buf, length, SBUF_FIXEDLEN | SBUF_INCLUDENUL);
|
2010-09-16 16:13:12 +00:00
|
|
|
sbuf_set_drain(s, sbuf_sysctl_drain, req);
|
|
|
|
return (s);
|
|
|
|
}
|
2019-08-08 00:42:29 +00:00
|
|
|
|
|
|
|
#ifdef DDB
|
|
|
|
|
|
|
|
/* The current OID the debugger is working with */
|
|
|
|
static struct sysctl_oid *g_ddb_oid;
|
|
|
|
|
|
|
|
/* The current flags specified by the user */
|
|
|
|
static int g_ddb_sysctl_flags;
|
|
|
|
|
|
|
|
/* Check to see if the last sysctl printed */
|
|
|
|
static int g_ddb_sysctl_printed;
|
|
|
|
|
|
|
|
static const int ctl_sign[CTLTYPE+1] = {
|
|
|
|
[CTLTYPE_INT] = 1,
|
|
|
|
[CTLTYPE_LONG] = 1,
|
|
|
|
[CTLTYPE_S8] = 1,
|
|
|
|
[CTLTYPE_S16] = 1,
|
|
|
|
[CTLTYPE_S32] = 1,
|
|
|
|
[CTLTYPE_S64] = 1,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const int ctl_size[CTLTYPE+1] = {
|
|
|
|
[CTLTYPE_INT] = sizeof(int),
|
|
|
|
[CTLTYPE_UINT] = sizeof(u_int),
|
|
|
|
[CTLTYPE_LONG] = sizeof(long),
|
|
|
|
[CTLTYPE_ULONG] = sizeof(u_long),
|
|
|
|
[CTLTYPE_S8] = sizeof(int8_t),
|
|
|
|
[CTLTYPE_S16] = sizeof(int16_t),
|
|
|
|
[CTLTYPE_S32] = sizeof(int32_t),
|
|
|
|
[CTLTYPE_S64] = sizeof(int64_t),
|
|
|
|
[CTLTYPE_U8] = sizeof(uint8_t),
|
|
|
|
[CTLTYPE_U16] = sizeof(uint16_t),
|
|
|
|
[CTLTYPE_U32] = sizeof(uint32_t),
|
|
|
|
[CTLTYPE_U64] = sizeof(uint64_t),
|
|
|
|
};
|
|
|
|
|
|
|
|
#define DB_SYSCTL_NAME_ONLY 0x001 /* Compare with -N */
|
|
|
|
#define DB_SYSCTL_VALUE_ONLY 0x002 /* Compare with -n */
|
|
|
|
#define DB_SYSCTL_OPAQUE 0x004 /* Compare with -o */
|
|
|
|
#define DB_SYSCTL_HEX 0x008 /* Compare with -x */
|
|
|
|
|
|
|
|
#define DB_SYSCTL_SAFE_ONLY 0x100 /* Only simple types */
|
|
|
|
|
|
|
|
static const char db_sysctl_modifs[] = {
|
|
|
|
'N', 'n', 'o', 'x',
|
|
|
|
};
|
|
|
|
|
|
|
|
static const int db_sysctl_modif_values[] = {
|
|
|
|
DB_SYSCTL_NAME_ONLY, DB_SYSCTL_VALUE_ONLY,
|
|
|
|
DB_SYSCTL_OPAQUE, DB_SYSCTL_HEX,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Handlers considered safe to print while recursing */
|
|
|
|
static int (* const db_safe_handlers[])(SYSCTL_HANDLER_ARGS) = {
|
|
|
|
sysctl_handle_bool,
|
|
|
|
sysctl_handle_8,
|
|
|
|
sysctl_handle_16,
|
|
|
|
sysctl_handle_32,
|
|
|
|
sysctl_handle_64,
|
|
|
|
sysctl_handle_int,
|
|
|
|
sysctl_handle_long,
|
|
|
|
sysctl_handle_string,
|
|
|
|
sysctl_handle_opaque,
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Use in place of sysctl_old_kernel to print sysctl values.
