1df8bae1dSRodney W. Grimes /*- 2df8bae1dSRodney W. Grimes * Copyright (c) 1982, 1986, 1989, 1993 3df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 4df8bae1dSRodney W. Grimes * 5df8bae1dSRodney W. Grimes * This code is derived from software contributed to Berkeley by 6df8bae1dSRodney W. Grimes * Mike Karels at Berkeley Software Design, Inc. 7df8bae1dSRodney W. Grimes * 8946bb7a2SPoul-Henning Kamp * Quite extensively rewritten by Poul-Henning Kamp of the FreeBSD 9946bb7a2SPoul-Henning Kamp * project, to make these variables more userfriendly. 10946bb7a2SPoul-Henning Kamp * 11df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 12df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 13df8bae1dSRodney W. Grimes * are met: 14df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 15df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 16df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 17df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 18df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 19df8bae1dSRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 20df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 21df8bae1dSRodney W. Grimes * without specific prior written permission. 22df8bae1dSRodney W. Grimes * 23df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 24df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 27df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33df8bae1dSRodney W. Grimes * SUCH DAMAGE. 34df8bae1dSRodney W. Grimes * 35df8bae1dSRodney W. Grimes * @(#)kern_sysctl.c 8.4 (Berkeley) 4/14/94 36df8bae1dSRodney W. Grimes */ 37df8bae1dSRodney W. Grimes 38677b542eSDavid E. O'Brien #include <sys/cdefs.h> 39677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$"); 40677b542eSDavid E. O'Brien 41ff66f6a4SRobert Watson #include "opt_capsicum.h" 425591b823SEivind Eklund #include "opt_compat.h" 43a56be37eSJohn Baldwin #include "opt_ktrace.h" 445591b823SEivind Eklund 45df8bae1dSRodney W. Grimes #include <sys/param.h> 46ccecef29SMatthew D Fleming #include <sys/fail.h> 47e96c1fdcSPeter Wemm #include <sys/systm.h> 484a144410SRobert Watson #include <sys/capsicum.h> 49df8bae1dSRodney W. Grimes #include <sys/kernel.h> 50df8bae1dSRodney W. Grimes #include <sys/sysctl.h> 51946bb7a2SPoul-Henning Kamp #include <sys/malloc.h> 52acd3428bSRobert Watson #include <sys/priv.h> 53efeaf95aSDavid Greenman #include <sys/proc.h> 54ebd8672cSBjoern A. Zeeb #include <sys/jail.h> 55fb99ab88SMatthew Dillon #include <sys/lock.h> 56fb99ab88SMatthew Dillon #include <sys/mutex.h> 574e657159SMatthew D Fleming #include <sys/sbuf.h> 5829a2c0cdSAlfred Perlstein #include <sys/sx.h> 5945ec3b38SPoul-Henning Kamp #include <sys/sysproto.h> 60af80b2c9SKonstantin Belousov #include <sys/uio.h> 61a56be37eSJohn Baldwin #ifdef KTRACE 62a56be37eSJohn Baldwin #include <sys/ktrace.h> 63a56be37eSJohn Baldwin #endif 64aed55708SRobert Watson 65eddfbb76SRobert Watson #include <net/vnet.h> 66eddfbb76SRobert Watson 67aed55708SRobert Watson #include <security/mac/mac_framework.h> 68aed55708SRobert Watson 694cb03b1bSBruce Evans #include <vm/vm.h> 70efeaf95aSDavid Greenman #include <vm/vm_extern.h> 714cb03b1bSBruce Evans 72a1c995b6SPoul-Henning Kamp static MALLOC_DEFINE(M_SYSCTL, "sysctl", "sysctl internal magic"); 73bd3cdc31SAndrzej Bialecki static MALLOC_DEFINE(M_SYSCTLOID, "sysctloid", "sysctl dynamic oids"); 749e74cba3SDon Lewis static MALLOC_DEFINE(M_SYSCTLTMP, "sysctltmp", "sysctl temp output buffer"); 7555166637SPoul-Henning Kamp 764b2af45fSPoul-Henning Kamp /* 77875b66a0SJohn Baldwin * The sysctllock protects the MIB tree. It also protects sysctl 78875b66a0SJohn Baldwin * contexts used with dynamic sysctls. The sysctl_register_oid() and 79875b66a0SJohn Baldwin * sysctl_unregister_oid() routines require the sysctllock to already 80875b66a0SJohn Baldwin * be held, so the sysctl_lock() and sysctl_unlock() routines are 81875b66a0SJohn Baldwin * provided for the few places in the kernel which need to use that 82875b66a0SJohn Baldwin * API rather than using the dynamic API. Use of the dynamic API is 83875b66a0SJohn Baldwin * strongly encouraged for most code. 84875b66a0SJohn Baldwin * 853e829b18SJohn Baldwin * The sysctlmemlock is used to limit the amount of user memory wired for 863e829b18SJohn Baldwin * sysctl requests. This is implemented by serializing any userland 873e829b18SJohn Baldwin * sysctl requests larger than a single page via an exclusive lock. 884b2af45fSPoul-Henning Kamp */ 893bd1da29SRobert Watson static struct sx sysctllock; 903e829b18SJohn Baldwin static struct sx sysctlmemlock; 9129a2c0cdSAlfred Perlstein 92875b66a0SJohn Baldwin #define SYSCTL_XLOCK() sx_xlock(&sysctllock) 93875b66a0SJohn Baldwin #define SYSCTL_XUNLOCK() sx_xunlock(&sysctllock) 94875b66a0SJohn Baldwin #define SYSCTL_ASSERT_XLOCKED() sx_assert(&sysctllock, SA_XLOCKED) 9574019059SJohn Baldwin #define SYSCTL_INIT() sx_init(&sysctllock, "sysctl lock") 96ccecef29SMatthew D Fleming #define SYSCTL_SLEEP(ch, wmesg, timo) \ 97ccecef29SMatthew D Fleming sx_sleep(ch, &sysctllock, 0, wmesg, timo) 984b2af45fSPoul-Henning Kamp 9982d9ae4eSPoul-Henning Kamp static int sysctl_root(SYSCTL_HANDLER_ARGS); 1004b2af45fSPoul-Henning Kamp 101*af3b2549SHans Petter Selasky /* Root list */ 102*af3b2549SHans Petter Selasky struct sysctl_oid_list sysctl__children = SLIST_HEAD_INITIALIZER(&sysctl__children); 103787d58f2SPoul-Henning Kamp 104875b66a0SJohn Baldwin static int sysctl_remove_oid_locked(struct sysctl_oid *oidp, int del, 105875b66a0SJohn Baldwin int recurse); 106*af3b2549SHans Petter Selasky static int sysctl_old_kernel(struct sysctl_req *, const void *, size_t); 107*af3b2549SHans Petter Selasky static int sysctl_new_kernel(struct sysctl_req *, void *, size_t); 108875b66a0SJohn Baldwin 109bd3cdc31SAndrzej Bialecki static struct sysctl_oid * 110bd3cdc31SAndrzej Bialecki sysctl_find_oidname(const char *name, struct sysctl_oid_list *list) 111bd3cdc31SAndrzej Bialecki { 112bd3cdc31SAndrzej Bialecki struct sysctl_oid *oidp; 113bd3cdc31SAndrzej Bialecki 114ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 115bd3cdc31SAndrzej Bialecki SLIST_FOREACH(oidp, list, oid_link) { 116bd3cdc31SAndrzej Bialecki if (strcmp(oidp->oid_name, name) == 0) { 117bd3cdc31SAndrzej Bialecki return (oidp); 118bd3cdc31SAndrzej Bialecki } 119bd3cdc31SAndrzej Bialecki } 120bd3cdc31SAndrzej Bialecki return (NULL); 121bd3cdc31SAndrzej Bialecki } 122bd3cdc31SAndrzej Bialecki 123946bb7a2SPoul-Henning Kamp /* 124946bb7a2SPoul-Henning Kamp * Initialization of the MIB tree. 125946bb7a2SPoul-Henning Kamp * 126ce02431fSDoug Rabson * Order by number in each list. 127946bb7a2SPoul-Henning Kamp */ 128875b66a0SJohn Baldwin void 129875b66a0SJohn Baldwin sysctl_lock(void) 130875b66a0SJohn Baldwin { 131875b66a0SJohn Baldwin 132875b66a0SJohn Baldwin SYSCTL_XLOCK(); 133875b66a0SJohn Baldwin } 134875b66a0SJohn Baldwin 135875b66a0SJohn Baldwin void 136875b66a0SJohn Baldwin sysctl_unlock(void) 137875b66a0SJohn Baldwin { 138875b66a0SJohn Baldwin 139875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 140875b66a0SJohn Baldwin } 1414b2af45fSPoul-Henning Kamp 142*af3b2549SHans Petter Selasky static int 143*af3b2549SHans Petter Selasky sysctl_root_handler_locked(struct sysctl_oid *oid, void *arg1, intptr_t arg2, 144*af3b2549SHans Petter Selasky struct sysctl_req *req) 145*af3b2549SHans Petter Selasky { 146*af3b2549SHans Petter Selasky int error; 147*af3b2549SHans Petter Selasky 148*af3b2549SHans Petter Selasky oid->oid_running++; 149*af3b2549SHans Petter Selasky SYSCTL_XUNLOCK(); 150*af3b2549SHans Petter Selasky 151*af3b2549SHans Petter Selasky if (!(oid->oid_kind & CTLFLAG_MPSAFE)) 152*af3b2549SHans Petter Selasky mtx_lock(&Giant); 153*af3b2549SHans Petter Selasky error = oid->oid_handler(oid, arg1, arg2, req); 154*af3b2549SHans Petter Selasky if (!(oid->oid_kind & CTLFLAG_MPSAFE)) 155*af3b2549SHans Petter Selasky mtx_unlock(&Giant); 156*af3b2549SHans Petter Selasky 157*af3b2549SHans Petter Selasky SYSCTL_XLOCK(); 158*af3b2549SHans Petter Selasky oid->oid_running--; 159*af3b2549SHans Petter Selasky if (oid->oid_running == 0 && (oid->oid_kind & CTLFLAG_DYING) != 0) 160*af3b2549SHans Petter Selasky wakeup(&oid->oid_running); 161*af3b2549SHans Petter Selasky 162*af3b2549SHans Petter Selasky return (error); 163*af3b2549SHans Petter Selasky } 164*af3b2549SHans Petter Selasky 165*af3b2549SHans Petter Selasky static void 166*af3b2549SHans Petter Selasky sysctl_load_tunable_by_oid_locked(struct sysctl_oid *oidp) 167*af3b2549SHans Petter Selasky { 168*af3b2549SHans Petter Selasky struct sysctl_req req; 169*af3b2549SHans Petter Selasky struct sysctl_oid *curr; 170*af3b2549SHans Petter Selasky char *penv; 171*af3b2549SHans Petter Selasky char path[64]; 172*af3b2549SHans Petter Selasky ssize_t rem = sizeof(path); 173*af3b2549SHans Petter Selasky ssize_t len; 174*af3b2549SHans Petter Selasky int val_int; 175*af3b2549SHans Petter Selasky long val_long; 176*af3b2549SHans Petter Selasky int64_t val_64; 177*af3b2549SHans Petter Selasky int error; 178*af3b2549SHans Petter Selasky 179*af3b2549SHans Petter Selasky path[--rem] = 0; 180*af3b2549SHans Petter Selasky 181*af3b2549SHans Petter Selasky for (curr = oidp; curr != NULL; curr = SYSCTL_PARENT(curr)) { 182*af3b2549SHans Petter Selasky len = strlen(curr->oid_name); 183*af3b2549SHans Petter Selasky rem -= len; 184*af3b2549SHans Petter Selasky if (curr != oidp) 185*af3b2549SHans Petter Selasky rem -= 1; 186*af3b2549SHans Petter Selasky if (rem < 0) { 187*af3b2549SHans Petter Selasky printf("OID path exceeds %d bytes\n", (int)sizeof(path)); 188*af3b2549SHans Petter Selasky return; 189*af3b2549SHans Petter Selasky } 190*af3b2549SHans Petter Selasky memcpy(path + rem, curr->oid_name, len); 191*af3b2549SHans Petter Selasky if (curr != oidp) 192*af3b2549SHans Petter Selasky path[rem + len] = '.'; 193*af3b2549SHans Petter Selasky } 194*af3b2549SHans Petter Selasky 195*af3b2549SHans Petter Selasky penv = getenv(path + rem); 196*af3b2549SHans Petter Selasky if (penv == NULL) 197*af3b2549SHans Petter Selasky return; 198*af3b2549SHans Petter Selasky 199*af3b2549SHans Petter Selasky memset(&req, 0, sizeof(req)); 200*af3b2549SHans Petter Selasky 201*af3b2549SHans Petter Selasky req.td = curthread; 202*af3b2549SHans Petter Selasky req.oldfunc = sysctl_old_kernel; 203*af3b2549SHans Petter Selasky req.newfunc = sysctl_new_kernel; 204*af3b2549SHans Petter Selasky req.lock = REQ_UNWIRED; 205*af3b2549SHans Petter Selasky 206*af3b2549SHans Petter Selasky switch (oidp->oid_kind & CTLTYPE) { 207*af3b2549SHans Petter Selasky case CTLTYPE_INT: 208*af3b2549SHans Petter Selasky val_int = strtoq(penv, NULL, 0); 209*af3b2549SHans Petter Selasky req.newlen = sizeof(val_int); 210*af3b2549SHans Petter Selasky req.newptr = &val_int; 211*af3b2549SHans Petter Selasky break; 212*af3b2549SHans Petter Selasky case CTLTYPE_UINT: 213*af3b2549SHans Petter Selasky val_int = strtouq(penv, NULL, 