1df8bae1dSRodney W. Grimes /*- 2df8bae1dSRodney W. Grimes * Copyright (c) 1982, 1986, 1989, 1993 3df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 4df8bae1dSRodney W. Grimes * 5df8bae1dSRodney W. Grimes * This code is derived from software contributed to Berkeley by 6df8bae1dSRodney W. Grimes * Mike Karels at Berkeley Software Design, Inc. 7df8bae1dSRodney W. Grimes * 8946bb7a2SPoul-Henning Kamp * Quite extensively rewritten by Poul-Henning Kamp of the FreeBSD 9946bb7a2SPoul-Henning Kamp * project, to make these variables more userfriendly. 10946bb7a2SPoul-Henning Kamp * 11df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 12df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 13df8bae1dSRodney W. Grimes * are met: 14df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 15df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 16df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 17df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 18df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 19df8bae1dSRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 20df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 21df8bae1dSRodney W. Grimes * without specific prior written permission. 22df8bae1dSRodney W. Grimes * 23df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 24df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 27df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33df8bae1dSRodney W. Grimes * SUCH DAMAGE. 34df8bae1dSRodney W. Grimes * 35df8bae1dSRodney W. Grimes * @(#)kern_sysctl.c 8.4 (Berkeley) 4/14/94 36df8bae1dSRodney W. Grimes */ 37df8bae1dSRodney W. Grimes 38677b542eSDavid E. O'Brien #include <sys/cdefs.h> 39677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$"); 40677b542eSDavid E. O'Brien 41ff66f6a4SRobert Watson #include "opt_capsicum.h" 425591b823SEivind Eklund #include "opt_compat.h" 43a56be37eSJohn Baldwin #include "opt_ktrace.h" 445591b823SEivind Eklund 45df8bae1dSRodney W. Grimes #include <sys/param.h> 46ccecef29SMatthew D Fleming #include <sys/fail.h> 47e96c1fdcSPeter Wemm #include <sys/systm.h> 484a144410SRobert Watson #include <sys/capsicum.h> 49df8bae1dSRodney W. Grimes #include <sys/kernel.h> 50df8bae1dSRodney W. Grimes #include <sys/sysctl.h> 51946bb7a2SPoul-Henning Kamp #include <sys/malloc.h> 52acd3428bSRobert Watson #include <sys/priv.h> 53efeaf95aSDavid Greenman #include <sys/proc.h> 54ebd8672cSBjoern A. Zeeb #include <sys/jail.h> 55fb99ab88SMatthew Dillon #include <sys/lock.h> 56fb99ab88SMatthew Dillon #include <sys/mutex.h> 574e657159SMatthew D Fleming #include <sys/sbuf.h> 5829a2c0cdSAlfred Perlstein #include <sys/sx.h> 5945ec3b38SPoul-Henning Kamp #include <sys/sysproto.h> 60af80b2c9SKonstantin Belousov #include <sys/uio.h> 61a56be37eSJohn Baldwin #ifdef KTRACE 62a56be37eSJohn Baldwin #include <sys/ktrace.h> 63a56be37eSJohn Baldwin #endif 64aed55708SRobert Watson 65eddfbb76SRobert Watson #include <net/vnet.h> 66eddfbb76SRobert Watson 67aed55708SRobert Watson #include <security/mac/mac_framework.h> 68aed55708SRobert Watson 694cb03b1bSBruce Evans #include <vm/vm.h> 70efeaf95aSDavid