1df8bae1dSRodney W. Grimes /*- 2df8bae1dSRodney W. Grimes * Copyright (c) 1982, 1986, 1989, 1993 3df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 4df8bae1dSRodney W. Grimes * 5df8bae1dSRodney W. Grimes * This code is derived from software contributed to Berkeley by 6df8bae1dSRodney W. Grimes * Mike Karels at Berkeley Software Design, Inc. 7df8bae1dSRodney W. Grimes * 8946bb7a2SPoul-Henning Kamp * Quite extensively rewritten by Poul-Henning Kamp of the FreeBSD 9946bb7a2SPoul-Henning Kamp * project, to make these variables more userfriendly. 10946bb7a2SPoul-Henning Kamp * 11df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 12df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 13df8bae1dSRodney W. Grimes * are met: 14df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 15df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 16df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 17df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 18df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 19df8bae1dSRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 20df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 21df8bae1dSRodney W. Grimes * without specific prior written permission. 22df8bae1dSRodney W. Grimes * 23df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 24df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 27df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33df8bae1dSRodney W. Grimes * SUCH DAMAGE. 34df8bae1dSRodney W. Grimes * 35df8bae1dSRodney W. Grimes * @(#)kern_sysctl.c 8.4 (Berkeley) 4/14/94 36df8bae1dSRodney W. Grimes */ 37df8bae1dSRodney W. Grimes 38677b542eSDavid E. O'Brien #include <sys/cdefs.h> 39677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$"); 40677b542eSDavid E. O'Brien 41ff66f6a4SRobert Watson #include "opt_capsicum.h" 425591b823SEivind Eklund #include "opt_compat.h" 43a56be37eSJohn Baldwin #include "opt_ktrace.h" 445591b823SEivind Eklund 45df8bae1dSRodney W. Grimes #include <sys/param.h> 46ccecef29SMatthew D Fleming #include <sys/fail.h> 47e96c1fdcSPeter Wemm #include <sys/systm.h> 484a144410SRobert Watson #include <sys/capsicum.h> 49df8bae1dSRodney W. Grimes #include <sys/kernel.h> 50df8bae1dSRodney W. Grimes #include <sys/sysctl.h> 51946bb7a2SPoul-Henning Kamp #include <sys/malloc.h> 52acd3428bSRobert Watson #include <sys/priv.h> 53efeaf95aSDavid Greenman #include <sys/proc.h> 54ebd8672cSBjoern A. Zeeb #include <sys/jail.h> 55fb99ab88SMatthew Dillon #include <sys/lock.h> 56fb99ab88SMatthew Dillon #include <sys/mutex.h> 574e657159SMatthew D Fleming #include <sys/sbuf.h> 5829a2c0cdSAlfred Perlstein #include <sys/sx.h> 5945ec3b38SPoul-Henning Kamp #include <sys/sysproto.h> 60af80b2c9SKonstantin Belousov #include <sys/uio.h> 61a56be37eSJohn Baldwin #ifdef KTRACE 62a56be37eSJohn Baldwin #include <sys/ktrace.h> 63a56be37eSJohn Baldwin #endif 64aed55708SRobert Watson 65eddfbb76SRobert Watson #include <net/vnet.h> 66eddfbb76SRobert Watson 67aed55708SRobert Watson #include <security/mac/mac_framework.h> 68aed55708SRobert Watson 694cb03b1bSBruce Evans #include <vm/vm.h> 70efeaf95aSDavid Greenman #include <vm/vm_extern.h> 714cb03b1bSBruce Evans 72a1c995b6SPoul-Henning Kamp static MALLOC_DEFINE(M_SYSCTL, "sysctl", "sysctl internal magic"); 73bd3cdc31SAndrzej Bialecki static MALLOC_DEFINE(M_SYSCTLOID, "sysctloid", "sysctl dynamic oids"); 749e74cba3SDon Lewis static MALLOC_DEFINE(M_SYSCTLTMP, "sysctltmp", "sysctl temp output buffer"); 7555166637SPoul-Henning Kamp 764b2af45fSPoul-Henning Kamp /* 77875b66a0SJohn Baldwin * The sysctllock protects the MIB tree. It also protects sysctl 78875b66a0SJohn Baldwin * contexts used with dynamic sysctls. The sysctl_register_oid() and 79875b66a0SJohn Baldwin * sysctl_unregister_oid() routines require the sysctllock to already 80875b66a0SJohn Baldwin * be held, so the sysctl_lock() and sysctl_unlock() routines are 81875b66a0SJohn Baldwin * provided for the few places in the kernel which need to use that 82875b66a0SJohn Baldwin * API rather than using the dynamic API. Use of the dynamic API is 83875b66a0SJohn Baldwin * strongly encouraged for most code. 84875b66a0SJohn Baldwin * 853e829b18SJohn Baldwin * The sysctlmemlock is used to limit the amount of user memory wired for 863e829b18SJohn Baldwin * sysctl requests. This is implemented by serializing any userland 873e829b18SJohn Baldwin * sysctl requests larger than a single page via an exclusive lock. 884b2af45fSPoul-Henning Kamp */ 893bd1da29SRobert Watson static struct sx sysctllock; 903e829b18SJohn Baldwin static struct sx sysctlmemlock; 9129a2c0cdSAlfred Perlstein 92875b66a0SJohn Baldwin #define SYSCTL_XLOCK() sx_xlock(&sysctllock) 93875b66a0SJohn Baldwin #define SYSCTL_XUNLOCK() sx_xunlock(&sysctllock) 94875b66a0SJohn Baldwin #define SYSCTL_ASSERT_XLOCKED() sx_assert(&sysctllock, SA_XLOCKED) 9574019059SJohn Baldwin #define SYSCTL_INIT() sx_init(&sysctllock, "sysctl lock") 96ccecef29SMatthew D Fleming #define SYSCTL_SLEEP(ch, wmesg, timo) \ 97ccecef29SMatthew D Fleming sx_sleep(ch, &sysctllock, 0, wmesg, timo) 984b2af45fSPoul-Henning Kamp 9982d9ae4eSPoul-Henning Kamp static int sysctl_root(SYSCTL_HANDLER_ARGS); 1004b2af45fSPoul-Henning Kamp 101af3b2549SHans Petter Selasky /* Root list */ 102af3b2549SHans Petter Selasky struct sysctl_oid_list sysctl__children = SLIST_HEAD_INITIALIZER(&sysctl__children); 103787d58f2SPoul-Henning Kamp 104875b66a0SJohn Baldwin static int sysctl_remove_oid_locked(struct sysctl_oid *oidp, int del, 105875b66a0SJohn Baldwin int recurse); 106af3b2549SHans Petter Selasky static int sysctl_old_kernel(struct sysctl_req *, const void *, size_t); 107af3b2549SHans Petter Selasky static int sysctl_new_kernel(struct sysctl_req *, void *, size_t); 108875b66a0SJohn Baldwin 109bd3cdc31SAndrzej Bialecki static struct sysctl_oid * 110bd3cdc31SAndrzej Bialecki sysctl_find_oidname(const char *name, struct sysctl_oid_list *list) 111bd3cdc31SAndrzej Bialecki { 112bd3cdc31SAndrzej Bialecki struct sysctl_oid *oidp; 113bd3cdc31SAndrzej Bialecki 114ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 115bd3cdc31SAndrzej Bialecki SLIST_FOREACH(oidp, list, oid_link) { 116bd3cdc31SAndrzej Bialecki if (strcmp(oidp->oid_name, name) == 0) { 117bd3cdc31SAndrzej Bialecki return (oidp); 118bd3cdc31SAndrzej Bialecki } 119bd3cdc31SAndrzej Bialecki } 120bd3cdc31SAndrzej Bialecki return (NULL); 121bd3cdc31SAndrzej Bialecki } 122bd3cdc31SAndrzej Bialecki 123946bb7a2SPoul-Henning Kamp /* 124946bb7a2SPoul-Henning Kamp * Initialization of the MIB tree. 125946bb7a2SPoul-Henning Kamp * 126ce02431fSDoug Rabson * Order by number in each list. 127946bb7a2SPoul-Henning Kamp */ 128875b66a0SJohn Baldwin void 129875b66a0SJohn Baldwin sysctl_lock(void) 130875b66a0SJohn Baldwin { 131875b66a0SJohn Baldwin 132875b66a0SJohn Baldwin SYSCTL_XLOCK(); 133875b66a0SJohn Baldwin } 134875b66a0SJohn Baldwin 135875b66a0SJohn Baldwin void 136875b66a0SJohn Baldwin sysctl_unlock(void) 137875b66a0SJohn Baldwin { 138875b66a0SJohn Baldwin 139875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 140875b66a0SJohn Baldwin } 1414b2af45fSPoul-Henning Kamp 142af3b2549SHans Petter Selasky static int 143af3b2549SHans Petter Selasky sysctl_root_handler_locked(struct sysctl_oid *oid, void *arg1, intptr_t arg2, 144af3b2549SHans Petter Selasky struct sysctl_req *req) 145af3b2549SHans Petter Selasky { 146af3b2549SHans Petter Selasky int error; 147af3b2549SHans Petter Selasky 148af3b2549SHans Petter Selasky oid->oid_running++; 149af3b2549SHans Petter Selasky SYSCTL_XUNLOCK(); 150af3b2549SHans Petter Selasky 151af3b2549SHans Petter Selasky if (!(oid->oid_kind & CTLFLAG_MPSAFE)) 152af3b2549SHans Petter Selasky mtx_lock(&Giant); 153af3b2549SHans Petter Selasky error = oid->oid_handler(oid, arg1, arg2, req); 154af3b2549SHans Petter Selasky if (!(oid->oid_kind & CTLFLAG_MPSAFE)) 155af3b2549SHans Petter Selasky mtx_unlock(&Giant); 156af3b2549SHans Petter Selasky 157af3b2549SHans Petter Selasky SYSCTL_XLOCK(); 158af3b2549SHans Petter Selasky oid->oid_running--; 159af3b2549SHans Petter Selasky if (oid->oid_running == 0 && (oid->oid_kind & CTLFLAG_DYING) != 0) 160af3b2549SHans Petter Selasky wakeup(&oid->oid_running); 161af3b2549SHans Petter Selasky 162af3b2549SHans Petter Selasky return (error); 163af3b2549SHans Petter Selasky } 164af3b2549SHans Petter Selasky 165af3b2549SHans Petter Selasky static void 166af3b2549SHans Petter Selasky sysctl_load_tunable_by_oid_locked(struct sysctl_oid *oidp) 167af3b2549SHans Petter Selasky { 168af3b2549SHans Petter Selasky struct sysctl_req req; 169af3b2549SHans Petter Selasky struct sysctl_oid *curr; 170*604bf9d3SHans Petter Selasky char *penv = NULL; 171af3b2549SHans Petter Selasky char path[64]; 172af3b2549SHans Petter Selasky ssize_t rem = sizeof(path); 173af3b2549SHans Petter Selasky ssize_t len; 174af3b2549SHans Petter Selasky int val_int; 175af3b2549SHans Petter Selasky long val_long; 176af3b2549SHans Petter Selasky int64_t val_64; 177*604bf9d3SHans Petter Selasky quad_t val_quad; 178af3b2549SHans Petter Selasky int error; 179af3b2549SHans Petter Selasky 180af3b2549SHans Petter Selasky path[--rem] = 0; 181af3b2549SHans Petter Selasky 182af3b2549SHans Petter Selasky for (curr = oidp; curr != NULL; curr = SYSCTL_PARENT(curr)) { 183af3b2549SHans Petter Selasky len = strlen(curr->oid_name); 184af3b2549SHans Petter Selasky rem -= len; 185af3b2549SHans Petter Selasky if (curr != oidp) 186af3b2549SHans Petter Selasky rem -= 1; 187af3b2549SHans Petter Selasky if (rem < 0) { 188af3b2549SHans Petter Selasky printf("OID path exceeds %d bytes\n", (int)sizeof(path)); 189af3b2549SHans Petter Selasky return; 190af3b2549SHans Petter Selasky } 191af3b2549SHans Petter Selasky memcpy(path + rem, curr->oid_name, len); 192af3b2549SHans Petter Selasky if (curr != oidp) 193af3b2549SHans Petter Selasky path[rem + len] = '.'; 194af3b2549SHans Petter Selasky } 195af3b2549SHans Petter Selasky 196af3b2549SHans Petter Selasky memset(&req, 0, sizeof(req)); 197af3b2549SHans Petter Selasky 198af3b2549SHans Petter Selasky req.td = curthread; 199af3b2549SHans Petter Selasky req.oldfunc = sysctl_old_kernel; 200af3b2549SHans Petter Selasky req.newfunc = sysctl_new_kernel; 201af3b2549SHans Petter Selasky req.lock = REQ_UNWIRED; 202af3b2549SHans Petter Selasky 203af3b2549SHans Petter Selasky switch (oidp->oid_kind & CTLTYPE) { 204af3b2549SHans Petter Selasky case CTLTYPE_INT: 205*604bf9d3SHans Petter Selasky if (getenv_int(path + rem, &val_int) == 0) 206*604bf9d3SHans Petter Selasky return; 207af3b2549SHans Petter Selasky req.newlen = sizeof(val_int); 208af3b2549SHans Petter Selasky req.newptr = &val_int; 209af3b2549SHans Petter Selasky break; 210af3b2549SHans Petter Selasky case CTLTYPE_UINT: 211*604bf9d3SHans Petter Selasky if (getenv_uint(path + rem, (unsigned int *)&val_int) == 0) 212*604bf9d3SHans Petter Selasky return; 213af3b2549SHans Petter Selasky req.newlen = sizeof(val_int); 214af3b2549SHans Petter Selasky req.newptr = &val_int; 215af3b2549SHans Petter