|
|
|
|
*
|
|
|
|
* Compare to the output handling in show_var from sbin/sysctl/sysctl.c
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
sysctl_old_ddb(struct sysctl_req *req, const void *ptr, size_t len)
|
|
|
|
{
|
|
|
|
const u_char *val, *p;
|
|
|
|
const char *sep1;
|
|
|
|
size_t intlen, slen;
|
|
|
|
uintmax_t umv;
|
|
|
|
intmax_t mv;
|
|
|
|
int sign, ctltype, hexlen, xflag, error;
|
|
|
|
|
|
|
|
/* Suppress false-positive GCC uninitialized variable warnings */
|
|
|
|
mv = 0;
|
|
|
|
umv = 0;
|
|
|
|
|
|
|
|
slen = len;
|
|
|
|
val = p = ptr;
|
|
|
|
|
|
|
|
if (ptr == NULL) {
|
|
|
|
error = 0;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* We are going to print */
|
|
|
|
g_ddb_sysctl_printed = 1;
|
|
|
|
|
|
|
|
xflag = g_ddb_sysctl_flags & DB_SYSCTL_HEX;
|
|
|
|
|
|
|
|
ctltype = (g_ddb_oid->oid_kind & CTLTYPE);
|
|
|
|
sign = ctl_sign[ctltype];
|
|
|
|
intlen = ctl_size[ctltype];
|
|
|
|
|
|
|
|
switch (ctltype) {
|
|
|
|
case CTLTYPE_NODE:
|
|
|
|
case CTLTYPE_STRING:
|
|
|
|
db_printf("%.*s", (int) len, (const char *) p);
|
|
|
|
error = 0;
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
case CTLTYPE_INT:
|
|
|
|
case CTLTYPE_UINT:
|
|
|
|
case CTLTYPE_LONG:
|
|
|
|
case CTLTYPE_ULONG:
|
|
|
|
case CTLTYPE_S8:
|
|
|
|
case CTLTYPE_S16:
|
|
|
|
case CTLTYPE_S32:
|
|
|
|
case CTLTYPE_S64:
|
|
|
|
case CTLTYPE_U8:
|
|
|
|
case CTLTYPE_U16:
|
|
|
|
case CTLTYPE_U32:
|
|
|
|
case CTLTYPE_U64:
|
|
|
|
hexlen = 2 + (intlen * CHAR_BIT + 3) / 4;
|
|
|
|
sep1 = "";
|
|
|
|
while (len >= intlen) {
|
|
|
|
switch (ctltype) {
|
|
|
|
case CTLTYPE_INT:
|
|
|
|
case CTLTYPE_UINT:
|
|
|
|
umv = *(const u_int *)p;
|
|
|
|
mv = *(const int *)p;
|
|
|
|
break;
|
|
|
|
case CTLTYPE_LONG:
|
|
|
|
case CTLTYPE_ULONG:
|
|
|
|
umv = *(const u_long *)p;
|
|
|
|
mv = *(const long *)p;
|
|
|
|
break;
|
|
|
|
case CTLTYPE_S8:
|
|
|
|
case CTLTYPE_U8:
|
|
|
|
umv = *(const uint8_t *)p;
|
|
|
|
mv = *(const int8_t *)p;
|
|
|
|
break;
|
|
|
|
case CTLTYPE_S16:
|
|
|
|
case CTLTYPE_U16:
|
|
|
|
umv = *(const uint16_t *)p;
|
|
|
|
mv = *(const int16_t *)p;
|
|
|
|
break;
|
|
|
|
case CTLTYPE_S32:
|
|
|
|
case CTLTYPE_U32:
|
|
|
|
umv = *(const uint32_t *)p;
|
|
|
|
mv = *(const int32_t *)p;
|
|
|
|
break;
|
|
|
|
case CTLTYPE_S64:
|
|
|
|
case CTLTYPE_U64:
|
|
|
|
umv = *(const uint64_t *)p;
|
|
|
|
mv = *(const int64_t *)p;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
db_printf("%s", sep1);
|
|
|
|
if (xflag)
|
|
|
|
db_printf("%#0*jx", hexlen, umv);
|
|
|
|
else if (!sign)
|
|
|
|
db_printf("%ju", umv);
|
|
|
|
else if (g_ddb_oid->oid_fmt[1] == 'K') {
|
|
|
|
/* Kelvins are currently unsupported. */
|
|
|
|
error = EOPNOTSUPP;
|
|
|
|
goto out;
|
|
|
|
} else
|
|
|
|
db_printf("%jd", mv);
|
|
|
|
|
|
|
|
sep1 = " ";
|
|
|
|
len -= intlen;
|
|
|
|
p += intlen;
|
|
|
|
}
|
|
|
|
error = 0;
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
case CTLTYPE_OPAQUE:
|
|
|
|
/* TODO: Support struct functions. */
|
|
|
|
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
default:
|
|
|
|
db_printf("Format:%s Length:%zu Dump:0x",
|
|
|
|
g_ddb_oid->oid_fmt, len);
|
|
|
|
while (len-- && (xflag || p < val + 16))
|
|
|
|
db_printf("%02x", *p++);
|
|
|
|
if (!xflag && len > 16)
|
|
|
|
db_printf("...");
|
|
|
|
error = 0;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
req->oldidx += slen;
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Avoid setting new sysctl values from the debugger
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
sysctl_new_ddb(struct sysctl_req *req, void *p, size_t l)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (!req->newptr)
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
/* Changing sysctls from the debugger is currently unsupported */
|
|
|
|
return (EPERM);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Run a sysctl handler with the DDB oldfunc and newfunc attached.