0); 214*af3b2549SHans Petter Selasky req.newlen = sizeof(val_int); 215*af3b2549SHans Petter Selasky req.newptr = &val_int; 216*af3b2549SHans Petter Selasky break; 217*af3b2549SHans Petter Selasky case CTLTYPE_LONG: 218*af3b2549SHans Petter Selasky val_long = strtoq(penv, NULL, 0); 219*af3b2549SHans Petter Selasky req.newlen = sizeof(val_long); 220*af3b2549SHans Petter Selasky req.newptr = &val_long; 221*af3b2549SHans Petter Selasky break; 222*af3b2549SHans Petter Selasky case CTLTYPE_ULONG: 223*af3b2549SHans Petter Selasky val_long = strtouq(penv, NULL, 0); 224*af3b2549SHans Petter Selasky req.newlen = sizeof(val_long); 225*af3b2549SHans Petter Selasky req.newptr = &val_long; 226*af3b2549SHans Petter Selasky break; 227*af3b2549SHans Petter Selasky case CTLTYPE_S64: 228*af3b2549SHans Petter Selasky val_64 = strtoq(penv, NULL, 0); 229*af3b2549SHans Petter Selasky req.newlen = sizeof(val_64); 230*af3b2549SHans Petter Selasky req.newptr = &val_64; 231*af3b2549SHans Petter Selasky break; 232*af3b2549SHans Petter Selasky case CTLTYPE_U64: 233*af3b2549SHans Petter Selasky val_64 = strtouq(penv, NULL, 0); 234*af3b2549SHans Petter Selasky req.newlen = sizeof(val_64); 235*af3b2549SHans Petter Selasky req.newptr = &val_64; 236*af3b2549SHans Petter Selasky break; 237*af3b2549SHans Petter Selasky case CTLTYPE_STRING: 238*af3b2549SHans Petter Selasky req.newlen = strlen(penv); 239*af3b2549SHans Petter Selasky req.newptr = penv; 240*af3b2549SHans Petter Selasky break; 241*af3b2549SHans Petter Selasky default: 242*af3b2549SHans Petter Selasky freeenv(penv); 243*af3b2549SHans Petter Selasky return; 244*af3b2549SHans Petter Selasky } 245*af3b2549SHans Petter Selasky error = sysctl_root_handler_locked(oidp, oidp->oid_arg1, 246*af3b2549SHans Petter Selasky oidp->oid_arg2, &req); 247*af3b2549SHans Petter Selasky if (error != 0) { 248*af3b2549SHans Petter Selasky printf("Setting sysctl '%s' to '%s' failed: %d\n", 249*af3b2549SHans Petter Selasky path, penv, error); 250*af3b2549SHans Petter Selasky } 251*af3b2549SHans Petter Selasky freeenv(penv); 252*af3b2549SHans Petter Selasky } 253*af3b2549SHans Petter Selasky 254107e7dc5SPeter Pentchev void 255107e7dc5SPeter Pentchev sysctl_register_oid(struct sysctl_oid *oidp) 256787d58f2SPoul-Henning Kamp { 257ce02431fSDoug Rabson struct sysctl_oid_list *parent = oidp->oid_parent; 258ce02431fSDoug Rabson struct sysctl_oid *p; 259ce02431fSDoug Rabson struct sysctl_oid *q; 2603c8e79ddSBruce Evans 261ce02431fSDoug Rabson /* 262bd3cdc31SAndrzej Bialecki * First check if another oid with the same name already 263bd3cdc31SAndrzej Bialecki * exists in the parent's list. 264bd3cdc31SAndrzej Bialecki */ 265875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 266bd3cdc31SAndrzej Bialecki p = sysctl_find_oidname(oidp->oid_name, parent); 267bd3cdc31SAndrzej Bialecki if (p != NULL) { 268bd3cdc31SAndrzej Bialecki if ((p->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 269bd3cdc31SAndrzej Bialecki p->oid_refcnt++; 270bd3cdc31SAndrzej Bialecki return; 271bd3cdc31SAndrzej Bialecki } else { 272bd3cdc31SAndrzej Bialecki printf("can't re-use a leaf (%s)!\n", p->oid_name); 273bd3cdc31SAndrzej Bialecki return; 274bd3cdc31SAndrzej Bialecki } 275bd3cdc31SAndrzej Bialecki } 276bd3cdc31SAndrzej Bialecki /* 277ce02431fSDoug Rabson * If this oid has a number OID_AUTO, give it a number which 2787ca4d05fSPeter Pentchev * is greater than any current oid. 2797ca4d05fSPeter Pentchev * NOTE: DO NOT change the starting value here, change it in 2807ca4d05fSPeter Pentchev * <sys/sysctl.h>, and make sure it is at least 256 to 2817ca4d05fSPeter Pentchev * accomodate e.g. net.inet.raw as a static sysctl node. 282ce02431fSDoug Rabson */ 283ce02431fSDoug Rabson if (oidp->oid_number == OID_AUTO) { 2847ca4d05fSPeter Pentchev static int newoid = CTL_AUTO_START; 2855ed57d32SKirk McKusick 2865ed57d32SKirk McKusick oidp->oid_number = newoid++; 2875ed57d32SKirk McKusick if (newoid == 0x7fffffff) 2885ed57d32SKirk McKusick panic("out of oids"); 289787d58f2SPoul-Henning Kamp } 29088fbb423SPeter Pentchev #if 0 29188fbb423SPeter Pentchev else if (oidp->oid_number >= CTL_AUTO_START) { 29288fbb423SPeter Pentchev /* do not panic; this happens when unregistering sysctl sets */ 29388fbb423SPeter Pentchev printf("static sysctl oid too high: %d", oidp->oid_number); 29488fbb423SPeter Pentchev } 29588fbb423SPeter Pentchev #endif 296787d58f2SPoul-Henning Kamp 297ce02431fSDoug Rabson /* 298ce02431fSDoug Rabson * Insert the oid into the parent's list in order. 299ce02431fSDoug Rabson */ 300ce02431fSDoug Rabson q = NULL; 301ce02431fSDoug Rabson SLIST_FOREACH(p, parent, oid_link) { 302ce02431fSDoug Rabson if (oidp->oid_number < p->oid_number) 303ce02431fSDoug Rabson break; 304ce02431fSDoug Rabson q = p; 305ce02431fSDoug Rabson } 306ce02431fSDoug Rabson if (q) 307ce02431fSDoug Rabson SLIST_INSERT_AFTER(q, oidp, oid_link); 308ce02431fSDoug Rabson else 309ce02431fSDoug Rabson SLIST_INSERT_HEAD(parent, oidp, oid_link); 310*af3b2549SHans Petter Selasky 311*af3b2549SHans Petter Selasky if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE && 312*af3b2549SHans Petter Selasky #ifdef VIMAGE 313*af3b2549SHans Petter Selasky (oidp->oid_kind & CTLFLAG_VNET) == 0 && 314*af3b2549SHans Petter Selasky #endif 315*af3b2549SHans Petter Selasky (oidp->oid_kind & CTLFLAG_TUN) != 0 && 316*af3b2549SHans Petter Selasky (oidp->oid_kind & CTLFLAG_NOFETCH) == 0) { 317*af3b2549SHans Petter Selasky sysctl_load_tunable_by_oid_locked(oidp); 318*af3b2549SHans Petter Selasky } 319ce02431fSDoug Rabson } 320ce02431fSDoug Rabson 321107e7dc5SPeter Pentchev void 322107e7dc5SPeter Pentchev sysctl_unregister_oid(struct sysctl_oid *oidp) 323787d58f2SPoul-Henning Kamp { 324193f2edbSMaxime Henrion struct sysctl_oid *p; 325193f2edbSMaxime Henrion int error; 326193f2edbSMaxime Henrion 327875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 328193f2edbSMaxime Henrion error = ENOENT; 329193f2edbSMaxime Henrion if (oidp->oid_number == OID_AUTO) { 330193f2edbSMaxime Henrion error = EINVAL; 331193f2edbSMaxime Henrion } else { 332193f2edbSMaxime Henrion SLIST_FOREACH(p, oidp->oid_parent, oid_link) { 333193f2edbSMaxime Henrion if (p == oidp) { 334193f2edbSMaxime Henrion SLIST_REMOVE(oidp->oid_parent, oidp, 335193f2edbSMaxime Henrion sysctl_oid, oid_link); 336193f2edbSMaxime Henrion error = 0; 337193f2edbSMaxime Henrion break; 338193f2edbSMaxime Henrion } 339193f2edbSMaxime Henrion } 340193f2edbSMaxime Henrion } 341193f2edbSMaxime Henrion 342193f2edbSMaxime Henrion /* 343193f2edbSMaxime Henrion * This can happen when a module fails to register and is 344193f2edbSMaxime Henrion * being unloaded afterwards. It should not be a panic() 345193f2edbSMaxime Henrion * for normal use. 346193f2edbSMaxime Henrion */ 347193f2edbSMaxime Henrion if (error) 348193f2edbSMaxime Henrion printf("%s: failed to unregister sysctl\n", __func__); 34961220614SPoul-Henning Kamp } 350946bb7a2SPoul-Henning Kamp 351bd3cdc31SAndrzej Bialecki /* Initialize a new context to keep track of dynamically added sysctls. */ 352bd3cdc31SAndrzej Bialecki int 353bd3cdc31SAndrzej Bialecki sysctl_ctx_init(struct sysctl_ctx_list *c) 354bd3cdc31SAndrzej Bialecki { 355bd3cdc31SAndrzej Bialecki 356bd3cdc31SAndrzej Bialecki if (c == NULL) { 357bd3cdc31SAndrzej Bialecki return (EINVAL); 358bd3cdc31SAndrzej Bialecki } 359875b66a0SJohn Baldwin 360875b66a0SJohn Baldwin /* 361875b66a0SJohn Baldwin * No locking here, the caller is responsible for not adding 362875b66a0SJohn Baldwin * new nodes to a context until after this function has 363875b66a0SJohn Baldwin * returned. 364875b66a0SJohn Baldwin */ 365bd3cdc31SAndrzej Bialecki TAILQ_INIT(c); 366bd3cdc31SAndrzej Bialecki return (0); 367bd3cdc31SAndrzej Bialecki } 368bd3cdc31SAndrzej Bialecki 369bd3cdc31SAndrzej Bialecki /* Free the context, and destroy all dynamic oids registered in this context */ 370bd3cdc31SAndrzej Bialecki int 371bd3cdc31SAndrzej Bialecki sysctl_ctx_free(struct sysctl_ctx_list *clist) 372bd3cdc31SAndrzej Bialecki { 373bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e, *e1; 374bd3cdc31SAndrzej Bialecki int error; 375bd3cdc31SAndrzej Bialecki 376bd3cdc31SAndrzej Bialecki error = 0; 377bd3cdc31SAndrzej Bialecki /* 378bd3cdc31SAndrzej Bialecki * First perform a "dry run" to check if it's ok to remove oids. 379bd3cdc31SAndrzej Bialecki * XXX FIXME 380bd3cdc31SAndrzej Bialecki * XXX This algorithm is a hack. But I don't know any 381bd3cdc31SAndrzej Bialecki * XXX better solution for now... 382bd3cdc31SAndrzej Bialecki */ 383875b66a0SJohn Baldwin SYSCTL_XLOCK(); 384bd3cdc31SAndrzej Bialecki TAILQ_FOREACH(e, clist, link) { 385875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(e->entry, 0, 0); 386bd3cdc31SAndrzej Bialecki if (error) 387bd3cdc31SAndrzej Bialecki break; 388bd3cdc31SAndrzej Bialecki } 389bd3cdc31SAndrzej Bialecki /* 390bd3cdc31SAndrzej Bialecki * Restore deregistered entries, either from the end, 391bd3cdc31SAndrzej Bialecki * or from the place where error occured. 392bd3cdc31SAndrzej Bialecki * e contains the entry that was not unregistered 393bd3cdc31SAndrzej Bialecki */ 394bd3cdc31SAndrzej Bialecki if (error) 395bd3cdc31SAndrzej Bialecki e1 = TAILQ_PREV(e, sysctl_ctx_list, link); 396bd3cdc31SAndrzej Bialecki else 397bd3cdc31SAndrzej Bialecki e1 = TAILQ_LAST(clist, sysctl_ctx_list); 398bd3cdc31SAndrzej Bialecki while (e1 != NULL) { 399bd3cdc31SAndrzej Bialecki sysctl_register_oid(e1->entry); 400bd3cdc31SAndrzej Bialecki e1 = TAILQ_PREV(e1, sysctl_ctx_list, link); 401bd3cdc31SAndrzej Bialecki } 402875b66a0SJohn Baldwin if (error) { 403875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 404bd3cdc31SAndrzej Bialecki return(EBUSY); 405875b66a0SJohn Baldwin } 406bd3cdc31SAndrzej Bialecki /* Now really delete the entries */ 407bd3cdc31SAndrzej Bialecki e = TAILQ_FIRST(clist); 408bd3cdc31SAndrzej Bialecki while (e != NULL) { 409bd3cdc31SAndrzej Bialecki e1 = TAILQ_NEXT(e, link); 410875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(e->entry, 1, 0); 411bd3cdc31SAndrzej Bialecki if (error) 412bd3cdc31SAndrzej Bialecki panic("sysctl_remove_oid: corrupt tree, entry: %s", 413bd3cdc31SAndrzej Bialecki e->entry->oid_name); 414bd3cdc31SAndrzej Bialecki free(e, M_SYSCTLOID); 415bd3cdc31SAndrzej Bialecki e = e1; 416bd3cdc31SAndrzej Bialecki } 417875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 418bd3cdc31SAndrzej Bialecki return (error); 419bd3cdc31SAndrzej Bialecki } 420bd3cdc31SAndrzej Bialecki 421bd3cdc31SAndrzej Bialecki /* Add an entry to the context */ 422bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry * 423bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_add(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp) 424bd3cdc31SAndrzej Bialecki { 425bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e; 426bd3cdc31SAndrzej Bialecki 427875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 428bd3cdc31SAndrzej Bialecki if (clist == NULL || oidp == NULL) 429bd3cdc31SAndrzej Bialecki return(NULL); 430a163d034SWarner Losh e = malloc(sizeof(struct sysctl_ctx_entry), M_SYSCTLOID, M_WAITOK); 431bd3cdc31SAndrzej Bialecki e->entry = oidp; 432bd3cdc31SAndrzej Bialecki TAILQ_INSERT_HEAD(clist, e, link); 433bd3cdc31SAndrzej Bialecki return (e); 434bd3cdc31SAndrzej Bialecki } 435bd3cdc31SAndrzej Bialecki 436bd3cdc31SAndrzej Bialecki /* Find an entry in the context */ 437bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry * 438bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_find(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp) 439bd3cdc31SAndrzej Bialecki { 440bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e; 441bd3cdc31SAndrzej Bialecki 442ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 443bd3cdc31SAndrzej Bialecki if (clist == NULL || oidp == NULL) 444bd3cdc31SAndrzej Bialecki return(NULL); 445fc2ffbe6SPoul-Henning Kamp TAILQ_FOREACH(e, clist, link) { 446bd3cdc31SAndrzej Bialecki if(e->entry == oidp) 447bd3cdc31SAndrzej Bialecki return(e); 448bd3cdc31SAndrzej Bialecki } 449bd3cdc31SAndrzej Bialecki return (e); 450bd3cdc31SAndrzej Bialecki } 451bd3cdc31SAndrzej Bialecki 452bd3cdc31SAndrzej Bialecki /* 453bd3cdc31SAndrzej Bialecki * Delete an entry from the context. 