Selasky break; 216af3b2549SHans Petter Selasky case CTLTYPE_LONG: 217*604bf9d3SHans Petter Selasky if (getenv_long(path + rem, &val_long) == 0) 218*604bf9d3SHans Petter Selasky return; 219af3b2549SHans Petter Selasky req.newlen = sizeof(val_long); 220af3b2549SHans Petter Selasky req.newptr = &val_long; 221af3b2549SHans Petter Selasky break; 222af3b2549SHans Petter Selasky case CTLTYPE_ULONG: 223*604bf9d3SHans Petter Selasky if (getenv_ulong(path + rem, (unsigned long *)&val_long) == 0) 224*604bf9d3SHans Petter Selasky return; 225af3b2549SHans Petter Selasky req.newlen = sizeof(val_long); 226af3b2549SHans Petter Selasky req.newptr = &val_long; 227af3b2549SHans Petter Selasky break; 228af3b2549SHans Petter Selasky case CTLTYPE_S64: 229*604bf9d3SHans Petter Selasky if (getenv_quad(path + rem, &val_quad) == 0) 230*604bf9d3SHans Petter Selasky return; 231*604bf9d3SHans Petter Selasky val_64 = val_quad; 232af3b2549SHans Petter Selasky req.newlen = sizeof(val_64); 233af3b2549SHans Petter Selasky req.newptr = &val_64; 234af3b2549SHans Petter Selasky break; 235af3b2549SHans Petter Selasky case CTLTYPE_U64: 236*604bf9d3SHans Petter Selasky /* XXX there is no getenv_uquad() */ 237*604bf9d3SHans Petter Selasky if (getenv_quad(path + rem, &val_quad) == 0) 238*604bf9d3SHans Petter Selasky return; 239*604bf9d3SHans Petter Selasky val_64 = val_quad; 240af3b2549SHans Petter Selasky req.newlen = sizeof(val_64); 241af3b2549SHans Petter Selasky req.newptr = &val_64; 242af3b2549SHans Petter Selasky break; 243af3b2549SHans Petter Selasky case CTLTYPE_STRING: 244*604bf9d3SHans Petter Selasky penv = getenv(path + rem); 245*604bf9d3SHans Petter Selasky if (penv == NULL) 246*604bf9d3SHans Petter Selasky return; 247af3b2549SHans Petter Selasky req.newlen = strlen(penv); 248af3b2549SHans Petter Selasky req.newptr = penv; 249af3b2549SHans Petter Selasky break; 250af3b2549SHans Petter Selasky default: 251af3b2549SHans Petter Selasky return; 252af3b2549SHans Petter Selasky } 253af3b2549SHans Petter Selasky error = sysctl_root_handler_locked(oidp, oidp->oid_arg1, 254af3b2549SHans Petter Selasky oidp->oid_arg2, &req); 255af3b2549SHans Petter Selasky if (error != 0) { 256af3b2549SHans Petter Selasky printf("Setting sysctl '%s' to '%s' failed: %d\n", 257af3b2549SHans Petter Selasky path, penv, error); 258af3b2549SHans Petter Selasky } 259af3b2549SHans Petter Selasky freeenv(penv); 260af3b2549SHans Petter Selasky } 261af3b2549SHans Petter Selasky 262107e7dc5SPeter Pentchev void 263107e7dc5SPeter Pentchev sysctl_register_oid(struct sysctl_oid *oidp) 264787d58f2SPoul-Henning Kamp { 265ce02431fSDoug Rabson struct sysctl_oid_list *parent = oidp->oid_parent; 266ce02431fSDoug Rabson struct sysctl_oid *p; 267ce02431fSDoug Rabson struct sysctl_oid *q; 2683c8e79ddSBruce Evans 269ce02431fSDoug Rabson /* 270bd3cdc31SAndrzej Bialecki * First check if another oid with the same name already 271bd3cdc31SAndrzej Bialecki * exists in the parent's list. 272bd3cdc31SAndrzej Bialecki */ 273875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 274bd3cdc31SAndrzej Bialecki p = sysctl_find_oidname(oidp->oid_name, parent); 275bd3cdc31SAndrzej Bialecki if (p != NULL) { 276bd3cdc31SAndrzej Bialecki if ((p->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 277bd3cdc31SAndrzej Bialecki p->oid_refcnt++; 278bd3cdc31SAndrzej Bialecki return; 279bd3cdc31SAndrzej Bialecki } else { 280bd3cdc31SAndrzej Bialecki printf("can't re-use a leaf (%s)!\n", p->oid_name); 281bd3cdc31SAndrzej Bialecki return; 282bd3cdc31SAndrzej Bialecki } 283bd3cdc31SAndrzej Bialecki } 284bd3cdc31SAndrzej Bialecki /* 285ce02431fSDoug Rabson * If this oid has a number OID_AUTO, give it a number which 2867ca4d05fSPeter Pentchev * is greater than any current oid. 2877ca4d05fSPeter Pentchev * NOTE: DO NOT change the starting value here, change it in 2887ca4d05fSPeter Pentchev * <sys/sysctl.h>, and make sure it is at least 256 to 2897ca4d05fSPeter Pentchev * accomodate e.g. net.inet.raw as a static sysctl node. 290ce02431fSDoug Rabson */ 291ce02431fSDoug Rabson if (oidp->oid_number == OID_AUTO) { 2927ca4d05fSPeter Pentchev static int newoid = CTL_AUTO_START; 2935ed57d32SKirk McKusick 2945ed57d32SKirk McKusick oidp->oid_number = newoid++; 2955ed57d32SKirk McKusick if (newoid == 0x7fffffff) 2965ed57d32SKirk McKusick panic("out of oids"); 297787d58f2SPoul-Henning Kamp } 29888fbb423SPeter Pentchev #if 0 29988fbb423SPeter Pentchev else if (oidp->oid_number >= CTL_AUTO_START) { 30088fbb423SPeter Pentchev /* do not panic; this happens when unregistering sysctl sets */ 30188fbb423SPeter Pentchev printf("static sysctl oid too high: %d", oidp->oid_number); 30288fbb423SPeter Pentchev } 30388fbb423SPeter Pentchev #endif 304787d58f2SPoul-Henning Kamp 305ce02431fSDoug Rabson /* 306ce02431fSDoug Rabson * Insert the oid into the parent's list in order. 307ce02431fSDoug Rabson */ 308ce02431fSDoug Rabson q = NULL; 309ce02431fSDoug Rabson SLIST_FOREACH(p, parent, oid_link) { 310ce02431fSDoug Rabson if (oidp->oid_number < p->oid_number) 311ce02431fSDoug Rabson break; 312ce02431fSDoug Rabson q = p; 313ce02431fSDoug Rabson } 314ce02431fSDoug Rabson if (q) 315ce02431fSDoug Rabson SLIST_INSERT_AFTER(q, oidp, oid_link); 316ce02431fSDoug Rabson else 317ce02431fSDoug Rabson SLIST_INSERT_HEAD(parent, oidp, oid_link); 318af3b2549SHans Petter Selasky 319af3b2549SHans Petter Selasky if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE && 320af3b2549SHans Petter Selasky #ifdef VIMAGE 321af3b2549SHans Petter Selasky (oidp->oid_kind & CTLFLAG_VNET) == 0 && 322af3b2549SHans Petter Selasky #endif 323af3b2549SHans Petter Selasky (oidp->oid_kind & CTLFLAG_TUN) != 0 && 324af3b2549SHans Petter Selasky (oidp->oid_kind & CTLFLAG_NOFETCH) == 0) { 325af3b2549SHans Petter Selasky sysctl_load_tunable_by_oid_locked(oidp); 326af3b2549SHans Petter Selasky } 327ce02431fSDoug Rabson } 328ce02431fSDoug Rabson 329107e7dc5SPeter Pentchev void 330107e7dc5SPeter Pentchev sysctl_unregister_oid(struct sysctl_oid *oidp) 331787d58f2SPoul-Henning Kamp { 332193f2edbSMaxime Henrion struct sysctl_oid *p; 333193f2edbSMaxime Henrion int error; 334193f2edbSMaxime Henrion 335875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 336193f2edbSMaxime Henrion error = ENOENT; 337193f2edbSMaxime Henrion if (oidp->oid_number == OID_AUTO) { 338193f2edbSMaxime Henrion error = EINVAL; 339193f2edbSMaxime Henrion } else { 340193f2edbSMaxime Henrion SLIST_FOREACH(p, oidp->oid_parent, oid_link) { 341193f2edbSMaxime Henrion if (p == oidp) { 342193f2edbSMaxime Henrion SLIST_REMOVE(oidp->oid_parent, oidp, 343193f2edbSMaxime Henrion sysctl_oid, oid_link); 344193f2edbSMaxime Henrion error = 0; 345193f2edbSMaxime Henrion break; 346193f2edbSMaxime Henrion } 347193f2edbSMaxime Henrion } 348193f2edbSMaxime Henrion } 349193f2edbSMaxime Henrion 350193f2edbSMaxime Henrion /* 351193f2edbSMaxime Henrion * This can happen when a module fails to register and is 352193f2edbSMaxime Henrion * being unloaded afterwards. It should not be a panic() 353193f2edbSMaxime Henrion * for normal use. 354193f2edbSMaxime Henrion */ 355193f2edbSMaxime Henrion if (error) 356193f2edbSMaxime Henrion printf("%s: failed to unregister sysctl\n", __func__); 35761220614SPoul-Henning Kamp } 358946bb7a2SPoul-Henning Kamp 359bd3cdc31SAndrzej Bialecki /* Initialize a new context to keep track of dynamically added sysctls. */ 360bd3cdc31SAndrzej Bialecki int 361bd3cdc31SAndrzej Bialecki sysctl_ctx_init(struct sysctl_ctx_list *c) 362bd3cdc31SAndrzej Bialecki { 363bd3cdc31SAndrzej Bialecki 364bd3cdc31SAndrzej Bialecki if (c == NULL) { 365bd3cdc31SAndrzej Bialecki return (EINVAL); 366bd3cdc31SAndrzej Bialecki } 367875b66a0SJohn Baldwin 368875b66a0SJohn Baldwin /* 369875b66a0SJohn Baldwin * No locking here, the caller is responsible for not adding 370875b66a0SJohn Baldwin * new nodes to a context until after this function has 371875b66a0SJohn Baldwin * returned. 372875b66a0SJohn Baldwin */ 373bd3cdc31SAndrzej Bialecki TAILQ_INIT(c); 374bd3cdc31SAndrzej Bialecki return (0); 375bd3cdc31SAndrzej Bialecki } 376bd3cdc31SAndrzej Bialecki 377bd3cdc31SAndrzej Bialecki /* Free the context, and destroy all dynamic oids registered in this context */ 378bd3cdc31SAndrzej Bialecki int 379bd3cdc31SAndrzej Bialecki sysctl_ctx_free(struct sysctl_ctx_list *clist) 380bd3cdc31SAndrzej Bialecki { 381bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e, *e1; 382bd3cdc31SAndrzej Bialecki int error; 383bd3cdc31SAndrzej Bialecki 384bd3cdc31SAndrzej Bialecki error = 0; 385bd3cdc31SAndrzej Bialecki /* 386bd3cdc31SAndrzej Bialecki * First perform a "dry run" to check if it's ok to remove oids. 387bd3cdc31SAndrzej Bialecki * XXX FIXME 388bd3cdc31SAndrzej Bialecki * XXX This algorithm is a hack. But I don't know any 389bd3cdc31SAndrzej Bialecki * XXX better solution for now... 390bd3cdc31SAndrzej Bialecki */ 391875b66a0SJohn Baldwin SYSCTL_XLOCK(); 392bd3cdc31SAndrzej Bialecki TAILQ_FOREACH(e, clist, link) { 393875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(e->entry, 0, 0); 394bd3cdc31SAndrzej Bialecki if (error) 395bd3cdc31SAndrzej Bialecki break; 396bd3cdc31SAndrzej Bialecki } 397bd3cdc31SAndrzej Bialecki /* 398bd3cdc31SAndrzej Bialecki * Restore deregistered entries, either from the end, 399bd3cdc31SAndrzej Bialecki * or from the place where error occured. 400bd3cdc31SAndrzej Bialecki * e contains the entry that was not unregistered 401bd3cdc31SAndrzej Bialecki */ 402bd3cdc31SAndrzej Bialecki if (error) 403bd3cdc31SAndrzej Bialecki e1 = TAILQ_PREV(e, sysctl_ctx_list, link); 404bd3cdc31SAndrzej Bialecki else 405bd3cdc31SAndrzej Bialecki e1 = TAILQ_LAST(clist, sysctl_ctx_list); 406bd3cdc31SAndrzej Bialecki while (e1 != NULL) { 407bd3cdc31SAndrzej Bialecki sysctl_register_oid(e1->entry); 408bd3cdc31SAndrzej Bialecki e1 = TAILQ_PREV(e1, sysctl_ctx_list, link); 409bd3cdc31SAndrzej Bialecki } 410875b66a0SJohn Baldwin if (error) { 411875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 412bd3cdc31SAndrzej Bialecki return(EBUSY); 413875b66a0SJohn Baldwin } 414bd3cdc31SAndrzej Bialecki /* Now really delete the entries */ 415bd3cdc31SAndrzej Bialecki e = TAILQ_FIRST(clist); 416bd3cdc31SAndrzej Bialecki while (e != NULL) { 417bd3cdc31SAndrzej Bialecki e1 = TAILQ_NEXT(e, link); 418875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(e->entry, 1, 0); 419bd3cdc31SAndrzej Bialecki if (error) 420bd3cdc31SAndrzej Bialecki panic("sysctl_remove_oid: corrupt tree, entry: %s", 421bd3cdc31SAndrzej Bialecki e->entry->oid_name); 422bd3cdc31SAndrzej Bialecki free(e, M_SYSCTLOID); 423bd3cdc31SAndrzej Bialecki e = e1; 424bd3cdc31SAndrzej Bialecki } 425875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 426bd3cdc31SAndrzej Bialecki return (error); 427bd3cdc31SAndrzej Bialecki } 428bd3cdc31SAndrzej Bialecki 429bd3cdc31SAndrzej Bialecki /* Add an entry to the context */ 430bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry * 431bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_add(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp) 432bd3cdc31SAndrzej Bialecki { 433bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e; 434bd3cdc31SAndrzej Bialecki 435875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 436bd3cdc31SAndrzej Bialecki if (clist == NULL || oidp == NULL) 437bd3cdc31SAndrzej Bialecki return(NULL); 438a163d034SWarner Losh e = malloc(sizeof(struct sysctl_ctx_entry), M_SYSCTLOID, M_WAITOK); 439bd3cdc31SAndrzej Bialecki e->entry = oidp; 440bd3cdc31SAndrzej Bialecki TAILQ_INSERT_HEAD(clist, e, link); 441bd3cdc31SAndrzej Bialecki return (e); 442bd3cdc31SAndrzej Bialecki } 443bd3cdc31SAndrzej Bialecki 444bd3cdc31SAndrzej Bialecki /* Find an entry in the context */ 445bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry * 446bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_find(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp) 447bd3cdc31SAndrzej Bialecki { 448bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e; 449bd3cdc31SAndrzej Bialecki 450ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 451bd3cdc31SAndrzej Bialecki if (clist == NULL || oidp == NULL) 452bd3cdc31SAndrzej Bialecki return(NULL); 453fc2ffbe6SPoul-Henning Kamp TAILQ_FOREACH(e, clist, link) { 454bd3cdc31SAndrzej Bialecki if(e->entry == oidp) 455bd3cdc31SAndrzej Bialecki return(e); 456bd3cdc31SAndrzej Bialecki } 457bd3cdc31SAndrzej Bialecki return (e); 458bd3cdc31SAndrzej Bialecki } 459bd3cdc31SAndrzej Bialecki 460bd3cdc31SAndrzej Bialecki /* 461bd3cdc31SAndrzej Bialecki * Delete an entry from the context. 