1df8bae1dSRodney W. Grimes /*- 2df8bae1dSRodney W. Grimes * Copyright (c) 1982, 1986, 1989, 1993 3df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 4df8bae1dSRodney W. Grimes * 5df8bae1dSRodney W. Grimes * This code is derived from software contributed to Berkeley by 6df8bae1dSRodney W. Grimes * Mike Karels at Berkeley Software Design, Inc. 7df8bae1dSRodney W. Grimes * 8946bb7a2SPoul-Henning Kamp * Quite extensively rewritten by Poul-Henning Kamp of the FreeBSD 9946bb7a2SPoul-Henning Kamp * project, to make these variables more userfriendly. 10946bb7a2SPoul-Henning Kamp * 11df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 12df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 13df8bae1dSRodney W. Grimes * are met: 14df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 15df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 16df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 17df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 18df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 19df8bae1dSRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 20df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 21df8bae1dSRodney W. Grimes * without specific prior written permission. 22df8bae1dSRodney W. Grimes * 23df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 24df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 27df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33df8bae1dSRodney W. Grimes * SUCH DAMAGE. 34df8bae1dSRodney W. Grimes * 35df8bae1dSRodney W. Grimes * @(#)kern_sysctl.c 8.4 (Berkeley) 4/14/94 36df8bae1dSRodney W. Grimes */ 37df8bae1dSRodney W. Grimes 38677b542eSDavid E. O'Brien #include <sys/cdefs.h> 39677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$"); 40677b542eSDavid E. O'Brien 41ff66f6a4SRobert Watson #include "opt_capsicum.h" 425591b823SEivind Eklund #include "opt_compat.h" 43a56be37eSJohn Baldwin #include "opt_ktrace.h" 445591b823SEivind Eklund 45df8bae1dSRodney W. Grimes #include <sys/param.h> 46ccecef29SMatthew D Fleming #include <sys/fail.h> 47e96c1fdcSPeter Wemm #include <sys/systm.h> 484a144410SRobert Watson #include <sys/capsicum.h> 49df8bae1dSRodney W. Grimes #include <sys/kernel.h> 50df8bae1dSRodney W. Grimes #include <sys/sysctl.h> 51946bb7a2SPoul-Henning Kamp #include <sys/malloc.h> 52acd3428bSRobert Watson #include <sys/priv.h> 53efeaf95aSDavid Greenman #include <sys/proc.h> 54ebd8672cSBjoern A. Zeeb #include <sys/jail.h> 55fb99ab88SMatthew Dillon #include <sys/lock.h> 56fb99ab88SMatthew Dillon #include <sys/mutex.h> 574e657159SMatthew D Fleming #include <sys/sbuf.h> 5829a2c0cdSAlfred Perlstein #include <sys/sx.h> 5945ec3b38SPoul-Henning Kamp #include <sys/sysproto.h> 60af80b2c9SKonstantin Belousov #include <sys/uio.h> 61a56be37eSJohn Baldwin #ifdef KTRACE 62a56be37eSJohn Baldwin #include <sys/ktrace.h> 63a56be37eSJohn Baldwin #endif 64aed55708SRobert Watson 65eddfbb76SRobert Watson #include <net/vnet.h> 66eddfbb76SRobert Watson 67aed55708SRobert Watson #include <security/mac/mac_framework.h> 68aed55708SRobert Watson 694cb03b1bSBruce Evans #include <vm/vm.h> 70efeaf95aSDavid Greenman #include <vm/vm_extern.h> 714cb03b1bSBruce Evans 72a1c995b6SPoul-Henning Kamp static MALLOC_DEFINE(M_SYSCTL, "sysctl", "sysctl internal magic"); 73bd3cdc31SAndrzej Bialecki static MALLOC_DEFINE(M_SYSCTLOID, "sysctloid", "sysctl dynamic oids"); 749e74cba3SDon Lewis static MALLOC_DEFINE(M_SYSCTLTMP, "sysctltmp", "sysctl temp output buffer"); 7555166637SPoul-Henning Kamp 764b2af45fSPoul-Henning Kamp /* 77875b66a0SJohn Baldwin * The sysctllock protects the MIB tree. It also protects sysctl 78875b66a0SJohn Baldwin * contexts used with dynamic sysctls. The sysctl_register_oid() and 79875b66a0SJohn Baldwin * sysctl_unregister_oid() routines require the sysctllock to already 80f84f8f94SMateusz Guzik * be held, so the sysctl_xlock() and sysctl_xunlock() routines are 81875b66a0SJohn Baldwin * provided for the few places in the kernel which need to use that 82875b66a0SJohn Baldwin * API rather than using the dynamic API. Use of the dynamic API is 83875b66a0SJohn Baldwin * strongly encouraged for most code. 84875b66a0SJohn Baldwin * 853e829b18SJohn Baldwin * The sysctlmemlock is used to limit the amount of user memory wired for 863e829b18SJohn Baldwin * sysctl requests. This is implemented by serializing any userland 873e829b18SJohn Baldwin * sysctl requests larger than a single page via an exclusive lock. 884b2af45fSPoul-Henning Kamp */ 893bd1da29SRobert Watson static struct sx sysctllock; 903e829b18SJohn Baldwin static struct sx sysctlmemlock; 9129a2c0cdSAlfred Perlstein 92875b66a0SJohn Baldwin #define SYSCTL_XLOCK() sx_xlock(&sysctllock) 93875b66a0SJohn Baldwin #define SYSCTL_XUNLOCK() sx_xunlock(&sysctllock) 94efe0abddSMateusz Guzik #define SYSCTL_SLOCK() sx_slock(&sysctllock) 95efe0abddSMateusz Guzik #define SYSCTL_SUNLOCK() sx_sunlock(&sysctllock) 96efe0abddSMateusz Guzik #define SYSCTL_XLOCKED() sx_xlocked(&sysctllock) 97efe0abddSMateusz Guzik #define SYSCTL_ASSERT_LOCKED() sx_assert(&sysctllock, SA_LOCKED) 98875b66a0SJohn Baldwin #define SYSCTL_ASSERT_XLOCKED() sx_assert(&sysctllock, SA_XLOCKED) 99f84f8f94SMateusz Guzik #define SYSCTL_ASSERT_SLOCKED() sx_assert(&sysctllock, SA_SLOCKED) 10074019059SJohn Baldwin #define SYSCTL_INIT() sx_init(&sysctllock, "sysctl lock") 101ccecef29SMatthew D Fleming #define SYSCTL_SLEEP(ch, wmesg, timo) \ 102ccecef29SMatthew D Fleming sx_sleep(ch, &sysctllock, 0, wmesg, timo) 1034b2af45fSPoul-Henning Kamp 10482d9ae4eSPoul-Henning Kamp static int sysctl_root(SYSCTL_HANDLER_ARGS); 1054b2af45fSPoul-Henning Kamp 106af3b2549SHans Petter Selasky /* Root list */ 107af3b2549SHans Petter Selasky struct sysctl_oid_list sysctl__children = SLIST_HEAD_INITIALIZER(&sysctl__children); 108787d58f2SPoul-Henning Kamp 109875b66a0SJohn Baldwin static int sysctl_remove_oid_locked(struct sysctl_oid *oidp, int del, 110875b66a0SJohn Baldwin int recurse); 111af3b2549SHans Petter Selasky static int sysctl_old_kernel(struct sysctl_req *, const void *, size_t); 112af3b2549SHans Petter Selasky static int sysctl_new_kernel(struct sysctl_req *, void *, size_t); 113875b66a0SJohn Baldwin 114efe0abddSMateusz Guzik static void 115efe0abddSMateusz Guzik sysctl_lock(bool xlock) 116efe0abddSMateusz Guzik { 117efe0abddSMateusz Guzik 118efe0abddSMateusz Guzik if (xlock) 119efe0abddSMateusz Guzik SYSCTL_XLOCK(); 120efe0abddSMateusz Guzik else 121efe0abddSMateusz Guzik SYSCTL_SLOCK(); 122efe0abddSMateusz Guzik } 123efe0abddSMateusz Guzik 124efe0abddSMateusz Guzik static bool 125efe0abddSMateusz Guzik sysctl_unlock(void) 126efe0abddSMateusz Guzik { 127efe0abddSMateusz Guzik bool xlocked; 128efe0abddSMateusz Guzik 129efe0abddSMateusz Guzik xlocked = SYSCTL_XLOCKED(); 130efe0abddSMateusz Guzik if (xlocked) 131efe0abddSMateusz Guzik SYSCTL_XUNLOCK(); 132efe0abddSMateusz Guzik else 133efe0abddSMateusz Guzik SYSCTL_SUNLOCK(); 134efe0abddSMateusz Guzik return (xlocked); 135efe0abddSMateusz Guzik } 136efe0abddSMateusz Guzik 137bd3cdc31SAndrzej Bialecki static struct sysctl_oid * 138bd3cdc31SAndrzej Bialecki sysctl_find_oidname(const char *name, struct sysctl_oid_list *list) 139bd3cdc31SAndrzej Bialecki { 140bd3cdc31SAndrzej Bialecki struct sysctl_oid *oidp; 141bd3cdc31SAndrzej Bialecki 142efe0abddSMateusz Guzik SYSCTL_ASSERT_LOCKED(); 143bd3cdc31SAndrzej Bialecki SLIST_FOREACH(oidp, list, oid_link) { 144bd3cdc31SAndrzej Bialecki if (strcmp(oidp->oid_name, name) == 0) { 145bd3cdc31SAndrzej Bialecki return (oidp); 146bd3cdc31SAndrzej Bialecki } 147bd3cdc31SAndrzej Bialecki } 148bd3cdc31SAndrzej Bialecki return (NULL); 149bd3cdc31SAndrzej Bialecki } 150bd3cdc31SAndrzej Bialecki 151946bb7a2SPoul-Henning Kamp /* 152946bb7a2SPoul-Henning Kamp * Initialization of the MIB tree. 153946bb7a2SPoul-Henning Kamp * 154ce02431fSDoug Rabson * Order by number in each list. 155946bb7a2SPoul-Henning Kamp */ 156875b66a0SJohn Baldwin void 157580a0117SMateusz Guzik sysctl_xlock(void) 158875b66a0SJohn Baldwin { 159875b66a0SJohn Baldwin 160875b66a0SJohn Baldwin SYSCTL_XLOCK(); 161875b66a0SJohn Baldwin } 162875b66a0SJohn Baldwin 163875b66a0SJohn Baldwin void 164580a0117SMateusz Guzik sysctl_xunlock(void) 165875b66a0SJohn Baldwin { 166875b66a0SJohn Baldwin 167875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 168875b66a0SJohn Baldwin } 1694b2af45fSPoul-Henning Kamp 170af3b2549SHans Petter Selasky static int 171af3b2549SHans Petter Selasky sysctl_root_handler_locked(struct sysctl_oid *oid, void *arg1, intptr_t arg2, 172af3b2549SHans Petter Selasky struct sysctl_req *req) 173af3b2549SHans Petter Selasky { 174af3b2549SHans Petter Selasky int error; 175efe0abddSMateusz Guzik bool xlocked; 176af3b2549SHans Petter Selasky 17784267cacSMateusz Guzik if (oid->oid_kind & CTLFLAG_DYN) 178efe0abddSMateusz Guzik atomic_add_int(&oid->oid_running, 1); 179efe0abddSMateusz Guzik xlocked = sysctl_unlock(); 180af3b2549SHans Petter Selasky 181af3b2549SHans Petter Selasky if (!(oid->oid_kind & CTLFLAG_MPSAFE)) 182af3b2549SHans Petter Selasky mtx_lock(&Giant); 183af3b2549SHans Petter Selasky error = oid->oid_handler(oid, arg1, arg2, req); 184af3b2549SHans Petter Selasky if (!(oid->oid_kind & CTLFLAG_MPSAFE)) 185af3b2549SHans Petter Selasky mtx_unlock(&Giant); 186af3b2549SHans Petter Selasky 187efe0abddSMateusz Guzik sysctl_lock(xlocked); 18884267cacSMateusz Guzik if (oid->oid_kind & CTLFLAG_DYN) { 189efe0abddSMateusz Guzik if (atomic_fetchadd_int(&oid->oid_running, -1) == 1 && 190efe0abddSMateusz Guzik (oid->oid_kind & CTLFLAG_DYING) != 0) 191af3b2549SHans Petter Selasky wakeup(&oid->oid_running); 19284267cacSMateusz Guzik } 193af3b2549SHans Petter Selasky 194af3b2549SHans Petter Selasky return (error); 195af3b2549SHans Petter Selasky } 196af3b2549SHans Petter Selasky 197af3b2549SHans Petter Selasky static void 198af3b2549SHans Petter Selasky sysctl_load_tunable_by_oid_locked(struct sysctl_oid *oidp) 199af3b2549SHans Petter Selasky { 200af3b2549SHans Petter Selasky struct sysctl_req req; 201af3b2549SHans Petter Selasky struct sysctl_oid *curr; 202604bf9d3SHans Petter Selasky char *penv = NULL; 203af3b2549SHans Petter Selasky char path[64]; 204af3b2549SHans Petter Selasky ssize_t rem = sizeof(path); 205af3b2549SHans Petter Selasky ssize_t len; 206af3b2549SHans Petter Selasky int val_int; 207af3b2549SHans Petter Selasky long val_long; 208af3b2549SHans Petter Selasky int64_t val_64; 209604bf9d3SHans Petter Selasky quad_t val_quad; 210af3b2549SHans Petter Selasky int error; 211af3b2549SHans Petter Selasky 212af3b2549SHans Petter Selasky path[--rem] = 0; 213af3b2549SHans Petter Selasky 214af3b2549SHans Petter Selasky for (curr = oidp; curr != NULL; curr = SYSCTL_PARENT(curr)) { 215af3b2549SHans Petter Selasky len = strlen(curr->oid_name); 216af3b2549SHans Petter Selasky rem -= len; 217af3b2549SHans Petter Selasky if (curr != oidp) 218af3b2549SHans Petter Selasky rem -= 1; 219af3b2549SHans Petter Selasky if (rem < 0) { 220af3b2549SHans Petter Selasky printf("OID path exceeds %d bytes\n", (int)sizeof(path)); 221af3b2549SHans Petter Selasky return; 222af3b2549SHans Petter Selasky } 223af3b2549SHans Petter Selasky memcpy(path + rem, curr->oid_name, len); 224af3b2549SHans Petter Selasky if (curr != oidp) 