454bd3cdc31SAndrzej Bialecki * NOTE: this function doesn't free oidp! You have to remove it 455bd3cdc31SAndrzej Bialecki * with sysctl_remove_oid(). 456bd3cdc31SAndrzej Bialecki */ 457bd3cdc31SAndrzej Bialecki int 458bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_del(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp) 459bd3cdc31SAndrzej Bialecki { 460bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e; 461bd3cdc31SAndrzej Bialecki 462bd3cdc31SAndrzej Bialecki if (clist == NULL || oidp == NULL) 463bd3cdc31SAndrzej Bialecki return (EINVAL); 464875b66a0SJohn Baldwin SYSCTL_XLOCK(); 465bd3cdc31SAndrzej Bialecki e = sysctl_ctx_entry_find(clist, oidp); 466bd3cdc31SAndrzej Bialecki if (e != NULL) { 467bd3cdc31SAndrzej Bialecki TAILQ_REMOVE(clist, e, link); 468875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 469bd3cdc31SAndrzej Bialecki free(e, M_SYSCTLOID); 470bd3cdc31SAndrzej Bialecki return (0); 471875b66a0SJohn Baldwin } else { 472875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 473bd3cdc31SAndrzej Bialecki return (ENOENT); 474bd3cdc31SAndrzej Bialecki } 475875b66a0SJohn Baldwin } 476bd3cdc31SAndrzej Bialecki 477bd3cdc31SAndrzej Bialecki /* 478bd3cdc31SAndrzej Bialecki * Remove dynamically created sysctl trees. 479bd3cdc31SAndrzej Bialecki * oidp - top of the tree to be removed 480bd3cdc31SAndrzej Bialecki * del - if 0 - just deregister, otherwise free up entries as well 481bd3cdc31SAndrzej Bialecki * recurse - if != 0 traverse the subtree to be deleted 482bd3cdc31SAndrzej Bialecki */ 483bd3cdc31SAndrzej Bialecki int 484bd3cdc31SAndrzej Bialecki sysctl_remove_oid(struct sysctl_oid *oidp, int del, int recurse) 485bd3cdc31SAndrzej Bialecki { 486875b66a0SJohn Baldwin int error; 487875b66a0SJohn Baldwin 488875b66a0SJohn Baldwin SYSCTL_XLOCK(); 489875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(oidp, del, recurse); 490875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 491875b66a0SJohn Baldwin return (error); 492875b66a0SJohn Baldwin } 493875b66a0SJohn Baldwin 494e4cd31ddSJeff Roberson int 495e4cd31ddSJeff Roberson sysctl_remove_name(struct sysctl_oid *parent, const char *name, 496e4cd31ddSJeff Roberson int del, int recurse) 497e4cd31ddSJeff Roberson { 498e4cd31ddSJeff Roberson struct sysctl_oid *p, *tmp; 499e4cd31ddSJeff Roberson int error; 500e4cd31ddSJeff Roberson 501e4cd31ddSJeff Roberson error = ENOENT; 502e4cd31ddSJeff Roberson SYSCTL_XLOCK(); 503e4cd31ddSJeff Roberson SLIST_FOREACH_SAFE(p, SYSCTL_CHILDREN(parent), oid_link, tmp) { 504e4cd31ddSJeff Roberson if (strcmp(p->oid_name, name) == 0) { 505e4cd31ddSJeff Roberson error = sysctl_remove_oid_locked(p, del, recurse); 506e4cd31ddSJeff Roberson break; 507e4cd31ddSJeff Roberson } 508e4cd31ddSJeff Roberson } 509e4cd31ddSJeff Roberson SYSCTL_XUNLOCK(); 510e4cd31ddSJeff Roberson 511e4cd31ddSJeff Roberson return (error); 512e4cd31ddSJeff Roberson } 513e4cd31ddSJeff Roberson 514e4cd31ddSJeff Roberson 515875b66a0SJohn Baldwin static int 516875b66a0SJohn Baldwin sysctl_remove_oid_locked(struct sysctl_oid *oidp, int del, int recurse) 517875b66a0SJohn Baldwin { 518e4cd31ddSJeff Roberson struct sysctl_oid *p, *tmp; 519bd3cdc31SAndrzej Bialecki int error; 520bd3cdc31SAndrzej Bialecki 521875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 522bd3cdc31SAndrzej Bialecki if (oidp == NULL) 523bd3cdc31SAndrzej Bialecki return(EINVAL); 524bd3cdc31SAndrzej Bialecki if ((oidp->oid_kind & CTLFLAG_DYN) == 0) { 525bd3cdc31SAndrzej Bialecki printf("can't remove non-dynamic nodes!\n"); 526bd3cdc31SAndrzej Bialecki return (EINVAL); 527bd3cdc31SAndrzej Bialecki } 528bd3cdc31SAndrzej Bialecki /* 529bd3cdc31SAndrzej Bialecki * WARNING: normal method to do this should be through 530bd3cdc31SAndrzej Bialecki * sysctl_ctx_free(). Use recursing as the last resort 531bd3cdc31SAndrzej Bialecki * method to purge your sysctl tree of leftovers... 532bd3cdc31SAndrzej Bialecki * However, if some other code still references these nodes, 533bd3cdc31SAndrzej Bialecki * it will panic. 534bd3cdc31SAndrzej Bialecki */ 535bd3cdc31SAndrzej Bialecki if ((oidp->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 536bd3cdc31SAndrzej Bialecki if (oidp->oid_refcnt == 1) { 537e4cd31ddSJeff Roberson SLIST_FOREACH_SAFE(p, 538e4cd31ddSJeff Roberson SYSCTL_CHILDREN(oidp), oid_link, tmp) { 539f510415dSScott Long if (!recurse) { 540f510415dSScott Long printf("Warning: failed attempt to " 541f510415dSScott Long "remove oid %s with child %s\n", 542f510415dSScott Long oidp->oid_name, p->oid_name); 543bd3cdc31SAndrzej Bialecki return (ENOTEMPTY); 544f510415dSScott Long } 545875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(p, del, 546875b66a0SJohn Baldwin recurse); 547bd3cdc31SAndrzej Bialecki if (error) 548bd3cdc31SAndrzej Bialecki return (error); 549bd3cdc31SAndrzej Bialecki } 550bd3cdc31SAndrzej Bialecki } 551bd3cdc31SAndrzej Bialecki } 552bd3cdc31SAndrzej Bialecki if (oidp->oid_refcnt > 1 ) { 553bd3cdc31SAndrzej Bialecki oidp->oid_refcnt--; 554bd3cdc31SAndrzej Bialecki } else { 555bd3cdc31SAndrzej Bialecki if (oidp->oid_refcnt == 0) { 556bd3cdc31SAndrzej Bialecki printf("Warning: bad oid_refcnt=%u (%s)!\n", 557bd3cdc31SAndrzej Bialecki oidp->oid_refcnt, oidp->oid_name); 558bd3cdc31SAndrzej Bialecki return (EINVAL); 559bd3cdc31SAndrzej Bialecki } 560bd3cdc31SAndrzej Bialecki sysctl_unregister_oid(oidp); 561bd3cdc31SAndrzej Bialecki if (del) { 562ccecef29SMatthew D Fleming /* 563ccecef29SMatthew D Fleming * Wait for all threads running the handler to drain. 564ccecef29SMatthew D Fleming * This preserves the previous behavior when the 565ccecef29SMatthew D Fleming * sysctl lock was held across a handler invocation, 566ccecef29SMatthew D Fleming * and is necessary for module unload correctness. 567ccecef29SMatthew D Fleming */ 568ccecef29SMatthew D Fleming while (oidp->oid_running > 0) { 569ccecef29SMatthew D Fleming oidp->oid_kind |= CTLFLAG_DYING; 570ccecef29SMatthew D Fleming SYSCTL_SLEEP(&oidp->oid_running, "oidrm", 0); 571ccecef29SMatthew D Fleming } 5725937226dSPoul-Henning Kamp if (oidp->oid_descr) 573db9066f7SMarius Strobl free(__DECONST(char *, oidp->oid_descr), 57493e8459aSPeter Wemm M_SYSCTLOID); 575db9066f7SMarius Strobl free(__DECONST(char *, oidp->oid_name), M_SYSCTLOID); 576bd3cdc31SAndrzej Bialecki free(oidp, M_SYSCTLOID); 577bd3cdc31SAndrzej Bialecki } 578bd3cdc31SAndrzej Bialecki } 579bd3cdc31SAndrzej Bialecki return (0); 580bd3cdc31SAndrzej Bialecki } 581bd3cdc31SAndrzej Bialecki /* 582bd3cdc31SAndrzej Bialecki * Create new sysctls at run time. 583bd3cdc31SAndrzej Bialecki * clist may point to a valid context initialized with sysctl_ctx_init(). 584bd3cdc31SAndrzej Bialecki */ 585bd3cdc31SAndrzej Bialecki struct sysctl_oid * 586bd3cdc31SAndrzej Bialecki sysctl_add_oid(struct sysctl_ctx_list *clist, struct sysctl_oid_list *parent, 587e4cd31ddSJeff Roberson int number, const char *name, int kind, void *arg1, intptr_t arg2, 588c5f9b6d0SJohn Baldwin int (*handler)(SYSCTL_HANDLER_ARGS), const char *fmt, const char *descr) 589bd3cdc31SAndrzej Bialecki { 590bd3cdc31SAndrzej Bialecki struct sysctl_oid *oidp; 591bd3cdc31SAndrzej Bialecki 592bd3cdc31SAndrzej Bialecki /* You have to hook up somewhere.. */ 593bd3cdc31SAndrzej Bialecki if (parent == NULL) 594bd3cdc31SAndrzej Bialecki return(NULL); 595bd3cdc31SAndrzej Bialecki /* Check if the node already exists, otherwise create it */ 596875b66a0SJohn Baldwin SYSCTL_XLOCK(); 597bd3cdc31SAndrzej Bialecki oidp = sysctl_find_oidname(name, parent); 598bd3cdc31SAndrzej Bialecki if (oidp != NULL) { 599bd3cdc31SAndrzej Bialecki if ((oidp->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 600bd3cdc31SAndrzej Bialecki oidp->oid_refcnt++; 601bd3cdc31SAndrzej Bialecki /* Update the context */ 602bd3cdc31SAndrzej Bialecki if (clist != NULL) 603bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_add(clist, oidp); 604875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 605bd3cdc31SAndrzej Bialecki return (oidp); 606bd3cdc31SAndrzej Bialecki } else { 607875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 608bd3cdc31SAndrzej Bialecki printf("can't re-use a leaf (%s)!