462bd3cdc31SAndrzej Bialecki * NOTE: this function doesn't free oidp! You have to remove it 463bd3cdc31SAndrzej Bialecki * with sysctl_remove_oid(). 464bd3cdc31SAndrzej Bialecki */ 465bd3cdc31SAndrzej Bialecki int 466bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_del(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp) 467bd3cdc31SAndrzej Bialecki { 468bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e; 469bd3cdc31SAndrzej Bialecki 470bd3cdc31SAndrzej Bialecki if (clist == NULL || oidp == NULL) 471bd3cdc31SAndrzej Bialecki return (EINVAL); 472875b66a0SJohn Baldwin SYSCTL_XLOCK(); 473bd3cdc31SAndrzej Bialecki e = sysctl_ctx_entry_find(clist, oidp); 474bd3cdc31SAndrzej Bialecki if (e != NULL) { 475bd3cdc31SAndrzej Bialecki TAILQ_REMOVE(clist, e, link); 476875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 477bd3cdc31SAndrzej Bialecki free(e, M_SYSCTLOID); 478bd3cdc31SAndrzej Bialecki return (0); 479875b66a0SJohn Baldwin } else { 480875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 481bd3cdc31SAndrzej Bialecki return (ENOENT); 482bd3cdc31SAndrzej Bialecki } 483875b66a0SJohn Baldwin } 484bd3cdc31SAndrzej Bialecki 485bd3cdc31SAndrzej Bialecki /* 486bd3cdc31SAndrzej Bialecki * Remove dynamically created sysctl trees. 487bd3cdc31SAndrzej Bialecki * oidp - top of the tree to be removed 488bd3cdc31SAndrzej Bialecki * del - if 0 - just deregister, otherwise free up entries as well 489bd3cdc31SAndrzej Bialecki * recurse - if != 0 traverse the subtree to be deleted 490bd3cdc31SAndrzej Bialecki */ 491bd3cdc31SAndrzej Bialecki int 492bd3cdc31SAndrzej Bialecki sysctl_remove_oid(struct sysctl_oid *oidp, int del, int recurse) 493bd3cdc31SAndrzej Bialecki { 494875b66a0SJohn Baldwin int error; 495875b66a0SJohn Baldwin 496875b66a0SJohn Baldwin SYSCTL_XLOCK(); 497875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(oidp, del, recurse); 498875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 499875b66a0SJohn Baldwin return (error); 500875b66a0SJohn Baldwin } 501875b66a0SJohn Baldwin 502e4cd31ddSJeff Roberson int 503e4cd31ddSJeff Roberson sysctl_remove_name(struct sysctl_oid *parent, const char *name, 504e4cd31ddSJeff Roberson int del, int recurse) 505e4cd31ddSJeff Roberson { 506e4cd31ddSJeff Roberson struct sysctl_oid *p, *tmp; 507e4cd31ddSJeff Roberson int error; 508e4cd31ddSJeff Roberson 509e4cd31ddSJeff Roberson error = ENOENT; 510e4cd31ddSJeff Roberson SYSCTL_XLOCK(); 511e4cd31ddSJeff Roberson SLIST_FOREACH_SAFE(p, SYSCTL_CHILDREN(parent), oid_link, tmp) { 512e4cd31ddSJeff Roberson if (strcmp(p->oid_name, name) == 0) { 513e4cd31ddSJeff Roberson error = sysctl_remove_oid_locked(p, del, recurse); 514e4cd31ddSJeff Roberson break; 515e4cd31ddSJeff Roberson } 516e4cd31ddSJeff Roberson } 517e4cd31ddSJeff Roberson SYSCTL_XUNLOCK(); 518e4cd31ddSJeff Roberson 519e4cd31ddSJeff Roberson return (error); 520e4cd31ddSJeff Roberson } 521e4cd31ddSJeff Roberson 522e4cd31ddSJeff Roberson 523875b66a0SJohn Baldwin static int 524875b66a0SJohn Baldwin sysctl_remove_oid_locked(struct sysctl_oid *oidp, int del, int recurse) 525875b66a0SJohn Baldwin { 526e4cd31ddSJeff Roberson struct sysctl_oid *p, *tmp; 527bd3cdc31SAndrzej Bialecki int error; 528bd3cdc31SAndrzej Bialecki 529875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 530bd3cdc31SAndrzej Bialecki if (oidp == NULL) 531bd3cdc31SAndrzej Bialecki return(EINVAL); 532bd3cdc31SAndrzej Bialecki if ((oidp->oid_kind & CTLFLAG_DYN) == 0) { 533bd3cdc31SAndrzej Bialecki printf("can't remove non-dynamic nodes!\n"); 534bd3cdc31SAndrzej Bialecki return (EINVAL); 535bd3cdc31SAndrzej Bialecki } 536bd3cdc31SAndrzej Bialecki /* 537bd3cdc31SAndrzej Bialecki * WARNING: normal method to do this should be through 538bd3cdc31SAndrzej Bialecki * sysctl_ctx_free(). Use recursing as the last resort 539bd3cdc31SAndrzej Bialecki * method to purge your sysctl tree of leftovers... 540bd3cdc31SAndrzej Bialecki * However, if some other code still references these nodes, 541bd3cdc31SAndrzej Bialecki * it will panic. 542bd3cdc31SAndrzej Bialecki */ 543bd3cdc31SAndrzej Bialecki if ((oidp->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 544bd3cdc31SAndrzej Bialecki if (oidp->oid_refcnt == 1) { 545e4cd31ddSJeff Roberson SLIST_FOREACH_SAFE(p, 546e4cd31ddSJeff Roberson SYSCTL_CHILDREN(oidp), oid_link, tmp) { 547f510415dSScott Long if (!recurse) { 548f510415dSScott Long printf("Warning: failed attempt to " 549f510415dSScott Long "remove oid %s with child %s\n", 550f510415dSScott Long oidp->oid_name, p->oid_name); 551bd3cdc31SAndrzej Bialecki return (ENOTEMPTY); 552f510415dSScott Long } 553875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(p, del, 554875b66a0SJohn Baldwin recurse); 555bd3cdc31SAndrzej Bialecki if (error) 556bd3cdc31SAndrzej Bialecki return (error); 557bd3cdc31SAndrzej Bialecki } 558bd3cdc31SAndrzej Bialecki } 559bd3cdc31SAndrzej Bialecki } 560bd3cdc31SAndrzej Bialecki if (oidp->oid_refcnt > 1 ) { 561bd3cdc31SAndrzej Bialecki oidp->oid_refcnt--; 562bd3cdc31SAndrzej Bialecki } else { 563bd3cdc31SAndrzej Bialecki if (oidp->oid_refcnt == 0) { 564bd3cdc31SAndrzej Bialecki printf("Warning: bad oid_refcnt=%u (%s)!\n", 565bd3cdc31SAndrzej Bialecki oidp->oid_refcnt, oidp->oid_name); 566bd3cdc31SAndrzej Bialecki return (EINVAL); 567bd3cdc31SAndrzej Bialecki } 568bd3cdc31SAndrzej Bialecki sysctl_unregister_oid(oidp); 569bd3cdc31SAndrzej Bialecki if (del) { 570ccecef29SMatthew D Fleming /* 571ccecef29SMatthew D Fleming * Wait for all threads running the handler to drain. 572ccecef29SMatthew D Fleming * This preserves the previous behavior when the 573ccecef29SMatthew D Fleming * sysctl lock was held across a handler invocation, 574ccecef29SMatthew D Fleming * and is necessary for module unload correctness. 575ccecef29SMatthew D Fleming */ 576ccecef29SMatthew D Fleming while (oidp->oid_running > 0) { 577ccecef29SMatthew D Fleming oidp->oid_kind |= CTLFLAG_DYING; 578ccecef29SMatthew D Fleming SYSCTL_SLEEP(&oidp->oid_running, "oidrm", 0); 579ccecef29SMatthew D Fleming } 5805937226dSPoul-Henning Kamp if (oidp->oid_descr) 581db9066f7SMarius Strobl free(__DECONST(char *, oidp->oid_descr), 58293e8459aSPeter Wemm M_SYSCTLOID); 583db9066f7SMarius Strobl free(__DECONST(char *, oidp->oid_name), M_SYSCTLOID); 584bd3cdc31SAndrzej Bialecki free(oidp, M_SYSCTLOID); 585bd3cdc31SAndrzej Bialecki } 586bd3cdc31SAndrzej Bialecki } 587bd3cdc31SAndrzej Bialecki return (0); 588bd3cdc31SAndrzej Bialecki } 589bd3cdc31SAndrzej Bialecki /* 590bd3cdc31SAndrzej Bialecki * Create new sysctls at run time. 591bd3cdc31SAndrzej Bialecki * clist may point to a valid context initialized with sysctl_ctx_init(). 592bd3cdc31SAndrzej Bialecki */ 593bd3cdc31SAndrzej Bialecki struct sysctl_oid * 594bd3cdc31SAndrzej Bialecki sysctl_add_oid(struct sysctl_ctx_list *clist, struct sysctl_oid_list *parent, 595e4cd31ddSJeff Roberson int number, const char *name, int kind, void *arg1, intptr_t arg2, 596c5f9b6d0SJohn Baldwin int (*handler)(SYSCTL_HANDLER_ARGS), const char *fmt, const char *descr) 597bd3cdc31SAndrzej Bialecki { 598bd3cdc31SAndrzej Bialecki struct sysctl_oid *oidp; 599bd3cdc31SAndrzej Bialecki 600bd3cdc31SAndrzej Bialecki /* You have to hook up somewhere.. */ 601bd3cdc31SAndrzej Bialecki if (parent == NULL) 602bd3cdc31SAndrzej Bialecki return(NULL); 603bd3cdc31SAndrzej Bialecki /* Check if the node already exists, otherwise create it */ 604875b66a0SJohn Baldwin SYSCTL_XLOCK(); 605bd3cdc31SAndrzej Bialecki oidp = sysctl_find_oidname(name, parent); 606bd3cdc31SAndrzej Bialecki if (oidp != NULL) { 607bd3cdc31SAndrzej Bialecki if ((oidp->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 608bd3cdc31SAndrzej Bialecki oidp->oid_refcnt++; 609bd3cdc31SAndrzej Bialecki /* Update the context */ 610bd3cdc31SAndrzej Bialecki if (clist != NULL) 611bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_add(clist, oidp); 612875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 613bd3cdc31SAndrzej Bialecki return (oidp); 614bd3cdc31SAndrzej Bialecki } else { 615875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 616bd3cdc31SAndrzej Bialecki printf("can't re-use a leaf (%s)!