225af3b2549SHans Petter Selasky path[rem + len] = '.'; 226af3b2549SHans Petter Selasky } 227af3b2549SHans Petter Selasky 228af3b2549SHans Petter Selasky memset(&req, 0, sizeof(req)); 229af3b2549SHans Petter Selasky 230af3b2549SHans Petter Selasky req.td = curthread; 231af3b2549SHans Petter Selasky req.oldfunc = sysctl_old_kernel; 232af3b2549SHans Petter Selasky req.newfunc = sysctl_new_kernel; 233af3b2549SHans Petter Selasky req.lock = REQ_UNWIRED; 234af3b2549SHans Petter Selasky 235af3b2549SHans Petter Selasky switch (oidp->oid_kind & CTLTYPE) { 236af3b2549SHans Petter Selasky case CTLTYPE_INT: 237604bf9d3SHans Petter Selasky if (getenv_int(path + rem, &val_int) == 0) 238604bf9d3SHans Petter Selasky return; 239af3b2549SHans Petter Selasky req.newlen = sizeof(val_int); 240af3b2549SHans Petter Selasky req.newptr = &val_int; 241af3b2549SHans Petter Selasky break; 242af3b2549SHans Petter Selasky case CTLTYPE_UINT: 243604bf9d3SHans Petter Selasky if (getenv_uint(path + rem, (unsigned int *)&val_int) == 0) 244604bf9d3SHans Petter Selasky return; 245af3b2549SHans Petter Selasky req.newlen = sizeof(val_int); 246af3b2549SHans Petter Selasky req.newptr = &val_int; 247af3b2549SHans Petter Selasky break; 248af3b2549SHans Petter Selasky case CTLTYPE_LONG: 249604bf9d3SHans Petter Selasky if (getenv_long(path + rem, &val_long) == 0) 250604bf9d3SHans Petter Selasky return; 251af3b2549SHans Petter Selasky req.newlen = sizeof(val_long); 252af3b2549SHans Petter Selasky req.newptr = &val_long; 253af3b2549SHans Petter Selasky break; 254af3b2549SHans Petter Selasky case CTLTYPE_ULONG: 255604bf9d3SHans Petter Selasky if (getenv_ulong(path + rem, (unsigned long *)&val_long) == 0) 256604bf9d3SHans Petter Selasky return; 257af3b2549SHans Petter Selasky req.newlen = sizeof(val_long); 258af3b2549SHans Petter Selasky req.newptr = &val_long; 259af3b2549SHans Petter Selasky break; 260af3b2549SHans Petter Selasky case CTLTYPE_S64: 261604bf9d3SHans Petter Selasky if (getenv_quad(path + rem, &val_quad) == 0) 262604bf9d3SHans Petter Selasky return; 263604bf9d3SHans Petter Selasky val_64 = val_quad; 264af3b2549SHans Petter Selasky req.newlen = sizeof(val_64); 265af3b2549SHans Petter Selasky req.newptr = &val_64; 266af3b2549SHans Petter Selasky break; 267af3b2549SHans Petter Selasky case CTLTYPE_U64: 268604bf9d3SHans Petter Selasky /* XXX there is no getenv_uquad() */ 269604bf9d3SHans Petter Selasky if (getenv_quad(path + rem, &val_quad) == 0) 270604bf9d3SHans Petter Selasky return; 271604bf9d3SHans Petter Selasky val_64 = val_quad; 272af3b2549SHans Petter Selasky req.newlen = sizeof(val_64); 273af3b2549SHans Petter Selasky req.newptr = &val_64; 274af3b2549SHans Petter Selasky break; 275af3b2549SHans Petter Selasky case CTLTYPE_STRING: 2762be111bfSDavide Italiano penv = kern_getenv(path + rem); 277604bf9d3SHans Petter Selasky if (penv == NULL) 278604bf9d3SHans Petter Selasky return; 279af3b2549SHans Petter Selasky req.newlen = strlen(penv); 280af3b2549SHans Petter Selasky req.newptr = penv; 281af3b2549SHans Petter Selasky break; 282af3b2549SHans Petter Selasky default: 283af3b2549SHans Petter Selasky return; 284af3b2549SHans Petter Selasky } 285af3b2549SHans Petter Selasky error = sysctl_root_handler_locked(oidp, oidp->oid_arg1, 286af3b2549SHans Petter Selasky oidp->oid_arg2, &req); 287b0d69dfaSDag-Erling Smørgrav if (error != 0) 288ab91c9a7SHans Petter Selasky printf("Setting sysctl %s failed: %d\n", path + rem, error); 289b0d69dfaSDag-Erling Smørgrav if (penv != NULL) 290af3b2549SHans Petter Selasky freeenv(penv); 291af3b2549SHans Petter Selasky } 292af3b2549SHans Petter Selasky 293107e7dc5SPeter Pentchev void 294107e7dc5SPeter Pentchev sysctl_register_oid(struct sysctl_oid *oidp) 295787d58f2SPoul-Henning Kamp { 296ce02431fSDoug Rabson struct sysctl_oid_list *parent = oidp->oid_parent; 297ce02431fSDoug Rabson struct sysctl_oid *p; 298ce02431fSDoug Rabson struct sysctl_oid *q; 2993c8e79ddSBruce Evans 300ce02431fSDoug Rabson /* 301bd3cdc31SAndrzej Bialecki * First check if another oid with the same name already 302bd3cdc31SAndrzej Bialecki * exists in the parent's list. 303bd3cdc31SAndrzej Bialecki */ 304875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 305bd3cdc31SAndrzej Bialecki p = sysctl_find_oidname(oidp->oid_name, parent); 306bd3cdc31SAndrzej Bialecki if (p != NULL) { 307bd3cdc31SAndrzej Bialecki if ((p->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 308bd3cdc31SAndrzej Bialecki p->oid_refcnt++; 309bd3cdc31SAndrzej Bialecki return; 310bd3cdc31SAndrzej Bialecki } else { 311bd3cdc31SAndrzej Bialecki printf("can't re-use a leaf (%s)!\n", p->oid_name); 312bd3cdc31SAndrzej Bialecki return; 313bd3cdc31SAndrzej Bialecki } 314bd3cdc31SAndrzej Bialecki } 315bd3cdc31SAndrzej Bialecki /* 316ce02431fSDoug Rabson * If this oid has a number OID_AUTO, give it a number which 3177ca4d05fSPeter Pentchev * is greater than any current oid. 3187ca4d05fSPeter Pentchev * NOTE: DO NOT change the starting value here, change it in 3197ca4d05fSPeter Pentchev * <sys/sysctl.h>, and make sure it is at least 256 to 3207ca4d05fSPeter Pentchev * accomodate e.g. net.inet.raw as a static sysctl node. 321ce02431fSDoug Rabson */ 322ce02431fSDoug Rabson if (oidp->oid_number == OID_AUTO) { 3237ca4d05fSPeter Pentchev static int newoid = CTL_AUTO_START; 3245ed57d32SKirk McKusick 3255ed57d32SKirk McKusick oidp->oid_number = newoid++; 3265ed57d32SKirk McKusick if (newoid == 0x7fffffff) 3275ed57d32SKirk McKusick panic("out of oids"); 328787d58f2SPoul-Henning Kamp } 32988fbb423SPeter Pentchev #if 0 33088fbb423SPeter Pentchev else if (oidp->oid_number >= CTL_AUTO_START) { 33188fbb423SPeter Pentchev /* do not panic; this happens when unregistering sysctl sets */ 33288fbb423SPeter Pentchev printf("static sysctl oid too high: %d", oidp->oid_number); 33388fbb423SPeter Pentchev } 33488fbb423SPeter Pentchev #endif 335787d58f2SPoul-Henning Kamp 336ce02431fSDoug Rabson /* 337ce02431fSDoug Rabson * Insert the oid into the parent's list in order. 338ce02431fSDoug Rabson */ 339ce02431fSDoug Rabson q = NULL; 340ce02431fSDoug Rabson SLIST_FOREACH(p, parent, oid_link) { 341ce02431fSDoug Rabson if (oidp->oid_number < p->oid_number) 342ce02431fSDoug Rabson break; 343ce02431fSDoug Rabson q = p; 344ce02431fSDoug Rabson } 345ce02431fSDoug Rabson if (q) 346ce02431fSDoug Rabson SLIST_INSERT_AFTER(q, oidp, oid_link); 347ce02431fSDoug Rabson else 348ce02431fSDoug Rabson SLIST_INSERT_HEAD(parent, oidp, oid_link); 349af3b2549SHans Petter Selasky 350af3b2549SHans Petter Selasky if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE && 351af3b2549SHans Petter Selasky #ifdef VIMAGE 352af3b2549SHans Petter Selasky (oidp->oid_kind & CTLFLAG_VNET) == 0 && 353af3b2549SHans Petter Selasky #endif 354af3b2549SHans Petter Selasky (oidp->oid_kind & CTLFLAG_TUN) != 0 && 355af3b2549SHans Petter Selasky (oidp->oid_kind & CTLFLAG_NOFETCH) == 0) { 356*502702c6SHans Petter Selasky /* only fetch value once */ 357*502702c6SHans Petter Selasky oidp->oid_kind |= CTLFLAG_NOFETCH; 358*502702c6SHans Petter Selasky /* try to fetch value from kernel environment */ 359af3b2549SHans Petter Selasky sysctl_load_tunable_by_oid_locked(oidp); 360af3b2549SHans Petter Selasky } 361ce02431fSDoug Rabson } 362ce02431fSDoug Rabson 363107e7dc5SPeter Pentchev void 364107e7dc5SPeter Pentchev sysctl_unregister_oid(struct sysctl_oid *oidp) 365787d58f2SPoul-Henning Kamp { 366193f2edbSMaxime Henrion struct sysctl_oid *p; 367193f2edbSMaxime Henrion int error; 368193f2edbSMaxime Henrion 369875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 370193f2edbSMaxime Henrion error = ENOENT; 371193f2edbSMaxime Henrion if (oidp->oid_number == OID_AUTO) { 372193f2edbSMaxime Henrion error = EINVAL; 373193f2edbSMaxime Henrion } else { 374193f2edbSMaxime Henrion SLIST_FOREACH(p, oidp->oid_parent, oid_link) { 375193f2edbSMaxime Henrion if (p == oidp) { 376193f2edbSMaxime Henrion SLIST_REMOVE(oidp->oid_parent, oidp, 377193f2edbSMaxime Henrion sysctl_oid, oid_link); 378193f2edbSMaxime Henrion error = 0; 379193f2edbSMaxime Henrion break; 380193f2edbSMaxime Henrion } 381193f2edbSMaxime Henrion } 382193f2edbSMaxime Henrion } 383193f2edbSMaxime Henrion 384193f2edbSMaxime Henrion /* 385193f2edbSMaxime Henrion * This can happen when a module fails to register and is 386193f2edbSMaxime Henrion * being unloaded afterwards. It should not be a panic() 387193f2edbSMaxime Henrion * for normal use. 388193f2edbSMaxime Henrion */ 389193f2edbSMaxime Henrion if (error) 390193f2edbSMaxime Henrion printf("%s: failed to unregister sysctl\n", __func__); 39161220614SPoul-Henning Kamp } 392946bb7a2SPoul-Henning Kamp 393bd3cdc31SAndrzej Bialecki /* Initialize a new context to keep track of dynamically added sysctls. */ 394bd3cdc31SAndrzej Bialecki int 395bd3cdc31SAndrzej Bialecki sysctl_ctx_init(struct sysctl_ctx_list *c) 396bd3cdc31SAndrzej Bialecki { 397bd3cdc31SAndrzej Bialecki 398bd3cdc31SAndrzej Bialecki if (c == NULL) { 399bd3cdc31SAndrzej Bialecki return (EINVAL); 400bd3cdc31SAndrzej Bialecki } 401875b66a0SJohn Baldwin 402875b66a0SJohn Baldwin /* 403875b66a0SJohn Baldwin * No locking here, the caller is responsible for not adding 404875b66a0SJohn Baldwin * new nodes to a context until after this function has 405875b66a0SJohn Baldwin * returned. 406875b66a0SJohn Baldwin */ 407bd3cdc31SAndrzej Bialecki TAILQ_INIT(c); 408bd3cdc31SAndrzej Bialecki return (0); 409bd3cdc31SAndrzej Bialecki } 410bd3cdc31SAndrzej Bialecki 411bd3cdc31SAndrzej Bialecki /* Free the context, and destroy all dynamic oids registered in this context */ 412bd3cdc31SAndrzej Bialecki int 413bd3cdc31SAndrzej Bialecki sysctl_ctx_free(struct sysctl_ctx_list *clist) 414bd3cdc31SAndrzej Bialecki { 415bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e, *e1; 416bd3cdc31SAndrzej Bialecki int error; 417bd3cdc31SAndrzej Bialecki 418bd3cdc31SAndrzej Bialecki error = 0; 419bd3cdc31SAndrzej Bialecki /* 420bd3cdc31SAndrzej Bialecki * First perform a "dry run" to check if it's ok to remove oids. 421bd3cdc31SAndrzej Bialecki * XXX FIXME 422bd3cdc31SAndrzej Bialecki * XXX This algorithm is a hack. But I don't know any 423bd3cdc31SAndrzej Bialecki * XXX better solution for now... 424bd3cdc31SAndrzej Bialecki */ 425875b66a0SJohn Baldwin SYSCTL_XLOCK(); 426bd3cdc31SAndrzej Bialecki TAILQ_FOREACH(e, clist, link) { 427875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(e->entry, 0, 0); 428bd3cdc31SAndrzej Bialecki if (error) 429bd3cdc31SAndrzej Bialecki break; 430bd3cdc31SAndrzej Bialecki } 431bd3cdc31SAndrzej Bialecki /* 432bd3cdc31SAndrzej Bialecki * Restore deregistered entries, either from the end, 433bd3cdc31SAndrzej Bialecki * or from the place where error occured. 