\n", name); 609bd3cdc31SAndrzej Bialecki return (NULL); 610bd3cdc31SAndrzej Bialecki } 611bd3cdc31SAndrzej Bialecki } 612a163d034SWarner Losh oidp = malloc(sizeof(struct sysctl_oid), M_SYSCTLOID, M_WAITOK|M_ZERO); 613bd3cdc31SAndrzej Bialecki oidp->oid_parent = parent; 614*af3b2549SHans Petter Selasky SLIST_INIT(&oidp->oid_children); 615bd3cdc31SAndrzej Bialecki oidp->oid_number = number; 616bd3cdc31SAndrzej Bialecki oidp->oid_refcnt = 1; 617db9066f7SMarius Strobl oidp->oid_name = strdup(name, M_SYSCTLOID); 618bd3cdc31SAndrzej Bialecki oidp->oid_handler = handler; 619bd3cdc31SAndrzej Bialecki oidp->oid_kind = CTLFLAG_DYN | kind; 620bd3cdc31SAndrzej Bialecki oidp->oid_arg1 = arg1; 621bd3cdc31SAndrzej Bialecki oidp->oid_arg2 = arg2; 622bd3cdc31SAndrzej Bialecki oidp->oid_fmt = fmt; 623*af3b2549SHans Petter Selasky if (descr != NULL) 624db9066f7SMarius Strobl oidp->oid_descr = strdup(descr, M_SYSCTLOID); 625bd3cdc31SAndrzej Bialecki /* Update the context, if used */ 626bd3cdc31SAndrzej Bialecki if (clist != NULL) 627bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_add(clist, oidp); 628bd3cdc31SAndrzej Bialecki /* Register this oid */ 629bd3cdc31SAndrzej Bialecki sysctl_register_oid(oidp); 630875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 631bd3cdc31SAndrzej Bialecki return (oidp); 632bd3cdc31SAndrzej Bialecki } 633bd3cdc31SAndrzej Bialecki 634ce02431fSDoug Rabson /* 635cd17ceaaSPeter Wemm * Rename an existing oid. 636cd17ceaaSPeter Wemm */ 637cd17ceaaSPeter Wemm void 638cd17ceaaSPeter Wemm sysctl_rename_oid(struct sysctl_oid *oidp, const char *name) 639cd17ceaaSPeter Wemm { 640cd17ceaaSPeter Wemm char *newname; 641db9066f7SMarius Strobl char *oldname; 642cd17ceaaSPeter Wemm 643db9066f7SMarius Strobl newname = strdup(name, M_SYSCTLOID); 644875b66a0SJohn Baldwin SYSCTL_XLOCK(); 645db9066f7SMarius Strobl oldname = __DECONST(char *, oidp->oid_name); 646cd17ceaaSPeter Wemm oidp->oid_name = newname; 647875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 648cd17ceaaSPeter Wemm free(oldname, M_SYSCTLOID); 649cd17ceaaSPeter Wemm } 650cd17ceaaSPeter Wemm 651cd17ceaaSPeter Wemm /* 65221885af5SDag-Erling Smørgrav * Reparent an existing oid. 65321885af5SDag-Erling Smørgrav */ 65421885af5SDag-Erling Smørgrav int 65521885af5SDag-Erling Smørgrav sysctl_move_oid(struct sysctl_oid *oid, struct sysctl_oid_list *parent) 65621885af5SDag-Erling Smørgrav { 65721885af5SDag-Erling Smørgrav struct sysctl_oid *oidp; 65821885af5SDag-Erling Smørgrav 659875b66a0SJohn Baldwin SYSCTL_XLOCK(); 660875b66a0SJohn Baldwin if (oid->oid_parent == parent) { 661875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 66221885af5SDag-Erling Smørgrav return (0); 663875b66a0SJohn Baldwin } 66421885af5SDag-Erling Smørgrav oidp = sysctl_find_oidname(oid->oid_name, parent); 665875b66a0SJohn Baldwin if (oidp != NULL) { 666875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 66721885af5SDag-Erling Smørgrav return (EEXIST); 668875b66a0SJohn Baldwin } 66921885af5SDag-Erling Smørgrav sysctl_unregister_oid(oid); 67021885af5SDag-Erling Smørgrav oid->oid_parent = parent; 67121885af5SDag-Erling Smørgrav oid->oid_number = OID_AUTO; 67221885af5SDag-Erling Smørgrav sysctl_register_oid(oid); 673875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 67421885af5SDag-Erling Smørgrav return (0); 67521885af5SDag-Erling Smørgrav } 67621885af5SDag-Erling Smørgrav 67721885af5SDag-Erling Smørgrav /* 678ce02431fSDoug Rabson * Register the kernel's oids on startup. 679ce02431fSDoug Rabson */ 680f41325dbSPeter Wemm SET_DECLARE(sysctl_set, struct sysctl_oid); 681ce02431fSDoug Rabson 682107e7dc5SPeter Pentchev static void 683107e7dc5SPeter Pentchev sysctl_register_all(void *arg) 684ce02431fSDoug Rabson { 685f41325dbSPeter Wemm struct sysctl_oid **oidp; 686ce02431fSDoug Rabson 6873e829b18SJohn Baldwin sx_init(&sysctlmemlock, "sysctl mem"); 6883bd1da29SRobert Watson SYSCTL_INIT(); 689875b66a0SJohn Baldwin SYSCTL_XLOCK(); 690f41325dbSPeter Wemm SET_FOREACH(oidp, sysctl_set) 691f41325dbSPeter Wemm sysctl_register_oid(*oidp); 692875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 693f41325dbSPeter Wemm } 694*af3b2549SHans Petter Selasky SYSINIT(sysctl, SI_SUB_KMEM, SI_ORDER_FIRST, sysctl_register_all, 0); 695ce02431fSDoug Rabson 696946bb7a2SPoul-Henning Kamp /* 697946bb7a2SPoul-Henning Kamp * "Staff-functions" 698946bb7a2SPoul-Henning Kamp * 69965d0bc13SPoul-Henning Kamp * These functions implement a presently undocumented interface 70065d0bc13SPoul-Henning Kamp * used by the sysctl program to walk the tree, and get the type 70165d0bc13SPoul-Henning Kamp * so it can print the value. 70265d0bc13SPoul-Henning Kamp * This interface is under work and consideration, and should probably 70365d0bc13SPoul-Henning Kamp * be killed with a big axe by the first person who can find the time. 70465d0bc13SPoul-Henning Kamp * (be aware though, that the proper interface isn't as obvious as it 70565d0bc13SPoul-Henning Kamp * may seem, there are various conflicting requirements. 70665d0bc13SPoul-Henning Kamp * 707946bb7a2SPoul-Henning Kamp * {0,0} printf the entire MIB-tree. 708946bb7a2SPoul-Henning Kamp * {0,1,...} return the name of the "..." OID. 70986415b71SPoul-Henning Kamp * {0,2,...} return the next OID. 710946bb7a2SPoul-Henning Kamp * {0,3} return the OID of the name in "new" 71165d0bc13SPoul-Henning Kamp * {0,4,...} return the kind & format info for the "..." OID. 7126105f815SLuigi Rizzo * {0,5,...} return the description the "..." OID. 713946bb7a2SPoul-Henning Kamp */ 714946bb7a2SPoul-Henning Kamp 715df970488SRobert Watson #ifdef SYSCTL_DEBUG 716787d58f2SPoul-Henning Kamp static void 717ce02431fSDoug Rabson sysctl_sysctl_debug_dump_node(struct sysctl_oid_list *l, int i) 718787d58f2SPoul-Henning Kamp { 719ce02431fSDoug Rabson int k; 720ce02431fSDoug Rabson struct sysctl_oid *oidp; 721787d58f2SPoul-Henning Kamp 722ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 723ce02431fSDoug Rabson SLIST_FOREACH(oidp, l, oid_link) { 724787d58f2SPoul-Henning Kamp 725787d58f2SPoul-Henning Kamp for (k=0; k<i; k++) 726787d58f2SPoul-Henning Kamp printf(" "); 727787d58f2SPoul-Henning Kamp 728ce02431fSDoug Rabson printf("%d %s ", oidp->oid_number, oidp->oid_name); 729787d58f2SPoul-Henning Kamp 730787d58f2SPoul-Henning Kamp printf("%c%c", 731ce02431fSDoug Rabson oidp->oid_kind & CTLFLAG_RD ? 'R':' ', 732ce02431fSDoug Rabson oidp->oid_kind & CTLFLAG_WR ? 'W':' '); 733787d58f2SPoul-Henning Kamp 734ce02431fSDoug Rabson if (oidp->oid_handler) 73561220614SPoul-Henning Kamp printf(" *Handler"); 73661220614SPoul-Henning Kamp 737ce02431fSDoug Rabson switch (oidp->oid_kind & CTLTYPE) { 738787d58f2SPoul-Henning Kamp case CTLTYPE_NODE: 739787d58f2SPoul-Henning Kamp printf(" Node\n"); 740ce02431fSDoug Rabson if (!oidp->oid_handler) { 741787d58f2SPoul-Henning Kamp sysctl_sysctl_debug_dump_node( 742*af3b2549SHans Petter Selasky SYSCTL_CHILDREN(oidp), i + 2); 743787d58f2SPoul-Henning Kamp } 744787d58f2SPoul-Henning Kamp break; 745787d58f2SPoul-Henning Kamp case CTLTYPE_INT: printf(" Int\n"); break; 746cbc134adSMatthew D Fleming case CTLTYPE_UINT: printf(" u_int\n"); break; 747cbc134adSMatthew D Fleming case CTLTYPE_LONG: printf(" Long\n"); break; 748cbc134adSMatthew D Fleming case CTLTYPE_ULONG: printf(" u_long\n"); break; 749787d58f2SPoul-Henning Kamp case CTLTYPE_STRING: printf(" String\n"); break; 750cbc134adSMatthew D Fleming case CTLTYPE_U64: printf(" uint64_t\n"); break; 751cbc134adSMatthew D Fleming case CTLTYPE_S64: printf(" int64_t\n"); break; 752787d58f2SPoul-Henning Kamp case CTLTYPE_OPAQUE: printf(" Opaque/struct\n"); break; 753787d58f2SPoul-Henning Kamp default: printf("\n"); 754787d58f2SPoul-Henning Kamp } 755787d58f2SPoul-Henning Kamp 756787d58f2SPoul-Henning Kamp } 757787d58f2SPoul-Henning Kamp } 758787d58f2SPoul-Henning Kamp 759787d58f2SPoul-Henning Kamp static int 76082d9ae4eSPoul-Henning Kamp sysctl_sysctl_debug(SYSCTL_HANDLER_ARGS) 761787d58f2SPoul-Henning Kamp { 762023a0e61SPeter Wemm int error; 763023a0e61SPeter Wemm 764acd3428bSRobert Watson error = priv_check(req->td, PRIV_SYSCTL_DEBUG); 765023a0e61SPeter Wemm if (error) 76646003fb3SPawel Jakub Dawidek return (error); 767ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 768ce02431fSDoug Rabson sysctl_sysctl_debug_dump_node(&sysctl__children, 0); 769ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 77046003fb3SPawel Jakub Dawidek return (ENOENT); 771787d58f2SPoul-Henning Kamp } 772787d58f2SPoul-Henning Kamp 773787d58f2SPoul-Henning Kamp SYSCTL_PROC(_sysctl, 0, debug, CTLTYPE_STRING|CTLFLAG_RD, 774946bb7a2SPoul-Henning Kamp 0, 0, sysctl_sysctl_debug, "-", ""); 775df970488SRobert Watson #endif 7762e210993SPoul-Henning Kamp 777946bb7a2SPoul-Henning Kamp static int 77882d9ae4eSPoul-Henning Kamp sysctl_sysctl_name(SYSCTL_HANDLER_ARGS) 779946bb7a2SPoul-Henning Kamp { 780946bb7a2SPoul-Henning Kamp int *name = (int *) arg1; 781946bb7a2SPoul-Henning Kamp u_int namelen = arg2; 782ce02431fSDoug Rabson int error = 0; 783ce02431fSDoug Rabson struct sysctl_oid *oid; 7847f4173ccSPoul-Henning Kamp struct sysctl_oid_list *lsp = &sysctl__children, *lsp2; 785946bb7a2SPoul-Henning Kamp char buf[10]; 7862e210993SPoul-Henning Kamp 787ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 788946bb7a2SPoul-Henning Kamp while (namelen) { 789946bb7a2SPoul-Henning Kamp if (!lsp) { 7902127f260SArchie Cobbs snprintf(buf,sizeof(buf),"%d",*name); 791946bb7a2SPoul-Henning Kamp if (req->oldidx) 792946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, ".", 1); 793946bb7a2SPoul-Henning Kamp if (!error) 794946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, buf, strlen(buf)); 795946bb7a2SPoul-Henning Kamp if (error) 796ccecef29SMatthew D Fleming goto out; 797946bb7a2SPoul-Henning Kamp namelen--; 798946bb7a2SPoul-Henning Kamp name++; 799946bb7a2SPoul-Henning Kamp continue; 800946bb7a2SPoul-Henning Kamp } 8017f4173ccSPoul-Henning Kamp lsp2 = 0; 802ce02431fSDoug Rabson SLIST_FOREACH(oid, lsp, oid_link) { 803ce02431fSDoug Rabson if (oid->oid_number != *name) 804946bb7a2SPoul-Henning Kamp continue; 805946bb7a2SPoul-Henning Kamp 806946bb7a2SPoul-Henning Kamp if (req->oldidx) 807946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, ".", 1); 808946bb7a2SPoul-Henning Kamp if (!error) 809ce02431fSDoug Rabson error = SYSCTL_OUT(req, oid->oid_name, 810ce02431fSDoug Rabson strlen(oid->oid_name)); 811946bb7a2SPoul-Henning Kamp if (error) 812ccecef29SMatthew D Fleming goto out; 813946bb7a2SPoul-Henning Kamp 814946bb7a2SPoul-Henning Kamp namelen--; 815946bb7a2SPoul-Henning Kamp name++; 816946bb7a2SPoul-Henning Kamp 817ce02431fSDoug Rabson if ((oid->oid_kind & CTLTYPE) != CTLTYPE_NODE) 818946bb7a2SPoul-Henning Kamp break; 819946bb7a2SPoul-Henning Kamp 820ce02431fSDoug Rabson if (oid->oid_handler) 821946bb7a2SPoul-Henning Kamp break; 822946bb7a2SPoul-Henning Kamp 8235127ecb8SMatthew D Fleming lsp2 = SYSCTL_CHILDREN(oid); 824946bb7a2SPoul-Henning Kamp break; 825946bb7a2SPoul-Henning Kamp } 8267f4173ccSPoul-Henning Kamp lsp = lsp2; 827946bb7a2SPoul-Henning Kamp } 828ccecef29SMatthew D Fleming error = SYSCTL_OUT(req, "", 1); 829ccecef29SMatthew D Fleming out: 830ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 831ccecef29SMatthew D Fleming return (error); 832946bb7a2SPoul-Henning Kamp } 833946bb7a2SPoul-Henning Kamp 834ff66f6a4SRobert Watson /* 835ff66f6a4SRobert Watson * XXXRW/JA: Shouldn't return name data for nodes that we don't permit in 836ff66f6a4SRobert Watson * capability mode. 837ff66f6a4SRobert Watson */ 838ff66f6a4SRobert Watson static SYSCTL_NODE(_sysctl, 1, name, CTLFLAG_RD | CTLFLAG_CAPRD, 839ff66f6a4SRobert Watson sysctl_sysctl_name, ""); 840946bb7a2SPoul-Henning Kamp 841946bb7a2SPoul-Henning Kamp static int 842ce02431fSDoug Rabson sysctl_sysctl_next_ls(struct sysctl_oid_list *lsp, int *name, u_int namelen, 843ce02431fSDoug Rabson int *next, int *len, int level, struct sysctl_oid **oidpp) 844946bb7a2SPoul-Henning Kamp { 845ce02431fSDoug Rabson struct sysctl_oid *oidp; 846946bb7a2SPoul-Henning Kamp 847ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 848946bb7a2SPoul-Henning Kamp *len = level; 849ce02431fSDoug Rabson SLIST_FOREACH(oidp, lsp, oid_link) { 850ce02431fSDoug Rabson *next = oidp->oid_number; 851ce02431fSDoug Rabson *oidpp = oidp; 852946bb7a2SPoul-Henning Kamp 853306e6b83SMaxime Henrion if (oidp->oid_kind & CTLFLAG_SKIP) 854306e6b83SMaxime Henrion continue; 855306e6b83SMaxime Henrion 856946bb7a2SPoul-Henning Kamp if (!namelen) { 857ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 85846003fb3SPawel Jakub Dawidek return (0); 859ce02431fSDoug Rabson if (oidp->oid_handler) 860946bb7a2SPoul-Henning Kamp /* We really should call the handler here...