\n", name); 617bd3cdc31SAndrzej Bialecki return (NULL); 618bd3cdc31SAndrzej Bialecki } 619bd3cdc31SAndrzej Bialecki } 620a163d034SWarner Losh oidp = malloc(sizeof(struct sysctl_oid), M_SYSCTLOID, M_WAITOK|M_ZERO); 621bd3cdc31SAndrzej Bialecki oidp->oid_parent = parent; 622af3b2549SHans Petter Selasky SLIST_INIT(&oidp->oid_children); 623bd3cdc31SAndrzej Bialecki oidp->oid_number = number; 624bd3cdc31SAndrzej Bialecki oidp->oid_refcnt = 1; 625db9066f7SMarius Strobl oidp->oid_name = strdup(name, M_SYSCTLOID); 626bd3cdc31SAndrzej Bialecki oidp->oid_handler = handler; 627bd3cdc31SAndrzej Bialecki oidp->oid_kind = CTLFLAG_DYN | kind; 628bd3cdc31SAndrzej Bialecki oidp->oid_arg1 = arg1; 629bd3cdc31SAndrzej Bialecki oidp->oid_arg2 = arg2; 630bd3cdc31SAndrzej Bialecki oidp->oid_fmt = fmt; 631af3b2549SHans Petter Selasky if (descr != NULL) 632db9066f7SMarius Strobl oidp->oid_descr = strdup(descr, M_SYSCTLOID); 633bd3cdc31SAndrzej Bialecki /* Update the context, if used */ 634bd3cdc31SAndrzej Bialecki if (clist != NULL) 635bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_add(clist, oidp); 636bd3cdc31SAndrzej Bialecki /* Register this oid */ 637bd3cdc31SAndrzej Bialecki sysctl_register_oid(oidp); 638875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 639bd3cdc31SAndrzej Bialecki return (oidp); 640bd3cdc31SAndrzej Bialecki } 641bd3cdc31SAndrzej Bialecki 642ce02431fSDoug Rabson /* 643cd17ceaaSPeter Wemm * Rename an existing oid. 644cd17ceaaSPeter Wemm */ 645cd17ceaaSPeter Wemm void 646cd17ceaaSPeter Wemm sysctl_rename_oid(struct sysctl_oid *oidp, const char *name) 647cd17ceaaSPeter Wemm { 648cd17ceaaSPeter Wemm char *newname; 649db9066f7SMarius Strobl char *oldname; 650cd17ceaaSPeter Wemm 651db9066f7SMarius Strobl newname = strdup(name, M_SYSCTLOID); 652875b66a0SJohn Baldwin SYSCTL_XLOCK(); 653db9066f7SMarius Strobl oldname = __DECONST(char *, oidp->oid_name); 654cd17ceaaSPeter Wemm oidp->oid_name = newname; 655875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 656cd17ceaaSPeter Wemm free(oldname, M_SYSCTLOID); 657cd17ceaaSPeter Wemm } 658cd17ceaaSPeter Wemm 659cd17ceaaSPeter Wemm /* 66021885af5SDag-Erling Smørgrav * Reparent an existing oid. 66121885af5SDag-Erling Smørgrav */ 66221885af5SDag-Erling Smørgrav int 66321885af5SDag-Erling Smørgrav sysctl_move_oid(struct sysctl_oid *oid, struct sysctl_oid_list *parent) 66421885af5SDag-Erling Smørgrav { 66521885af5SDag-Erling Smørgrav struct sysctl_oid *oidp; 66621885af5SDag-Erling Smørgrav 667875b66a0SJohn Baldwin SYSCTL_XLOCK(); 668875b66a0SJohn Baldwin if (oid->oid_parent == parent) { 669875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 67021885af5SDag-Erling Smørgrav return (0); 671875b66a0SJohn Baldwin } 67221885af5SDag-Erling Smørgrav oidp = sysctl_find_oidname(oid->oid_name, parent); 673875b66a0SJohn Baldwin if (oidp != NULL) { 674875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 67521885af5SDag-Erling Smørgrav return (EEXIST); 676875b66a0SJohn Baldwin } 67721885af5SDag-Erling Smørgrav sysctl_unregister_oid(oid); 67821885af5SDag-Erling Smørgrav oid->oid_parent = parent; 67921885af5SDag-Erling Smørgrav oid->oid_number = OID_AUTO; 68021885af5SDag-Erling Smørgrav sysctl_register_oid(oid); 681875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 68221885af5SDag-Erling Smørgrav return (0); 68321885af5SDag-Erling Smørgrav } 68421885af5SDag-Erling Smørgrav 68521885af5SDag-Erling Smørgrav /* 686ce02431fSDoug Rabson * Register the kernel's oids on startup. 687ce02431fSDoug Rabson */ 688f41325dbSPeter Wemm SET_DECLARE(sysctl_set, struct sysctl_oid); 689ce02431fSDoug Rabson 690107e7dc5SPeter Pentchev static void 691107e7dc5SPeter Pentchev sysctl_register_all(void *arg) 692ce02431fSDoug Rabson { 693f41325dbSPeter Wemm struct sysctl_oid **oidp; 694ce02431fSDoug Rabson 6953e829b18SJohn Baldwin sx_init(&sysctlmemlock, "sysctl mem"); 6963bd1da29SRobert Watson SYSCTL_INIT(); 697875b66a0SJohn Baldwin SYSCTL_XLOCK(); 698f41325dbSPeter Wemm SET_FOREACH(oidp, sysctl_set) 699f41325dbSPeter Wemm sysctl_register_oid(*oidp); 700875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 701f41325dbSPeter Wemm } 702af3b2549SHans Petter Selasky SYSINIT(sysctl, SI_SUB_KMEM, SI_ORDER_FIRST, sysctl_register_all, 0); 703ce02431fSDoug Rabson 704946bb7a2SPoul-Henning Kamp /* 705946bb7a2SPoul-Henning Kamp * "Staff-functions" 706946bb7a2SPoul-Henning Kamp * 70765d0bc13SPoul-Henning Kamp * These functions implement a presently undocumented interface 70865d0bc13SPoul-Henning Kamp * used by the sysctl program to walk the tree, and get the type 70965d0bc13SPoul-Henning Kamp * so it can print the value. 71065d0bc13SPoul-Henning Kamp * This interface is under work and consideration, and should probably 71165d0bc13SPoul-Henning Kamp * be killed with a big axe by the first person who can find the time. 71265d0bc13SPoul-Henning Kamp * (be aware though, that the proper interface isn't as obvious as it 71365d0bc13SPoul-Henning Kamp * may seem, there are various conflicting requirements. 71465d0bc13SPoul-Henning Kamp * 715946bb7a2SPoul-Henning Kamp * {0,0} printf the entire MIB-tree. 716946bb7a2SPoul-Henning Kamp * {0,1,...} return the name of the "..." OID. 71786415b71SPoul-Henning Kamp * {0,2,...} return the next OID. 718946bb7a2SPoul-Henning Kamp * {0,3} return the OID of the name in "new" 71965d0bc13SPoul-Henning Kamp * {0,4,...} return the kind & format info for the "..." OID. 7206105f815SLuigi Rizzo * {0,5,...} return the description the "..." OID. 721946bb7a2SPoul-Henning Kamp */ 722946bb7a2SPoul-Henning Kamp 723df970488SRobert Watson #ifdef SYSCTL_DEBUG 724787d58f2SPoul-Henning Kamp static void 725ce02431fSDoug Rabson sysctl_sysctl_debug_dump_node(struct sysctl_oid_list *l, int i) 726787d58f2SPoul-Henning Kamp { 727ce02431fSDoug Rabson int k; 728ce02431fSDoug Rabson struct sysctl_oid *oidp; 729787d58f2SPoul-Henning Kamp 730ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 731ce02431fSDoug Rabson SLIST_FOREACH(oidp, l, oid_link) { 732787d58f2SPoul-Henning Kamp 733787d58f2SPoul-Henning Kamp for (k=0; k<i; k++) 734787d58f2SPoul-Henning Kamp printf(" "); 735787d58f2SPoul-Henning Kamp 736ce02431fSDoug Rabson printf("%d %s ", oidp->oid_number, oidp->oid_name); 737787d58f2SPoul-Henning Kamp 738787d58f2SPoul-Henning Kamp printf("%c%c", 739ce02431fSDoug Rabson oidp->oid_kind & CTLFLAG_RD ? 'R':' ', 740ce02431fSDoug Rabson oidp->oid_kind & CTLFLAG_WR ? 'W':' '); 741787d58f2SPoul-Henning Kamp 742ce02431fSDoug Rabson if (oidp->oid_handler) 74361220614SPoul-Henning Kamp printf(" *Handler"); 74461220614SPoul-Henning Kamp 745ce02431fSDoug Rabson switch (oidp->oid_kind & CTLTYPE) { 746787d58f2SPoul-Henning Kamp case CTLTYPE_NODE: 747787d58f2SPoul-Henning Kamp printf(" Node\n"); 748ce02431fSDoug Rabson if (!oidp->oid_handler) { 749787d58f2SPoul-Henning Kamp sysctl_sysctl_debug_dump_node( 750af3b2549SHans Petter Selasky SYSCTL_CHILDREN(oidp), i + 2); 751787d58f2SPoul-Henning Kamp } 752787d58f2SPoul-Henning Kamp break; 753787d58f2SPoul-Henning Kamp case CTLTYPE_INT: printf(" Int\n"); break; 754cbc134adSMatthew D Fleming case CTLTYPE_UINT: printf(" u_int\n"); break; 755cbc134adSMatthew D Fleming case CTLTYPE_LONG: printf(" Long\n"); break; 756cbc134adSMatthew D Fleming case CTLTYPE_ULONG: printf(" u_long\n"); break; 757787d58f2SPoul-Henning Kamp case CTLTYPE_STRING: printf(" String\n"); break; 758cbc134adSMatthew D Fleming case CTLTYPE_U64: printf(" uint64_t\n"); break; 759cbc134adSMatthew D Fleming case CTLTYPE_S64: printf(" int64_t\n"); break; 760787d58f2SPoul-Henning Kamp case CTLTYPE_OPAQUE: printf(" Opaque/struct\n"); break; 761787d58f2SPoul-Henning Kamp default: printf("\n"); 762787d58f2SPoul-Henning Kamp } 763787d58f2SPoul-Henning Kamp 764787d58f2SPoul-Henning Kamp } 765787d58f2SPoul-Henning Kamp } 766787d58f2SPoul-Henning Kamp 767787d58f2SPoul-Henning Kamp static int 76882d9ae4eSPoul-Henning Kamp sysctl_sysctl_debug(SYSCTL_HANDLER_ARGS) 769787d58f2SPoul-Henning Kamp { 770023a0e61SPeter Wemm int error; 771023a0e61SPeter Wemm 772acd3428bSRobert Watson error = priv_check(req->td, PRIV_SYSCTL_DEBUG); 773023a0e61SPeter Wemm if (error) 77446003fb3SPawel Jakub Dawidek return (error); 775ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 776ce02431fSDoug Rabson sysctl_sysctl_debug_dump_node(&sysctl__children, 0); 777ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 77846003fb3SPawel Jakub Dawidek return (ENOENT); 779787d58f2SPoul-Henning Kamp } 780787d58f2SPoul-Henning Kamp 781787d58f2SPoul-Henning Kamp SYSCTL_PROC(_sysctl, 0, debug, CTLTYPE_STRING|CTLFLAG_RD, 782946bb7a2SPoul-Henning Kamp 0, 0, sysctl_sysctl_debug, "-", ""); 783df970488SRobert Watson #endif 7842e210993SPoul-Henning Kamp 785946bb7a2SPoul-Henning Kamp static int 78682d9ae4eSPoul-Henning Kamp sysctl_sysctl_name(SYSCTL_HANDLER_ARGS) 787946bb7a2SPoul-Henning Kamp { 788946bb7a2SPoul-Henning Kamp int *name = (int *) arg1; 789946bb7a2SPoul-Henning Kamp u_int namelen = arg2; 790ce02431fSDoug Rabson int error = 0; 791ce02431fSDoug Rabson struct sysctl_oid *oid; 7927f4173ccSPoul-Henning Kamp struct sysctl_oid_list *lsp = &sysctl__children, *lsp2; 793946bb7a2SPoul-Henning Kamp char buf[10]; 7942e210993SPoul-Henning Kamp 795ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 796946bb7a2SPoul-Henning Kamp while (namelen) { 797946bb7a2SPoul-Henning Kamp if (!lsp) { 7982127f260SArchie Cobbs snprintf(buf,sizeof(buf),"%d",*name); 799946bb7a2SPoul-Henning Kamp if (req->oldidx) 800946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, ".", 1); 801946bb7a2SPoul-Henning Kamp if (!error) 802946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, buf, strlen(buf)); 803946bb7a2SPoul-Henning Kamp if (error) 804ccecef29SMatthew D Fleming goto out; 805946bb7a2SPoul-Henning Kamp namelen--; 806946bb7a2SPoul-Henning Kamp name++; 807946bb7a2SPoul-Henning Kamp continue; 808946bb7a2SPoul-Henning Kamp } 8097f4173ccSPoul-Henning Kamp lsp2 = 0; 810ce02431fSDoug Rabson SLIST_FOREACH(oid, lsp, oid_link) { 811ce02431fSDoug Rabson if (oid->oid_number != *name) 812946bb7a2SPoul-Henning Kamp continue; 813946bb7a2SPoul-Henning Kamp 814946bb7a2SPoul-Henning Kamp if (req->oldidx) 815946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, ".", 1); 816946bb7a2SPoul-Henning Kamp if (!error) 817ce02431fSDoug Rabson error = SYSCTL_OUT(req, oid->oid_name, 818ce02431fSDoug Rabson strlen(oid->oid_name)); 819946bb7a2SPoul-Henning Kamp if (error) 820ccecef29SMatthew D Fleming goto out; 821946bb7a2SPoul-Henning Kamp 822946bb7a2SPoul-Henning Kamp namelen--; 823946bb7a2SPoul-Henning Kamp name++; 824946bb7a2SPoul-Henning Kamp 825ce02431fSDoug Rabson if ((oid->oid_kind & CTLTYPE) != CTLTYPE_NODE) 826946bb7a2SPoul-Henning Kamp break; 827946bb7a2SPoul-Henning Kamp 828ce02431fSDoug Rabson if (oid->oid_handler) 829946bb7a2SPoul-Henning Kamp break; 830946bb7a2SPoul-Henning Kamp 8315127ecb8SMatthew D Fleming lsp2 = SYSCTL_CHILDREN(oid); 832946bb7a2SPoul-Henning Kamp break; 833946bb7a2SPoul-Henning Kamp } 8347f4173ccSPoul-Henning Kamp lsp = lsp2; 835946bb7a2SPoul-Henning Kamp } 836ccecef29SMatthew D Fleming error = SYSCTL_OUT(req, "", 1); 837ccecef29SMatthew D Fleming out: 838ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 839ccecef29SMatthew D Fleming return (error); 840946bb7a2SPoul-Henning Kamp } 841946bb7a2SPoul-Henning Kamp 842ff66f6a4SRobert Watson /* 843ff66f6a4SRobert Watson * XXXRW/JA: Shouldn't return name data for nodes that we don't permit in 844ff66f6a4SRobert Watson * capability mode. 845ff66f6a4SRobert Watson */ 846ff66f6a4SRobert Watson static SYSCTL_NODE(_sysctl, 1, name, CTLFLAG_RD | CTLFLAG_CAPRD, 847ff66f6a4SRobert Watson sysctl_sysctl_name, ""); 848946bb7a2SPoul-Henning Kamp 849946bb7a2SPoul-Henning Kamp static int 850ce02431fSDoug Rabson sysctl_sysctl_next_ls(struct sysctl_oid_list *lsp, int *name, u_int namelen, 851ce02431fSDoug Rabson int *next, int *len, int level, struct sysctl_oid **oidpp) 852946bb7a2SPoul-Henning Kamp { 853ce02431fSDoug Rabson struct sysctl_oid *oidp; 854946bb7a2SPoul-Henning Kamp 855ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 856946bb7a2SPoul-Henning Kamp *len = level; 857ce02431fSDoug Rabson SLIST_FOREACH(oidp, lsp, oid_link) { 858ce02431fSDoug Rabson *next = oidp->oid_number; 859ce02431fSDoug Rabson *oidpp = oidp; 860946bb7a2SPoul-Henning Kamp 861306e6b83SMaxime Henrion if (oidp->oid_kind & CTLFLAG_SKIP) 862306e6b83SMaxime Henrion continue; 863306e6b83SMaxime Henrion 864946bb7a2SPoul-Henning Kamp if (!namelen) { 865ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 86646003fb3SPawel Jakub Dawidek return (0); 867ce02431fSDoug Rabson if (oidp->oid_handler) 868946bb7a2SPoul-Henning Kamp /* We really should call the handler here...