|
|
|
|
* Instead of copying any output to a buffer we'll dump it right to
|
|
|
|
* the console.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
db_sysctl(struct sysctl_oid *oidp, int *name, u_int namelen,
|
|
|
|
void *old, size_t *oldlenp, size_t *retval, int flags)
|
|
|
|
{
|
|
|
|
struct sysctl_req req;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
/* Setup the request */
|
|
|
|
bzero(&req, sizeof req);
|
|
|
|
req.td = kdb_thread;
|
|
|
|
req.oldfunc = sysctl_old_ddb;
|
|
|
|
req.newfunc = sysctl_new_ddb;
|
|
|
|
req.lock = REQ_UNWIRED;
|
|
|
|
if (oldlenp) {
|
|
|
|
req.oldlen = *oldlenp;
|
|
|
|
}
|
|
|
|
req.validlen = req.oldlen;
|
|
|
|
if (old) {
|
|
|
|
req.oldptr = old;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Setup our globals for sysctl_old_ddb */
|
|
|
|
g_ddb_oid = oidp;
|
|
|
|
g_ddb_sysctl_flags = flags;
|
|
|
|
g_ddb_sysctl_printed = 0;
|
|
|
|
|
|
|
|
error = sysctl_root(0, name, namelen, &req);
|
|
|
|
|
|
|
|
/* Reset globals */
|
|
|
|
g_ddb_oid = NULL;
|
|
|
|
g_ddb_sysctl_flags = 0;
|
|
|
|
|
|
|
|
if (retval) {
|
|
|
|
if (req.oldptr && req.oldidx > req.validlen)
|
|
|
|
*retval = req.validlen;
|
|
|
|
else
|
|
|
|
*retval = req.oldidx;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Show a sysctl's name
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
db_show_oid_name(int *oid, size_t nlen)
|
|
|
|
{
|
|
|
|
struct sysctl_oid *oidp;
|
|
|
|
int qoid[CTL_MAXNAME+2];
|
|
|
|
int error;
|
|
|
|
|
|
|
|
qoid[0] = 0;
|
|
|
|
memcpy(qoid + 2, oid, nlen * sizeof(int));
|
|
|
|
qoid[1] = 1;
|
|
|
|
|
|
|
|
error = sysctl_find_oid(qoid, nlen + 2, &oidp, NULL, NULL);
|
|
|
|
if (error)
|
|
|
|
db_error("sysctl name oid");
|
|
|
|
|
|
|
|
error = db_sysctl(oidp, qoid, nlen + 2, NULL, NULL, NULL, 0);
|
|
|
|
if (error)
|
|
|
|
db_error("sysctl name");
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check to see if an OID is safe to print from ddb.