Greenman #include <vm/vm_extern.h> 714cb03b1bSBruce Evans 72a1c995b6SPoul-Henning Kamp static MALLOC_DEFINE(M_SYSCTL, "sysctl", "sysctl internal magic"); 73bd3cdc31SAndrzej Bialecki static MALLOC_DEFINE(M_SYSCTLOID, "sysctloid", "sysctl dynamic oids"); 749e74cba3SDon Lewis static MALLOC_DEFINE(M_SYSCTLTMP, "sysctltmp", "sysctl temp output buffer"); 7555166637SPoul-Henning Kamp 764b2af45fSPoul-Henning Kamp /* 77875b66a0SJohn Baldwin * The sysctllock protects the MIB tree. It also protects sysctl 78875b66a0SJohn Baldwin * contexts used with dynamic sysctls. The sysctl_register_oid() and 79875b66a0SJohn Baldwin * sysctl_unregister_oid() routines require the sysctllock to already 80875b66a0SJohn Baldwin * be held, so the sysctl_lock() and sysctl_unlock() routines are 81875b66a0SJohn Baldwin * provided for the few places in the kernel which need to use that 82875b66a0SJohn Baldwin * API rather than using the dynamic API. Use of the dynamic API is 83875b66a0SJohn Baldwin * strongly encouraged for most code. 84875b66a0SJohn Baldwin * 853e829b18SJohn Baldwin * The sysctlmemlock is used to limit the amount of user memory wired for 863e829b18SJohn Baldwin * sysctl requests. This is implemented by serializing any userland 873e829b18SJohn Baldwin * sysctl requests larger than a single page via an exclusive lock. 884b2af45fSPoul-Henning Kamp */ 893bd1da29SRobert Watson static struct sx sysctllock; 903e829b18SJohn Baldwin static struct sx sysctlmemlock; 9129a2c0cdSAlfred Perlstein 92875b66a0SJohn Baldwin #define SYSCTL_XLOCK() sx_xlock(&sysctllock) 93875b66a0SJohn Baldwin #define SYSCTL_XUNLOCK() sx_xunlock(&sysctllock) 94*efe0abddSMateusz Guzik #define SYSCTL_SLOCK() sx_slock(&sysctllock) 95*efe0abddSMateusz Guzik #define SYSCTL_SUNLOCK() sx_sunlock(&sysctllock) 96*efe0abddSMateusz Guzik #define SYSCTL_XLOCKED() sx_xlocked(&sysctllock) 97*efe0abddSMateusz Guzik #define SYSCTL_ASSERT_LOCKED() sx_assert(&sysctllock, SA_LOCKED) 98875b66a0SJohn Baldwin #define SYSCTL_ASSERT_XLOCKED() sx_assert(&sysctllock, SA_XLOCKED) 9974019059SJohn Baldwin #define SYSCTL_INIT() sx_init(&sysctllock, "sysctl lock") 100ccecef29SMatthew D Fleming #define SYSCTL_SLEEP(ch, wmesg, timo) \ 101ccecef29SMatthew D Fleming sx_sleep(ch, &sysctllock, 0, wmesg, timo) 1024b2af45fSPoul-Henning Kamp 10382d9ae4eSPoul-Henning Kamp static int sysctl_root(SYSCTL_HANDLER_ARGS); 1044b2af45fSPoul-Henning Kamp 105af3b2549SHans Petter Selasky /* Root list */ 106af3b2549SHans Petter Selasky struct sysctl_oid_list sysctl__children = SLIST_HEAD_INITIALIZER(&sysctl__children); 107787d58f2SPoul-Henning Kamp 108875b66a0SJohn Baldwin static int sysctl_remove_oid_locked(struct sysctl_oid *oidp, int del, 109875b66a0SJohn Baldwin int recurse); 110af3b2549SHans Petter Selasky static int sysctl_old_kernel(struct sysctl_req *, const void *, size_t); 111af3b2549SHans Petter Selasky static int sysctl_new_kernel(struct sysctl_req *, void *, size_t); 112875b66a0SJohn Baldwin 113*efe0abddSMateusz Guzik static void 114*efe0abddSMateusz Guzik sysctl_lock(bool xlock) 115*efe0abddSMateusz Guzik { 116*efe0abddSMateusz Guzik 117*efe0abddSMateusz