*/ 86946003fb3SPawel Jakub Dawidek return (0); 8705127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 87161220614SPoul-Henning Kamp if (!sysctl_sysctl_next_ls(lsp, 0, 0, next+1, 872ce02431fSDoug Rabson len, level+1, oidpp)) 87346003fb3SPawel Jakub Dawidek return (0); 87490623e1aSRobert Watson goto emptynode; 875946bb7a2SPoul-Henning Kamp } 876946bb7a2SPoul-Henning Kamp 877ce02431fSDoug Rabson if (oidp->oid_number < *name) 878946bb7a2SPoul-Henning Kamp continue; 879946bb7a2SPoul-Henning Kamp 880ce02431fSDoug Rabson if (oidp->oid_number > *name) { 881ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 88246003fb3SPawel Jakub Dawidek return (0); 883ce02431fSDoug Rabson if (oidp->oid_handler) 88446003fb3SPawel Jakub Dawidek return (0); 8855127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 886946bb7a2SPoul-Henning Kamp if (!sysctl_sysctl_next_ls(lsp, name+1, namelen-1, 887ce02431fSDoug Rabson next+1, len, level+1, oidpp)) 888946bb7a2SPoul-Henning Kamp return (0); 88961220614SPoul-Henning Kamp goto next; 890946bb7a2SPoul-Henning Kamp } 891ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 892946bb7a2SPoul-Henning Kamp continue; 893946bb7a2SPoul-Henning Kamp 894ce02431fSDoug Rabson if (oidp->oid_handler) 895946bb7a2SPoul-Henning Kamp continue; 896946bb7a2SPoul-Henning Kamp 8975127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 898946bb7a2SPoul-Henning Kamp if (!sysctl_sysctl_next_ls(lsp, name+1, namelen-1, next+1, 899ce02431fSDoug Rabson len, level+1, oidpp)) 900946bb7a2SPoul-Henning Kamp return (0); 90161220614SPoul-Henning Kamp next: 902946bb7a2SPoul-Henning Kamp namelen = 1; 90390623e1aSRobert Watson emptynode: 904946bb7a2SPoul-Henning Kamp *len = level; 905946bb7a2SPoul-Henning Kamp } 90646003fb3SPawel Jakub Dawidek return (1); 907946bb7a2SPoul-Henning Kamp } 908946bb7a2SPoul-Henning Kamp 909946bb7a2SPoul-Henning Kamp static int 91082d9ae4eSPoul-Henning Kamp sysctl_sysctl_next(SYSCTL_HANDLER_ARGS) 911946bb7a2SPoul-Henning Kamp { 912946bb7a2SPoul-Henning Kamp int *name = (int *) arg1; 913946bb7a2SPoul-Henning Kamp u_int namelen = arg2; 914946bb7a2SPoul-Henning Kamp int i, j, error; 915946bb7a2SPoul-Henning Kamp struct sysctl_oid *oid; 916ce02431fSDoug Rabson struct sysctl_oid_list *lsp = &sysctl__children; 917946bb7a2SPoul-Henning Kamp int newoid[CTL_MAXNAME]; 918946bb7a2SPoul-Henning Kamp 919ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 920946bb7a2SPoul-Henning Kamp i = sysctl_sysctl_next_ls(lsp, name, namelen, newoid, &j, 1, &oid); 921ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 922946bb7a2SPoul-Henning Kamp if (i) 92346003fb3SPawel Jakub Dawidek return (ENOENT); 924946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, newoid, j * sizeof (int)); 925946bb7a2SPoul-Henning Kamp return (error); 926946bb7a2SPoul-Henning Kamp } 927946bb7a2SPoul-Henning Kamp 928ff66f6a4SRobert Watson /* 929ff66f6a4SRobert Watson * XXXRW/JA: Shouldn't return next data for nodes that we don't permit in 930ff66f6a4SRobert Watson * capability mode. 931ff66f6a4SRobert Watson */ 932ff66f6a4SRobert Watson static SYSCTL_NODE(_sysctl, 2, next, CTLFLAG_RD | CTLFLAG_CAPRD, 933ff66f6a4SRobert Watson sysctl_sysctl_next, ""); 934946bb7a2SPoul-Henning Kamp 935946bb7a2SPoul-Henning Kamp static int 936ce02431fSDoug Rabson name2oid(char *name, int *oid, int *len, struct sysctl_oid **oidpp) 937946bb7a2SPoul-Henning Kamp { 938ce02431fSDoug Rabson struct sysctl_oid *oidp; 939ce02431fSDoug Rabson struct sysctl_oid_list *lsp = &sysctl__children; 940946bb7a2SPoul-Henning Kamp char *p; 941946bb7a2SPoul-Henning Kamp 942ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 943ddf9d243SEd Schouten 944db9066f7SMarius Strobl for (*len = 0; *len < CTL_MAXNAME;) { 945db9066f7SMarius Strobl p = strsep(&name, "."); 946946bb7a2SPoul-Henning Kamp 947ce02431fSDoug Rabson oidp = SLIST_FIRST(lsp); 948db9066f7SMarius Strobl for (;; oidp = SLIST_NEXT(oidp, oid_link)) { 949db9066f7SMarius Strobl if (oidp == NULL) 950db9066f7SMarius Strobl return (ENOENT); 951db9066f7SMarius Strobl if (strcmp(p, oidp->oid_name) == 0) 952db9066f7SMarius Strobl break; 953946bb7a2SPoul-Henning Kamp } 954ce02431fSDoug Rabson *oid++ = oidp->oid_number; 955946bb7a2SPoul-Henning Kamp (*len)++; 956946bb7a2SPoul-Henning Kamp 957db9066f7SMarius Strobl if (name == NULL || *name == '\0') { 958ce02431fSDoug Rabson if (oidpp) 959ce02431fSDoug Rabson *oidpp = oidp; 960946bb7a2SPoul-Henning Kamp return (0); 961946bb7a2SPoul-Henning Kamp } 962946bb7a2SPoul-Henning Kamp 963ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 964946bb7a2SPoul-Henning Kamp break; 965946bb7a2SPoul-Henning Kamp 966ce02431fSDoug Rabson if (oidp->oid_handler) 967946bb7a2SPoul-Henning Kamp break; 968946bb7a2SPoul-Henning Kamp 9695127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 970946bb7a2SPoul-Henning Kamp } 97146003fb3SPawel Jakub Dawidek return (ENOENT); 972946bb7a2SPoul-Henning Kamp } 973946bb7a2SPoul-Henning Kamp 974946bb7a2SPoul-Henning Kamp static int 97582d9ae4eSPoul-Henning Kamp sysctl_sysctl_name2oid(SYSCTL_HANDLER_ARGS) 976946bb7a2SPoul-Henning Kamp { 977946bb7a2SPoul-Henning Kamp char *p; 978dd6312a7SMatthew D Fleming int error, oid[CTL_MAXNAME], len = 0; 979946bb7a2SPoul-Henning Kamp struct sysctl_oid *op = 0; 980946bb7a2SPoul-Henning Kamp 981946bb7a2SPoul-Henning Kamp if (!req->newlen) 98246003fb3SPawel Jakub Dawidek return (ENOENT); 9836a5d592aSPoul-Henning Kamp if (req->newlen >= MAXPATHLEN) /* XXX arbitrary, undocumented */ 9846a5d592aSPoul-Henning Kamp return (ENAMETOOLONG); 985946bb7a2SPoul-Henning Kamp 986a163d034SWarner Losh p = malloc(req->newlen+1, M_SYSCTL, M_WAITOK); 987946bb7a2SPoul-Henning Kamp 988946bb7a2SPoul-Henning Kamp error = SYSCTL_IN(req, p, req->newlen); 989946bb7a2SPoul-Henning Kamp if (error) { 990946bb7a2SPoul-Henning Kamp free(p, M_SYSCTL); 991946bb7a2SPoul-Henning Kamp return (error); 992946bb7a2SPoul-Henning Kamp } 993946bb7a2SPoul-Henning Kamp 994946bb7a2SPoul-Henning Kamp p [req->newlen] = '\0'; 995946bb7a2SPoul-Henning Kamp 996ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 997946bb7a2SPoul-Henning Kamp error = name2oid(p, oid, &len, &op); 998ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 999946bb7a2SPoul-Henning Kamp 1000946bb7a2SPoul-Henning Kamp free(p, M_SYSCTL); 1001946bb7a2SPoul-Henning Kamp 1002946bb7a2SPoul-Henning Kamp if (error) 1003946bb7a2SPoul-Henning Kamp return (error); 1004946bb7a2SPoul-Henning Kamp 1005946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, oid, len * sizeof *oid); 1006946bb7a2SPoul-Henning Kamp return (error); 1007946bb7a2SPoul-Henning Kamp } 1008946bb7a2SPoul-Henning Kamp 1009ff66f6a4SRobert Watson /* 1010ff66f6a4SRobert Watson * XXXRW/JA: Shouldn't return name2oid data for nodes that we don't permit in 1011ff66f6a4SRobert Watson * capability mode. 1012ff66f6a4SRobert Watson */ 10132fee06f0SMatthew D Fleming SYSCTL_PROC(_sysctl, 3, name2oid, 1014ff66f6a4SRobert Watson CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_ANYBODY | CTLFLAG_MPSAFE 1015ff66f6a4SRobert Watson | CTLFLAG_CAPRW, 0, 0, sysctl_sysctl_name2oid, "I", ""); 1016946bb7a2SPoul-Henning Kamp 1017946bb7a2SPoul-Henning Kamp static int 101882d9ae4eSPoul-Henning Kamp sysctl_sysctl_oidfmt(SYSCTL_HANDLER_ARGS) 1019946bb7a2SPoul-Henning Kamp { 1020ce02431fSDoug Rabson struct sysctl_oid *oid; 1021226420a4SBrian Feldman int error; 1022946bb7a2SPoul-Henning Kamp 1023ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 1024226420a4SBrian Feldman error = sysctl_find_oid(arg1, arg2, &oid, NULL, req); 1025226420a4SBrian Feldman if (error) 1026ccecef29SMatthew D Fleming goto out; 1027946bb7a2SPoul-Henning Kamp 1028ccecef29SMatthew D Fleming if (oid->oid_fmt == NULL) { 1029ccecef29SMatthew D Fleming error = ENOENT; 1030ccecef29SMatthew D Fleming goto out; 1031ccecef29SMatthew D Fleming } 1032226420a4SBrian Feldman error = SYSCTL_OUT(req, &oid->oid_kind, sizeof(oid->oid_kind)); 1033226420a4SBrian Feldman if (error) 1034ccecef29SMatthew D Fleming goto out; 1035226420a4SBrian Feldman error = SYSCTL_OUT(req, oid->oid_fmt, strlen(oid->oid_fmt) + 1); 1036ccecef29SMatthew D Fleming out: 1037ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 103865d0bc13SPoul-Henning Kamp return (error); 1039946bb7a2SPoul-Henning Kamp } 1040946bb7a2SPoul-Henning Kamp 104186415b71SPoul-Henning Kamp 1042ff66f6a4SRobert Watson static SYSCTL_NODE(_sysctl, 4, oidfmt, CTLFLAG_RD|CTLFLAG_MPSAFE|CTLFLAG_CAPRD, 1043f3b86a5fSEd Schouten sysctl_sysctl_oidfmt, ""); 1044946bb7a2SPoul-Henning Kamp 10456105f815SLuigi Rizzo static int 10466105f815SLuigi Rizzo sysctl_sysctl_oiddescr(SYSCTL_HANDLER_ARGS) 10476105f815SLuigi Rizzo { 10486105f815SLuigi Rizzo struct sysctl_oid *oid; 10496105f815SLuigi Rizzo int error; 10506105f815SLuigi Rizzo 1051ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 10526105f815SLuigi Rizzo error = sysctl_find_oid(arg1, arg2, &oid, NULL, req); 10536105f815SLuigi Rizzo if (error) 1054ccecef29SMatthew D Fleming goto out; 10556105f815SLuigi Rizzo 1056ccecef29SMatthew D Fleming if (oid->oid_descr == NULL) { 1057ccecef29SMatthew D Fleming error = ENOENT; 1058ccecef29SMatthew D Fleming goto out; 1059ccecef29SMatthew D Fleming } 10605937226dSPoul-Henning Kamp error = SYSCTL_OUT(req, oid->oid_descr, strlen(oid->oid_descr) + 1); 1061ccecef29SMatthew D Fleming out: 1062ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 10636105f815SLuigi Rizzo return (error); 10646105f815SLuigi Rizzo } 10656105f815SLuigi Rizzo 1066ff66f6a4SRobert Watson static SYSCTL_NODE(_sysctl, 5, oiddescr, CTLFLAG_RD|CTLFLAG_CAPRD, 1067ff66f6a4SRobert Watson sysctl_sysctl_oiddescr, ""); 10686105f815SLuigi Rizzo 1069946bb7a2SPoul-Henning Kamp /* 1070946bb7a2SPoul-Henning Kamp * Default "handler" functions. 1071946bb7a2SPoul-Henning Kamp */ 10722e210993SPoul-Henning Kamp 1073ae0eb976SPoul-Henning Kamp /* 1074486bddb0SDoug Rabson * Handle an int, signed or unsigned. 1075ae0eb976SPoul-Henning Kamp * Two cases: 1076ae0eb976SPoul-Henning Kamp * a variable: point arg1 at it. 1077ae0eb976SPoul-Henning Kamp * a constant: pass it in arg2. 