|
|
|
|
*/
|
|
|
|
static bool
|
|
|
|
db_oid_safe(const struct sysctl_oid *oidp)
|
|
|
|
{
|
|
|
|
for (unsigned int i = 0; i < nitems(db_safe_handlers); ++i) {
|
|
|
|
if (oidp->oid_handler == db_safe_handlers[i])
|
|
|
|
return (true);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (false);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Show a sysctl at a specific OID
|
|
|
|
* Compare to the input handling in show_var from sbin/sysctl/sysctl.c
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
db_show_oid(struct sysctl_oid *oidp, int *oid, size_t nlen, int flags)
|
|
|
|
{
|
|
|
|
int error, xflag, oflag, Nflag, nflag;
|
|
|
|
size_t len;
|
|
|
|
|
|
|
|
xflag = flags & DB_SYSCTL_HEX;
|
|
|
|
oflag = flags & DB_SYSCTL_OPAQUE;
|
|
|
|
nflag = flags & DB_SYSCTL_VALUE_ONLY;
|
|
|
|
Nflag = flags & DB_SYSCTL_NAME_ONLY;
|
|
|
|
|
|
|
|
if ((oidp->oid_kind & CTLTYPE) == CTLTYPE_OPAQUE &&
|
|
|
|
(!xflag && !oflag))
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
if (Nflag) {
|
|
|
|
db_show_oid_name(oid, nlen);
|
|
|
|
error = 0;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!nflag) {
|
|
|
|
db_show_oid_name(oid, nlen);
|
|
|
|
db_printf(": ");
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((flags & DB_SYSCTL_SAFE_ONLY) && !db_oid_safe(oidp)) {
|
|
|
|
db_printf("Skipping, unsafe to print while recursing.");
|
|
|
|
error = 0;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Try once, and ask about the size */
|
|
|
|
len = 0;
|
|
|
|
error = db_sysctl(oidp, oid, nlen,
|
|
|
|
NULL, NULL, &len, flags);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (!g_ddb_sysctl_printed)
|
|
|
|
/* Lie about the size */
|
|
|
|
error = db_sysctl(oidp, oid, nlen,
|
|
|
|
(void *) 1, &len, NULL, flags);
|
|
|
|
|
|
|
|
out:
|
|
|
|
db_printf("\n");
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Show all sysctls under a specific OID
|
|
|
|
* Compare to sysctl_all from sbin/sysctl/sysctl.c
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
db_show_sysctl_all(int *oid, size_t len, int flags)
|
|
|
|
{
|
|
|
|
struct sysctl_oid *oidp;
|
|
|
|
int name1[CTL_MAXNAME + 2], name2[CTL_MAXNAME + 2];
|
|
|
|
size_t l1, l2;
|
|
|
|
|
2019-09-18 16:13:10 +00:00
|
|
|
name1[0] = CTL_SYSCTL;
|
|
|
|
name1[1] = CTL_SYSCTL_NEXT;
|
2019-08-08 00:42:29 +00:00
|
|
|
l1 = 2;
|
|
|
|
if (len) {
|
2020-10-05 20:13:22 +00:00
|
|
|
memcpy(name1 + 2, oid, len * sizeof(int));
|
|
|
|
l1 += len;
|
2019-08-08 00:42:29 +00:00
|
|
|
} else {
|
2020-10-05 20:13:22 +00:00
|
|
|
name1[2] = CTL_KERN;
|
2019-08-08 00:42:29 +00:00
|
|
|
l1++;
|
|
|
|
}
|
|
|
|
for (;;) {
|
|
|
|
int i, error;
|
|
|
|
|
|
|
|
l2 = sizeof(name2);
|
|
|
|
error = kernel_sysctl(kdb_thread, name1, l1,
|
|
|
|
name2, &l2, NULL, 0, &l2, 0);
|
|
|
|
if (error != 0) {
|
|
|
|
if (error == ENOENT)
|
|
|
|
return (0);
|
|
|
|
else
|
2020-10-05 20:13:22 +00:00
|
|
|
db_error("sysctl(next)");
|
2019-08-08 00:42:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
l2 /= sizeof(int);
|
|
|
|
|
|
|
|
if (l2 < (unsigned int)len)
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
for (i = 0; i < len; i++)
|
|
|
|
if (name2[i] != oid[i])
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
/* Find the OID in question */
|
|
|
|
error = sysctl_find_oid(name2, l2, &oidp, NULL, NULL);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
i = db_show_oid(oidp, name2, l2, flags | DB_SYSCTL_SAFE_ONLY);
|
|
|
|
|
|
|
|
if (db_pager_quit)
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