434bd3cdc31SAndrzej Bialecki * e contains the entry that was not unregistered 435bd3cdc31SAndrzej Bialecki */ 436bd3cdc31SAndrzej Bialecki if (error) 437bd3cdc31SAndrzej Bialecki e1 = TAILQ_PREV(e, sysctl_ctx_list, link); 438bd3cdc31SAndrzej Bialecki else 439bd3cdc31SAndrzej Bialecki e1 = TAILQ_LAST(clist, sysctl_ctx_list); 440bd3cdc31SAndrzej Bialecki while (e1 != NULL) { 441bd3cdc31SAndrzej Bialecki sysctl_register_oid(e1->entry); 442bd3cdc31SAndrzej Bialecki e1 = TAILQ_PREV(e1, sysctl_ctx_list, link); 443bd3cdc31SAndrzej Bialecki } 444875b66a0SJohn Baldwin if (error) { 445875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 446bd3cdc31SAndrzej Bialecki return(EBUSY); 447875b66a0SJohn Baldwin } 448bd3cdc31SAndrzej Bialecki /* Now really delete the entries */ 449bd3cdc31SAndrzej Bialecki e = TAILQ_FIRST(clist); 450bd3cdc31SAndrzej Bialecki while (e != NULL) { 451bd3cdc31SAndrzej Bialecki e1 = TAILQ_NEXT(e, link); 452875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(e->entry, 1, 0); 453bd3cdc31SAndrzej Bialecki if (error) 454bd3cdc31SAndrzej Bialecki panic("sysctl_remove_oid: corrupt tree, entry: %s", 455bd3cdc31SAndrzej Bialecki e->entry->oid_name); 456bd3cdc31SAndrzej Bialecki free(e, M_SYSCTLOID); 457bd3cdc31SAndrzej Bialecki e = e1; 458bd3cdc31SAndrzej Bialecki } 459875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 460bd3cdc31SAndrzej Bialecki return (error); 461bd3cdc31SAndrzej Bialecki } 462bd3cdc31SAndrzej Bialecki 463bd3cdc31SAndrzej Bialecki /* Add an entry to the context */ 464bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry * 465bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_add(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp) 466bd3cdc31SAndrzej Bialecki { 467bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e; 468bd3cdc31SAndrzej Bialecki 469875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 470bd3cdc31SAndrzej Bialecki if (clist == NULL || oidp == NULL) 471bd3cdc31SAndrzej Bialecki return(NULL); 472a163d034SWarner Losh e = malloc(sizeof(struct sysctl_ctx_entry), M_SYSCTLOID, M_WAITOK); 473bd3cdc31SAndrzej Bialecki e->entry = oidp; 474bd3cdc31SAndrzej Bialecki TAILQ_INSERT_HEAD(clist, e, link); 475bd3cdc31SAndrzej Bialecki return (e); 476bd3cdc31SAndrzej Bialecki } 477bd3cdc31SAndrzej Bialecki 478bd3cdc31SAndrzej Bialecki /* Find an entry in the context */ 479bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry * 480bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_find(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp) 481bd3cdc31SAndrzej Bialecki { 482bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e; 483bd3cdc31SAndrzej Bialecki 484ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 485bd3cdc31SAndrzej Bialecki if (clist == NULL || oidp == NULL) 486bd3cdc31SAndrzej Bialecki return(NULL); 487fc2ffbe6SPoul-Henning Kamp TAILQ_FOREACH(e, clist, link) { 488bd3cdc31SAndrzej Bialecki if(e->entry == oidp) 489bd3cdc31SAndrzej Bialecki return(e); 490bd3cdc31SAndrzej Bialecki } 491bd3cdc31SAndrzej Bialecki return (e); 492bd3cdc31SAndrzej Bialecki } 493bd3cdc31SAndrzej Bialecki 494bd3cdc31SAndrzej Bialecki /* 495bd3cdc31SAndrzej Bialecki * Delete an entry from the context. 496bd3cdc31SAndrzej Bialecki * NOTE: this function doesn't free oidp! You have to remove it 497bd3cdc31SAndrzej Bialecki * with sysctl_remove_oid(). 498bd3cdc31SAndrzej Bialecki */ 499bd3cdc31SAndrzej Bialecki int 500bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_del(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp) 501bd3cdc31SAndrzej Bialecki { 502bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e; 503bd3cdc31SAndrzej Bialecki 504bd3cdc31SAndrzej Bialecki if (clist == NULL || oidp == NULL) 505bd3cdc31SAndrzej Bialecki return (EINVAL); 506875b66a0SJohn Baldwin SYSCTL_XLOCK(); 507bd3cdc31SAndrzej Bialecki e = sysctl_ctx_entry_find(clist, oidp); 508bd3cdc31SAndrzej Bialecki if (e != NULL) { 509bd3cdc31SAndrzej Bialecki TAILQ_REMOVE(clist, e, link); 510875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 511bd3cdc31SAndrzej Bialecki free(e, M_SYSCTLOID); 512bd3cdc31SAndrzej Bialecki return (0); 513875b66a0SJohn Baldwin } else { 514875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 515bd3cdc31SAndrzej Bialecki return (ENOENT); 516bd3cdc31SAndrzej Bialecki } 517875b66a0SJohn Baldwin } 518bd3cdc31SAndrzej Bialecki 519bd3cdc31SAndrzej Bialecki /* 520bd3cdc31SAndrzej Bialecki * Remove dynamically created sysctl trees. 521bd3cdc31SAndrzej Bialecki * oidp - top of the tree to be removed 522bd3cdc31SAndrzej Bialecki * del - if 0 - just deregister, otherwise free up entries as well 523bd3cdc31SAndrzej Bialecki * recurse - if != 0 traverse the subtree to be deleted 524bd3cdc31SAndrzej Bialecki */ 525bd3cdc31SAndrzej Bialecki int 526bd3cdc31SAndrzej Bialecki sysctl_remove_oid(struct sysctl_oid *oidp, int del, int recurse) 527bd3cdc31SAndrzej Bialecki { 528875b66a0SJohn Baldwin int error; 529875b66a0SJohn Baldwin 530875b66a0SJohn Baldwin SYSCTL_XLOCK(); 531875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(oidp, del, recurse); 532875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 533875b66a0SJohn Baldwin return (error); 534875b66a0SJohn Baldwin } 535875b66a0SJohn Baldwin 536e4cd31ddSJeff Roberson int 537e4cd31ddSJeff Roberson sysctl_remove_name(struct sysctl_oid *parent, const char *name, 538e4cd31ddSJeff Roberson int del, int recurse) 539e4cd31ddSJeff Roberson { 540e4cd31ddSJeff Roberson struct sysctl_oid *p, *tmp; 541e4cd31ddSJeff Roberson int error; 542e4cd31ddSJeff Roberson 543e4cd31ddSJeff Roberson error = ENOENT; 544e4cd31ddSJeff Roberson SYSCTL_XLOCK(); 545e4cd31ddSJeff Roberson SLIST_FOREACH_SAFE(p, SYSCTL_CHILDREN(parent), oid_link, tmp) { 546e4cd31ddSJeff Roberson if (strcmp(p->oid_name, name) == 0) { 547e4cd31ddSJeff Roberson error = sysctl_remove_oid_locked(p, del, recurse); 548e4cd31ddSJeff Roberson break; 549e4cd31ddSJeff Roberson } 550e4cd31ddSJeff Roberson } 551e4cd31ddSJeff Roberson SYSCTL_XUNLOCK(); 552e4cd31ddSJeff Roberson 553e4cd31ddSJeff Roberson return (error); 554e4cd31ddSJeff Roberson } 555e4cd31ddSJeff Roberson 556e4cd31ddSJeff Roberson 557875b66a0SJohn Baldwin static int 558875b66a0SJohn Baldwin sysctl_remove_oid_locked(struct sysctl_oid *oidp, int del, int recurse) 559875b66a0SJohn Baldwin { 560e4cd31ddSJeff Roberson struct sysctl_oid *p, *tmp; 561bd3cdc31SAndrzej Bialecki int error; 562bd3cdc31SAndrzej Bialecki 563875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 564bd3cdc31SAndrzej Bialecki if (oidp == NULL) 565bd3cdc31SAndrzej Bialecki return(EINVAL); 566bd3cdc31SAndrzej Bialecki if ((oidp->oid_kind & CTLFLAG_DYN) == 0) { 567bd3cdc31SAndrzej Bialecki printf("can't remove non-dynamic nodes!\n"); 568bd3cdc31SAndrzej Bialecki return (EINVAL); 569bd3cdc31SAndrzej Bialecki } 570bd3cdc31SAndrzej Bialecki /* 571bd3cdc31SAndrzej Bialecki * WARNING: normal method to do this should be through 572bd3cdc31SAndrzej Bialecki * sysctl_ctx_free(). Use recursing as the last resort 573bd3cdc31SAndrzej Bialecki * method to purge your sysctl tree of leftovers... 574bd3cdc31SAndrzej Bialecki * However, if some other code still references these nodes, 575bd3cdc31SAndrzej Bialecki * it will panic. 576bd3cdc31SAndrzej Bialecki */ 577bd3cdc31SAndrzej Bialecki if ((oidp->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 578bd3cdc31SAndrzej Bialecki if (oidp->oid_refcnt == 1) { 579e4cd31ddSJeff Roberson SLIST_FOREACH_SAFE(p, 580e4cd31ddSJeff Roberson SYSCTL_CHILDREN(oidp), oid_link, tmp) { 581f510415dSScott Long if (!recurse) { 582f510415dSScott Long printf("Warning: failed attempt to " 583f510415dSScott Long "remove oid %s with child %s\n", 584f510415dSScott Long oidp->oid_name, p->oid_name); 585bd3cdc31SAndrzej Bialecki return (ENOTEMPTY); 586f510415dSScott Long } 587875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(p, del, 588875b66a0SJohn Baldwin recurse); 589bd3cdc31SAndrzej Bialecki if (error) 590bd3cdc31SAndrzej Bialecki return (error); 591bd3cdc31SAndrzej Bialecki } 592bd3cdc31SAndrzej Bialecki } 593bd3cdc31SAndrzej Bialecki } 594bd3cdc31SAndrzej Bialecki if (oidp->oid_refcnt > 1 ) { 595bd3cdc31SAndrzej Bialecki oidp->oid_refcnt--; 596bd3cdc31SAndrzej Bialecki } else { 597bd3cdc31SAndrzej Bialecki if (oidp->oid_refcnt == 0) { 598bd3cdc31SAndrzej Bialecki printf("Warning: bad oid_refcnt=%u (%s)!\n", 599bd3cdc31SAndrzej Bialecki oidp->oid_refcnt, oidp->oid_name); 600bd3cdc31SAndrzej Bialecki return (EINVAL); 601bd3cdc31SAndrzej Bialecki } 602bd3cdc31SAndrzej Bialecki sysctl_unregister_oid(oidp); 603bd3cdc31SAndrzej Bialecki if (del) { 604ccecef29SMatthew D Fleming /* 605ccecef29SMatthew D Fleming * Wait for all threads running the handler to drain. 606ccecef29SMatthew D Fleming * This preserves the previous behavior when the 607ccecef29SMatthew D Fleming * sysctl lock was held across a handler invocation, 608ccecef29SMatthew D Fleming * and is necessary for module unload correctness. 609ccecef29SMatthew D Fleming */ 610ccecef29SMatthew D Fleming while (oidp->oid_running > 0) { 611ccecef29SMatthew D Fleming oidp->oid_kind |= CTLFLAG_DYING; 612ccecef29SMatthew D Fleming SYSCTL_SLEEP(&oidp->oid_running, "oidrm", 0); 613ccecef29SMatthew D Fleming } 6145937226dSPoul-Henning Kamp if (oidp->oid_descr) 615db9066f7SMarius Strobl free(__DECONST(char *, oidp->oid_descr), 61693e8459aSPeter Wemm M_SYSCTLOID); 617db9066f7SMarius Strobl free(__DECONST(char *, oidp->oid_name), M_SYSCTLOID); 618bd3cdc31SAndrzej Bialecki free(oidp, M_SYSCTLOID); 619bd3cdc31SAndrzej Bialecki } 620bd3cdc31SAndrzej Bialecki } 621bd3cdc31SAndrzej Bialecki return (0); 622bd3cdc31SAndrzej Bialecki } 623bd3cdc31SAndrzej Bialecki /* 624bd3cdc31SAndrzej Bialecki * Create new sysctls at run time. 625bd3cdc31SAndrzej Bialecki * clist may point to a valid context initialized with sysctl_ctx_init(). 626bd3cdc31SAndrzej Bialecki */ 627bd3cdc31SAndrzej Bialecki struct sysctl_oid * 628bd3cdc31SAndrzej Bialecki sysctl_add_oid(struct sysctl_ctx_list *clist, struct sysctl_oid_list *parent, 629e4cd31ddSJeff Roberson int number, const char *name, int kind, void *arg1, intptr_t arg2, 630c5f9b6d0SJohn Baldwin int (*handler)(SYSCTL_HANDLER_ARGS), const char *fmt, const char *descr) 631bd3cdc31SAndrzej Bialecki { 632bd3cdc31SAndrzej Bialecki struct sysctl_oid *oidp; 633bd3cdc31SAndrzej Bialecki 634bd3cdc31SAndrzej Bialecki /* You have to hook up somewhere.. */ 635bd3cdc31SAndrzej Bialecki if (parent == NULL) 636bd3cdc31SAndrzej Bialecki return(NULL); 637bd3cdc31SAndrzej Bialecki /* Check if the node already exists, otherwise create it */ 638875b66a0SJohn Baldwin SYSCTL_XLOCK(); 639bd3cdc31SAndrzej Bialecki oidp = sysctl_find_oidname(name, parent); 640bd3cdc31SAndrzej Bialecki if (oidp != NULL) { 641bd3cdc31SAndrzej Bialecki if ((oidp->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 642bd3cdc31SAndrzej Bialecki oidp->oid_refcnt++; 643bd3cdc31SAndrzej Bialecki /* Update the context */ 644bd3cdc31SAndrzej Bialecki if (clist != NULL) 645bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_add(clist, oidp); 646875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 647bd3cdc31SAndrzej Bialecki return (oidp); 648bd3cdc31SAndrzej Bialecki } else { 649875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 650bd3cdc31SAndrzej Bialecki printf("can't re-use a leaf (%s)!