1078ae0eb976SPoul-Henning Kamp */ 1079ae0eb976SPoul-Henning Kamp 10803a34a5c3SPoul-Henning Kamp int 108182d9ae4eSPoul-Henning Kamp sysctl_handle_int(SYSCTL_HANDLER_ARGS) 1082b396cd83SPoul-Henning Kamp { 10839e74cba3SDon Lewis int tmpout, error = 0; 1084b396cd83SPoul-Henning Kamp 10859e74cba3SDon Lewis /* 10869e74cba3SDon Lewis * Attempt to get a coherent snapshot by making a copy of the data. 10879e74cba3SDon Lewis */ 1088ae0eb976SPoul-Henning Kamp if (arg1) 10899e74cba3SDon Lewis tmpout = *(int *)arg1; 10901fbf1f71SBruce Evans else 10919e74cba3SDon Lewis tmpout = arg2; 10929e74cba3SDon Lewis error = SYSCTL_OUT(req, &tmpout, sizeof(int)); 1093b396cd83SPoul-Henning Kamp 1094ae0eb976SPoul-Henning Kamp if (error || !req->newptr) 1095ae0eb976SPoul-Henning Kamp return (error); 1096b396cd83SPoul-Henning Kamp 1097ae0eb976SPoul-Henning Kamp if (!arg1) 1098ae0eb976SPoul-Henning Kamp error = EPERM; 1099ae0eb976SPoul-Henning Kamp else 1100ae0eb976SPoul-Henning Kamp error = SYSCTL_IN(req, arg1, sizeof(int)); 1101ae0eb976SPoul-Henning Kamp return (error); 1102b396cd83SPoul-Henning Kamp } 1103b396cd83SPoul-Henning Kamp 1104a4684d74SAndre Oppermann /* 1105a4684d74SAndre Oppermann * Based on on sysctl_handle_int() convert milliseconds into ticks. 1106eddfbb76SRobert Watson * Note: this is used by TCP. 1107a4684d74SAndre Oppermann */ 1108a4684d74SAndre Oppermann 1109a4684d74SAndre Oppermann int 1110a4684d74SAndre Oppermann sysctl_msec_to_ticks(SYSCTL_HANDLER_ARGS) 1111a4684d74SAndre Oppermann { 1112a4684d74SAndre Oppermann int error, s, tt; 1113a4684d74SAndre Oppermann 1114f6dfe47aSMarko Zec tt = *(int *)arg1; 1115a4684d74SAndre Oppermann s = (int)((int64_t)tt * 1000 / hz); 1116a4684d74SAndre Oppermann 1117a4684d74SAndre Oppermann error = sysctl_handle_int(oidp, &s, 0, req); 1118a4684d74SAndre Oppermann if (error || !req->newptr) 1119a4684d74SAndre Oppermann return (error); 1120a4684d74SAndre Oppermann 1121a4684d74SAndre Oppermann tt = (int)((int64_t)s * hz / 1000); 1122a4684d74SAndre Oppermann if (tt < 1) 1123a4684d74SAndre Oppermann return (EINVAL); 1124a4684d74SAndre Oppermann 1125f6dfe47aSMarko Zec *(int *)arg1 = tt; 1126a4684d74SAndre Oppermann return (0); 1127a4684d74SAndre Oppermann } 1128a4684d74SAndre Oppermann 1129a4684d74SAndre Oppermann 1130ae0eb976SPoul-Henning Kamp /* 113118716f9fSMarius Strobl * Handle a long, signed or unsigned. 113218716f9fSMarius Strobl * Two cases: 113318716f9fSMarius Strobl * a variable: point arg1 at it. 113418716f9fSMarius Strobl * a constant: pass it in arg2. 1135069e9bc1SDoug Rabson */ 1136069e9bc1SDoug Rabson 1137069e9bc1SDoug Rabson int 113882d9ae4eSPoul-Henning Kamp sysctl_handle_long(SYSCTL_HANDLER_ARGS) 1139069e9bc1SDoug Rabson { 1140069e9bc1SDoug Rabson int error = 0; 1141a7bc3102SPeter Wemm long tmplong; 1142a7bc3102SPeter Wemm #ifdef SCTL_MASK32 1143a7bc3102SPeter Wemm int tmpint; 1144a7bc3102SPeter Wemm #endif 1145069e9bc1SDoug Rabson 11469e74cba3SDon Lewis /* 11479e74cba3SDon Lewis * Attempt to get a coherent snapshot by making a copy of the data. 11489e74cba3SDon Lewis */ 1149bdc5f017SMarius Strobl if (arg1) 1150a7bc3102SPeter Wemm tmplong = *(long *)arg1; 1151bdc5f017SMarius Strobl else 1152bdc5f017SMarius Strobl tmplong = arg2; 1153a7bc3102SPeter Wemm #ifdef SCTL_MASK32 1154a7bc3102SPeter Wemm if (req->flags & SCTL_MASK32) { 1155a7bc3102SPeter Wemm tmpint = tmplong; 1156a7bc3102SPeter Wemm error = SYSCTL_OUT(req, &tmpint, sizeof(int)); 1157a7bc3102SPeter Wemm } else 1158a7bc3102SPeter Wemm #endif 1159a7bc3102SPeter Wemm error = SYSCTL_OUT(req, &tmplong, sizeof(long)); 1160069e9bc1SDoug Rabson 1161069e9bc1SDoug Rabson if (error || !req->newptr) 1162069e9bc1SDoug Rabson return (error); 1163069e9bc1SDoug Rabson 1164bdc5f017SMarius Strobl if (!arg1) 1165bdc5f017SMarius Strobl error = EPERM; 1166a7bc3102SPeter Wemm #ifdef SCTL_MASK32 1167bdc5f017SMarius Strobl else if (req->flags & SCTL_MASK32) { 1168a7bc3102SPeter Wemm error = SYSCTL_IN(req, &tmpint, sizeof(int)); 1169a7bc3102SPeter Wemm *(long *)arg1 = (long)tmpint; 1170bdc5f017SMarius Strobl } 1171a7bc3102SPeter Wemm #endif 1172bdc5f017SMarius Strobl else 1173069e9bc1SDoug Rabson error = SYSCTL_IN(req, arg1, sizeof(long)); 1174069e9bc1SDoug Rabson return (error); 1175069e9bc1SDoug Rabson } 1176069e9bc1SDoug Rabson 1177069e9bc1SDoug Rabson /* 117818716f9fSMarius Strobl * Handle a 64 bit int, signed or unsigned. 117918716f9fSMarius Strobl * Two cases: 118018716f9fSMarius Strobl * a variable: point arg1 at it. 118118716f9fSMarius Strobl * a constant: pass it in arg2. 1182df82ff50SDavid Malone */ 1183df82ff50SDavid Malone int 1184cbc134adSMatthew D Fleming sysctl_handle_64(SYSCTL_HANDLER_ARGS) 1185df82ff50SDavid Malone { 1186df82ff50SDavid Malone int error = 0; 1187df82ff50SDavid Malone uint64_t tmpout; 1188df82ff50SDavid Malone 1189df82ff50SDavid Malone /* 1190df82ff50SDavid Malone * Attempt to get a coherent snapshot by making a copy of the data. 1191df82ff50SDavid Malone */ 1192bdc5f017SMarius Strobl if (arg1) 1193df82ff50SDavid Malone tmpout = *(uint64_t *)arg1; 1194bdc5f017SMarius Strobl else 1195bdc5f017SMarius Strobl tmpout = arg2; 1196df82ff50SDavid Malone error = SYSCTL_OUT(req, &tmpout, sizeof(uint64_t)); 1197df82ff50SDavid Malone 1198df82ff50SDavid Malone if (error || !req->newptr) 1199df82ff50SDavid Malone return (error); 1200df82ff50SDavid Malone 1201bdc5f017SMarius Strobl if (!arg1) 1202bdc5f017SMarius Strobl error = EPERM; 1203bdc5f017SMarius Strobl else 1204df82ff50SDavid Malone error = SYSCTL_IN(req, arg1, sizeof(uint64_t)); 1205df82ff50SDavid Malone return (error); 1206df82ff50SDavid Malone } 1207df82ff50SDavid Malone 1208df82ff50SDavid Malone /* 1209ae0eb976SPoul-Henning Kamp * Handle our generic '\0' terminated 'C' string. 1210ae0eb976SPoul-Henning Kamp * Two cases: 1211ae0eb976SPoul-Henning Kamp * a variable string: point arg1 at it, arg2 is max length. 1212ae0eb976SPoul-Henning Kamp * a constant string: point arg1 at it, arg2 is zero. 1213ae0eb976SPoul-Henning Kamp */ 1214ae0eb976SPoul-Henning Kamp 12153a34a5c3SPoul-Henning Kamp int 121682d9ae4eSPoul-Henning Kamp sysctl_handle_string(SYSCTL_HANDLER_ARGS) 1217b396cd83SPoul-Henning Kamp { 121837a107a4SGlen Barber size_t outlen; 1219af3b2549SHans Petter Selasky int error = 0; 1220e80fb434SRobert Drehmel 12216a3287f8SHans Petter Selasky /* 12226a3287f8SHans Petter Selasky * A zero-length buffer indicates a fixed size read-only 12236a3287f8SHans Petter Selasky * string: 12246a3287f8SHans Petter Selasky */ 1225af3b2549SHans Petter Selasky if (arg2 == 0) 12266a3287f8SHans Petter Selasky arg2 = strlen((char *)arg1) + 1; 12273da1cf1eSHans Petter Selasky 1228af3b2549SHans Petter Selasky if (req->oldptr != NULL) { 1229af3b2549SHans Petter Selasky char *tmparg; 123037a107a4SGlen Barber 1231af3b2549SHans Petter Selasky /* try to make a coherent snapshot of the string */ 1232af3b2549SHans Petter Selasky tmparg = malloc(arg2, M_SYSCTLTMP, M_WAITOK); 1233af3b2549SHans Petter Selasky memcpy(tmparg, arg1, arg2); 1234af3b2549SHans Petter Selasky 1235af3b2549SHans Petter Selasky outlen = strnlen(tmparg, arg2 - 1) + 1; 123637a107a4SGlen Barber error = SYSCTL_OUT(req, tmparg, outlen); 123737a107a4SGlen Barber 1238af3b2549SHans Petter Selasky free(tmparg, M_SYSCTLTMP); 1239af3b2549SHans Petter Selasky } else { 1240af3b2549SHans Petter Selasky outlen = strnlen((char *)arg1, arg2 - 1) + 1; 1241af3b2549SHans Petter Selasky error = SYSCTL_OUT(req, NULL, outlen); 1242af3b2549SHans Petter Selasky } 12436a5d592aSPoul-Henning Kamp if (error || !req->newptr) 1244ae0eb976SPoul-Henning Kamp return (error); 1245ae0eb976SPoul-Henning Kamp 12466a5d592aSPoul-Henning Kamp if ((req->newlen - req->newidx) >= arg2) { 12476a5d592aSPoul-Henning Kamp error = EINVAL; 1248ae0eb976SPoul-Henning Kamp } else { 1249ae0eb976SPoul-Henning Kamp arg2 = (req->newlen - req->newidx); 1250ae0eb976SPoul-Henning Kamp error = SYSCTL_IN(req, arg1, arg2); 1251ae0eb976SPoul-Henning Kamp ((char *)arg1)[arg2] = '\0'; 1252b396cd83SPoul-Henning Kamp } 12532e210993SPoul-Henning Kamp return (error); 1254b396cd83SPoul-Henning Kamp } 1255b396cd83SPoul-Henning Kamp 1256ae0eb976SPoul-Henning Kamp /* 1257ae0eb976SPoul-Henning Kamp * Handle any kind of opaque data. 1258ae0eb976SPoul-Henning Kamp * arg1 points to it, arg2 is the size. 1259ae0eb976SPoul-Henning Kamp */ 1260ae0eb976SPoul-Henning Kamp 12613a34a5c3SPoul-Henning Kamp int 126282d9ae4eSPoul-Henning Kamp sysctl_handle_opaque(SYSCTL_HANDLER_ARGS) 1263b396cd83SPoul-Henning Kamp { 1264dcf59a59SBruce M Simpson int error, tries; 1265dcf59a59SBruce M Simpson u_int generation; 1266f0597024SBruce M Simpson struct sysctl_req req2; 1267b396cd83SPoul-Henning Kamp 12689e74cba3SDon Lewis /* 1269dcf59a59SBruce M Simpson * Attempt to get a coherent snapshot, by using the thread 1270dcf59a59SBruce M Simpson * pre-emption counter updated from within mi_switch() to 1271dcf59a59SBruce M Simpson * determine if we were pre-empted during a bcopy() or 1272dcf59a59SBruce M Simpson * copyout(). Make 3 attempts at doing this before giving up. 1273dcf59a59SBruce M Simpson * If we encounter an error, stop immediately. 12749e74cba3SDon Lewis */ 1275dcf59a59SBruce M Simpson tries = 0; 1276f0597024SBruce M Simpson req2 = *req; 1277f0597024SBruce M Simpson retry: 1278dcf59a59SBruce M Simpson generation = curthread->td_generation; 1279ae0eb976SPoul-Henning Kamp error = SYSCTL_OUT(req, arg1, arg2); 1280dcf59a59SBruce M Simpson if (error) 1281ae0eb976SPoul-Henning Kamp return (error); 1282dcf59a59SBruce M Simpson tries++; 1283f0597024SBruce M Simpson if (generation != curthread->td_generation && tries < 3) { 1284f0597024SBruce M Simpson *req = req2; 1285f0597024SBruce M Simpson goto retry; 1286f0597024SBruce M Simpson } 1287ae0eb976SPoul-Henning Kamp 1288ae0eb976SPoul-Henning Kamp error = SYSCTL_IN(req, arg1, arg2); 1289ae0eb976SPoul-Henning Kamp 1290ae0eb976SPoul-Henning Kamp return (error); 1291b396cd83SPoul-Henning Kamp } 1292ae0eb976SPoul-Henning Kamp 1293deae269aSPoul-Henning Kamp /* 1294deae269aSPoul-Henning Kamp * Transfer functions to/from kernel space. 