*/ 86146003fb3SPawel Jakub Dawidek return (0); 8625127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 86361220614SPoul-Henning Kamp if (!sysctl_sysctl_next_ls(lsp, 0, 0, next+1, 864ce02431fSDoug Rabson len, level+1, oidpp)) 86546003fb3SPawel Jakub Dawidek return (0); 86690623e1aSRobert Watson goto emptynode; 867946bb7a2SPoul-Henning Kamp } 868946bb7a2SPoul-Henning Kamp 869ce02431fSDoug Rabson if (oidp->oid_number < *name) 870946bb7a2SPoul-Henning Kamp continue; 871946bb7a2SPoul-Henning Kamp 872ce02431fSDoug Rabson if (oidp->oid_number > *name) { 873ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 87446003fb3SPawel Jakub Dawidek return (0); 875ce02431fSDoug Rabson if (oidp->oid_handler) 87646003fb3SPawel Jakub Dawidek return (0); 8775127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 878946bb7a2SPoul-Henning Kamp if (!sysctl_sysctl_next_ls(lsp, name+1, namelen-1, 879ce02431fSDoug Rabson next+1, len, level+1, oidpp)) 880946bb7a2SPoul-Henning Kamp return (0); 88161220614SPoul-Henning Kamp goto next; 882946bb7a2SPoul-Henning Kamp } 883ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 884946bb7a2SPoul-Henning Kamp continue; 885946bb7a2SPoul-Henning Kamp 886ce02431fSDoug Rabson if (oidp->oid_handler) 887946bb7a2SPoul-Henning Kamp continue; 888946bb7a2SPoul-Henning Kamp 8895127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 890946bb7a2SPoul-Henning Kamp if (!sysctl_sysctl_next_ls(lsp, name+1, namelen-1, next+1, 891ce02431fSDoug Rabson len, level+1, oidpp)) 892946bb7a2SPoul-Henning Kamp return (0); 89361220614SPoul-Henning Kamp next: 894946bb7a2SPoul-Henning Kamp namelen = 1; 89590623e1aSRobert Watson emptynode: 896946bb7a2SPoul-Henning Kamp *len = level; 897946bb7a2SPoul-Henning Kamp } 89846003fb3SPawel Jakub Dawidek return (1); 899946bb7a2SPoul-Henning Kamp } 900946bb7a2SPoul-Henning Kamp 901946bb7a2SPoul-Henning Kamp static int 90282d9ae4eSPoul-Henning Kamp sysctl_sysctl_next(SYSCTL_HANDLER_ARGS) 903946bb7a2SPoul-Henning Kamp { 904946bb7a2SPoul-Henning Kamp int *name = (int *) arg1; 905946bb7a2SPoul-Henning Kamp u_int namelen = arg2; 906946bb7a2SPoul-Henning Kamp int i, j, error; 907946bb7a2SPoul-Henning Kamp struct sysctl_oid *oid; 908ce02431fSDoug Rabson struct sysctl_oid_list *lsp = &sysctl__children; 909946bb7a2SPoul-Henning Kamp int newoid[CTL_MAXNAME]; 910946bb7a2SPoul-Henning Kamp 911ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 912946bb7a2SPoul-Henning Kamp i = sysctl_sysctl_next_ls(lsp, name, namelen, newoid, &j, 1, &oid); 913ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 914946bb7a2SPoul-Henning Kamp if (i) 91546003fb3SPawel Jakub Dawidek return (ENOENT); 916946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, newoid, j * sizeof (int)); 917946bb7a2SPoul-Henning Kamp return (error); 918946bb7a2SPoul-Henning Kamp } 919946bb7a2SPoul-Henning Kamp 920ff66f6a4SRobert Watson /* 921ff66f6a4SRobert Watson * XXXRW/JA: Shouldn't return next data for nodes that we don't permit in 922ff66f6a4SRobert Watson * capability mode. 923ff66f6a4SRobert Watson */ 924ff66f6a4SRobert Watson static SYSCTL_NODE(_sysctl, 2, next, CTLFLAG_RD | CTLFLAG_CAPRD, 925ff66f6a4SRobert Watson sysctl_sysctl_next, ""); 926946bb7a2SPoul-Henning Kamp 927946bb7a2SPoul-Henning Kamp static int 928ce02431fSDoug Rabson name2oid(char *name, int *oid, int *len, struct sysctl_oid **oidpp) 929946bb7a2SPoul-Henning Kamp { 930ce02431fSDoug Rabson struct sysctl_oid *oidp; 931ce02431fSDoug Rabson struct sysctl_oid_list *lsp = &sysctl__children; 932946bb7a2SPoul-Henning Kamp char *p; 933946bb7a2SPoul-Henning Kamp 934ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 935ddf9d243SEd Schouten 936db9066f7SMarius Strobl for (*len = 0; *len < CTL_MAXNAME;) { 937db9066f7SMarius Strobl p = strsep(&name, "."); 938946bb7a2SPoul-Henning Kamp 939ce02431fSDoug Rabson oidp = SLIST_FIRST(lsp); 940db9066f7SMarius Strobl for (;; oidp = SLIST_NEXT(oidp, oid_link)) { 941db9066f7SMarius Strobl if (oidp == NULL) 942db9066f7SMarius Strobl return (ENOENT); 943db9066f7SMarius Strobl if (strcmp(p, oidp->oid_name) == 0) 944db9066f7SMarius Strobl break; 945946bb7a2SPoul-Henning Kamp } 946ce02431fSDoug Rabson *oid++ = oidp->oid_number; 947946bb7a2SPoul-Henning Kamp (*len)++; 948946bb7a2SPoul-Henning Kamp 949db9066f7SMarius Strobl if (name == NULL || *name == '\0') { 950ce02431fSDoug Rabson if (oidpp) 951ce02431fSDoug Rabson *oidpp = oidp; 952946bb7a2SPoul-Henning Kamp return (0); 953946bb7a2SPoul-Henning Kamp } 954946bb7a2SPoul-Henning Kamp 955ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 956946bb7a2SPoul-Henning Kamp break; 957946bb7a2SPoul-Henning Kamp 958ce02431fSDoug Rabson if (oidp->oid_handler) 959946bb7a2SPoul-Henning Kamp break; 960946bb7a2SPoul-Henning Kamp 9615127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 962946bb7a2SPoul-Henning Kamp } 96346003fb3SPawel Jakub Dawidek return (ENOENT); 964946bb7a2SPoul-Henning Kamp } 965946bb7a2SPoul-Henning Kamp 966946bb7a2SPoul-Henning Kamp static int 96782d9ae4eSPoul-Henning Kamp sysctl_sysctl_name2oid(SYSCTL_HANDLER_ARGS) 968946bb7a2SPoul-Henning Kamp { 969946bb7a2SPoul-Henning Kamp char *p; 970dd6312a7SMatthew D Fleming int error, oid[CTL_MAXNAME], len = 0; 971946bb7a2SPoul-Henning Kamp struct sysctl_oid *op = 0; 972946bb7a2SPoul-Henning Kamp 973946bb7a2SPoul-Henning Kamp if (!req->newlen) 97446003fb3SPawel Jakub Dawidek return (ENOENT); 9756a5d592aSPoul-Henning Kamp if (req->newlen >= MAXPATHLEN) /* XXX arbitrary, undocumented */ 9766a5d592aSPoul-Henning Kamp return (ENAMETOOLONG); 977946bb7a2SPoul-Henning Kamp 978a163d034SWarner Losh p = malloc(req->newlen+1, M_SYSCTL, M_WAITOK); 979946bb7a2SPoul-Henning Kamp 980946bb7a2SPoul-Henning Kamp error = SYSCTL_IN(req, p, req->newlen); 981946bb7a2SPoul-Henning Kamp if (error) { 982946bb7a2SPoul-Henning Kamp free(p, M_SYSCTL); 983946bb7a2SPoul-Henning Kamp return (error); 984946bb7a2SPoul-Henning Kamp } 985946bb7a2SPoul-Henning Kamp 986946bb7a2SPoul-Henning Kamp p [req->newlen] = '\0'; 987946bb7a2SPoul-Henning Kamp 988ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 989946bb7a2SPoul-Henning Kamp error = name2oid(p, oid, &len, &op); 990ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 991946bb7a2SPoul-Henning Kamp 992946bb7a2SPoul-Henning Kamp free(p, M_SYSCTL); 993946bb7a2SPoul-Henning Kamp 994946bb7a2SPoul-Henning Kamp if (error) 995946bb7a2SPoul-Henning Kamp return (error); 996946bb7a2SPoul-Henning Kamp 997946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, oid, len * sizeof *oid); 998946bb7a2SPoul-Henning Kamp return (error); 999946bb7a2SPoul-Henning Kamp } 1000946bb7a2SPoul-Henning Kamp 1001ff66f6a4SRobert Watson /* 1002ff66f6a4SRobert Watson * XXXRW/JA: Shouldn't return name2oid data for nodes that we don't permit in 1003ff66f6a4SRobert Watson * capability mode. 1004ff66f6a4SRobert Watson */ 10052fee06f0SMatthew D Fleming SYSCTL_PROC(_sysctl, 3, name2oid, 1006ff66f6a4SRobert Watson CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_ANYBODY | CTLFLAG_MPSAFE 1007ff66f6a4SRobert Watson | CTLFLAG_CAPRW, 0, 0, sysctl_sysctl_name2oid, "I", ""); 1008946bb7a2SPoul-Henning Kamp 1009946bb7a2SPoul-Henning Kamp static int 101082d9ae4eSPoul-Henning Kamp sysctl_sysctl_oidfmt(SYSCTL_HANDLER_ARGS) 1011946bb7a2SPoul-Henning Kamp { 1012ce02431fSDoug Rabson struct sysctl_oid *oid; 1013226420a4SBrian Feldman int error; 1014946bb7a2SPoul-Henning Kamp 1015ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 1016226420a4SBrian Feldman error = sysctl_find_oid(arg1, arg2, &oid, NULL, req); 1017226420a4SBrian Feldman if (error) 1018ccecef29SMatthew D Fleming goto out; 1019946bb7a2SPoul-Henning Kamp 1020ccecef29SMatthew D Fleming if (oid->oid_fmt == NULL) { 1021ccecef29SMatthew D Fleming error = ENOENT; 1022ccecef29SMatthew D Fleming goto out; 1023ccecef29SMatthew D Fleming } 1024226420a4SBrian Feldman error = SYSCTL_OUT(req, &oid->oid_kind, sizeof(oid->oid_kind)); 1025226420a4SBrian Feldman if (error) 1026ccecef29SMatthew D Fleming goto out; 1027226420a4SBrian Feldman error = SYSCTL_OUT(req, oid->oid_fmt, strlen(oid->oid_fmt) + 1); 1028ccecef29SMatthew D Fleming out: 1029ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 103065d0bc13SPoul-Henning Kamp return (error); 1031946bb7a2SPoul-Henning Kamp } 1032946bb7a2SPoul-Henning Kamp 103386415b71SPoul-Henning Kamp 1034ff66f6a4SRobert Watson static SYSCTL_NODE(_sysctl, 4, oidfmt, CTLFLAG_RD|CTLFLAG_MPSAFE|CTLFLAG_CAPRD, 1035f3b86a5fSEd Schouten sysctl_sysctl_oidfmt, ""); 1036946bb7a2SPoul-Henning Kamp 10376105f815SLuigi Rizzo static int 10386105f815SLuigi Rizzo sysctl_sysctl_oiddescr(SYSCTL_HANDLER_ARGS) 10396105f815SLuigi Rizzo { 10406105f815SLuigi Rizzo struct sysctl_oid *oid; 10416105f815SLuigi Rizzo int error; 10426105f815SLuigi Rizzo 1043ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 10446105f815SLuigi Rizzo error = sysctl_find_oid(arg1, arg2, &oid, NULL, req); 10456105f815SLuigi Rizzo if (error) 1046ccecef29SMatthew D Fleming goto out; 10476105f815SLuigi Rizzo 1048ccecef29SMatthew D Fleming if (oid->oid_descr == NULL) { 1049ccecef29SMatthew D Fleming error = ENOENT; 1050ccecef29SMatthew D Fleming goto out; 1051ccecef29SMatthew D Fleming } 10525937226dSPoul-Henning Kamp error = SYSCTL_OUT(req, oid->oid_descr, strlen(oid->oid_descr) + 1); 1053ccecef29SMatthew D Fleming out: 1054ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 10556105f815SLuigi Rizzo return (error); 10566105f815SLuigi Rizzo } 10576105f815SLuigi Rizzo 1058ff66f6a4SRobert Watson static SYSCTL_NODE(_sysctl, 5, oiddescr, CTLFLAG_RD|CTLFLAG_CAPRD, 1059ff66f6a4SRobert Watson sysctl_sysctl_oiddescr, ""); 10606105f815SLuigi Rizzo 1061946bb7a2SPoul-Henning Kamp /* 1062946bb7a2SPoul-Henning Kamp * Default "handler" functions. 1063946bb7a2SPoul-Henning Kamp */ 10642e210993SPoul-Henning Kamp 1065ae0eb976SPoul-Henning Kamp /* 1066486bddb0SDoug Rabson * Handle an int, signed or unsigned. 1067ae0eb976SPoul-Henning Kamp * Two cases: 1068ae0eb976SPoul-Henning Kamp * a variable: point arg1 at it. 1069ae0eb976SPoul-Henning Kamp * a constant: pass it in arg2. 