\n", name); 651bd3cdc31SAndrzej Bialecki return (NULL); 652bd3cdc31SAndrzej Bialecki } 653bd3cdc31SAndrzej Bialecki } 654a163d034SWarner Losh oidp = malloc(sizeof(struct sysctl_oid), M_SYSCTLOID, M_WAITOK|M_ZERO); 655bd3cdc31SAndrzej Bialecki oidp->oid_parent = parent; 656af3b2549SHans Petter Selasky SLIST_INIT(&oidp->oid_children); 657bd3cdc31SAndrzej Bialecki oidp->oid_number = number; 658bd3cdc31SAndrzej Bialecki oidp->oid_refcnt = 1; 659db9066f7SMarius Strobl oidp->oid_name = strdup(name, M_SYSCTLOID); 660bd3cdc31SAndrzej Bialecki oidp->oid_handler = handler; 661bd3cdc31SAndrzej Bialecki oidp->oid_kind = CTLFLAG_DYN | kind; 662bd3cdc31SAndrzej Bialecki oidp->oid_arg1 = arg1; 663bd3cdc31SAndrzej Bialecki oidp->oid_arg2 = arg2; 664bd3cdc31SAndrzej Bialecki oidp->oid_fmt = fmt; 665af3b2549SHans Petter Selasky if (descr != NULL) 666db9066f7SMarius Strobl oidp->oid_descr = strdup(descr, M_SYSCTLOID); 667bd3cdc31SAndrzej Bialecki /* Update the context, if used */ 668bd3cdc31SAndrzej Bialecki if (clist != NULL) 669bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_add(clist, oidp); 670bd3cdc31SAndrzej Bialecki /* Register this oid */ 671bd3cdc31SAndrzej Bialecki sysctl_register_oid(oidp); 672875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 673bd3cdc31SAndrzej Bialecki return (oidp); 674bd3cdc31SAndrzej Bialecki } 675bd3cdc31SAndrzej Bialecki 676ce02431fSDoug Rabson /* 677cd17ceaaSPeter Wemm * Rename an existing oid. 678cd17ceaaSPeter Wemm */ 679cd17ceaaSPeter Wemm void 680cd17ceaaSPeter Wemm sysctl_rename_oid(struct sysctl_oid *oidp, const char *name) 681cd17ceaaSPeter Wemm { 682cd17ceaaSPeter Wemm char *newname; 683db9066f7SMarius Strobl char *oldname; 684cd17ceaaSPeter Wemm 685db9066f7SMarius Strobl newname = strdup(name, M_SYSCTLOID); 686875b66a0SJohn Baldwin SYSCTL_XLOCK(); 687db9066f7SMarius Strobl oldname = __DECONST(char *, oidp->oid_name); 688cd17ceaaSPeter Wemm oidp->oid_name = newname; 689875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 690cd17ceaaSPeter Wemm free(oldname, M_SYSCTLOID); 691cd17ceaaSPeter Wemm } 692cd17ceaaSPeter Wemm 693cd17ceaaSPeter Wemm /* 69421885af5SDag-Erling Smørgrav * Reparent an existing oid. 69521885af5SDag-Erling Smørgrav */ 69621885af5SDag-Erling Smørgrav int 69721885af5SDag-Erling Smørgrav sysctl_move_oid(struct sysctl_oid *oid, struct sysctl_oid_list *parent) 69821885af5SDag-Erling Smørgrav { 69921885af5SDag-Erling Smørgrav struct sysctl_oid *oidp; 70021885af5SDag-Erling Smørgrav 701875b66a0SJohn Baldwin SYSCTL_XLOCK(); 702875b66a0SJohn Baldwin if (oid->oid_parent == parent) { 703875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 70421885af5SDag-Erling Smørgrav return (0); 705875b66a0SJohn Baldwin } 70621885af5SDag-Erling Smørgrav oidp = sysctl_find_oidname(oid->oid_name, parent); 707875b66a0SJohn Baldwin if (oidp != NULL) { 708875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 70921885af5SDag-Erling Smørgrav return (EEXIST); 710875b66a0SJohn Baldwin } 71121885af5SDag-Erling Smørgrav sysctl_unregister_oid(oid); 71221885af5SDag-Erling Smørgrav oid->oid_parent = parent; 71321885af5SDag-Erling Smørgrav oid->oid_number = OID_AUTO; 71421885af5SDag-Erling Smørgrav sysctl_register_oid(oid); 715875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 71621885af5SDag-Erling Smørgrav return (0); 71721885af5SDag-Erling Smørgrav } 71821885af5SDag-Erling Smørgrav 71921885af5SDag-Erling Smørgrav /* 720ce02431fSDoug Rabson * Register the kernel's oids on startup. 721ce02431fSDoug Rabson */ 722f41325dbSPeter Wemm SET_DECLARE(sysctl_set, struct sysctl_oid); 723ce02431fSDoug Rabson 724107e7dc5SPeter Pentchev static void 725107e7dc5SPeter Pentchev sysctl_register_all(void *arg) 726ce02431fSDoug Rabson { 727f41325dbSPeter Wemm struct sysctl_oid **oidp; 728ce02431fSDoug Rabson 7293e829b18SJohn Baldwin sx_init(&sysctlmemlock, "sysctl mem"); 7303bd1da29SRobert Watson SYSCTL_INIT(); 731875b66a0SJohn Baldwin SYSCTL_XLOCK(); 732f41325dbSPeter Wemm SET_FOREACH(oidp, sysctl_set) 733f41325dbSPeter Wemm sysctl_register_oid(*oidp); 734875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 735f41325dbSPeter Wemm } 736af3b2549SHans Petter Selasky SYSINIT(sysctl, SI_SUB_KMEM, SI_ORDER_FIRST, sysctl_register_all, 0); 737ce02431fSDoug Rabson 738946bb7a2SPoul-Henning Kamp /* 739946bb7a2SPoul-Henning Kamp * "Staff-functions" 740946bb7a2SPoul-Henning Kamp * 74165d0bc13SPoul-Henning Kamp * These functions implement a presently undocumented interface 74265d0bc13SPoul-Henning Kamp * used by the sysctl program to walk the tree, and get the type 74365d0bc13SPoul-Henning Kamp * so it can print the value. 74465d0bc13SPoul-Henning Kamp * This interface is under work and consideration, and should probably 74565d0bc13SPoul-Henning Kamp * be killed with a big axe by the first person who can find the time. 74665d0bc13SPoul-Henning Kamp * (be aware though, that the proper interface isn't as obvious as it 74765d0bc13SPoul-Henning Kamp * may seem, there are various conflicting requirements. 74865d0bc13SPoul-Henning Kamp * 749946bb7a2SPoul-Henning Kamp * {0,0} printf the entire MIB-tree. 750946bb7a2SPoul-Henning Kamp * {0,1,...} return the name of the "..." OID. 75186415b71SPoul-Henning Kamp * {0,2,...} return the next OID. 752946bb7a2SPoul-Henning Kamp * {0,3} return the OID of the name in "new" 75365d0bc13SPoul-Henning Kamp * {0,4,...} return the kind & format info for the "..." OID. 7546105f815SLuigi Rizzo * {0,5,...} return the description the "..." OID. 755946bb7a2SPoul-Henning Kamp */ 756946bb7a2SPoul-Henning Kamp 757df970488SRobert Watson #ifdef SYSCTL_DEBUG 758787d58f2SPoul-Henning Kamp static void 759ce02431fSDoug Rabson sysctl_sysctl_debug_dump_node(struct sysctl_oid_list *l, int i) 760787d58f2SPoul-Henning Kamp { 761ce02431fSDoug Rabson int k; 762ce02431fSDoug Rabson struct sysctl_oid *oidp; 763787d58f2SPoul-Henning Kamp 764fca77320SMateusz Guzik SYSCTL_ASSERT_LOCKED(); 765ce02431fSDoug Rabson SLIST_FOREACH(oidp, l, oid_link) { 766787d58f2SPoul-Henning Kamp 767787d58f2SPoul-Henning Kamp for (k=0; k<i; k++) 768787d58f2SPoul-Henning Kamp printf(" "); 769787d58f2SPoul-Henning Kamp 770ce02431fSDoug Rabson printf("%d %s ", oidp->oid_number, oidp->oid_name); 771787d58f2SPoul-Henning Kamp 772787d58f2SPoul-Henning Kamp printf("%c%c", 773ce02431fSDoug Rabson oidp->oid_kind & CTLFLAG_RD ? 'R':' ', 774ce02431fSDoug Rabson oidp->oid_kind & CTLFLAG_WR ? 'W':' '); 775787d58f2SPoul-Henning Kamp 776ce02431fSDoug Rabson if (oidp->oid_handler) 77761220614SPoul-Henning Kamp printf(" *Handler"); 77861220614SPoul-Henning Kamp 779ce02431fSDoug Rabson switch (oidp->oid_kind & CTLTYPE) { 780787d58f2SPoul-Henning Kamp case CTLTYPE_NODE: 781787d58f2SPoul-Henning Kamp printf(" Node\n"); 782ce02431fSDoug Rabson if (!oidp->oid_handler) { 783787d58f2SPoul-Henning Kamp sysctl_sysctl_debug_dump_node( 784af3b2549SHans Petter Selasky SYSCTL_CHILDREN(oidp), i + 2); 785787d58f2SPoul-Henning Kamp } 786787d58f2SPoul-Henning Kamp break; 787787d58f2SPoul-Henning Kamp case CTLTYPE_INT: printf(" Int\n"); break; 788cbc134adSMatthew D Fleming case CTLTYPE_UINT: printf(" u_int\n"); break; 789cbc134adSMatthew D Fleming case CTLTYPE_LONG: printf(" Long\n"); break; 790cbc134adSMatthew D Fleming case CTLTYPE_ULONG: printf(" u_long\n"); break; 791787d58f2SPoul-Henning Kamp case CTLTYPE_STRING: printf(" String\n"); break; 792cbc134adSMatthew D Fleming case CTLTYPE_U64: printf(" uint64_t\n"); break; 793cbc134adSMatthew D Fleming case CTLTYPE_S64: printf(" int64_t\n"); break; 794787d58f2SPoul-Henning Kamp case CTLTYPE_OPAQUE: printf(" Opaque/struct\n"); break; 795787d58f2SPoul-Henning Kamp default: printf("\n"); 796787d58f2SPoul-Henning Kamp } 797787d58f2SPoul-Henning Kamp 798787d58f2SPoul-Henning Kamp } 799787d58f2SPoul-Henning Kamp } 800787d58f2SPoul-Henning Kamp 801787d58f2SPoul-Henning Kamp static int 80282d9ae4eSPoul-Henning Kamp sysctl_sysctl_debug(SYSCTL_HANDLER_ARGS) 803787d58f2SPoul-Henning Kamp { 804023a0e61SPeter Wemm int error; 805023a0e61SPeter Wemm 806acd3428bSRobert Watson error = priv_check(req->td, PRIV_SYSCTL_DEBUG); 807023a0e61SPeter Wemm if (error) 80846003fb3SPawel Jakub Dawidek return (error); 809fca77320SMateusz Guzik SYSCTL_SLOCK(); 810ce02431fSDoug Rabson sysctl_sysctl_debug_dump_node(&sysctl__children, 0); 811fca77320SMateusz Guzik SYSCTL_SUNLOCK(); 81246003fb3SPawel Jakub Dawidek return (ENOENT); 813787d58f2SPoul-Henning Kamp } 814787d58f2SPoul-Henning Kamp 815fca77320SMateusz Guzik SYSCTL_PROC(_sysctl, 0, debug, CTLTYPE_STRING|CTLFLAG_RD|CTLFLAG_MPSAFE, 816946bb7a2SPoul-Henning Kamp 0, 0, sysctl_sysctl_debug, "-", ""); 817df970488SRobert Watson #endif 8182e210993SPoul-Henning Kamp 819946bb7a2SPoul-Henning Kamp static int 82082d9ae4eSPoul-Henning Kamp sysctl_sysctl_name(SYSCTL_HANDLER_ARGS) 821946bb7a2SPoul-Henning Kamp { 822946bb7a2SPoul-Henning Kamp int *name = (int *) arg1; 823946bb7a2SPoul-Henning Kamp u_int namelen = arg2; 824ce02431fSDoug Rabson int error = 0; 825ce02431fSDoug Rabson struct sysctl_oid *oid; 8267f4173ccSPoul-Henning Kamp struct sysctl_oid_list *lsp = &sysctl__children, *lsp2; 827946bb7a2SPoul-Henning Kamp char buf[10]; 8282e210993SPoul-Henning Kamp 829fca77320SMateusz Guzik SYSCTL_SLOCK(); 830946bb7a2SPoul-Henning Kamp while (namelen) { 831946bb7a2SPoul-Henning Kamp if (!lsp) { 8322127f260SArchie Cobbs snprintf(buf,sizeof(buf),"%d",*name); 833946bb7a2SPoul-Henning Kamp if (req->oldidx) 834946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, ".", 1); 835946bb7a2SPoul-Henning Kamp if (!error) 836946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, buf, strlen(buf)); 837946bb7a2SPoul-Henning Kamp if (error) 838ccecef29SMatthew D Fleming goto out; 839946bb7a2SPoul-Henning Kamp namelen--; 840946bb7a2SPoul-Henning Kamp name++; 841946bb7a2SPoul-Henning Kamp continue; 842946bb7a2SPoul-Henning Kamp } 8437f4173ccSPoul-Henning Kamp lsp2 = 0; 844ce02431fSDoug Rabson SLIST_FOREACH(oid, lsp, oid_link) { 845ce02431fSDoug Rabson if (oid->oid_number != *name) 846946bb7a2SPoul-Henning Kamp continue; 847946bb7a2SPoul-Henning Kamp 848946bb7a2SPoul-Henning Kamp if (req->oldidx) 849946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, ".", 1); 850946bb7a2SPoul-Henning Kamp if (!error) 851ce02431fSDoug Rabson error = SYSCTL_OUT(req, oid->oid_name, 852ce02431fSDoug Rabson strlen(oid->oid_name)); 853946bb7a2SPoul-Henning Kamp if (error) 854ccecef29SMatthew D Fleming goto out; 855946bb7a2SPoul-Henning Kamp 856946bb7a2SPoul-Henning Kamp namelen--; 857946bb7a2SPoul-Henning Kamp name++; 858946bb7a2SPoul-Henning Kamp 859ce02431fSDoug Rabson if ((oid->oid_kind & CTLTYPE) != CTLTYPE_NODE) 860946bb7a2SPoul-Henning Kamp break; 861946bb7a2SPoul-Henning Kamp 862ce02431fSDoug Rabson if (oid->oid_handler) 863946bb7a2SPoul-Henning Kamp break; 864946bb7a2SPoul-Henning Kamp 8655127ecb8SMatthew D Fleming lsp2 = SYSCTL_CHILDREN(oid); 866946bb7a2SPoul-Henning Kamp break; 867946bb7a2SPoul-Henning Kamp } 8687f4173ccSPoul-Henning Kamp lsp = lsp2; 869946bb7a2SPoul-Henning Kamp } 870ccecef29SMatthew D Fleming error = SYSCTL_OUT(req, "", 1); 871ccecef29SMatthew D Fleming out: 872fca77320SMateusz Guzik SYSCTL_SUNLOCK(); 873ccecef29SMatthew D Fleming return (error); 874946bb7a2SPoul-Henning Kamp } 875946bb7a2SPoul-Henning Kamp 876ff66f6a4SRobert Watson /* 877ff66f6a4SRobert Watson * XXXRW/JA: Shouldn't return name data for nodes that we don't permit in 878ff66f6a4SRobert Watson * capability mode. 879ff66f6a4SRobert Watson */ 880fca77320SMateusz Guzik static SYSCTL_NODE(_sysctl, 1, name, CTLFLAG_RD | CTLFLAG_MPSAFE | CTLFLAG_CAPRD, 881ff66f6a4SRobert Watson sysctl_sysctl_name, ""); 882946bb7a2SPoul-Henning Kamp 883946bb7a2SPoul-Henning Kamp static int 884ce02431fSDoug Rabson sysctl_sysctl_next_ls(struct sysctl_oid_list *lsp, int *name, u_int namelen, 885ce02431fSDoug Rabson int *next, int *len, int level, struct sysctl_oid **oidpp) 886946bb7a2SPoul-Henning Kamp { 887ce02431fSDoug Rabson struct sysctl_oid *oidp; 888946bb7a2SPoul-Henning Kamp 889efe0abddSMateusz Guzik SYSCTL_ASSERT_LOCKED(); 890946bb7a2SPoul-Henning Kamp *len = level; 891ce02431fSDoug Rabson SLIST_FOREACH(oidp, lsp, oid_link) { 892ce02431fSDoug Rabson *next = oidp->oid_number; 893ce02431fSDoug Rabson *oidpp = oidp; 894946bb7a2SPoul-Henning Kamp 895306e6b83SMaxime Henrion if (oidp->oid_kind & CTLFLAG_SKIP) 896306e6b83SMaxime Henrion continue; 897306e6b83SMaxime Henrion 898946bb7a2SPoul-Henning Kamp if (!namelen) { 899ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 90046003fb3SPawel Jakub Dawidek return (0); 901ce02431fSDoug Rabson if (oidp->oid_handler) 902946bb7a2SPoul-Henning Kamp /* We really should call the handler here...