1295deae269aSPoul-Henning Kamp * XXX: rather untested at this point 1296deae269aSPoul-Henning Kamp */ 1297deae269aSPoul-Henning Kamp static int 1298069e9bc1SDoug Rabson sysctl_old_kernel(struct sysctl_req *req, const void *p, size_t l) 1299ae0eb976SPoul-Henning Kamp { 1300069e9bc1SDoug Rabson size_t i = 0; 1301deae269aSPoul-Henning Kamp 1302deae269aSPoul-Henning Kamp if (req->oldptr) { 1303069e9bc1SDoug Rabson i = l; 13043a515572SThomas Moestl if (req->oldlen <= req->oldidx) 13053a515572SThomas Moestl i = 0; 13063a515572SThomas Moestl else 1307069e9bc1SDoug Rabson if (i > req->oldlen - req->oldidx) 1308069e9bc1SDoug Rabson i = req->oldlen - req->oldidx; 1309deae269aSPoul-Henning Kamp if (i > 0) 131009a8dfa2SBruce Evans bcopy(p, (char *)req->oldptr + req->oldidx, i); 1311ae0eb976SPoul-Henning Kamp } 13126b72d8dbSKonstantin Belousov req->oldidx += l; 13131c346c70SNate Williams if (req->oldptr && i != l) 1314ae0eb976SPoul-Henning Kamp return (ENOMEM); 13152e210993SPoul-Henning Kamp return (0); 1316ae0eb976SPoul-Henning Kamp } 1317ae0eb976SPoul-Henning Kamp 1318deae269aSPoul-Henning Kamp static int 1319069e9bc1SDoug Rabson sysctl_new_kernel(struct sysctl_req *req, void *p, size_t l) 1320ae0eb976SPoul-Henning Kamp { 1321deae269aSPoul-Henning Kamp if (!req->newptr) 132246003fb3SPawel Jakub Dawidek return (0); 1323deae269aSPoul-Henning Kamp if (req->newlen - req->newidx < l) 1324ae0eb976SPoul-Henning Kamp return (EINVAL); 132509a8dfa2SBruce Evans bcopy((char *)req->newptr + req->newidx, p, l); 1326ae0eb976SPoul-Henning Kamp req->newidx += l; 1327ae0eb976SPoul-Henning Kamp return (0); 1328ae0eb976SPoul-Henning Kamp } 1329ae0eb976SPoul-Henning Kamp 13301c346c70SNate Williams int 1331b40ce416SJulian Elischer kernel_sysctl(struct thread *td, int *name, u_int namelen, void *old, 1332a7bc3102SPeter Wemm size_t *oldlenp, void *new, size_t newlen, size_t *retval, int flags) 13331c346c70SNate Williams { 13341c346c70SNate Williams int error = 0; 13351c346c70SNate Williams struct sysctl_req req; 13361c346c70SNate Williams 13371c346c70SNate Williams bzero(&req, sizeof req); 13381c346c70SNate Williams 1339ce178806SRobert Watson req.td = td; 1340a7bc3102SPeter Wemm req.flags = flags; 13411c346c70SNate Williams 13421c346c70SNate Williams if (oldlenp) { 13431c346c70SNate Williams req.oldlen = *oldlenp; 13441c346c70SNate Williams } 1345a961520cSDon Lewis req.validlen = req.oldlen; 13461c346c70SNate Williams 13471c346c70SNate Williams if (old) { 13481c346c70SNate Williams req.oldptr= old; 13491c346c70SNate Williams } 13501c346c70SNate Williams 1351b8edb44cSDima Dorfman if (new != NULL) { 13521c346c70SNate Williams req.newlen = newlen; 13531c346c70SNate Williams req.newptr = new; 13541c346c70SNate Williams } 13551c346c70SNate Williams 13561c346c70SNate Williams req.oldfunc = sysctl_old_kernel; 13571c346c70SNate Williams req.newfunc = sysctl_new_kernel; 135873d6f851SMatthew D Fleming req.lock = REQ_UNWIRED; 13591c346c70SNate Williams 1360ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 13611c346c70SNate Williams error = sysctl_root(0, name, namelen, &req); 1362ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 1363f0597024SBruce M Simpson 1364a961520cSDon Lewis if (req.lock == REQ_WIRED && req.validlen > 0) 1365a961520cSDon Lewis vsunlock(req.oldptr, req.validlen); 13661c346c70SNate Williams 13671c346c70SNate Williams if (error && error != ENOMEM) 13681c346c70SNate Williams return (error); 13691c346c70SNate Williams 13701c346c70SNate Williams if (retval) { 1371a961520cSDon Lewis if (req.oldptr && req.oldidx > req.validlen) 1372a961520cSDon Lewis *retval = req.validlen; 13731c346c70SNate Williams else 13741c346c70SNate Williams *retval = req.oldidx; 13751c346c70SNate Williams } 13761c346c70SNate Williams return (error); 13771c346c70SNate Williams } 13781c346c70SNate Williams 13791890520aSJonathan Lemon int 1380b40ce416SJulian Elischer kernel_sysctlbyname(struct thread *td, char *name, void *old, size_t *oldlenp, 1381a7bc3102SPeter Wemm void *new, size_t newlen, size_t *retval, int flags) 13821890520aSJonathan Lemon { 13831890520aSJonathan Lemon int oid[CTL_MAXNAME]; 13842f7f966cSMatt Jacob size_t oidlen, plen; 13852f7f966cSMatt Jacob int error; 13861890520aSJonathan Lemon 13871890520aSJonathan Lemon oid[0] = 0; /* sysctl internal magic */ 13881890520aSJonathan Lemon oid[1] = 3; /* name2oid */ 13891890520aSJonathan Lemon oidlen = sizeof(oid); 13901890520aSJonathan Lemon 1391b40ce416SJulian Elischer error = kernel_sysctl(td, oid, 2, oid, &oidlen, 1392a7bc3102SPeter Wemm (void *)name, strlen(name), &plen, flags); 13931890520aSJonathan Lemon if (error) 13941890520aSJonathan Lemon return (error); 13951890520aSJonathan Lemon 1396b40ce416SJulian Elischer error = kernel_sysctl(td, oid, plen / sizeof(int), old, oldlenp, 1397a7bc3102SPeter Wemm new, newlen, retval, flags); 13981890520aSJonathan Lemon return (error); 13991890520aSJonathan Lemon } 14001890520aSJonathan Lemon 1401deae269aSPoul-Henning Kamp /* 1402deae269aSPoul-Henning Kamp * Transfer function to/from user space. 1403deae269aSPoul-Henning Kamp */ 1404deae269aSPoul-Henning Kamp static int 1405069e9bc1SDoug Rabson sysctl_old_user(struct sysctl_req *req, const void *p, size_t l) 1406ae0eb976SPoul-Henning Kamp { 140747934cefSDon Lewis size_t i, len, origidx; 14085730afc9SAlan Cox int error; 1409ae0eb976SPoul-Henning Kamp 141047934cefSDon Lewis origidx = req->oldidx; 141147934cefSDon Lewis req->oldidx += l; 14126b72d8dbSKonstantin Belousov if (req->oldptr == NULL) 141347934cefSDon Lewis return (0); 1414417ab24fSChristian S.J. Peron /* 1415417ab24fSChristian S.J. Peron * If we have not wired the user supplied buffer and we are currently 1416417ab24fSChristian S.J. Peron * holding locks, drop a witness warning, as it's possible that 1417417ab24fSChristian S.J. Peron * write operations to the user page can sleep. 1418417ab24fSChristian S.J. Peron */ 1419417ab24fSChristian S.J. Peron if (req->lock != REQ_WIRED) 142026306795SJohn Baldwin WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL, 142126306795SJohn Baldwin "sysctl_old_user()"); 1422069e9bc1SDoug Rabson i = l; 1423a961520cSDon Lewis len = req->validlen; 142447934cefSDon Lewis if (len <= origidx) 14253a515572SThomas Moestl i = 0; 142647934cefSDon Lewis else { 142747934cefSDon Lewis if (i > len - origidx) 142847934cefSDon Lewis i = len - origidx; 14295730afc9SAlan Cox if (req->lock == REQ_WIRED) { 14305730afc9SAlan Cox error = copyout_nofault(p, (char *)req->oldptr + 14315730afc9SAlan Cox origidx, i); 14325730afc9SAlan Cox } else 143347934cefSDon Lewis error = copyout(p, (char *)req->oldptr + origidx, i); 14345730afc9SAlan Cox if (error != 0) 1435ae0eb976SPoul-Henning Kamp return (error); 14365730afc9SAlan Cox } 143747934cefSDon Lewis if (i < l) 1438ae0eb976SPoul-Henning Kamp return (ENOMEM); 1439deae269aSPoul-Henning Kamp return (0); 1440ae0eb976SPoul-Henning Kamp } 1441ae0eb976SPoul-Henning Kamp 1442deae269aSPoul-Henning Kamp static int 1443069e9bc1SDoug Rabson sysctl_new_user(struct sysctl_req *req, void *p, size_t l) 1444ae0eb976SPoul-Henning Kamp { 144516cd04a3SPoul-Henning Kamp int error; 1446deae269aSPoul-Henning Kamp 1447deae269aSPoul-Henning Kamp if (!req->newptr) 144846003fb3SPawel Jakub Dawidek return (0); 1449deae269aSPoul-Henning Kamp if (req->newlen - req->newidx < l) 1450ae0eb976SPoul-Henning Kamp return (EINVAL); 1451d8339a26SChristian S.J. Peron WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL, 1452d8339a26SChristian S.J. Peron "sysctl_new_user()"); 145309a8dfa2SBruce Evans error = copyin((char *)req->newptr + req->newidx, p, l); 1454ae0eb976SPoul-Henning Kamp req->newidx += l; 1455ae0eb976SPoul-Henning Kamp return (error); 1456b396cd83SPoul-Henning Kamp } 1457b396cd83SPoul-Henning Kamp 14580600730dSDon Lewis /* 14590600730dSDon Lewis * Wire the user space destination buffer. If set to a value greater than 14600600730dSDon Lewis * zero, the len parameter limits the maximum amount of wired memory. 14610600730dSDon Lewis */ 146247934cefSDon Lewis int 14630600730dSDon Lewis sysctl_wire_old_buffer(struct sysctl_req *req, size_t len) 14640600730dSDon Lewis { 146547934cefSDon Lewis int ret; 1466433e2f47SDag-Erling Smørgrav size_t wiredlen; 146747934cefSDon Lewis 146847934cefSDon Lewis wiredlen = (len > 0 && len < req->oldlen) ? len : req->oldlen; 146947934cefSDon Lewis ret = 0; 147073d6f851SMatthew D Fleming if (req->lock != REQ_WIRED && req->oldptr && 14715be99846SBruce M Simpson req->oldfunc == sysctl_old_user) { 14728ac3e8e9SDon Lewis if (wiredlen != 0) { 1473ce8660e3SDon Lewis ret = vslock(req->oldptr, wiredlen); 1474b4adfcf2SBrian Feldman if (ret != 0) { 1475b4adfcf2SBrian Feldman if (ret != ENOMEM) 14768ac3e8e9SDon Lewis return (ret); 1477b4adfcf2SBrian Feldman wiredlen = 0; 1478b4adfcf2SBrian Feldman } 14798ac3e8e9SDon Lewis } 14805be99846SBruce M Simpson req->lock = REQ_WIRED; 1481a961520cSDon Lewis req->validlen = wiredlen; 14820600730dSDon Lewis } 14838ac3e8e9SDon Lewis return (0); 148447934cefSDon Lewis } 14850600730dSDon Lewis 14862e210993SPoul-Henning Kamp int 1487226420a4SBrian Feldman sysctl_find_oid(int *name, u_int namelen, struct sysctl_oid **noid, 1488226420a4SBrian Feldman int *nindx, struct sysctl_req *req) 14892e210993SPoul-Henning Kamp { 1490d0bb6f25SMatthew D Fleming struct sysctl_oid_list *lsp; 1491ce02431fSDoug Rabson struct sysctl_oid *oid; 1492226420a4SBrian Feldman int indx; 14932e210993SPoul-Henning Kamp 1494ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 1495d0bb6f25SMatthew D Fleming lsp = &sysctl__children; 14962e210993SPoul-Henning Kamp indx = 0; 1497d0bb6f25SMatthew D Fleming while (indx < CTL_MAXNAME) { 1498d0bb6f25SMatthew D Fleming SLIST_FOREACH(oid, lsp, oid_link) { 1499d0bb6f25SMatthew D Fleming if (oid->oid_number == name[indx]) 1500d0bb6f25SMatthew D Fleming break; 1501d0bb6f25SMatthew D Fleming } 1502d0bb6f25SMatthew D Fleming if (oid == NULL) 1503d0bb6f25SMatthew D Fleming return (ENOENT); 1504d0bb6f25SMatthew D Fleming 15052e210993SPoul-Henning Kamp indx++; 1506ce02431fSDoug Rabson if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 1507d0bb6f25SMatthew D Fleming if (oid->oid_handler != NULL || indx == namelen) { 1508226420a4SBrian Feldman *noid = oid; 1509226420a4SBrian Feldman if (nindx != NULL) 1510226420a4SBrian Feldman *nindx = indx; 1511ccecef29SMatthew D Fleming KASSERT((oid->oid_kind & CTLFLAG_DYING) == 0, 1512ccecef29SMatthew D Fleming ("%s found DYING node %p", __func__, oid)); 1513226420a4SBrian Feldman return (0); 1514226420a4SBrian Feldman } 1515d0bb6f25SMatthew D Fleming lsp = SYSCTL_CHILDREN(oid); 1516226420a4SBrian Feldman } else if (indx == namelen) { 1517226420a4SBrian Feldman *noid = oid; 1518226420a4SBrian Feldman if (nindx != NULL) 1519226420a4SBrian Feldman *nindx = indx; 1520ccecef29SMatthew D Fleming KASSERT((oid->oid_kind & CTLFLAG_DYING) == 0, 1521ccecef29SMatthew D Fleming ("%s found DYING node %p", __func__, oid)); 1522226420a4SBrian Feldman return (0); 15232e210993SPoul-Henning Kamp } else { 1524226420a4SBrian Feldman return (ENOTDIR); 15252e210993SPoul-Henning Kamp } 15262e210993SPoul-Henning Kamp } 1527226420a4SBrian Feldman return (ENOENT); 1528226420a4SBrian Feldman } 1529226420a4SBrian Feldman 1530226420a4SBrian Feldman /* 1531226420a4SBrian Feldman * Traverse our tree, and find the right node, execute whatever it points 1532226420a4SBrian Feldman * to, and return the resulting error code. 1533226420a4SBrian Feldman */ 1534226420a4SBrian Feldman 153537c84183SPoul-Henning Kamp static int 153682d9ae4eSPoul-Henning Kamp sysctl_root(SYSCTL_HANDLER_ARGS) 1537226420a4SBrian Feldman { 1538226420a4SBrian Feldman struct sysctl_oid *oid; 1539fe41ca53SMatthew Dillon int error, indx, lvl; 1540226420a4SBrian Feldman 1541ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 1542ddf9d243SEd Schouten 1543226420a4SBrian Feldman error = sysctl_find_oid(arg1, arg2, &oid, &indx, req); 1544226420a4SBrian Feldman if (error) 1545226420a4SBrian Feldman return (error); 1546226420a4SBrian Feldman 1547226420a4SBrian Feldman if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 1548226420a4SBrian Feldman /* 1549226420a4SBrian Feldman * You can't call a sysctl when it's a node, but has 1550226420a4SBrian Feldman * no handler. Inform the user that it's a node. 1551226420a4SBrian Feldman * The indx may or may not be the same as namelen. 