1070ae0eb976SPoul-Henning Kamp */ 1071ae0eb976SPoul-Henning Kamp 10723a34a5c3SPoul-Henning Kamp int 107382d9ae4eSPoul-Henning Kamp sysctl_handle_int(SYSCTL_HANDLER_ARGS) 1074b396cd83SPoul-Henning Kamp { 10759e74cba3SDon Lewis int tmpout, error = 0; 1076b396cd83SPoul-Henning Kamp 10779e74cba3SDon Lewis /* 10789e74cba3SDon Lewis * Attempt to get a coherent snapshot by making a copy of the data. 10799e74cba3SDon Lewis */ 1080ae0eb976SPoul-Henning Kamp if (arg1) 10819e74cba3SDon Lewis tmpout = *(int *)arg1; 10821fbf1f71SBruce Evans else 10839e74cba3SDon Lewis tmpout = arg2; 10849e74cba3SDon Lewis error = SYSCTL_OUT(req, &tmpout, sizeof(int)); 1085b396cd83SPoul-Henning Kamp 1086ae0eb976SPoul-Henning Kamp if (error || !req->newptr) 1087ae0eb976SPoul-Henning Kamp return (error); 1088b396cd83SPoul-Henning Kamp 1089ae0eb976SPoul-Henning Kamp if (!arg1) 1090ae0eb976SPoul-Henning Kamp error = EPERM; 1091ae0eb976SPoul-Henning Kamp else 1092ae0eb976SPoul-Henning Kamp error = SYSCTL_IN(req, arg1, sizeof(int)); 1093ae0eb976SPoul-Henning Kamp return (error); 1094b396cd83SPoul-Henning Kamp } 1095b396cd83SPoul-Henning Kamp 1096a4684d74SAndre Oppermann /* 1097a4684d74SAndre Oppermann * Based on on sysctl_handle_int() convert milliseconds into ticks. 1098eddfbb76SRobert Watson * Note: this is used by TCP. 1099a4684d74SAndre Oppermann */ 1100a4684d74SAndre Oppermann 1101a4684d74SAndre Oppermann int 1102a4684d74SAndre Oppermann sysctl_msec_to_ticks(SYSCTL_HANDLER_ARGS) 1103a4684d74SAndre Oppermann { 1104a4684d74SAndre Oppermann int error, s, tt; 1105a4684d74SAndre Oppermann 1106f6dfe47aSMarko Zec tt = *(int *)arg1; 1107a4684d74SAndre Oppermann s = (int)((int64_t)tt * 1000 / hz); 1108a4684d74SAndre Oppermann 1109a4684d74SAndre Oppermann error = sysctl_handle_int(oidp, &s, 0, req); 1110a4684d74SAndre Oppermann if (error || !req->newptr) 1111a4684d74SAndre Oppermann return (error); 1112a4684d74SAndre Oppermann 1113a4684d74SAndre Oppermann tt = (int)((int64_t)s * hz / 1000); 1114a4684d74SAndre Oppermann if (tt < 1) 1115a4684d74SAndre Oppermann return (EINVAL); 1116a4684d74SAndre Oppermann 1117f6dfe47aSMarko Zec *(int *)arg1 = tt; 1118a4684d74SAndre Oppermann return (0); 1119a4684d74SAndre Oppermann } 1120a4684d74SAndre Oppermann 1121a4684d74SAndre Oppermann 1122ae0eb976SPoul-Henning Kamp /* 112318716f9fSMarius Strobl * Handle a long, signed or unsigned. 112418716f9fSMarius Strobl * Two cases: 112518716f9fSMarius Strobl * a variable: point arg1 at it. 112618716f9fSMarius Strobl * a constant: pass it in arg2. 1127069e9bc1SDoug Rabson */ 1128069e9bc1SDoug Rabson 1129069e9bc1SDoug Rabson int 113082d9ae4eSPoul-Henning Kamp sysctl_handle_long(SYSCTL_HANDLER_ARGS) 1131069e9bc1SDoug Rabson { 1132069e9bc1SDoug Rabson int error = 0; 1133a7bc3102SPeter Wemm long tmplong; 1134a7bc3102SPeter Wemm #ifdef SCTL_MASK32 1135a7bc3102SPeter Wemm int tmpint; 1136a7bc3102SPeter Wemm #endif 1137069e9bc1SDoug Rabson 11389e74cba3SDon Lewis /* 11399e74cba3SDon Lewis * Attempt to get a coherent snapshot by making a copy of the data. 11409e74cba3SDon Lewis */ 1141bdc5f017SMarius Strobl if (arg1) 1142a7bc3102SPeter Wemm tmplong = *(long *)arg1; 1143bdc5f017SMarius Strobl else 1144bdc5f017SMarius Strobl tmplong = arg2; 1145a7bc3102SPeter Wemm #ifdef SCTL_MASK32 1146a7bc3102SPeter Wemm if (req->flags & SCTL_MASK32) { 1147a7bc3102SPeter Wemm tmpint = tmplong; 1148a7bc3102SPeter Wemm error = SYSCTL_OUT(req, &tmpint, sizeof(int)); 1149a7bc3102SPeter Wemm } else 1150a7bc3102SPeter Wemm #endif 1151a7bc3102SPeter Wemm error = SYSCTL_OUT(req, &tmplong, sizeof(long)); 1152069e9bc1SDoug Rabson 1153069e9bc1SDoug Rabson if (error || !req->newptr) 1154069e9bc1SDoug Rabson return (error); 1155069e9bc1SDoug Rabson 1156bdc5f017SMarius Strobl if (!arg1) 1157bdc5f017SMarius Strobl error = EPERM; 1158a7bc3102SPeter Wemm #ifdef SCTL_MASK32 1159bdc5f017SMarius Strobl else if (req->flags & SCTL_MASK32) { 1160a7bc3102SPeter Wemm error = SYSCTL_IN(req, &tmpint, sizeof(int)); 1161a7bc3102SPeter Wemm *(long *)arg1 = (long)tmpint; 1162bdc5f017SMarius Strobl } 1163a7bc3102SPeter Wemm #endif 1164bdc5f017SMarius Strobl else 1165069e9bc1SDoug Rabson error = SYSCTL_IN(req, arg1, sizeof(long)); 1166069e9bc1SDoug Rabson return (error); 1167069e9bc1SDoug Rabson } 1168069e9bc1SDoug Rabson 1169069e9bc1SDoug Rabson /* 117018716f9fSMarius Strobl * Handle a 64 bit int, signed or unsigned. 117118716f9fSMarius Strobl * Two cases: 117218716f9fSMarius Strobl * a variable: point arg1 at it. 117318716f9fSMarius Strobl * a constant: pass it in arg2. 1174df82ff50SDavid Malone */ 1175df82ff50SDavid Malone int 1176cbc134adSMatthew D Fleming sysctl_handle_64(SYSCTL_HANDLER_ARGS) 1177df82ff50SDavid Malone { 1178df82ff50SDavid Malone int error = 0; 1179df82ff50SDavid Malone uint64_t tmpout; 1180df82ff50SDavid Malone 1181df82ff50SDavid Malone /* 1182df82ff50SDavid Malone * Attempt to get a coherent snapshot by making a copy of the data. 1183df82ff50SDavid Malone */ 1184bdc5f017SMarius Strobl if (arg1) 1185df82ff50SDavid Malone tmpout = *(uint64_t *)arg1; 1186bdc5f017SMarius Strobl else 1187bdc5f017SMarius Strobl tmpout = arg2; 1188df82ff50SDavid Malone error = SYSCTL_OUT(req, &tmpout, sizeof(uint64_t)); 1189df82ff50SDavid Malone 1190df82ff50SDavid Malone if (error || !req->newptr) 1191df82ff50SDavid Malone return (error); 1192df82ff50SDavid Malone 1193bdc5f017SMarius Strobl if (!arg1) 1194bdc5f017SMarius Strobl error = EPERM; 1195bdc5f017SMarius Strobl else 1196df82ff50SDavid Malone error = SYSCTL_IN(req, arg1, sizeof(uint64_t)); 1197df82ff50SDavid Malone return (error); 1198df82ff50SDavid Malone } 1199df82ff50SDavid Malone 1200df82ff50SDavid Malone /* 1201ae0eb976SPoul-Henning Kamp * Handle our generic '\0' terminated 'C' string. 1202ae0eb976SPoul-Henning Kamp * Two cases: 1203ae0eb976SPoul-Henning Kamp * a variable string: point arg1 at it, arg2 is max length. 1204ae0eb976SPoul-Henning Kamp * a constant string: point arg1 at it, arg2 is zero. 1205ae0eb976SPoul-Henning Kamp */ 1206ae0eb976SPoul-Henning Kamp 12073a34a5c3SPoul-Henning Kamp int 120882d9ae4eSPoul-Henning Kamp sysctl_handle_string(SYSCTL_HANDLER_ARGS) 1209b396cd83SPoul-Henning Kamp { 121037a107a4SGlen Barber size_t outlen; 1211*af3b2549SHans Petter Selasky int error = 0; 1212e80fb434SRobert Drehmel 1213*af3b2549SHans Petter Selasky /* check for zero-length buffer */ 1214*af3b2549SHans Petter Selasky if (arg2 == 0) 1215*af3b2549SHans Petter Selasky return (ENOMEM); 12163da1cf1eSHans Petter Selasky 1217*af3b2549SHans Petter Selasky if (req->oldptr != NULL) { 1218*af3b2549SHans Petter Selasky char *tmparg; 121937a107a4SGlen Barber 1220*af3b2549SHans Petter Selasky /* try to make a coherent snapshot of the string */ 1221*af3b2549SHans Petter Selasky tmparg = malloc(arg2, M_SYSCTLTMP, M_WAITOK); 1222*af3b2549SHans Petter Selasky memcpy(tmparg, arg1, arg2); 1223*af3b2549SHans Petter Selasky 1224*af3b2549SHans Petter Selasky outlen = strnlen(tmparg, arg2 - 1) + 1; 122537a107a4SGlen Barber error = SYSCTL_OUT(req, tmparg, outlen); 122637a107a4SGlen Barber 1227*af3b2549SHans Petter Selasky free(tmparg, M_SYSCTLTMP); 1228*af3b2549SHans Petter Selasky } else { 1229*af3b2549SHans Petter Selasky outlen = strnlen((char *)arg1, arg2 - 1) + 1; 1230*af3b2549SHans Petter Selasky error = SYSCTL_OUT(req, NULL, outlen); 1231*af3b2549SHans Petter Selasky } 12326a5d592aSPoul-Henning Kamp if (error || !req->newptr) 1233ae0eb976SPoul-Henning Kamp return (error); 1234ae0eb976SPoul-Henning Kamp 12356a5d592aSPoul-Henning Kamp if ((req->newlen - req->newidx) >= arg2) { 12366a5d592aSPoul-Henning Kamp error = EINVAL; 1237ae0eb976SPoul-Henning Kamp } else { 1238ae0eb976SPoul-Henning Kamp arg2 = (req->newlen - req->newidx); 1239ae0eb976SPoul-Henning Kamp error = SYSCTL_IN(req, arg1, arg2); 1240ae0eb976SPoul-Henning Kamp ((char *)arg1)[arg2] = '\0'; 1241b396cd83SPoul-Henning Kamp } 12422e210993SPoul-Henning Kamp return (error); 1243b396cd83SPoul-Henning Kamp } 1244b396cd83SPoul-Henning Kamp 1245ae0eb976SPoul-Henning Kamp /* 1246ae0eb976SPoul-Henning Kamp * Handle any kind of opaque data. 1247ae0eb976SPoul-Henning Kamp * arg1 points to it, arg2 is the size. 1248ae0eb976SPoul-Henning Kamp */ 1249ae0eb976SPoul-Henning Kamp 12503a34a5c3SPoul-Henning Kamp int 125182d9ae4eSPoul-Henning Kamp sysctl_handle_opaque(SYSCTL_HANDLER_ARGS) 1252b396cd83SPoul-Henning Kamp { 1253dcf59a59SBruce M Simpson int error, tries; 1254dcf59a59SBruce M Simpson u_int generation; 1255f0597024SBruce M Simpson struct sysctl_req req2; 1256b396cd83SPoul-Henning Kamp 12579e74cba3SDon Lewis /* 1258dcf59a59SBruce M Simpson * Attempt to get a coherent snapshot, by using the thread 1259dcf59a59SBruce M Simpson * pre-emption counter updated from within mi_switch() to 1260dcf59a59SBruce M Simpson * determine if we were pre-empted during a bcopy() or 1261dcf59a59SBruce M Simpson * copyout(). Make 3 attempts at doing this before giving up. 1262dcf59a59SBruce M Simpson * If we encounter an error, stop immediately. 12639e74cba3SDon Lewis */ 1264dcf59a59SBruce M Simpson tries = 0; 1265f0597024SBruce M Simpson req2 = *req; 1266f0597024SBruce M Simpson retry: 1267dcf59a59SBruce M Simpson generation = curthread->td_generation; 1268ae0eb976SPoul-Henning Kamp error = SYSCTL_OUT(req, arg1, arg2); 1269dcf59a59SBruce M Simpson if (error) 1270ae0eb976SPoul-Henning Kamp return (error); 1271dcf59a59SBruce M Simpson tries++; 1272f0597024SBruce M Simpson if (generation != curthread->td_generation && tries < 3) { 1273f0597024SBruce M Simpson *req = req2; 1274f0597024SBruce M Simpson goto retry; 1275f0597024SBruce M Simpson } 1276ae0eb976SPoul-Henning Kamp 1277ae0eb976SPoul-Henning Kamp error = SYSCTL_IN(req, arg1, arg2); 1278ae0eb976SPoul-Henning Kamp 1279ae0eb976SPoul-Henning Kamp return (error); 1280b396cd83SPoul-Henning Kamp } 1281ae0eb976SPoul-Henning Kamp 1282deae269aSPoul-Henning Kamp /* 1283deae269aSPoul-Henning Kamp * Transfer functions to/from kernel space. 