*/ 90346003fb3SPawel Jakub Dawidek return (0); 9045127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 90561220614SPoul-Henning Kamp if (!sysctl_sysctl_next_ls(lsp, 0, 0, next+1, 906ce02431fSDoug Rabson len, level+1, oidpp)) 90746003fb3SPawel Jakub Dawidek return (0); 90890623e1aSRobert Watson goto emptynode; 909946bb7a2SPoul-Henning Kamp } 910946bb7a2SPoul-Henning Kamp 911ce02431fSDoug Rabson if (oidp->oid_number < *name) 912946bb7a2SPoul-Henning Kamp continue; 913946bb7a2SPoul-Henning Kamp 914ce02431fSDoug Rabson if (oidp->oid_number > *name) { 915ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 91646003fb3SPawel Jakub Dawidek return (0); 917ce02431fSDoug Rabson if (oidp->oid_handler) 91846003fb3SPawel Jakub Dawidek return (0); 9195127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 920946bb7a2SPoul-Henning Kamp if (!sysctl_sysctl_next_ls(lsp, name+1, namelen-1, 921ce02431fSDoug Rabson next+1, len, level+1, oidpp)) 922946bb7a2SPoul-Henning Kamp return (0); 92361220614SPoul-Henning Kamp goto next; 924946bb7a2SPoul-Henning Kamp } 925ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 926946bb7a2SPoul-Henning Kamp continue; 927946bb7a2SPoul-Henning Kamp 928ce02431fSDoug Rabson if (oidp->oid_handler) 929946bb7a2SPoul-Henning Kamp continue; 930946bb7a2SPoul-Henning Kamp 9315127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 932946bb7a2SPoul-Henning Kamp if (!sysctl_sysctl_next_ls(lsp, name+1, namelen-1, next+1, 933ce02431fSDoug Rabson len, level+1, oidpp)) 934946bb7a2SPoul-Henning Kamp return (0); 93561220614SPoul-Henning Kamp next: 936946bb7a2SPoul-Henning Kamp namelen = 1; 93790623e1aSRobert Watson emptynode: 938946bb7a2SPoul-Henning Kamp *len = level; 939946bb7a2SPoul-Henning Kamp } 94046003fb3SPawel Jakub Dawidek return (1); 941946bb7a2SPoul-Henning Kamp } 942946bb7a2SPoul-Henning Kamp 943946bb7a2SPoul-Henning Kamp static int 94482d9ae4eSPoul-Henning Kamp sysctl_sysctl_next(SYSCTL_HANDLER_ARGS) 945946bb7a2SPoul-Henning Kamp { 946946bb7a2SPoul-Henning Kamp int *name = (int *) arg1; 947946bb7a2SPoul-Henning Kamp u_int namelen = arg2; 948946bb7a2SPoul-Henning Kamp int i, j, error; 949946bb7a2SPoul-Henning Kamp struct sysctl_oid *oid; 950ce02431fSDoug Rabson struct sysctl_oid_list *lsp = &sysctl__children; 951946bb7a2SPoul-Henning Kamp int newoid[CTL_MAXNAME]; 952946bb7a2SPoul-Henning Kamp 953fca77320SMateusz Guzik SYSCTL_SLOCK(); 954946bb7a2SPoul-Henning Kamp i = sysctl_sysctl_next_ls(lsp, name, namelen, newoid, &j, 1, &oid); 955fca77320SMateusz Guzik SYSCTL_SUNLOCK(); 956946bb7a2SPoul-Henning Kamp if (i) 95746003fb3SPawel Jakub Dawidek return (ENOENT); 958946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, newoid, j * sizeof (int)); 959946bb7a2SPoul-Henning Kamp return (error); 960946bb7a2SPoul-Henning Kamp } 961946bb7a2SPoul-Henning Kamp 962ff66f6a4SRobert Watson /* 963ff66f6a4SRobert Watson * XXXRW/JA: Shouldn't return next data for nodes that we don't permit in 964ff66f6a4SRobert Watson * capability mode. 965ff66f6a4SRobert Watson */ 966fca77320SMateusz Guzik static SYSCTL_NODE(_sysctl, 2, next, CTLFLAG_RD | CTLFLAG_MPSAFE | CTLFLAG_CAPRD, 967ff66f6a4SRobert Watson sysctl_sysctl_next, ""); 968946bb7a2SPoul-Henning Kamp 969946bb7a2SPoul-Henning Kamp static int 970ce02431fSDoug Rabson name2oid(char *name, int *oid, int *len, struct sysctl_oid **oidpp) 971946bb7a2SPoul-Henning Kamp { 972ce02431fSDoug Rabson struct sysctl_oid *oidp; 973ce02431fSDoug Rabson struct sysctl_oid_list *lsp = &sysctl__children; 974946bb7a2SPoul-Henning Kamp char *p; 975946bb7a2SPoul-Henning Kamp 976efe0abddSMateusz Guzik SYSCTL_ASSERT_LOCKED(); 977ddf9d243SEd Schouten 978db9066f7SMarius Strobl for (*len = 0; *len < CTL_MAXNAME;) { 979db9066f7SMarius Strobl p = strsep(&name, "."); 980946bb7a2SPoul-Henning Kamp 981ce02431fSDoug Rabson oidp = SLIST_FIRST(lsp); 982db9066f7SMarius Strobl for (;; oidp = SLIST_NEXT(oidp, oid_link)) { 983db9066f7SMarius Strobl if (oidp == NULL) 984db9066f7SMarius Strobl return (ENOENT); 985db9066f7SMarius Strobl if (strcmp(p, oidp->oid_name) == 0) 986db9066f7SMarius Strobl break; 987946bb7a2SPoul-Henning Kamp } 988ce02431fSDoug Rabson *oid++ = oidp->oid_number; 989946bb7a2SPoul-Henning Kamp (*len)++; 990946bb7a2SPoul-Henning Kamp 991db9066f7SMarius Strobl if (name == NULL || *name == '\0') { 992ce02431fSDoug Rabson if (oidpp) 993ce02431fSDoug Rabson *oidpp = oidp; 994946bb7a2SPoul-Henning Kamp return (0); 995946bb7a2SPoul-Henning Kamp } 996946bb7a2SPoul-Henning Kamp 997ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 998946bb7a2SPoul-Henning Kamp break; 999946bb7a2SPoul-Henning Kamp 1000ce02431fSDoug Rabson if (oidp->oid_handler) 1001946bb7a2SPoul-Henning Kamp break; 1002946bb7a2SPoul-Henning Kamp 10035127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 1004946bb7a2SPoul-Henning Kamp } 100546003fb3SPawel Jakub Dawidek return (ENOENT); 1006946bb7a2SPoul-Henning Kamp } 1007946bb7a2SPoul-Henning Kamp 1008946bb7a2SPoul-Henning Kamp static int 100982d9ae4eSPoul-Henning Kamp sysctl_sysctl_name2oid(SYSCTL_HANDLER_ARGS) 1010946bb7a2SPoul-Henning Kamp { 1011946bb7a2SPoul-Henning Kamp char *p; 1012dd6312a7SMatthew D Fleming int error, oid[CTL_MAXNAME], len = 0; 1013946bb7a2SPoul-Henning Kamp struct sysctl_oid *op = 0; 1014946bb7a2SPoul-Henning Kamp 1015946bb7a2SPoul-Henning Kamp if (!req->newlen) 101646003fb3SPawel Jakub Dawidek return (ENOENT); 10176a5d592aSPoul-Henning Kamp if (req->newlen >= MAXPATHLEN) /* XXX arbitrary, undocumented */ 10186a5d592aSPoul-Henning Kamp return (ENAMETOOLONG); 1019946bb7a2SPoul-Henning Kamp 1020a163d034SWarner Losh p = malloc(req->newlen+1, M_SYSCTL, M_WAITOK); 1021946bb7a2SPoul-Henning Kamp 1022946bb7a2SPoul-Henning Kamp error = SYSCTL_IN(req, p, req->newlen); 1023946bb7a2SPoul-Henning Kamp if (error) { 1024946bb7a2SPoul-Henning Kamp free(p, M_SYSCTL); 1025946bb7a2SPoul-Henning Kamp return (error); 1026946bb7a2SPoul-Henning Kamp } 1027946bb7a2SPoul-Henning Kamp 1028946bb7a2SPoul-Henning Kamp p [req->newlen] = '\0'; 1029946bb7a2SPoul-Henning Kamp 1030b564c5d6SMateusz Guzik SYSCTL_SLOCK(); 1031946bb7a2SPoul-Henning Kamp error = name2oid(p, oid, &len, &op); 1032b564c5d6SMateusz Guzik SYSCTL_SUNLOCK(); 1033946bb7a2SPoul-Henning Kamp 1034946bb7a2SPoul-Henning Kamp free(p, M_SYSCTL); 1035946bb7a2SPoul-Henning Kamp 1036946bb7a2SPoul-Henning Kamp if (error) 1037946bb7a2SPoul-Henning Kamp return (error); 1038946bb7a2SPoul-Henning Kamp 1039946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, oid, len * sizeof *oid); 1040946bb7a2SPoul-Henning Kamp return (error); 1041946bb7a2SPoul-Henning Kamp } 1042946bb7a2SPoul-Henning Kamp 1043ff66f6a4SRobert Watson /* 1044ff66f6a4SRobert Watson * XXXRW/JA: Shouldn't return name2oid data for nodes that we don't permit in 1045ff66f6a4SRobert Watson * capability mode. 1046ff66f6a4SRobert Watson */ 10472fee06f0SMatthew D Fleming SYSCTL_PROC(_sysctl, 3, name2oid, 1048ff66f6a4SRobert Watson CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_ANYBODY | CTLFLAG_MPSAFE 1049ff66f6a4SRobert Watson | CTLFLAG_CAPRW, 0, 0, sysctl_sysctl_name2oid, "I", ""); 1050946bb7a2SPoul-Henning Kamp 1051946bb7a2SPoul-Henning Kamp static int 105282d9ae4eSPoul-Henning Kamp sysctl_sysctl_oidfmt(SYSCTL_HANDLER_ARGS) 1053946bb7a2SPoul-Henning Kamp { 1054ce02431fSDoug Rabson struct sysctl_oid *oid; 1055226420a4SBrian Feldman int error; 1056946bb7a2SPoul-Henning Kamp 1057fca77320SMateusz Guzik SYSCTL_SLOCK(); 1058226420a4SBrian Feldman error = sysctl_find_oid(arg1, arg2, &oid, NULL, req); 1059226420a4SBrian Feldman if (error) 1060ccecef29SMatthew D Fleming goto out; 1061946bb7a2SPoul-Henning Kamp 1062ccecef29SMatthew D Fleming if (oid->oid_fmt == NULL) { 1063ccecef29SMatthew D Fleming error = ENOENT; 1064ccecef29SMatthew D Fleming goto out; 1065ccecef29SMatthew D Fleming } 1066226420a4SBrian Feldman error = SYSCTL_OUT(req, &oid->oid_kind, sizeof(oid->oid_kind)); 1067226420a4SBrian Feldman if (error) 1068ccecef29SMatthew D Fleming goto out; 1069226420a4SBrian Feldman error = SYSCTL_OUT(req, oid->oid_fmt, strlen(oid->oid_fmt) + 1); 1070ccecef29SMatthew D Fleming out: 1071fca77320SMateusz Guzik SYSCTL_SUNLOCK(); 107265d0bc13SPoul-Henning Kamp return (error); 1073946bb7a2SPoul-Henning Kamp } 1074946bb7a2SPoul-Henning Kamp 107586415b71SPoul-Henning Kamp 1076ff66f6a4SRobert Watson static SYSCTL_NODE(_sysctl, 4, oidfmt, CTLFLAG_RD|CTLFLAG_MPSAFE|CTLFLAG_CAPRD, 1077f3b86a5fSEd Schouten sysctl_sysctl_oidfmt, ""); 1078946bb7a2SPoul-Henning Kamp 10796105f815SLuigi Rizzo static int 10806105f815SLuigi Rizzo sysctl_sysctl_oiddescr(SYSCTL_HANDLER_ARGS) 10816105f815SLuigi Rizzo { 10826105f815SLuigi Rizzo struct sysctl_oid *oid; 10836105f815SLuigi Rizzo int error; 10846105f815SLuigi Rizzo 1085fca77320SMateusz Guzik SYSCTL_SLOCK(); 10866105f815SLuigi Rizzo error = sysctl_find_oid(arg1, arg2, &oid, NULL, req); 10876105f815SLuigi Rizzo if (error) 1088ccecef29SMatthew D Fleming goto out; 10896105f815SLuigi Rizzo 1090ccecef29SMatthew D Fleming if (oid->oid_descr == NULL) { 1091ccecef29SMatthew D Fleming error = ENOENT; 1092ccecef29SMatthew D Fleming goto out; 1093ccecef29SMatthew D Fleming } 10945937226dSPoul-Henning Kamp error = SYSCTL_OUT(req, oid->oid_descr, strlen(oid->oid_descr) + 1); 1095ccecef29SMatthew D Fleming out: 1096fca77320SMateusz Guzik SYSCTL_SUNLOCK(); 10976105f815SLuigi Rizzo return (error); 10986105f815SLuigi Rizzo } 10996105f815SLuigi Rizzo 1100fca77320SMateusz Guzik static SYSCTL_NODE(_sysctl, 5, oiddescr, CTLFLAG_RD|CTLFLAG_MPSAFE|CTLFLAG_CAPRD, 1101ff66f6a4SRobert Watson sysctl_sysctl_oiddescr, ""); 11026105f815SLuigi Rizzo 1103946bb7a2SPoul-Henning Kamp /* 1104946bb7a2SPoul-Henning Kamp * Default "handler" functions. 1105946bb7a2SPoul-Henning Kamp */ 11062e210993SPoul-Henning Kamp 1107ae0eb976SPoul-Henning Kamp /* 1108486bddb0SDoug Rabson * Handle an int, signed or unsigned. 1109ae0eb976SPoul-Henning Kamp * Two cases: 1110ae0eb976SPoul-Henning Kamp * a variable: point arg1 at it. 1111ae0eb976SPoul-Henning Kamp * a constant: pass it in arg2. 