Guzik if (xlock) 118*efe0abddSMateusz Guzik SYSCTL_XLOCK(); 119*efe0abddSMateusz Guzik else 120*efe0abddSMateusz Guzik SYSCTL_SLOCK(); 121*efe0abddSMateusz Guzik } 122*efe0abddSMateusz Guzik 123*efe0abddSMateusz Guzik static bool 124*efe0abddSMateusz Guzik sysctl_unlock(void) 125*efe0abddSMateusz Guzik { 126*efe0abddSMateusz Guzik bool xlocked; 127*efe0abddSMateusz Guzik 128*efe0abddSMateusz Guzik xlocked = SYSCTL_XLOCKED(); 129*efe0abddSMateusz Guzik if (xlocked) 130*efe0abddSMateusz Guzik SYSCTL_XUNLOCK(); 131*efe0abddSMateusz Guzik else 132*efe0abddSMateusz Guzik SYSCTL_SUNLOCK(); 133*efe0abddSMateusz Guzik return (xlocked); 134*efe0abddSMateusz Guzik } 135*efe0abddSMateusz Guzik 136bd3cdc31SAndrzej Bialecki static struct sysctl_oid * 137bd3cdc31SAndrzej Bialecki sysctl_find_oidname(const char *name, struct sysctl_oid_list *list) 138bd3cdc31SAndrzej Bialecki { 139bd3cdc31SAndrzej Bialecki struct sysctl_oid *oidp; 140bd3cdc31SAndrzej Bialecki 141*efe0abddSMateusz Guzik SYSCTL_ASSERT_LOCKED(); 142bd3cdc31SAndrzej Bialecki SLIST_FOREACH(oidp, list, oid_link) { 143bd3cdc31SAndrzej Bialecki if (strcmp(oidp->oid_name, name) == 0) { 144bd3cdc31SAndrzej Bialecki return (oidp); 145bd3cdc31SAndrzej Bialecki } 146bd3cdc31SAndrzej Bialecki } 147bd3cdc31SAndrzej Bialecki return (NULL); 148bd3cdc31SAndrzej Bialecki } 149bd3cdc31SAndrzej Bialecki 150946bb7a2SPoul-Henning Kamp /* 151946bb7a2SPoul-Henning Kamp * Initialization of the MIB tree. 152946bb7a2SPoul-Henning Kamp * 153ce02431fSDoug Rabson * Order by number in each list. 154946bb7a2SPoul-Henning Kamp */ 155875b66a0SJohn Baldwin void 156580a0117SMateusz Guzik sysctl_xlock(void) 157875b66a0SJohn Baldwin { 158875b66a0SJohn Baldwin 159875b66a0SJohn Baldwin SYSCTL_XLOCK(); 160875b66a0SJohn Baldwin } 161875b66a0SJohn Baldwin 162875b66a0SJohn Baldwin void 163580a0117SMateusz Guzik sysctl_xunlock(void) 164875b66a0SJohn Baldwin { 165875b66a0SJohn Baldwin 166875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 167875b66a0SJohn Baldwin } 1684b2af45fSPoul-Henning Kamp 169af3b2549SHans Petter Selasky static int 170af3b2549SHans Petter Selasky sysctl_root_handler_locked(struct sysctl_oid *oid, void *arg1, intptr_t arg2, 171af3b2549SHans Petter Selasky struct sysctl_req *req) 172af3b2549SHans Petter Selasky { 173af3b2549SHans Petter Selasky int error; 174*efe0abddSMateusz Guzik bool xlocked; 175af3b2549SHans Petter Selasky 176*efe0abddSMateusz Guzik atomic_add_int(&oid->oid_running, 1); 177*efe0abddSMateusz Guzik xlocked = sysctl_unlock(); 178af3b2549SHans Petter Selasky 179af3b2549SHans Petter Selasky if (!(oid->oid_kind & CTLFLAG_MPSAFE)) 180af3b2549SHans Petter Selasky mtx_lock(&Giant); 181af3b2549SHans Petter Selasky error = oid->oid_handler(oid, arg1, arg2, req); 182af3b2549SHans Petter Selasky if (!