1552226420a4SBrian Feldman */ 1553226420a4SBrian Feldman if (oid->oid_handler == NULL) 1554226420a4SBrian Feldman return (EISDIR); 1555226420a4SBrian Feldman } 1556226420a4SBrian Feldman 1557c2f413afSRobert Watson /* Is this sysctl writable? */ 1558c2f413afSRobert Watson if (req->newptr && !(oid->oid_kind & CTLFLAG_WR)) 15592e210993SPoul-Henning Kamp return (EPERM); 15602e210993SPoul-Henning Kamp 15617906271fSRobert Watson KASSERT(req->td != NULL, ("sysctl_root(): req->td == NULL")); 15627906271fSRobert Watson 1563ff66f6a4SRobert Watson #ifdef CAPABILITY_MODE 1564ff66f6a4SRobert Watson /* 1565ff66f6a4SRobert Watson * If the process is in capability mode, then don't permit reading or 1566ff66f6a4SRobert Watson * writing unless specifically granted for the node. 1567ff66f6a4SRobert Watson */ 1568ff66f6a4SRobert Watson if (IN_CAPABILITY_MODE(req->td)) { 1569ff66f6a4SRobert Watson if (req->oldptr && !(oid->oid_kind & CTLFLAG_CAPRD)) 1570ff66f6a4SRobert Watson return (EPERM); 1571ff66f6a4SRobert Watson if (req->newptr && !(oid->oid_kind & CTLFLAG_CAPWR)) 1572ff66f6a4SRobert Watson return (EPERM); 1573ff66f6a4SRobert Watson } 1574ff66f6a4SRobert Watson #endif 1575ff66f6a4SRobert Watson 1576c2f413afSRobert Watson /* Is this sysctl sensitive to securelevels? */ 1577c2f413afSRobert Watson if (req->newptr && (oid->oid_kind & CTLFLAG_SECURE)) { 1578fe41ca53SMatthew Dillon lvl = (oid->oid_kind & CTLMASK_SECURE) >> CTLSHIFT_SECURE; 1579fe41ca53SMatthew Dillon error = securelevel_gt(req->td->td_ucred, lvl); 1580c2f413afSRobert Watson if (error) 1581c2f413afSRobert Watson return (error); 1582c2f413afSRobert Watson } 1583c2f413afSRobert Watson 1584c2f413afSRobert Watson /* Is this sysctl writable by only privileged users? */ 1585c2f413afSRobert Watson if (req->newptr && !(oid->oid_kind & CTLFLAG_ANYBODY)) { 1586eb79e1c7SBjoern A. Zeeb int priv; 1587eb79e1c7SBjoern A. Zeeb 1588c2f413afSRobert Watson if (oid->oid_kind & CTLFLAG_PRISON) 1589eb79e1c7SBjoern A. Zeeb priv = PRIV_SYSCTL_WRITEJAIL; 1590eb79e1c7SBjoern A. Zeeb #ifdef VIMAGE 1591eb79e1c7SBjoern A. Zeeb else if ((oid->oid_kind & CTLFLAG_VNET) && 1592eb79e1c7SBjoern A. Zeeb prison_owns_vnet(req->td->td_ucred)) 1593eb79e1c7SBjoern A. Zeeb priv = PRIV_SYSCTL_WRITEJAIL; 1594eb79e1c7SBjoern A. Zeeb #endif 1595c2f413afSRobert Watson else 1596eb79e1c7SBjoern A. Zeeb priv = PRIV_SYSCTL_WRITE; 1597eb79e1c7SBjoern A. Zeeb error = priv_check(req->td, priv); 1598c2f413afSRobert Watson if (error) 1599c2f413afSRobert Watson return (error); 1600c2f413afSRobert Watson } 16013ac9f819SPoul-Henning Kamp 1602ce02431fSDoug Rabson if (!oid->oid_handler) 160346003fb3SPawel Jakub Dawidek return (EINVAL); 16042e210993SPoul-Henning Kamp 160563dba32bSPawel Jakub Dawidek if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 160600fbcda8SAlexander Kabaev arg1 = (int *)arg1 + indx; 160763dba32bSPawel Jakub Dawidek arg2 -= indx; 160863dba32bSPawel Jakub Dawidek } else { 160963dba32bSPawel Jakub Dawidek arg1 = oid->oid_arg1; 161063dba32bSPawel Jakub Dawidek arg2 = oid->oid_arg2; 161163dba32bSPawel Jakub Dawidek } 161263dba32bSPawel Jakub Dawidek #ifdef MAC 161330d239bcSRobert Watson error = mac_system_check_sysctl(req->td->td_ucred, oid, arg1, arg2, 1614ae0eb976SPoul-Henning Kamp req); 161563dba32bSPawel Jakub Dawidek if (error != 0) 161663dba32bSPawel Jakub Dawidek return (error); 161763dba32bSPawel Jakub Dawidek #endif 1618b5c32cf4SGleb Smirnoff #ifdef VIMAGE 1619b5c32cf4SGleb Smirnoff if ((oid->oid_kind & CTLFLAG_VNET) && arg1 != NULL) 1620b5c32cf4SGleb Smirnoff arg1 = (void *)(curvnet->vnet_data_base + (uintptr_t)arg1); 1621b5c32cf4SGleb Smirnoff #endif 1622af3b2549SHans Petter Selasky error = sysctl_root_handler_locked(oid, arg1, arg2, req); 162363dba32bSPawel Jakub Dawidek 1624ccecef29SMatthew D Fleming KFAIL_POINT_ERROR(_debug_fail_point, sysctl_running, error); 1625ccecef29SMatthew D Fleming 1626226420a4SBrian Feldman return (error); 16272e210993SPoul-Henning Kamp } 16282e210993SPoul-Henning Kamp 1629d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_ 1630b8da2396SPoul-Henning Kamp struct sysctl_args { 1631b8da2396SPoul-Henning Kamp int *name; 1632b8da2396SPoul-Henning Kamp u_int namelen; 1633b8da2396SPoul-Henning Kamp void *old; 1634b8da2396SPoul-Henning Kamp size_t *oldlenp; 1635b8da2396SPoul-Henning Kamp void *new; 1636b8da2396SPoul-Henning Kamp size_t newlen; 1637b8da2396SPoul-Henning Kamp }; 1638d2d3e875SBruce Evans #endif 1639df8bae1dSRodney W. Grimes int 16408451d0ddSKip Macy sys___sysctl(struct thread *td, struct sysctl_args *uap) 1641df8bae1dSRodney W. Grimes { 1642875b66a0SJohn Baldwin int error, i, name[CTL_MAXNAME]; 1643069e9bc1SDoug Rabson size_t j; 1644b396cd83SPoul-Henning Kamp 1645df8bae1dSRodney W. Grimes if (uap->namelen > CTL_MAXNAME || uap->namelen < 2) 1646df8bae1dSRodney W. Grimes return (EINVAL); 1647b396cd83SPoul-Henning Kamp 1648797f2d22SPoul-Henning Kamp error = copyin(uap->name, &name, uap->namelen * sizeof(int)); 1649797f2d22SPoul-Henning Kamp if (error) 1650df8bae1dSRodney W. Grimes return (error); 1651df8bae1dSRodney W. Grimes 1652b40ce416SJulian Elischer error = userland_sysctl(td, name, uap->namelen, 1653b8da2396SPoul-Henning Kamp uap->old, uap->oldlenp, 0, 1654a7bc3102SPeter Wemm uap->new, uap->newlen, &j, 0); 1655deae269aSPoul-Henning Kamp if (error && error != ENOMEM) 1656ddf9d243SEd Schouten return (error); 16574cfe4790SEd Schouten if (uap->oldlenp) { 1658875b66a0SJohn Baldwin i = copyout(&j, uap->oldlenp, sizeof(j)); 16594cfe4790SEd Schouten if (i) 16604cfe4790SEd Schouten return (i); 16614cfe4790SEd Schouten } 1662deae269aSPoul-Henning Kamp return (error); 1663b8da2396SPoul-Henning Kamp } 1664b8da2396SPoul-Henning Kamp 1665b8da2396SPoul-Henning Kamp /* 1666b8da2396SPoul-Henning Kamp * This is used from various compatibility syscalls too. That's why name 1667b8da2396SPoul-Henning Kamp * must be in kernel space. 1668b8da2396SPoul-Henning Kamp */ 1669b8da2396SPoul-Henning Kamp int 1670b40ce416SJulian Elischer userland_sysctl(struct thread *td, int *name, u_int namelen, void *old, 1671a7bc3102SPeter Wemm size_t *oldlenp, int inkernel, void *new, size_t newlen, size_t *retval, 1672a7bc3102SPeter Wemm int flags) 1673b8da2396SPoul-Henning Kamp { 16743e829b18SJohn Baldwin int error = 0, memlocked; 1675a961520cSDon Lewis struct sysctl_req req; 1676ae0eb976SPoul-Henning Kamp 1677ae0eb976SPoul-Henning Kamp bzero(&req, sizeof req); 1678b8da2396SPoul-Henning Kamp 1679ce178806SRobert Watson req.td = td; 1680a7bc3102SPeter Wemm req.flags = flags; 168116cd04a3SPoul-Henning Kamp 1682b8da2396SPoul-Henning Kamp if (oldlenp) { 1683b8da2396SPoul-Henning Kamp if (inkernel) { 1684ae0eb976SPoul-Henning Kamp req.oldlen = *oldlenp; 1685b8da2396SPoul-Henning Kamp } else { 1686deae269aSPoul-Henning Kamp error = copyin(oldlenp, &req.oldlen, sizeof(*oldlenp)); 1687b8da2396SPoul-Henning Kamp if (error) 1688b8da2396SPoul-Henning Kamp return (error); 1689b8da2396SPoul-Henning Kamp } 1690b8da2396SPoul-Henning Kamp } 1691a961520cSDon Lewis req.validlen = req.oldlen; 1692b8da2396SPoul-Henning Kamp 1693ae0eb976SPoul-Henning Kamp if (old) { 169402c58685SPoul-Henning Kamp if (!useracc(old, req.oldlen, VM_PROT_WRITE)) 1695ae0eb976SPoul-Henning Kamp return (EFAULT); 1696ae0eb976SPoul-Henning Kamp req.oldptr= old; 1697ae0eb976SPoul-Henning Kamp } 16982e210993SPoul-Henning Kamp 1699b8edb44cSDima Dorfman if (new != NULL) { 170070ffc2fbSRobert Watson if (!useracc(new, newlen, VM_PROT_READ)) 1701ae0eb976SPoul-Henning Kamp return (EFAULT); 1702ae0eb976SPoul-Henning Kamp req.newlen = newlen; 1703ae0eb976SPoul-Henning Kamp req.newptr = new; 1704b396cd83SPoul-Henning Kamp } 1705b396cd83SPoul-Henning Kamp 1706ae0eb976SPoul-Henning Kamp req.oldfunc = sysctl_old_user; 1707ae0eb976SPoul-Henning Kamp req.newfunc = sysctl_new_user; 170873d6f851SMatthew D Fleming req.lock = REQ_UNWIRED; 17094b2af45fSPoul-Henning Kamp 1710a56be37eSJohn Baldwin #ifdef KTRACE 1711a56be37eSJohn Baldwin if (KTRPOINT(curthread, KTR_SYSCTL)) 1712a56be37eSJohn Baldwin ktrsysctl(name, namelen); 1713a56be37eSJohn Baldwin #endif 1714a56be37eSJohn Baldwin 17153e829b18SJohn Baldwin if (req.oldlen > PAGE_SIZE) { 17163e829b18SJohn Baldwin memlocked = 1; 17173e829b18SJohn Baldwin sx_xlock(&sysctlmemlock); 17183e829b18SJohn Baldwin } else 17193e829b18SJohn Baldwin memlocked = 0; 17209ed47d01SJamie Gritton CURVNET_SET(TD_TO_VNET(td)); 1721ae0eb976SPoul-Henning Kamp 1722af80b2c9SKonstantin Belousov for (;;) { 1723a961520cSDon Lewis req.oldidx = 0; 1724a961520cSDon Lewis req.newidx = 0; 1725ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 1726a961520cSDon Lewis error = sysctl_root(0, name, namelen, &req); 1727ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 1728af80b2c9SKonstantin Belousov if (error != EAGAIN) 1729af80b2c9SKonstantin Belousov break; 17303d08a76bSMatthew D Fleming kern_yield(PRI_USER); 1731af80b2c9SKonstantin Belousov } 1732b396cd83SPoul-Henning Kamp 173397021c24SMarko Zec CURVNET_RESTORE(); 17344b2af45fSPoul-Henning Kamp 1735ddf9d243SEd Schouten if (req.lock == REQ_WIRED && req.validlen > 0) 1736ddf9d243SEd Schouten vsunlock(req.oldptr, req.validlen); 17373e829b18SJohn Baldwin if (memlocked) 17383e829b18SJohn Baldwin sx_xunlock(&sysctlmemlock); 1739ddf9d243SEd Schouten 1740deae269aSPoul-Henning Kamp if (error && error != ENOMEM) 1741deae269aSPoul-Henning Kamp return (error); 1742deae269aSPoul-Henning Kamp 1743deae269aSPoul-Henning Kamp if (retval) { 1744a961520cSDon Lewis if (req.oldptr && req.oldidx > req.validlen) 1745a961520cSDon Lewis *retval = req.validlen; 1746deae269aSPoul-Henning Kamp else 1747deae269aSPoul-Henning Kamp *retval = req.oldidx; 1748b8da2396SPoul-Henning Kamp } 17492e210993SPoul-Henning Kamp return (error); 1750df8bae1dSRodney W. Grimes } 17514e657159SMatthew D Fleming 17524e657159SMatthew D Fleming /* 175300f0e671SMatthew D Fleming * Drain into a sysctl struct. The user buffer should be wired if a page 175400f0e671SMatthew D Fleming * fault would cause issue. 17554e657159SMatthew D Fleming */ 17564e657159SMatthew D Fleming static int 17574e657159SMatthew D Fleming sbuf_sysctl_drain(void *arg, const char *data, int len) 17584e657159SMatthew D Fleming { 17594e657159SMatthew D Fleming struct sysctl_req *req = arg; 17604e657159SMatthew D Fleming int error; 17614e657159SMatthew D Fleming 17624e657159SMatthew D Fleming error = SYSCTL_OUT(req, data, len); 17634e657159SMatthew D Fleming KASSERT(error >= 0, ("Got unexpected negative value %d", error)); 17644e657159SMatthew D Fleming return (error == 0 ? len : -error); 17654e657159SMatthew D Fleming } 17664e657159SMatthew D Fleming 17674e657159SMatthew D Fleming struct sbuf * 17684e657159SMatthew D Fleming sbuf_new_for_sysctl(struct sbuf *s, char *buf, int length, 17694e657159SMatthew D Fleming struct sysctl_req *req) 17704e657159SMatthew D Fleming { 17714e657159SMatthew D Fleming 17724e657159SMatthew D Fleming s = sbuf_new(s, buf, length, SBUF_FIXEDLEN); 17734e657159SMatthew D Fleming sbuf_set_drain(s, sbuf_sysctl_drain, req); 17744e657159SMatthew D Fleming return (s); 17754e657159SMatthew D Fleming } 1776