1112ae0eb976SPoul-Henning Kamp */ 1113ae0eb976SPoul-Henning Kamp 11143a34a5c3SPoul-Henning Kamp int 111582d9ae4eSPoul-Henning Kamp sysctl_handle_int(SYSCTL_HANDLER_ARGS) 1116b396cd83SPoul-Henning Kamp { 11179e74cba3SDon Lewis int tmpout, error = 0; 1118b396cd83SPoul-Henning Kamp 11199e74cba3SDon Lewis /* 11209e74cba3SDon Lewis * Attempt to get a coherent snapshot by making a copy of the data. 11219e74cba3SDon Lewis */ 1122ae0eb976SPoul-Henning Kamp if (arg1) 11239e74cba3SDon Lewis tmpout = *(int *)arg1; 11241fbf1f71SBruce Evans else 11259e74cba3SDon Lewis tmpout = arg2; 11269e74cba3SDon Lewis error = SYSCTL_OUT(req, &tmpout, sizeof(int)); 1127b396cd83SPoul-Henning Kamp 1128ae0eb976SPoul-Henning Kamp if (error || !req->newptr) 1129ae0eb976SPoul-Henning Kamp return (error); 1130b396cd83SPoul-Henning Kamp 1131ae0eb976SPoul-Henning Kamp if (!arg1) 1132ae0eb976SPoul-Henning Kamp error = EPERM; 1133ae0eb976SPoul-Henning Kamp else 1134ae0eb976SPoul-Henning Kamp error = SYSCTL_IN(req, arg1, sizeof(int)); 1135ae0eb976SPoul-Henning Kamp return (error); 1136b396cd83SPoul-Henning Kamp } 1137b396cd83SPoul-Henning Kamp 1138a4684d74SAndre Oppermann /* 1139a4684d74SAndre Oppermann * Based on on sysctl_handle_int() convert milliseconds into ticks. 1140eddfbb76SRobert Watson * Note: this is used by TCP. 1141a4684d74SAndre Oppermann */ 1142a4684d74SAndre Oppermann 1143a4684d74SAndre Oppermann int 1144a4684d74SAndre Oppermann sysctl_msec_to_ticks(SYSCTL_HANDLER_ARGS) 1145a4684d74SAndre Oppermann { 1146a4684d74SAndre Oppermann int error, s, tt; 1147a4684d74SAndre Oppermann 1148f6dfe47aSMarko Zec tt = *(int *)arg1; 1149a4684d74SAndre Oppermann s = (int)((int64_t)tt * 1000 / hz); 1150a4684d74SAndre Oppermann 1151a4684d74SAndre Oppermann error = sysctl_handle_int(oidp, &s, 0, req); 1152a4684d74SAndre Oppermann if (error || !req->newptr) 1153a4684d74SAndre Oppermann return (error); 1154a4684d74SAndre Oppermann 1155a4684d74SAndre Oppermann tt = (int)((int64_t)s * hz / 1000); 1156a4684d74SAndre Oppermann if (tt < 1) 1157a4684d74SAndre Oppermann return (EINVAL); 1158a4684d74SAndre Oppermann 1159f6dfe47aSMarko Zec *(int *)arg1 = tt; 1160a4684d74SAndre Oppermann return (0); 1161a4684d74SAndre Oppermann } 1162a4684d74SAndre Oppermann 1163a4684d74SAndre Oppermann 1164ae0eb976SPoul-Henning Kamp /* 116518716f9fSMarius Strobl * Handle a long, signed or unsigned. 116618716f9fSMarius Strobl * Two cases: 116718716f9fSMarius Strobl * a variable: point arg1 at it. 116818716f9fSMarius Strobl * a constant: pass it in arg2. 1169069e9bc1SDoug Rabson */ 1170069e9bc1SDoug Rabson 1171069e9bc1SDoug Rabson int 117282d9ae4eSPoul-Henning Kamp sysctl_handle_long(SYSCTL_HANDLER_ARGS) 1173069e9bc1SDoug Rabson { 1174069e9bc1SDoug Rabson int error = 0; 1175a7bc3102SPeter Wemm long tmplong; 1176a7bc3102SPeter Wemm #ifdef SCTL_MASK32 1177a7bc3102SPeter Wemm int tmpint; 1178a7bc3102SPeter Wemm #endif 1179069e9bc1SDoug Rabson 11809e74cba3SDon Lewis /* 11819e74cba3SDon Lewis * Attempt to get a coherent snapshot by making a copy of the data. 11829e74cba3SDon Lewis */ 1183bdc5f017SMarius Strobl if (arg1) 1184a7bc3102SPeter Wemm tmplong = *(long *)arg1; 1185bdc5f017SMarius Strobl else 1186bdc5f017SMarius Strobl tmplong = arg2; 1187a7bc3102SPeter Wemm #ifdef SCTL_MASK32 1188a7bc3102SPeter Wemm if (req->flags & SCTL_MASK32) { 1189a7bc3102SPeter Wemm tmpint = tmplong; 1190a7bc3102SPeter Wemm error = SYSCTL_OUT(req, &tmpint, sizeof(int)); 1191a7bc3102SPeter Wemm } else 1192a7bc3102SPeter Wemm #endif 1193a7bc3102SPeter Wemm error = SYSCTL_OUT(req, &tmplong, sizeof(long)); 1194069e9bc1SDoug Rabson 1195069e9bc1SDoug Rabson if (error || !req->newptr) 1196069e9bc1SDoug Rabson return (error); 1197069e9bc1SDoug Rabson 1198bdc5f017SMarius Strobl if (!arg1) 1199bdc5f017SMarius Strobl error = EPERM; 1200a7bc3102SPeter Wemm #ifdef SCTL_MASK32 1201bdc5f017SMarius Strobl else if (req->flags & SCTL_MASK32) { 1202a7bc3102SPeter Wemm error = SYSCTL_IN(req, &tmpint, sizeof(int)); 1203a7bc3102SPeter Wemm *(long *)arg1 = (long)tmpint; 1204bdc5f017SMarius Strobl } 1205a7bc3102SPeter Wemm #endif 1206bdc5f017SMarius Strobl else 1207069e9bc1SDoug Rabson error = SYSCTL_IN(req, arg1, sizeof(long)); 1208069e9bc1SDoug Rabson return (error); 1209069e9bc1SDoug Rabson } 1210069e9bc1SDoug Rabson 1211069e9bc1SDoug Rabson /* 121218716f9fSMarius Strobl * Handle a 64 bit int, signed or unsigned. 121318716f9fSMarius Strobl * Two cases: 121418716f9fSMarius Strobl * a variable: point arg1 at it. 121518716f9fSMarius Strobl * a constant: pass it in arg2. 1216df82ff50SDavid Malone */ 1217df82ff50SDavid Malone int 1218cbc134adSMatthew D Fleming sysctl_handle_64(SYSCTL_HANDLER_ARGS) 1219df82ff50SDavid Malone { 1220df82ff50SDavid Malone int error = 0; 1221df82ff50SDavid Malone uint64_t tmpout; 1222df82ff50SDavid Malone 1223df82ff50SDavid Malone /* 1224df82ff50SDavid Malone * Attempt to get a coherent snapshot by making a copy of the data. 1225df82ff50SDavid Malone */ 1226bdc5f017SMarius Strobl if (arg1) 1227df82ff50SDavid Malone tmpout = *(uint64_t *)arg1; 1228bdc5f017SMarius Strobl else 1229bdc5f017SMarius Strobl tmpout = arg2; 1230df82ff50SDavid Malone error = SYSCTL_OUT(req, &tmpout, sizeof(uint64_t)); 1231df82ff50SDavid Malone 1232df82ff50SDavid Malone if (error || !req->newptr) 1233df82ff50SDavid Malone return (error); 1234df82ff50SDavid Malone 1235bdc5f017SMarius Strobl if (!arg1) 1236bdc5f017SMarius Strobl error = EPERM; 1237bdc5f017SMarius Strobl else 1238df82ff50SDavid Malone error = SYSCTL_IN(req, arg1, sizeof(uint64_t)); 1239df82ff50SDavid Malone return (error); 1240df82ff50SDavid Malone } 1241df82ff50SDavid Malone 1242df82ff50SDavid Malone /* 1243ae0eb976SPoul-Henning Kamp * Handle our generic '\0' terminated 'C' string. 1244ae0eb976SPoul-Henning Kamp * Two cases: 1245ae0eb976SPoul-Henning Kamp * a variable string: point arg1 at it, arg2 is max length. 1246ae0eb976SPoul-Henning Kamp * a constant string: point arg1 at it, arg2 is zero. 1247ae0eb976SPoul-Henning Kamp */ 1248ae0eb976SPoul-Henning Kamp 12493a34a5c3SPoul-Henning Kamp int 125082d9ae4eSPoul-Henning Kamp sysctl_handle_string(SYSCTL_HANDLER_ARGS) 1251b396cd83SPoul-Henning Kamp { 125237a107a4SGlen Barber size_t outlen; 125330d58d6bSMateusz Guzik int error = 0, ro_string = 0; 1254e80fb434SRobert Drehmel 12556a3287f8SHans Petter Selasky /* 12566a3287f8SHans Petter Selasky * A zero-length buffer indicates a fixed size read-only 12576a3287f8SHans Petter Selasky * string: 12586a3287f8SHans Petter Selasky */ 125930d58d6bSMateusz Guzik if (arg2 == 0) { 12606a3287f8SHans Petter Selasky arg2 = strlen((char *)arg1) + 1; 126130d58d6bSMateusz Guzik ro_string = 1; 126230d58d6bSMateusz Guzik } 12633da1cf1eSHans Petter Selasky 1264af3b2549SHans Petter Selasky if (req->oldptr != NULL) { 1265af3b2549SHans Petter Selasky char *tmparg; 126637a107a4SGlen Barber 126730d58d6bSMateusz Guzik if (ro_string) { 126830d58d6bSMateusz Guzik tmparg = arg1; 126930d58d6bSMateusz Guzik } else { 1270af3b2549SHans Petter Selasky /* try to make a coherent snapshot of the string */ 1271af3b2549SHans Petter Selasky tmparg = malloc(arg2, M_SYSCTLTMP, M_WAITOK); 1272af3b2549SHans Petter Selasky memcpy(tmparg, arg1, arg2); 127330d58d6bSMateusz Guzik } 1274af3b2549SHans Petter Selasky 1275af3b2549SHans Petter Selasky outlen = strnlen(tmparg, arg2 - 1) + 1; 127637a107a4SGlen Barber error = SYSCTL_OUT(req, tmparg, outlen); 127737a107a4SGlen Barber 127830d58d6bSMateusz Guzik if (!ro_string) 1279af3b2549SHans Petter Selasky free(tmparg, M_SYSCTLTMP); 1280af3b2549SHans Petter Selasky } else { 1281af3b2549SHans Petter Selasky outlen = strnlen((char *)arg1, arg2 - 1) + 1; 1282af3b2549SHans Petter Selasky error = SYSCTL_OUT(req, NULL, outlen); 1283af3b2549SHans Petter Selasky } 12846a5d592aSPoul-Henning Kamp if (error || !req->newptr) 1285ae0eb976SPoul-Henning Kamp return (error); 1286ae0eb976SPoul-Henning Kamp 12876a5d592aSPoul-Henning Kamp if ((req->newlen - req->newidx) >= arg2) { 12886a5d592aSPoul-Henning Kamp error = EINVAL; 1289ae0eb976SPoul-Henning Kamp } else { 1290ae0eb976SPoul-Henning Kamp arg2 = (req->newlen - req->newidx); 1291ae0eb976SPoul-Henning Kamp error = SYSCTL_IN(req, arg1, arg2); 1292ae0eb976SPoul-Henning Kamp ((char *)arg1)[arg2] = '\0'; 1293b396cd83SPoul-Henning Kamp } 12942e210993SPoul-Henning Kamp return (error); 1295b396cd83SPoul-Henning Kamp } 1296b396cd83SPoul-Henning Kamp 1297ae0eb976SPoul-Henning Kamp /* 1298ae0eb976SPoul-Henning Kamp * Handle any kind of opaque data. 1299ae0eb976SPoul-Henning Kamp * arg1 points to it, arg2 is the size. 1300ae0eb976SPoul-Henning Kamp */ 1301ae0eb976SPoul-Henning Kamp 13023a34a5c3SPoul-Henning Kamp int 130382d9ae4eSPoul-Henning Kamp sysctl_handle_opaque(SYSCTL_HANDLER_ARGS) 1304b396cd83SPoul-Henning Kamp { 1305dcf59a59SBruce M Simpson int error, tries; 1306dcf59a59SBruce M Simpson u_int generation; 1307f0597024SBruce M Simpson struct sysctl_req req2; 1308b396cd83SPoul-Henning Kamp 13099e74cba3SDon Lewis /* 1310dcf59a59SBruce M Simpson * Attempt to get a coherent snapshot, by using the thread 1311dcf59a59SBruce M Simpson * pre-emption counter updated from within mi_switch() to 1312dcf59a59SBruce M Simpson * determine if we were pre-empted during a bcopy() or 1313dcf59a59SBruce M Simpson * copyout(). Make 3 attempts at doing this before giving up. 1314dcf59a59SBruce M Simpson * If we encounter an error, stop immediately. 13159e74cba3SDon Lewis */ 1316dcf59a59SBruce M Simpson tries = 0; 1317f0597024SBruce M Simpson req2 = *req; 1318f0597024SBruce M Simpson retry: 1319dcf59a59SBruce M Simpson generation = curthread->td_generation; 1320ae0eb976SPoul-Henning Kamp error = SYSCTL_OUT(req, arg1, arg2); 1321dcf59a59SBruce M Simpson if (error) 1322ae0eb976SPoul-Henning Kamp return (error); 1323dcf59a59SBruce M Simpson tries++; 1324f0597024SBruce M Simpson if (generation != curthread->td_generation && tries < 3) { 1325f0597024SBruce M Simpson *req = req2; 1326f0597024SBruce M Simpson goto retry; 1327f0597024SBruce M Simpson } 1328ae0eb976SPoul-Henning Kamp 1329ae0eb976SPoul-Henning Kamp error = SYSCTL_IN(req, arg1, arg2); 1330ae0eb976SPoul-Henning Kamp 1331ae0eb976SPoul-Henning Kamp return (error); 1332b396cd83SPoul-Henning Kamp } 1333ae0eb976SPoul-Henning Kamp 1334deae269aSPoul-Henning Kamp /* 1335deae269aSPoul-Henning Kamp * Transfer functions to/from kernel space. 