(oid->oid_kind & CTLFLAG_MPSAFE)) 183af3b2549SHans Petter Selasky mtx_unlock(&Giant); 184af3b2549SHans Petter Selasky 185*efe0abddSMateusz Guzik sysctl_lock(xlocked); 186*efe0abddSMateusz Guzik if (atomic_fetchadd_int(&oid->oid_running, -1) == 1 && 187*efe0abddSMateusz Guzik (oid->oid_kind & CTLFLAG_DYING) != 0) 188af3b2549SHans Petter Selasky wakeup(&oid->oid_running); 189af3b2549SHans Petter Selasky 190af3b2549SHans Petter Selasky return (error); 191af3b2549SHans Petter Selasky } 192af3b2549SHans Petter Selasky 193af3b2549SHans Petter Selasky static void 194af3b2549SHans Petter Selasky sysctl_load_tunable_by_oid_locked(struct sysctl_oid *oidp) 195af3b2549SHans Petter Selasky { 196af3b2549SHans Petter Selasky struct sysctl_req req; 197af3b2549SHans Petter Selasky struct sysctl_oid *curr; 198604bf9d3SHans Petter Selasky char *penv = NULL; 199af3b2549SHans Petter Selasky char path[64]; 200af3b2549SHans Petter Selasky ssize_t rem = sizeof(path); 201af3b2549SHans Petter Selasky ssize_t len; 202af3b2549SHans Petter Selasky int val_int; 203af3b2549SHans Petter Selasky long val_long; 204af3b2549SHans Petter Selasky int64_t val_64; 205604bf9d3SHans Petter Selasky quad_t val_quad; 206af3b2549SHans Petter Selasky int error; 207af3b2549SHans Petter Selasky 208af3b2549SHans Petter Selasky path[--rem] = 0; 209af3b2549SHans Petter Selasky 210af3b2549SHans Petter Selasky for (curr = oidp; curr != NULL; curr = SYSCTL_PARENT(curr)) { 211af3b2549SHans Petter Selasky len = strlen(curr->oid_name); 212af3b2549SHans Petter Selasky rem -= len; 213af3b2549SHans Petter Selasky if (curr != oidp) 214af3b2549SHans Petter Selasky rem -= 1; 215af3b2549SHans Petter Selasky if (rem < 0) { 216af3b2549SHans Petter Selasky printf("OID path exceeds %d bytes\n", (int)sizeof(path)); 217af3b2549SHans Petter Selasky return; 218af3b2549SHans Petter Selasky } 219af3b2549SHans Petter Selasky memcpy(path + rem, curr->oid_name, len); 220af3b2549SHans Petter Selasky if (curr != oidp) 221af3b2549SHans Petter Selasky path[rem + len] = '.'; 222af3b2549SHans Petter Selasky } 223af3b2549SHans Petter Selasky 224af3b2549SHans Petter Selasky memset(&req, 0, sizeof(req)); 225af3b2549SHans Petter Selasky 226af3b2549SHans Petter Selasky req.td = curthread; 227af3b2549SHans Petter Selasky req.oldfunc = sysctl_old_kernel; 228af3b2549SHans Petter Selasky req.newfunc = sysctl_new_kernel; 229af3b2549SHans Petter Selasky req.lock = REQ_UNWIRED; 230af3b2549SHans Petter Selasky 231af3b2549SHans Petter Selasky switch (oidp->oid_kind & CTLTYPE) { 232af3b2549SHans Petter Selasky case CTLTYPE_INT: 233604bf9d3SHans Petter Selasky if (getenv_int(path + rem, &val_int) == 0) 234604bf9d3SHans Petter Selasky return; 235af3b2549SHans Petter Selasky req.newlen = sizeof(val_int); 236af3b2549SHans Petter Selasky req.newptr = &val_int; 237af3b2549SHans Petter Selasky break; 238af3b2549SHans Petter Selasky case CTLTYPE_UINT: 239604bf9d3SHans Petter Selasky if (getenv_uint(path + rem, (unsigned int *)&val_int) == 0) 240604bf9d3SHans Petter Selasky return; 241af3b2549SHans Petter Selasky req.newlen = sizeof(val_int); 242af3b2549SHans Petter Selasky req.newptr = &val_int; 243af3b2549SHans Petter Selasky break; 244af3b2549SHans Petter Selasky case CTLTYPE_LONG: 245604bf9d3SHans Petter Selasky if (getenv_long(path + rem, &val_long) == 0) 246604bf9d3SHans Petter Selasky return; 247af3b2549SHans Petter Selasky req.newlen = sizeof(val_long); 248af3b2549SHans