1284deae269aSPoul-Henning Kamp * XXX: rather untested at this point 1285deae269aSPoul-Henning Kamp */ 1286deae269aSPoul-Henning Kamp static int 1287069e9bc1SDoug Rabson sysctl_old_kernel(struct sysctl_req *req, const void *p, size_t l) 1288ae0eb976SPoul-Henning Kamp { 1289069e9bc1SDoug Rabson size_t i = 0; 1290deae269aSPoul-Henning Kamp 1291deae269aSPoul-Henning Kamp if (req->oldptr) { 1292069e9bc1SDoug Rabson i = l; 12933a515572SThomas Moestl if (req->oldlen <= req->oldidx) 12943a515572SThomas Moestl i = 0; 12953a515572SThomas Moestl else 1296069e9bc1SDoug Rabson if (i > req->oldlen - req->oldidx) 1297069e9bc1SDoug Rabson i = req->oldlen - req->oldidx; 1298deae269aSPoul-Henning Kamp if (i > 0) 129909a8dfa2SBruce Evans bcopy(p, (char *)req->oldptr + req->oldidx, i); 1300ae0eb976SPoul-Henning Kamp } 13016b72d8dbSKonstantin Belousov req->oldidx += l; 13021c346c70SNate Williams if (req->oldptr && i != l) 1303ae0eb976SPoul-Henning Kamp return (ENOMEM); 13042e210993SPoul-Henning Kamp return (0); 1305ae0eb976SPoul-Henning Kamp } 1306ae0eb976SPoul-Henning Kamp 1307deae269aSPoul-Henning Kamp static int 1308069e9bc1SDoug Rabson sysctl_new_kernel(struct sysctl_req *req, void *p, size_t l) 1309ae0eb976SPoul-Henning Kamp { 1310deae269aSPoul-Henning Kamp if (!req->newptr) 131146003fb3SPawel Jakub Dawidek return (0); 1312deae269aSPoul-Henning Kamp if (req->newlen - req->newidx < l) 1313ae0eb976SPoul-Henning Kamp return (EINVAL); 131409a8dfa2SBruce Evans bcopy((char *)req->newptr + req->newidx, p, l); 1315ae0eb976SPoul-Henning Kamp req->newidx += l; 1316ae0eb976SPoul-Henning Kamp return (0); 1317ae0eb976SPoul-Henning Kamp } 1318ae0eb976SPoul-Henning Kamp 13191c346c70SNate Williams int 1320b40ce416SJulian Elischer kernel_sysctl(struct thread *td, int *name, u_int namelen, void *old, 1321a7bc3102SPeter Wemm size_t *oldlenp, void *new, size_t newlen, size_t *retval, int flags) 13221c346c70SNate Williams { 13231c346c70SNate Williams int error = 0; 13241c346c70SNate Williams struct sysctl_req req; 13251c346c70SNate Williams 13261c346c70SNate Williams bzero(&req, sizeof req); 13271c346c70SNate Williams 1328ce178806SRobert Watson req.td = td; 1329a7bc3102SPeter Wemm req.flags = flags; 13301c346c70SNate Williams 13311c346c70SNate Williams if (oldlenp) { 13321c346c70SNate Williams req.oldlen = *oldlenp; 13331c346c70SNate Williams } 1334a961520cSDon Lewis req.validlen = req.oldlen; 13351c346c70SNate Williams 13361c346c70SNate Williams if (old) { 13371c346c70SNate Williams req.oldptr= old; 13381c346c70SNate Williams } 13391c346c70SNate Williams 1340b8edb44cSDima Dorfman if (new != NULL) { 13411c346c70SNate Williams req.newlen = newlen; 13421c346c70SNate Williams req.newptr = new; 13431c346c70SNate Williams } 13441c346c70SNate Williams 13451c346c70SNate Williams req.oldfunc = sysctl_old_kernel; 13461c346c70SNate Williams req.newfunc = sysctl_new_kernel; 134773d6f851SMatthew D Fleming req.lock = REQ_UNWIRED; 13481c346c70SNate Williams 1349ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 13501c346c70SNate Williams error = sysctl_root(0, name, namelen, &req); 1351ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 1352f0597024SBruce M Simpson 1353a961520cSDon Lewis if (req.lock == REQ_WIRED && req.validlen > 0) 1354a961520cSDon Lewis vsunlock(req.oldptr, req.validlen); 13551c346c70SNate Williams 13561c346c70SNate Williams if (error && error != ENOMEM) 13571c346c70SNate Williams return (error); 13581c346c70SNate Williams 13591c346c70SNate Williams if (retval) { 1360a961520cSDon Lewis if (req.oldptr && req.oldidx > req.validlen) 1361a961520cSDon Lewis *retval = req.validlen; 13621c346c70SNate Williams else 13631c346c70SNate Williams *retval = req.oldidx; 13641c346c70SNate Williams } 13651c346c70SNate Williams return (error); 13661c346c70SNate Williams } 13671c346c70SNate Williams 13681890520aSJonathan Lemon int 1369b40ce416SJulian Elischer kernel_sysctlbyname(struct thread *td, char *name, void *old, size_t *oldlenp, 1370a7bc3102SPeter Wemm void *new, size_t newlen, size_t *retval, int flags) 13711890520aSJonathan Lemon { 13721890520aSJonathan Lemon int oid[CTL_MAXNAME]; 13732f7f966cSMatt Jacob size_t oidlen, plen; 13742f7f966cSMatt Jacob int error; 13751890520aSJonathan Lemon 13761890520aSJonathan Lemon oid[0] = 0; /* sysctl internal magic */ 13771890520aSJonathan Lemon oid[1] = 3; /* name2oid */ 13781890520aSJonathan Lemon oidlen = sizeof(oid); 13791890520aSJonathan Lemon 1380b40ce416SJulian Elischer error = kernel_sysctl(td, oid, 2, oid, &oidlen, 1381a7bc3102SPeter Wemm (void *)name, strlen(name), &plen, flags); 13821890520aSJonathan Lemon if (error) 13831890520aSJonathan Lemon return (error); 13841890520aSJonathan Lemon 1385b40ce416SJulian Elischer error = kernel_sysctl(td, oid, plen / sizeof(int), old, oldlenp, 1386a7bc3102SPeter Wemm new, newlen, retval, flags); 13871890520aSJonathan Lemon return (error); 13881890520aSJonathan Lemon } 13891890520aSJonathan Lemon 1390deae269aSPoul-Henning Kamp /* 1391deae269aSPoul-Henning Kamp * Transfer function to/from user space. 1392deae269aSPoul-Henning Kamp */ 1393deae269aSPoul-Henning Kamp static int 1394069e9bc1SDoug Rabson sysctl_old_user(struct sysctl_req *req, const void *p, size_t l) 1395ae0eb976SPoul-Henning Kamp { 139647934cefSDon Lewis size_t i, len, origidx; 13975730afc9SAlan Cox int error; 1398ae0eb976SPoul-Henning Kamp 139947934cefSDon Lewis origidx = req->oldidx; 140047934cefSDon Lewis req->oldidx += l; 14016b72d8dbSKonstantin Belousov if (req->oldptr == NULL) 140247934cefSDon Lewis return (0); 1403417ab24fSChristian S.J. Peron /* 1404417ab24fSChristian S.J. Peron * If we have not wired the user supplied buffer and we are currently 1405417ab24fSChristian S.J. Peron * holding locks, drop a witness warning, as it's possible that 1406417ab24fSChristian S.J. Peron * write operations to the user page can sleep. 1407417ab24fSChristian S.J. Peron */ 1408417ab24fSChristian S.J. Peron if (req->lock != REQ_WIRED) 140926306795SJohn Baldwin WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL, 141026306795SJohn Baldwin "sysctl_old_user()"); 1411069e9bc1SDoug Rabson i = l; 1412a961520cSDon Lewis len = req->validlen; 141347934cefSDon Lewis if (len <= origidx) 14143a515572SThomas Moestl i = 0; 141547934cefSDon Lewis else { 141647934cefSDon Lewis if (i > len - origidx) 141747934cefSDon Lewis i = len - origidx; 14185730afc9SAlan Cox if (req->lock == REQ_WIRED) { 14195730afc9SAlan Cox error = copyout_nofault(p, (char *)req->oldptr + 14205730afc9SAlan Cox origidx, i); 14215730afc9SAlan Cox } else 142247934cefSDon Lewis error = copyout(p, (char *)req->oldptr + origidx, i); 14235730afc9SAlan Cox if (error != 0) 1424ae0eb976SPoul-Henning Kamp return (error); 14255730afc9SAlan Cox } 142647934cefSDon Lewis if (i < l) 1427ae0eb976SPoul-Henning Kamp return (ENOMEM); 1428deae269aSPoul-Henning Kamp return (0); 1429ae0eb976SPoul-Henning Kamp } 1430ae0eb976SPoul-Henning Kamp 1431deae269aSPoul-Henning Kamp static int 1432069e9bc1SDoug Rabson sysctl_new_user(struct sysctl_req *req, void *p, size_t l) 1433ae0eb976SPoul-Henning Kamp { 143416cd04a3SPoul-Henning Kamp int error; 1435deae269aSPoul-Henning Kamp 1436deae269aSPoul-Henning Kamp if (!req->newptr) 143746003fb3SPawel Jakub Dawidek return (0); 1438deae269aSPoul-Henning Kamp if (req->newlen - req->newidx < l) 1439ae0eb976SPoul-Henning Kamp return (EINVAL); 1440d8339a26SChristian S.J. Peron WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL, 1441d8339a26SChristian S.J. Peron "sysctl_new_user()"); 144209a8dfa2SBruce Evans error = copyin((char *)req->newptr + req->newidx, p, l); 1443ae0eb976SPoul-Henning Kamp req->newidx += l; 1444ae0eb976SPoul-Henning Kamp return (error); 1445b396cd83SPoul-Henning Kamp } 1446b396cd83SPoul-Henning Kamp 14470600730dSDon Lewis /* 14480600730dSDon Lewis * Wire the user space destination buffer. If set to a value greater than 14490600730dSDon Lewis * zero, the len parameter limits the maximum amount of wired memory. 14500600730dSDon Lewis */ 145147934cefSDon Lewis int 14520600730dSDon Lewis sysctl_wire_old_buffer(struct sysctl_req *req, size_t len) 14530600730dSDon Lewis { 145447934cefSDon Lewis int ret; 1455433e2f47SDag-Erling Smørgrav size_t wiredlen; 145647934cefSDon Lewis 145747934cefSDon Lewis wiredlen = (len > 0 && len < req->oldlen) ? len : req->oldlen; 145847934cefSDon Lewis ret = 0; 145973d6f851SMatthew D Fleming if (req->lock != REQ_WIRED && req->oldptr && 14605be99846SBruce M Simpson req->oldfunc == sysctl_old_user) { 14618ac3e8e9SDon Lewis if (wiredlen != 0) { 1462ce8660e3SDon Lewis ret = vslock(req->oldptr, wiredlen); 1463b4adfcf2SBrian Feldman if (ret != 0) { 1464b4adfcf2SBrian Feldman if (ret != ENOMEM) 14658ac3e8e9SDon Lewis return (ret); 1466b4adfcf2SBrian Feldman wiredlen = 0; 1467b4adfcf2SBrian Feldman } 14688ac3e8e9SDon Lewis } 14695be99846SBruce M Simpson req->lock = REQ_WIRED; 1470a961520cSDon Lewis req->validlen = wiredlen; 14710600730dSDon Lewis } 14728ac3e8e9SDon Lewis return (0); 147347934cefSDon Lewis } 14740600730dSDon Lewis 14752e210993SPoul-Henning Kamp int 1476226420a4SBrian Feldman sysctl_find_oid(int *name, u_int namelen, struct sysctl_oid **noid, 1477226420a4SBrian Feldman int *nindx, struct sysctl_req *req) 14782e210993SPoul-Henning Kamp { 1479d0bb6f25SMatthew D Fleming struct sysctl_oid_list *lsp; 1480ce02431fSDoug Rabson struct sysctl_oid *oid; 1481226420a4SBrian Feldman int indx; 14822e210993SPoul-Henning Kamp 1483ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 1484d0bb6f25SMatthew D Fleming lsp = &sysctl__children; 14852e210993SPoul-Henning Kamp indx = 0; 1486d0bb6f25SMatthew D Fleming while (indx < CTL_MAXNAME) { 1487d0bb6f25SMatthew D Fleming SLIST_FOREACH(oid, lsp, oid_link) { 1488d0bb6f25SMatthew D Fleming if (oid->oid_number == name[indx]) 1489d0bb6f25SMatthew D Fleming break; 1490d0bb6f25SMatthew D Fleming } 1491d0bb6f25SMatthew D Fleming if (oid == NULL) 1492d0bb6f25SMatthew D Fleming return (ENOENT); 1493d0bb6f25SMatthew D Fleming 14942e210993SPoul-Henning Kamp indx++; 1495ce02431fSDoug Rabson if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 1496d0bb6f25SMatthew D Fleming if (oid->oid_handler != NULL || indx == namelen) { 1497226420a4SBrian Feldman *noid = oid; 1498226420a4SBrian Feldman if (nindx != NULL) 1499226420a4SBrian Feldman *nindx = indx; 1500ccecef29SMatthew D Fleming KASSERT((oid->oid_kind & CTLFLAG_DYING) == 0, 1501ccecef29SMatthew D Fleming ("%s found DYING node %p", __func__, oid)); 1502226420a4SBrian Feldman return (0); 1503226420a4SBrian Feldman } 1504d0bb6f25SMatthew D Fleming lsp = SYSCTL_CHILDREN(oid); 1505226420a4SBrian Feldman } else if (indx == namelen) { 1506226420a4SBrian Feldman *noid = oid; 1507226420a4SBrian Feldman if (nindx != NULL) 1508226420a4SBrian Feldman *nindx = indx; 1509ccecef29SMatthew D Fleming KASSERT((oid->oid_kind & CTLFLAG_DYING) == 0, 1510ccecef29SMatthew D Fleming ("%s found DYING node %p", __func__, oid)); 1511226420a4SBrian Feldman return (0); 15122e210993SPoul-Henning Kamp } else { 1513226420a4SBrian Feldman return (ENOTDIR); 15142e210993SPoul-Henning Kamp } 15152e210993SPoul-Henning Kamp } 1516226420a4SBrian Feldman return (ENOENT); 1517226420a4SBrian Feldman } 1518226420a4SBrian Feldman 1519226420a4SBrian Feldman /* 1520226420a4SBrian Feldman * Traverse our tree, and find the right node, execute whatever it points 1521226420a4SBrian Feldman * to, and return the resulting error code. 1522226420a4SBrian Feldman */ 1523226420a4SBrian Feldman 152437c84183SPoul-Henning Kamp static int 152582d9ae4eSPoul-Henning Kamp sysctl_root(SYSCTL_HANDLER_ARGS) 1526226420a4SBrian Feldman { 1527226420a4SBrian Feldman struct sysctl_oid *oid; 1528fe41ca53SMatthew Dillon int error, indx, lvl; 1529226420a4SBrian Feldman 1530ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 1531ddf9d243SEd Schouten 1532226420a4SBrian Feldman error = sysctl_find_oid(arg1, arg2, &oid, &indx, req); 1533226420a4SBrian Feldman if (error) 1534226420a4SBrian Feldman return (error); 1535226420a4SBrian Feldman 1536226420a4SBrian Feldman if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 1537226420a4SBrian Feldman /* 1538226420a4SBrian Feldman * You can't call a sysctl when it's a node, but has 1539226420a4SBrian Feldman * no handler. Inform the user that it's a node. 1540226420a4SBrian Feldman * The indx may or may not be the same as namelen. 1541226420a4SBrian Feldman */ 1542226420a4SBrian Feldman if (oid->oid_handler == NULL) 1543226420a4SBrian Feldman return (EISDIR); 1544226420a4SBrian Feldman } 1545226420a4SBrian Feldman 1546c2f413afSRobert Watson /* Is this sysctl writable? */ 1547c2f413afSRobert Watson if (req->newptr && !