1336deae269aSPoul-Henning Kamp * XXX: rather untested at this point 1337deae269aSPoul-Henning Kamp */ 1338deae269aSPoul-Henning Kamp static int 1339069e9bc1SDoug Rabson sysctl_old_kernel(struct sysctl_req *req, const void *p, size_t l) 1340ae0eb976SPoul-Henning Kamp { 1341069e9bc1SDoug Rabson size_t i = 0; 1342deae269aSPoul-Henning Kamp 1343deae269aSPoul-Henning Kamp if (req->oldptr) { 1344069e9bc1SDoug Rabson i = l; 13453a515572SThomas Moestl if (req->oldlen <= req->oldidx) 13463a515572SThomas Moestl i = 0; 13473a515572SThomas Moestl else 1348069e9bc1SDoug Rabson if (i > req->oldlen - req->oldidx) 1349069e9bc1SDoug Rabson i = req->oldlen - req->oldidx; 1350deae269aSPoul-Henning Kamp if (i > 0) 135109a8dfa2SBruce Evans bcopy(p, (char *)req->oldptr + req->oldidx, i); 1352ae0eb976SPoul-Henning Kamp } 13536b72d8dbSKonstantin Belousov req->oldidx += l; 13541c346c70SNate Williams if (req->oldptr && i != l) 1355ae0eb976SPoul-Henning Kamp return (ENOMEM); 13562e210993SPoul-Henning Kamp return (0); 1357ae0eb976SPoul-Henning Kamp } 1358ae0eb976SPoul-Henning Kamp 1359deae269aSPoul-Henning Kamp static int 1360069e9bc1SDoug Rabson sysctl_new_kernel(struct sysctl_req *req, void *p, size_t l) 1361ae0eb976SPoul-Henning Kamp { 1362deae269aSPoul-Henning Kamp if (!req->newptr) 136346003fb3SPawel Jakub Dawidek return (0); 1364deae269aSPoul-Henning Kamp if (req->newlen - req->newidx < l) 1365ae0eb976SPoul-Henning Kamp return (EINVAL); 136609a8dfa2SBruce Evans bcopy((char *)req->newptr + req->newidx, p, l); 1367ae0eb976SPoul-Henning Kamp req->newidx += l; 1368ae0eb976SPoul-Henning Kamp return (0); 1369ae0eb976SPoul-Henning Kamp } 1370ae0eb976SPoul-Henning Kamp 13711c346c70SNate Williams int 1372b40ce416SJulian Elischer kernel_sysctl(struct thread *td, int *name, u_int namelen, void *old, 1373a7bc3102SPeter Wemm size_t *oldlenp, void *new, size_t newlen, size_t *retval, int flags) 13741c346c70SNate Williams { 13751c346c70SNate Williams int error = 0; 13761c346c70SNate Williams struct sysctl_req req; 13771c346c70SNate Williams 13781c346c70SNate Williams bzero(&req, sizeof req); 13791c346c70SNate Williams 1380ce178806SRobert Watson req.td = td; 1381a7bc3102SPeter Wemm req.flags = flags; 13821c346c70SNate Williams 13831c346c70SNate Williams if (oldlenp) { 13841c346c70SNate Williams req.oldlen = *oldlenp; 13851c346c70SNate Williams } 1386a961520cSDon Lewis req.validlen = req.oldlen; 13871c346c70SNate Williams 13881c346c70SNate Williams if (old) { 13891c346c70SNate Williams req.oldptr= old; 13901c346c70SNate Williams } 13911c346c70SNate Williams 1392b8edb44cSDima Dorfman if (new != NULL) { 13931c346c70SNate Williams req.newlen = newlen; 13941c346c70SNate Williams req.newptr = new; 13951c346c70SNate Williams } 13961c346c70SNate Williams 13971c346c70SNate Williams req.oldfunc = sysctl_old_kernel; 13981c346c70SNate Williams req.newfunc = sysctl_new_kernel; 139973d6f851SMatthew D Fleming req.lock = REQ_UNWIRED; 14001c346c70SNate Williams 1401efe0abddSMateusz Guzik SYSCTL_SLOCK(); 14021c346c70SNate Williams error = sysctl_root(0, name, namelen, &req); 1403efe0abddSMateusz Guzik SYSCTL_SUNLOCK(); 1404f0597024SBruce M Simpson 1405a961520cSDon Lewis if (req.lock == REQ_WIRED && req.validlen > 0) 1406a961520cSDon Lewis vsunlock(req.oldptr, req.validlen); 14071c346c70SNate Williams 14081c346c70SNate Williams if (error && error != ENOMEM) 14091c346c70SNate Williams return (error); 14101c346c70SNate Williams 14111c346c70SNate Williams if (retval) { 1412a961520cSDon Lewis if (req.oldptr && req.oldidx > req.validlen) 1413a961520cSDon Lewis *retval = req.validlen; 14141c346c70SNate Williams else 14151c346c70SNate Williams *retval = req.oldidx; 14161c346c70SNate Williams } 14171c346c70SNate Williams return (error); 14181c346c70SNate Williams } 14191c346c70SNate Williams 14201890520aSJonathan Lemon int 1421b40ce416SJulian Elischer kernel_sysctlbyname(struct thread *td, char *name, void *old, size_t *oldlenp, 1422a7bc3102SPeter Wemm void *new, size_t newlen, size_t *retval, int flags) 14231890520aSJonathan Lemon { 14241890520aSJonathan Lemon int oid[CTL_MAXNAME]; 14252f7f966cSMatt Jacob size_t oidlen, plen; 14262f7f966cSMatt Jacob int error; 14271890520aSJonathan Lemon 14281890520aSJonathan Lemon oid[0] = 0; /* sysctl internal magic */ 14291890520aSJonathan Lemon oid[1] = 3; /* name2oid */ 14301890520aSJonathan Lemon oidlen = sizeof(oid); 14311890520aSJonathan Lemon 1432b40ce416SJulian Elischer error = kernel_sysctl(td, oid, 2, oid, &oidlen, 1433a7bc3102SPeter Wemm (void *)name, strlen(name), &plen, flags); 14341890520aSJonathan Lemon if (error) 14351890520aSJonathan Lemon return (error); 14361890520aSJonathan Lemon 1437b40ce416SJulian Elischer error = kernel_sysctl(td, oid, plen / sizeof(int), old, oldlenp, 1438a7bc3102SPeter Wemm new, newlen, retval, flags); 14391890520aSJonathan Lemon return (error); 14401890520aSJonathan Lemon } 14411890520aSJonathan Lemon 1442deae269aSPoul-Henning Kamp /* 1443deae269aSPoul-Henning Kamp * Transfer function to/from user space. 1444deae269aSPoul-Henning Kamp */ 1445deae269aSPoul-Henning Kamp static int 1446069e9bc1SDoug Rabson sysctl_old_user(struct sysctl_req *req, const void *p, size_t l) 1447ae0eb976SPoul-Henning Kamp { 144847934cefSDon Lewis size_t i, len, origidx; 14495730afc9SAlan Cox int error; 1450ae0eb976SPoul-Henning Kamp 145147934cefSDon Lewis origidx = req->oldidx; 145247934cefSDon Lewis req->oldidx += l; 14536b72d8dbSKonstantin Belousov if (req->oldptr == NULL) 145447934cefSDon Lewis return (0); 1455417ab24fSChristian S.J. Peron /* 1456417ab24fSChristian S.J. Peron * If we have not wired the user supplied buffer and we are currently 1457417ab24fSChristian S.J. Peron * holding locks, drop a witness warning, as it's possible that 1458417ab24fSChristian S.J. Peron * write operations to the user page can sleep. 1459417ab24fSChristian S.J. Peron */ 1460417ab24fSChristian S.J. Peron if (req->lock != REQ_WIRED) 146126306795SJohn Baldwin WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL, 146226306795SJohn Baldwin "sysctl_old_user()"); 1463069e9bc1SDoug Rabson i = l; 1464a961520cSDon Lewis len = req->validlen; 146547934cefSDon Lewis if (len <= origidx) 14663a515572SThomas Moestl i = 0; 146747934cefSDon Lewis else { 146847934cefSDon Lewis if (i > len - origidx) 146947934cefSDon Lewis i = len - origidx; 14705730afc9SAlan Cox if (req->lock == REQ_WIRED) { 14715730afc9SAlan Cox error = copyout_nofault(p, (char *)req->oldptr + 14725730afc9SAlan Cox origidx, i); 14735730afc9SAlan Cox } else 147447934cefSDon Lewis error = copyout(p, (char *)req->oldptr + origidx, i); 14755730afc9SAlan Cox if (error != 0) 1476ae0eb976SPoul-Henning Kamp return (error); 14775730afc9SAlan Cox } 147847934cefSDon Lewis if (i < l) 1479ae0eb976SPoul-Henning Kamp return (ENOMEM); 1480deae269aSPoul-Henning Kamp return (0); 1481ae0eb976SPoul-Henning Kamp } 1482ae0eb976SPoul-Henning Kamp 1483deae269aSPoul-Henning Kamp static int 1484069e9bc1SDoug Rabson sysctl_new_user(struct sysctl_req *req, void *p, size_t l) 1485ae0eb976SPoul-Henning Kamp { 148616cd04a3SPoul-Henning Kamp int error; 1487deae269aSPoul-Henning Kamp 1488deae269aSPoul-Henning Kamp if (!req->newptr) 148946003fb3SPawel Jakub Dawidek return (0); 1490deae269aSPoul-Henning Kamp if (req->newlen - req->newidx < l) 1491ae0eb976SPoul-Henning Kamp return (EINVAL); 1492d8339a26SChristian S.J. Peron WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL, 1493d8339a26SChristian S.J. Peron "sysctl_new_user()"); 149409a8dfa2SBruce Evans error = copyin((char *)req->newptr + req->newidx, p, l); 1495ae0eb976SPoul-Henning Kamp req->newidx += l; 1496ae0eb976SPoul-Henning Kamp return (error); 1497b396cd83SPoul-Henning Kamp } 1498b396cd83SPoul-Henning Kamp 14990600730dSDon Lewis /* 15000600730dSDon Lewis * Wire the user space destination buffer. If set to a value greater than 15010600730dSDon Lewis * zero, the len parameter limits the maximum amount of wired memory. 15020600730dSDon Lewis */ 150347934cefSDon Lewis int 15040600730dSDon Lewis sysctl_wire_old_buffer(struct sysctl_req *req, size_t len) 15050600730dSDon Lewis { 150647934cefSDon Lewis int ret; 1507433e2f47SDag-Erling Smørgrav size_t wiredlen; 150847934cefSDon Lewis 150947934cefSDon Lewis wiredlen = (len > 0 && len < req->oldlen) ? len : req->oldlen; 151047934cefSDon Lewis ret = 0; 151173d6f851SMatthew D Fleming if (req->lock != REQ_WIRED && req->oldptr && 15125be99846SBruce M Simpson req->oldfunc == sysctl_old_user) { 15138ac3e8e9SDon Lewis if (wiredlen != 0) { 1514ce8660e3SDon Lewis ret = vslock(req->oldptr, wiredlen); 1515b4adfcf2SBrian Feldman if (ret != 0) { 1516b4adfcf2SBrian Feldman if (ret != ENOMEM) 15178ac3e8e9SDon Lewis return (ret); 1518b4adfcf2SBrian Feldman wiredlen = 0; 1519b4adfcf2SBrian Feldman } 15208ac3e8e9SDon Lewis } 15215be99846SBruce M Simpson req->lock = REQ_WIRED; 1522a961520cSDon Lewis req->validlen = wiredlen; 15230600730dSDon Lewis } 15248ac3e8e9SDon Lewis return (0); 152547934cefSDon Lewis } 15260600730dSDon Lewis 15272e210993SPoul-Henning Kamp int 1528226420a4SBrian Feldman sysctl_find_oid(int *name, u_int namelen, struct sysctl_oid **noid, 1529226420a4SBrian Feldman int *nindx, struct sysctl_req *req) 15302e210993SPoul-Henning Kamp { 1531d0bb6f25SMatthew D Fleming struct sysctl_oid_list *lsp; 1532ce02431fSDoug Rabson struct sysctl_oid *oid; 1533226420a4SBrian Feldman int indx; 15342e210993SPoul-Henning Kamp 1535efe0abddSMateusz Guzik SYSCTL_ASSERT_LOCKED(); 1536d0bb6f25SMatthew D Fleming lsp = &sysctl__children; 15372e210993SPoul-Henning Kamp indx = 0; 1538d0bb6f25SMatthew D Fleming while (indx < CTL_MAXNAME) { 1539d0bb6f25SMatthew D Fleming SLIST_FOREACH(oid, lsp, oid_link) { 1540d0bb6f25SMatthew D Fleming if (oid->oid_number == name[indx]) 1541d0bb6f25SMatthew D Fleming break; 1542d0bb6f25SMatthew D Fleming } 1543d0bb6f25SMatthew D Fleming if (oid == NULL) 1544d0bb6f25SMatthew D Fleming return (ENOENT); 1545d0bb6f25SMatthew D Fleming 15462e210993SPoul-Henning Kamp indx++; 1547ce02431fSDoug Rabson if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 1548d0bb6f25SMatthew D Fleming if (oid->oid_handler != NULL || indx == namelen) { 1549226420a4SBrian Feldman *noid = oid; 1550226420a4SBrian Feldman if (nindx != NULL) 1551226420a4SBrian Feldman *nindx = indx; 1552ccecef29SMatthew D Fleming KASSERT((oid->oid_kind & CTLFLAG_DYING) == 0, 1553ccecef29SMatthew D Fleming ("%s found DYING node %p", __func__, oid)); 1554226420a4SBrian Feldman return (0); 1555226420a4SBrian Feldman } 1556d0bb6f25SMatthew D Fleming lsp = SYSCTL_CHILDREN(oid); 1557226420a4SBrian Feldman } else if (indx == namelen) { 1558226420a4SBrian Feldman *noid = oid; 1559226420a4SBrian Feldman if (nindx != NULL) 1560226420a4SBrian Feldman *nindx = indx; 1561ccecef29SMatthew D Fleming KASSERT((oid->oid_kind & CTLFLAG_DYING) == 0, 1562ccecef29SMatthew D Fleming ("%s found DYING node %p", __func__, oid)); 1563226420a4SBrian Feldman return (0); 15642e210993SPoul-Henning Kamp } else { 1565226420a4SBrian Feldman return (ENOTDIR); 15662e210993SPoul-Henning Kamp } 15672e210993SPoul-Henning Kamp } 1568226420a4SBrian Feldman return (ENOENT); 1569226420a4SBrian Feldman } 1570226420a4SBrian Feldman 1571226420a4SBrian Feldman /* 1572226420a4SBrian Feldman * Traverse our tree, and find the right node, execute whatever it points 1573226420a4SBrian Feldman * to, and return the resulting error code. 1574226420a4SBrian Feldman */ 1575226420a4SBrian Feldman 157637c84183SPoul-Henning Kamp static int 157782d9ae4eSPoul-Henning Kamp sysctl_root(SYSCTL_HANDLER_ARGS) 1578226420a4SBrian Feldman { 1579226420a4SBrian Feldman struct sysctl_oid *oid; 1580fe41ca53SMatthew Dillon int error, indx, lvl; 1581226420a4SBrian Feldman 1582f84f8f94SMateusz Guzik SYSCTL_ASSERT_SLOCKED(); 1583ddf9d243SEd Schouten 1584226420a4SBrian Feldman error = sysctl_find_oid(arg1, arg2, &oid, &indx, req); 1585226420a4SBrian Feldman if (error) 1586226420a4SBrian Feldman return (error); 1587226420a4SBrian Feldman 1588226420a4SBrian Feldman if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 1589226420a4SBrian Feldman /* 1590226420a4SBrian Feldman * You can't call a sysctl when it's a node, but has 1591226420a4SBrian Feldman * no handler. Inform the user that it's a node. 1592226420a4SBrian Feldman * The indx may or may not be the same as namelen. 