memcpy(name1+2, name2, l2 * sizeof(int));
|
|
|
|
l1 = 2 + l2;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Show a sysctl by its user facing string
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
db_sysctlbyname(char *name, int flags)
|
|
|
|
{
|
|
|
|
struct sysctl_oid *oidp;
|
|
|
|
int oid[CTL_MAXNAME];
|
|
|
|
int error, nlen;
|
|
|
|
|
|
|
|
error = name2oid(name, oid, &nlen, &oidp);
|
|
|
|
if (error) {
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((oidp->oid_kind & CTLTYPE) == CTLTYPE_NODE) {
|
|
|
|
db_show_sysctl_all(oid, nlen, flags);
|
|
|
|
} else {
|
|
|
|
error = db_show_oid(oidp, oid, nlen, flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
db_sysctl_cmd_usage(void)
|
|
|
|
{
|
|
|
|
db_printf(
|
|
|
|
" sysctl [/Nnox] <sysctl> \n"
|
|
|
|
" \n"
|
|
|
|
" <sysctl> The name of the sysctl to show. \n"
|
|
|
|
" \n"
|
|
|
|
" Show a sysctl by hooking into SYSCTL_IN and SYSCTL_OUT. \n"
|
|
|
|
" This will work for most sysctls, but should not be used \n"
|
|
|
|
" with sysctls that are known to malloc. \n"
|
|
|
|
" \n"
|
|
|
|
" While recursing any \"unsafe\" sysctls will be skipped. \n"
|
|
|
|
" Call sysctl directly on the sysctl to try printing the \n"
|
|
|
|
" skipped sysctl. This is unsafe and may make the ddb \n"
|
|
|
|
" session unusable. \n"
|
|
|
|
" \n"
|
|
|
|
" Arguments: \n"
|
|
|
|
" /N Display only the name of the sysctl. \n"
|
|
|
|
" /n Display only the value of the sysctl. \n"
|
|
|
|
" /o Display opaque values. \n"
|
|
|
|
" /x Display the sysctl in hex. \n"
|
|
|
|
" \n"
|
|
|
|
"For example: \n"
|
|
|
|
"sysctl vm.v_free_min \n"
|
|
|
|
"vn.v_free_min: 12669 \n"
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Show a specific sysctl similar to sysctl (8).
|
|
|
|
*/
|
|
|
|
DB_FUNC(sysctl, db_sysctl_cmd, db_cmd_table, CS_OWN, NULL)
|
|
|
|
{
|
|
|
|
char name[TOK_STRING_SIZE];
|
|
|
|
int error, i, t, flags;
|
|
|
|
|
|
|
|
/* Parse the modifiers */
|
|
|
|
t = db_read_token();
|
|
|
|
if (t == tSLASH || t == tMINUS) {
|
|
|
|
t = db_read_token();
|
|
|
|
if (t != tIDENT) {
|
|
|
|
db_printf("Bad modifier\n");
|
|
|
|
error = EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
db_strcpy(modif, db_tok_string);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
db_unread_token(t);
|
|
|
|
modif[0] = '\0';
|
|
|
|
}
|
|
|
|
|
|
|
|
flags = 0;
|
|
|
|
for (i = 0; i < nitems(db_sysctl_modifs); i++) {
|
|
|
|
if (strchr(modif, db_sysctl_modifs[i])) {
|
|
|
|
flags |= db_sysctl_modif_values[i];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Parse the sysctl names */
|
|
|
|
t = db_read_token();
|
|
|
|
if (t != tIDENT) {
|
|
|
|
db_printf("Need sysctl name\n");
|
|
|
|
error = EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Copy the name into a temporary buffer */
|
|
|
|
db_strcpy(name, db_tok_string);
|
|
|
|
|
|
|
|
/* Ensure there is no trailing cruft */
|
|
|
|
t = db_read_token();
|
|
|
|
if (t != tEOL) {
|
|
|
|
db_printf("Unexpected sysctl argument\n");
|
|
|
|
error = EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
error = db_sysctlbyname(name, flags);
|
|
|
|
if (error == ENOENT) {
|
|
|
|
db_printf("unknown oid: '%s'\n", db_tok_string);
|
|
|
|
goto out;
|
|
|
|
} else if (error) {
|
|
|
|
db_printf("%s: error: %d\n", db_tok_string, error);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
/* Ensure we eat all of our text */
|
|
|
|
db_flush_lex();
|
|
|
|
|
|
|
|
if (error == EINVAL) {
|
|
|
|
db_sysctl_cmd_usage();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* DDB */
|