(oid->oid_kind & CTLFLAG_WR)) 15482e210993SPoul-Henning Kamp return (EPERM); 15492e210993SPoul-Henning Kamp 15507906271fSRobert Watson KASSERT(req->td != NULL, ("sysctl_root(): req->td == NULL")); 15517906271fSRobert Watson 1552ff66f6a4SRobert Watson #ifdef CAPABILITY_MODE 1553ff66f6a4SRobert Watson /* 1554ff66f6a4SRobert Watson * If the process is in capability mode, then don't permit reading or 1555ff66f6a4SRobert Watson * writing unless specifically granted for the node. 1556ff66f6a4SRobert Watson */ 1557ff66f6a4SRobert Watson if (IN_CAPABILITY_MODE(req->td)) { 1558ff66f6a4SRobert Watson if (req->oldptr && !(oid->oid_kind & CTLFLAG_CAPRD)) 1559ff66f6a4SRobert Watson return (EPERM); 1560ff66f6a4SRobert Watson if (req->newptr && !(oid->oid_kind & CTLFLAG_CAPWR)) 1561ff66f6a4SRobert Watson return (EPERM); 1562ff66f6a4SRobert Watson } 1563ff66f6a4SRobert Watson #endif 1564ff66f6a4SRobert Watson 1565c2f413afSRobert Watson /* Is this sysctl sensitive to securelevels? */ 1566c2f413afSRobert Watson if (req->newptr && (oid->oid_kind & CTLFLAG_SECURE)) { 1567fe41ca53SMatthew Dillon lvl = (oid->oid_kind & CTLMASK_SECURE) >> CTLSHIFT_SECURE; 1568fe41ca53SMatthew Dillon error = securelevel_gt(req->td->td_ucred, lvl); 1569c2f413afSRobert Watson if (error) 1570c2f413afSRobert Watson return (error); 1571c2f413afSRobert Watson } 1572c2f413afSRobert Watson 1573c2f413afSRobert Watson /* Is this sysctl writable by only privileged users? */ 1574c2f413afSRobert Watson if (req->newptr && !(oid->oid_kind & CTLFLAG_ANYBODY)) { 1575eb79e1c7SBjoern A. Zeeb int priv; 1576eb79e1c7SBjoern A. Zeeb 1577c2f413afSRobert Watson if (oid->oid_kind & CTLFLAG_PRISON) 1578eb79e1c7SBjoern A. Zeeb priv = PRIV_SYSCTL_WRITEJAIL; 1579eb79e1c7SBjoern A. Zeeb #ifdef VIMAGE 1580eb79e1c7SBjoern A. Zeeb else if ((oid->oid_kind & CTLFLAG_VNET) && 1581eb79e1c7SBjoern A. Zeeb prison_owns_vnet(req->td->td_ucred)) 1582eb79e1c7SBjoern A. Zeeb priv = PRIV_SYSCTL_WRITEJAIL; 1583eb79e1c7SBjoern A. Zeeb #endif 1584c2f413afSRobert Watson else 1585eb79e1c7SBjoern A. Zeeb priv = PRIV_SYSCTL_WRITE; 1586eb79e1c7SBjoern A. Zeeb error = priv_check(req->td, priv); 1587c2f413afSRobert Watson if (error) 1588c2f413afSRobert Watson return (error); 1589c2f413afSRobert Watson } 15903ac9f819SPoul-Henning Kamp 1591ce02431fSDoug Rabson if (!oid->oid_handler) 159246003fb3SPawel Jakub Dawidek return (EINVAL); 15932e210993SPoul-Henning Kamp 159463dba32bSPawel Jakub Dawidek if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 159500fbcda8SAlexander Kabaev arg1 = (int *)arg1 + indx; 159663dba32bSPawel Jakub Dawidek arg2 -= indx; 159763dba32bSPawel Jakub Dawidek } else { 159863dba32bSPawel Jakub Dawidek arg1 = oid->oid_arg1; 159963dba32bSPawel Jakub Dawidek arg2 = oid->oid_arg2; 160063dba32bSPawel Jakub Dawidek } 160163dba32bSPawel Jakub Dawidek #ifdef MAC 160230d239bcSRobert Watson error = mac_system_check_sysctl(req->td->td_ucred, oid, arg1, arg2, 1603ae0eb976SPoul-Henning Kamp req); 160463dba32bSPawel Jakub Dawidek if (error != 0) 160563dba32bSPawel Jakub Dawidek return (error); 160663dba32bSPawel Jakub Dawidek #endif 1607b5c32cf4SGleb Smirnoff #ifdef VIMAGE 1608b5c32cf4SGleb Smirnoff if ((oid->oid_kind & CTLFLAG_VNET) && arg1 != NULL) 1609b5c32cf4SGleb Smirnoff arg1 = (void *)(curvnet->vnet_data_base + (uintptr_t)arg1); 1610b5c32cf4SGleb Smirnoff #endif 1611*af3b2549SHans Petter Selasky error = sysctl_root_handler_locked(oid, arg1, arg2, req); 161263dba32bSPawel Jakub Dawidek 1613ccecef29SMatthew D Fleming KFAIL_POINT_ERROR(_debug_fail_point, sysctl_running, error); 1614ccecef29SMatthew D Fleming 1615226420a4SBrian Feldman return (error); 16162e210993SPoul-Henning Kamp } 16172e210993SPoul-Henning Kamp 1618d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_ 1619b8da2396SPoul-Henning Kamp struct sysctl_args { 1620b8da2396SPoul-Henning Kamp int *name; 1621b8da2396SPoul-Henning Kamp u_int namelen; 1622b8da2396SPoul-Henning Kamp void *old; 1623b8da2396SPoul-Henning Kamp size_t *oldlenp; 1624b8da2396SPoul-Henning Kamp void *new; 1625b8da2396SPoul-Henning Kamp size_t newlen; 1626b8da2396SPoul-Henning Kamp }; 1627d2d3e875SBruce Evans #endif 1628df8bae1dSRodney W. Grimes int 16298451d0ddSKip Macy sys___sysctl(struct thread *td, struct sysctl_args *uap) 1630df8bae1dSRodney W. Grimes { 1631875b66a0SJohn Baldwin int error, i, name[CTL_MAXNAME]; 1632069e9bc1SDoug Rabson size_t j; 1633b396cd83SPoul-Henning Kamp 1634df8bae1dSRodney W. Grimes if (uap->namelen > CTL_MAXNAME || uap->namelen < 2) 1635df8bae1dSRodney W. Grimes return (EINVAL); 1636b396cd83SPoul-Henning Kamp 1637797f2d22SPoul-Henning Kamp error = copyin(uap->name, &name, uap->namelen * sizeof(int)); 1638797f2d22SPoul-Henning Kamp if (error) 1639df8bae1dSRodney W. Grimes return (error); 1640df8bae1dSRodney W. Grimes 1641b40ce416SJulian Elischer error = userland_sysctl(td, name, uap->namelen, 1642b8da2396SPoul-Henning Kamp uap->old, uap->oldlenp, 0, 1643a7bc3102SPeter Wemm uap->new, uap->newlen, &j, 0); 1644deae269aSPoul-Henning Kamp if (error && error != ENOMEM) 1645ddf9d243SEd Schouten return (error); 16464cfe4790SEd Schouten if (uap->oldlenp) { 1647875b66a0SJohn Baldwin i = copyout(&j, uap->oldlenp, sizeof(j)); 16484cfe4790SEd Schouten if (i) 16494cfe4790SEd Schouten return (i); 16504cfe4790SEd Schouten } 1651deae269aSPoul-Henning Kamp return (error); 1652b8da2396SPoul-Henning Kamp } 1653b8da2396SPoul-Henning Kamp 1654b8da2396SPoul-Henning Kamp /* 1655b8da2396SPoul-Henning Kamp * This is used from various compatibility syscalls too. That's why name 1656b8da2396SPoul-Henning Kamp * must be in kernel space. 1657b8da2396SPoul-Henning Kamp */ 1658b8da2396SPoul-Henning Kamp int 1659b40ce416SJulian Elischer userland_sysctl(struct thread *td, int *name, u_int namelen, void *old, 1660a7bc3102SPeter Wemm size_t *oldlenp, int inkernel, void *new, size_t newlen, size_t *retval, 1661a7bc3102SPeter Wemm int flags) 1662b8da2396SPoul-Henning Kamp { 16633e829b18SJohn Baldwin int error = 0, memlocked; 1664a961520cSDon Lewis struct sysctl_req req; 1665ae0eb976SPoul-Henning Kamp 1666ae0eb976SPoul-Henning Kamp bzero(&req, sizeof req); 1667b8da2396SPoul-Henning Kamp 1668ce178806SRobert Watson req.td = td; 1669a7bc3102SPeter Wemm req.flags = flags; 167016cd04a3SPoul-Henning Kamp 1671b8da2396SPoul-Henning Kamp if (oldlenp) { 1672b8da2396SPoul-Henning Kamp if (inkernel) { 1673ae0eb976SPoul-Henning Kamp req.oldlen = *oldlenp; 1674b8da2396SPoul-Henning Kamp } else { 1675deae269aSPoul-Henning Kamp error = copyin(oldlenp, &req.oldlen, sizeof(*oldlenp)); 1676b8da2396SPoul-Henning Kamp if (error) 1677b8da2396SPoul-Henning Kamp return (error); 1678b8da2396SPoul-Henning Kamp } 1679b8da2396SPoul-Henning Kamp } 1680a961520cSDon Lewis req.validlen = req.oldlen; 1681b8da2396SPoul-Henning Kamp 1682ae0eb976SPoul-Henning Kamp if (old) { 168302c58685SPoul-Henning Kamp if (!useracc(old, req.oldlen, VM_PROT_WRITE)) 1684ae0eb976SPoul-Henning Kamp return (EFAULT); 1685ae0eb976SPoul-Henning Kamp req.oldptr= old; 1686ae0eb976SPoul-Henning Kamp } 16872e210993SPoul-Henning Kamp 1688b8edb44cSDima Dorfman if (new != NULL) { 168970ffc2fbSRobert Watson if (!useracc(new, newlen, VM_PROT_READ)) 1690ae0eb976SPoul-Henning Kamp return (EFAULT); 1691ae0eb976SPoul-Henning Kamp req.newlen = newlen; 1692ae0eb976SPoul-Henning Kamp req.newptr = new; 1693b396cd83SPoul-Henning Kamp } 1694b396cd83SPoul-Henning Kamp 1695ae0eb976SPoul-Henning Kamp req.oldfunc = sysctl_old_user; 1696ae0eb976SPoul-Henning Kamp req.newfunc = sysctl_new_user; 169773d6f851SMatthew D Fleming req.lock = REQ_UNWIRED; 16984b2af45fSPoul-Henning Kamp 1699a56be37eSJohn Baldwin #ifdef KTRACE 1700a56be37eSJohn Baldwin if (KTRPOINT(curthread, KTR_SYSCTL)) 1701a56be37eSJohn Baldwin ktrsysctl(name, namelen); 1702a56be37eSJohn Baldwin #endif 1703a56be37eSJohn Baldwin 17043e829b18SJohn Baldwin if (req.oldlen > PAGE_SIZE) { 17053e829b18SJohn Baldwin memlocked = 1; 17063e829b18SJohn Baldwin sx_xlock(&sysctlmemlock); 17073e829b18SJohn Baldwin } else 17083e829b18SJohn Baldwin memlocked = 0; 17099ed47d01SJamie Gritton CURVNET_SET(TD_TO_VNET(td)); 1710ae0eb976SPoul-Henning Kamp 1711af80b2c9SKonstantin Belousov for (;;) { 1712a961520cSDon Lewis req.oldidx = 0; 1713a961520cSDon Lewis req.newidx = 0; 1714ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 1715a961520cSDon Lewis error = sysctl_root(0, name, namelen, &req); 1716ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 1717af80b2c9SKonstantin Belousov if (error != EAGAIN) 1718af80b2c9SKonstantin Belousov break; 17193d08a76bSMatthew D Fleming kern_yield(PRI_USER); 1720af80b2c9SKonstantin Belousov } 1721b396cd83SPoul-Henning Kamp 172297021c24SMarko Zec CURVNET_RESTORE(); 17234b2af45fSPoul-Henning Kamp 1724ddf9d243SEd Schouten if (req.lock == REQ_WIRED && req.validlen > 0) 1725ddf9d243SEd Schouten vsunlock(req.oldptr, req.validlen); 17263e829b18SJohn Baldwin if (memlocked) 17273e829b18SJohn Baldwin sx_xunlock(&sysctlmemlock); 1728ddf9d243SEd Schouten 1729deae269aSPoul-Henning Kamp if (error && error != ENOMEM) 1730deae269aSPoul-Henning Kamp return (error); 1731deae269aSPoul-Henning Kamp 1732deae269aSPoul-Henning Kamp if (retval) { 1733a961520cSDon Lewis if (req.oldptr && req.oldidx > req.validlen) 1734a961520cSDon Lewis *retval = req.validlen; 1735deae269aSPoul-Henning Kamp else 1736deae269aSPoul-Henning Kamp *retval = req.oldidx; 1737b8da2396SPoul-Henning Kamp } 17382e210993SPoul-Henning Kamp return (error); 1739df8bae1dSRodney W. Grimes } 17404e657159SMatthew D Fleming 17414e657159SMatthew D Fleming /* 174200f0e671SMatthew D Fleming * Drain into a sysctl struct. The user buffer should be wired if a page 174300f0e671SMatthew D Fleming * fault would cause issue. 17444e657159SMatthew D Fleming */ 17454e657159SMatthew D Fleming static int 17464e657159SMatthew D Fleming sbuf_sysctl_drain(void *arg, const char *data, int len) 17474e657159SMatthew D Fleming { 17484e657159SMatthew D Fleming struct sysctl_req *req = arg; 17494e657159SMatthew D Fleming int error; 17504e657159SMatthew D Fleming 17514e657159SMatthew D Fleming error = SYSCTL_OUT(req, data, len); 17524e657159SMatthew D Fleming KASSERT(error >= 0, ("Got unexpected negative value %d", error)); 17534e657159SMatthew D Fleming return (error == 0 ? len : -error); 17544e657159SMatthew D Fleming } 17554e657159SMatthew D Fleming 17564e657159SMatthew D Fleming struct sbuf * 17574e657159SMatthew D Fleming sbuf_new_for_sysctl(struct sbuf *s, char *buf, int length, 17584e657159SMatthew D Fleming struct sysctl_req *req) 17594e657159SMatthew D Fleming { 17604e657159SMatthew D Fleming 17614e657159SMatthew D Fleming s = sbuf_new(s, buf, length, SBUF_FIXEDLEN); 17624e657159SMatthew D Fleming sbuf_set_drain(s, sbuf_sysctl_drain, req); 17634e657159SMatthew D Fleming return (s); 17644e657159SMatthew D Fleming } 1765