1593226420a4SBrian Feldman */ 1594226420a4SBrian Feldman if (oid->oid_handler == NULL) 1595226420a4SBrian Feldman return (EISDIR); 1596226420a4SBrian Feldman } 1597226420a4SBrian Feldman 1598c2f413afSRobert Watson /* Is this sysctl writable? */ 1599c2f413afSRobert Watson if (req->newptr && !(oid->oid_kind & CTLFLAG_WR)) 16002e210993SPoul-Henning Kamp return (EPERM); 16012e210993SPoul-Henning Kamp 16027906271fSRobert Watson KASSERT(req->td != NULL, ("sysctl_root(): req->td == NULL")); 16037906271fSRobert Watson 1604ff66f6a4SRobert Watson #ifdef CAPABILITY_MODE 1605ff66f6a4SRobert Watson /* 1606ff66f6a4SRobert Watson * If the process is in capability mode, then don't permit reading or 1607ff66f6a4SRobert Watson * writing unless specifically granted for the node. 1608ff66f6a4SRobert Watson */ 1609ff66f6a4SRobert Watson if (IN_CAPABILITY_MODE(req->td)) { 1610ff66f6a4SRobert Watson if (req->oldptr && !(oid->oid_kind & CTLFLAG_CAPRD)) 1611ff66f6a4SRobert Watson return (EPERM); 1612ff66f6a4SRobert Watson if (req->newptr && !(oid->oid_kind & CTLFLAG_CAPWR)) 1613ff66f6a4SRobert Watson return (EPERM); 1614ff66f6a4SRobert Watson } 1615ff66f6a4SRobert Watson #endif 1616ff66f6a4SRobert Watson 1617c2f413afSRobert Watson /* Is this sysctl sensitive to securelevels? */ 1618c2f413afSRobert Watson if (req->newptr && (oid->oid_kind & CTLFLAG_SECURE)) { 1619fe41ca53SMatthew Dillon lvl = (oid->oid_kind & CTLMASK_SECURE) >> CTLSHIFT_SECURE; 1620fe41ca53SMatthew Dillon error = securelevel_gt(req->td->td_ucred, lvl); 1621c2f413afSRobert Watson if (error) 1622c2f413afSRobert Watson return (error); 1623c2f413afSRobert Watson } 1624c2f413afSRobert Watson 1625c2f413afSRobert Watson /* Is this sysctl writable by only privileged users? */ 1626c2f413afSRobert Watson if (req->newptr && !(oid->oid_kind & CTLFLAG_ANYBODY)) { 1627eb79e1c7SBjoern A. Zeeb int priv; 1628eb79e1c7SBjoern A. Zeeb 1629c2f413afSRobert Watson if (oid->oid_kind & CTLFLAG_PRISON) 1630eb79e1c7SBjoern A. Zeeb priv = PRIV_SYSCTL_WRITEJAIL; 1631eb79e1c7SBjoern A. Zeeb #ifdef VIMAGE 1632eb79e1c7SBjoern A. Zeeb else if ((oid->oid_kind & CTLFLAG_VNET) && 1633eb79e1c7SBjoern A. Zeeb prison_owns_vnet(req->td->td_ucred)) 1634eb79e1c7SBjoern A. Zeeb priv = PRIV_SYSCTL_WRITEJAIL; 1635eb79e1c7SBjoern A. Zeeb #endif 1636c2f413afSRobert Watson else 1637eb79e1c7SBjoern A. Zeeb priv = PRIV_SYSCTL_WRITE; 1638eb79e1c7SBjoern A. Zeeb error = priv_check(req->td, priv); 1639c2f413afSRobert Watson if (error) 1640c2f413afSRobert Watson return (error); 1641c2f413afSRobert Watson } 16423ac9f819SPoul-Henning Kamp 1643ce02431fSDoug Rabson if (!oid->oid_handler) 164446003fb3SPawel Jakub Dawidek return (EINVAL); 16452e210993SPoul-Henning Kamp 164663dba32bSPawel Jakub Dawidek if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 164700fbcda8SAlexander Kabaev arg1 = (int *)arg1 + indx; 164863dba32bSPawel Jakub Dawidek arg2 -= indx; 164963dba32bSPawel Jakub Dawidek } else { 165063dba32bSPawel Jakub Dawidek arg1 = oid->oid_arg1; 165163dba32bSPawel Jakub Dawidek arg2 = oid->oid_arg2; 165263dba32bSPawel Jakub Dawidek } 165363dba32bSPawel Jakub Dawidek #ifdef MAC 165430d239bcSRobert Watson error = mac_system_check_sysctl(req->td->td_ucred, oid, arg1, arg2, 1655ae0eb976SPoul-Henning Kamp req); 165663dba32bSPawel Jakub Dawidek if (error != 0) 165763dba32bSPawel Jakub Dawidek return (error); 165863dba32bSPawel Jakub Dawidek #endif 1659b5c32cf4SGleb Smirnoff #ifdef VIMAGE 1660b5c32cf4SGleb Smirnoff if ((oid->oid_kind & CTLFLAG_VNET) && arg1 != NULL) 1661b5c32cf4SGleb Smirnoff arg1 = (void *)(curvnet->vnet_data_base + (uintptr_t)arg1); 1662b5c32cf4SGleb Smirnoff #endif 1663af3b2549SHans Petter Selasky error = sysctl_root_handler_locked(oid, arg1, arg2, req); 166463dba32bSPawel Jakub Dawidek 1665ccecef29SMatthew D Fleming KFAIL_POINT_ERROR(_debug_fail_point, sysctl_running, error); 1666ccecef29SMatthew D Fleming 1667226420a4SBrian Feldman return (error); 16682e210993SPoul-Henning Kamp } 16692e210993SPoul-Henning Kamp 1670d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_ 1671b8da2396SPoul-Henning Kamp struct sysctl_args { 1672b8da2396SPoul-Henning Kamp int *name; 1673b8da2396SPoul-Henning Kamp u_int namelen; 1674b8da2396SPoul-Henning Kamp void *old; 1675b8da2396SPoul-Henning Kamp size_t *oldlenp; 1676b8da2396SPoul-Henning Kamp void *new; 1677b8da2396SPoul-Henning Kamp size_t newlen; 1678b8da2396SPoul-Henning Kamp }; 1679d2d3e875SBruce Evans #endif 1680df8bae1dSRodney W. Grimes int 16818451d0ddSKip Macy sys___sysctl(struct thread *td, struct sysctl_args *uap) 1682df8bae1dSRodney W. Grimes { 1683875b66a0SJohn Baldwin int error, i, name[CTL_MAXNAME]; 1684069e9bc1SDoug Rabson size_t j; 1685b396cd83SPoul-Henning Kamp 1686df8bae1dSRodney W. Grimes if (uap->namelen > CTL_MAXNAME || uap->namelen < 2) 1687df8bae1dSRodney W. Grimes return (EINVAL); 1688b396cd83SPoul-Henning Kamp 1689797f2d22SPoul-Henning Kamp error = copyin(uap->name, &name, uap->namelen * sizeof(int)); 1690797f2d22SPoul-Henning Kamp if (error) 1691df8bae1dSRodney W. Grimes return (error); 1692df8bae1dSRodney W. Grimes 1693b40ce416SJulian Elischer error = userland_sysctl(td, name, uap->namelen, 1694b8da2396SPoul-Henning Kamp uap->old, uap->oldlenp, 0, 1695a7bc3102SPeter Wemm uap->new, uap->newlen, &j, 0); 1696deae269aSPoul-Henning Kamp if (error && error != ENOMEM) 1697ddf9d243SEd Schouten return (error); 16984cfe4790SEd Schouten if (uap->oldlenp) { 1699875b66a0SJohn Baldwin i = copyout(&j, uap->oldlenp, sizeof(j)); 17004cfe4790SEd Schouten if (i) 17014cfe4790SEd Schouten return (i); 17024cfe4790SEd Schouten } 1703deae269aSPoul-Henning Kamp return (error); 1704b8da2396SPoul-Henning Kamp } 1705b8da2396SPoul-Henning Kamp 1706b8da2396SPoul-Henning Kamp /* 1707b8da2396SPoul-Henning Kamp * This is used from various compatibility syscalls too. That's why name 1708b8da2396SPoul-Henning Kamp * must be in kernel space. 1709b8da2396SPoul-Henning Kamp */ 1710b8da2396SPoul-Henning Kamp int 1711b40ce416SJulian Elischer userland_sysctl(struct thread *td, int *name, u_int namelen, void *old, 1712a7bc3102SPeter Wemm size_t *oldlenp, int inkernel, void *new, size_t newlen, size_t *retval, 1713a7bc3102SPeter Wemm int flags) 1714b8da2396SPoul-Henning Kamp { 17153e829b18SJohn Baldwin int error = 0, memlocked; 1716a961520cSDon Lewis struct sysctl_req req; 1717ae0eb976SPoul-Henning Kamp 1718ae0eb976SPoul-Henning Kamp bzero(&req, sizeof req); 1719b8da2396SPoul-Henning Kamp 1720ce178806SRobert Watson req.td = td; 1721a7bc3102SPeter Wemm req.flags = flags; 172216cd04a3SPoul-Henning Kamp 1723b8da2396SPoul-Henning Kamp if (oldlenp) { 1724b8da2396SPoul-Henning Kamp if (inkernel) { 1725ae0eb976SPoul-Henning Kamp req.oldlen = *oldlenp; 1726b8da2396SPoul-Henning Kamp } else { 1727deae269aSPoul-Henning Kamp error = copyin(oldlenp, &req.oldlen, sizeof(*oldlenp)); 1728b8da2396SPoul-Henning Kamp if (error) 1729b8da2396SPoul-Henning Kamp return (error); 1730b8da2396SPoul-Henning Kamp } 1731b8da2396SPoul-Henning Kamp } 1732a961520cSDon Lewis req.validlen = req.oldlen; 1733b8da2396SPoul-Henning Kamp 1734ae0eb976SPoul-Henning Kamp if (old) { 173502c58685SPoul-Henning Kamp if (!useracc(old, req.oldlen, VM_PROT_WRITE)) 1736ae0eb976SPoul-Henning Kamp return (EFAULT); 1737ae0eb976SPoul-Henning Kamp req.oldptr= old; 1738ae0eb976SPoul-Henning Kamp } 17392e210993SPoul-Henning Kamp 1740b8edb44cSDima Dorfman if (new != NULL) { 174170ffc2fbSRobert Watson if (!useracc(new, newlen, VM_PROT_READ)) 1742ae0eb976SPoul-Henning Kamp return (EFAULT); 1743ae0eb976SPoul-Henning Kamp req.newlen = newlen; 1744ae0eb976SPoul-Henning Kamp req.newptr = new; 1745b396cd83SPoul-Henning Kamp } 1746b396cd83SPoul-Henning Kamp 1747ae0eb976SPoul-Henning Kamp req.oldfunc = sysctl_old_user; 1748ae0eb976SPoul-Henning Kamp req.newfunc = sysctl_new_user; 174973d6f851SMatthew D Fleming req.lock = REQ_UNWIRED; 17504b2af45fSPoul-Henning Kamp 1751a56be37eSJohn Baldwin #ifdef KTRACE 1752a56be37eSJohn Baldwin if (KTRPOINT(curthread, KTR_SYSCTL)) 1753a56be37eSJohn Baldwin ktrsysctl(name, namelen); 1754a56be37eSJohn Baldwin #endif 1755a56be37eSJohn Baldwin 17563e829b18SJohn Baldwin if (req.oldlen > PAGE_SIZE) { 17573e829b18SJohn Baldwin memlocked = 1; 17583e829b18SJohn Baldwin sx_xlock(&sysctlmemlock); 17593e829b18SJohn Baldwin } else 17603e829b18SJohn Baldwin memlocked = 0; 17619ed47d01SJamie Gritton CURVNET_SET(TD_TO_VNET(td)); 1762ae0eb976SPoul-Henning Kamp 1763af80b2c9SKonstantin Belousov for (;;) { 1764a961520cSDon Lewis req.oldidx = 0; 1765a961520cSDon Lewis req.newidx = 0; 1766efe0abddSMateusz Guzik SYSCTL_SLOCK(); 1767a961520cSDon Lewis error = sysctl_root(0, name, namelen, &req); 1768efe0abddSMateusz Guzik SYSCTL_SUNLOCK(); 1769af80b2c9SKonstantin Belousov if (error != EAGAIN) 1770af80b2c9SKonstantin Belousov break; 17713d08a76bSMatthew D Fleming kern_yield(PRI_USER); 1772af80b2c9SKonstantin Belousov } 1773b396cd83SPoul-Henning Kamp 177497021c24SMarko Zec CURVNET_RESTORE(); 17754b2af45fSPoul-Henning Kamp 1776ddf9d243SEd Schouten if (req.lock == REQ_WIRED && req.validlen > 0) 1777ddf9d243SEd Schouten vsunlock(req.oldptr, req.validlen); 17783e829b18SJohn Baldwin if (memlocked) 17793e829b18SJohn Baldwin sx_xunlock(&sysctlmemlock); 1780ddf9d243SEd Schouten 1781deae269aSPoul-Henning Kamp if (error && error != ENOMEM) 1782deae269aSPoul-Henning Kamp return (error); 1783deae269aSPoul-Henning Kamp 1784deae269aSPoul-Henning Kamp if (retval) { 1785a961520cSDon Lewis if (req.oldptr && req.oldidx > req.validlen) 1786a961520cSDon Lewis *retval = req.validlen; 1787deae269aSPoul-Henning Kamp else 1788deae269aSPoul-Henning Kamp *retval = req.oldidx; 1789b8da2396SPoul-Henning Kamp } 17902e210993SPoul-Henning Kamp return (error); 1791df8bae1dSRodney W. Grimes } 17924e657159SMatthew D Fleming 17934e657159SMatthew D Fleming /* 179400f0e671SMatthew D Fleming * Drain into a sysctl struct. The user buffer should be wired if a page 179500f0e671SMatthew D Fleming * fault would cause issue. 17964e657159SMatthew D Fleming */ 17974e657159SMatthew D Fleming static int 17984e657159SMatthew D Fleming sbuf_sysctl_drain(void *arg, const char *data, int len) 17994e657159SMatthew D Fleming { 18004e657159SMatthew D Fleming struct sysctl_req *req = arg; 18014e657159SMatthew D Fleming int error; 18024e657159SMatthew D Fleming 18034e657159SMatthew D Fleming error = SYSCTL_OUT(req, data, len); 18044e657159SMatthew D Fleming KASSERT(error >= 0, ("Got unexpected negative value %d", error)); 18054e657159SMatthew D Fleming return (error == 0 ? len : -error); 18064e657159SMatthew D Fleming } 18074e657159SMatthew D Fleming 18084e657159SMatthew D Fleming struct sbuf * 18094e657159SMatthew D Fleming sbuf_new_for_sysctl(struct sbuf *s, char *buf, int length, 18104e657159SMatthew D Fleming struct sysctl_req *req) 18114e657159SMatthew D Fleming { 18124e657159SMatthew D Fleming 181328349245SIan Lepore /* Supply a default buffer size if none given. */ 181428349245SIan Lepore if (buf == NULL && length == 0) 181528349245SIan Lepore length = 64; 18161eafc078SIan Lepore s = sbuf_new(s, buf, length, SBUF_FIXEDLEN | SBUF_INCLUDENUL); 18174e657159SMatthew D Fleming sbuf_set_drain(s, sbuf_sysctl_drain, req); 18184e657159SMatthew D Fleming return (s); 18194e657159SMatthew D Fleming } 1820