Petter Selasky req.newptr = &val_long; 249af3b2549SHans Petter Selasky break; 250af3b2549SHans Petter Selasky case CTLTYPE_ULONG: 251604bf9d3SHans Petter Selasky if (getenv_ulong(path + rem, (unsigned long *)&val_long) == 0) 252604bf9d3SHans Petter Selasky return; 253af3b2549SHans Petter Selasky req.newlen = sizeof(val_long); 254af3b2549SHans Petter Selasky req.newptr = &val_long; 255af3b2549SHans Petter Selasky break; 256af3b2549SHans Petter Selasky case CTLTYPE_S64: 257604bf9d3SHans Petter Selasky if (getenv_quad(path + rem, &val_quad) == 0) 258604bf9d3SHans Petter Selasky return; 259604bf9d3SHans Petter Selasky val_64 = val_quad; 260af3b2549SHans Petter Selasky req.newlen = sizeof(val_64); 261af3b2549SHans Petter Selasky req.newptr = &val_64; 262af3b2549SHans Petter Selasky break; 263af3b2549SHans Petter Selasky case CTLTYPE_U64: 264604bf9d3SHans Petter Selasky /* XXX there is no getenv_uquad() */ 265604bf9d3SHans Petter Selasky if (getenv_quad(path + rem, &val_quad) == 0) 266604bf9d3SHans Petter Selasky return; 267604bf9d3SHans Petter Selasky val_64 = val_quad; 268af3b2549SHans Petter Selasky req.newlen = sizeof(val_64); 269af3b2549SHans Petter Selasky req.newptr = &val_64; 270af3b2549SHans Petter Selasky break; 271af3b2549SHans Petter Selasky case CTLTYPE_STRING: 2722be111bfSDavide Italiano penv = kern_getenv(path + rem); 273604bf9d3SHans Petter Selasky if (penv == NULL) 274604bf9d3SHans Petter Selasky return; 275af3b2549SHans Petter Selasky req.newlen = strlen(penv); 276af3b2549SHans Petter Selasky req.newptr = penv; 277af3b2549SHans Petter Selasky break; 278af3b2549SHans Petter Selasky default: 279af3b2549SHans Petter Selasky return; 280af3b2549SHans Petter Selasky } 281af3b2549SHans Petter Selasky error = sysctl_root_handler_locked(oidp, oidp->oid_arg1, 282af3b2549SHans Petter Selasky oidp->oid_arg2, &req); 283af3b2549SHans Petter Selasky if (error != 0) { 284af3b2549SHans Petter Selasky printf("Setting sysctl '%s' to '%s' failed: %d\n", 285af3b2549SHans Petter Selasky path, penv, error); 286af3b2549SHans Petter Selasky } 287af3b2549SHans Petter Selasky freeenv(penv); 288af3b2549SHans Petter Selasky } 289af3b2549SHans Petter Selasky 290107e7dc5SPeter Pentchev void 291107e7dc5SPeter Pentchev sysctl_register_oid(struct sysctl_oid *oidp) 292787d58f2SPoul-Henning Kamp { 293ce02431fSDoug Rabson struct sysctl_oid_list *parent = oidp->oid_parent; 294ce02431fSDoug Rabson struct sysctl_oid *p; 295ce02431fSDoug Rabson struct sysctl_oid *q; 2963c8e79ddSBruce Evans 297ce02431fSDoug Rabson /* 298bd3cdc31SAndrzej Bialecki * First check if another oid with the same name already 299bd3cdc31SAndrzej Bialecki * exists in the parent's list. 300bd3cdc31SAndrzej Bialecki */ 301875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 302bd3cdc31SAndrzej Bialecki p = sysctl_find_oidname(oidp->oid_name, parent); 303bd3cdc31SAndrzej Bialecki if (p != NULL) { 304bd3cdc31SAndrzej Bialecki if ((p->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 305bd3cdc31SAndrzej Bialecki p->oid_refcnt++; 306bd3cdc31SAndrzej Bialecki return; 307bd3cdc31SAndrzej Bialecki } else { 308bd3cdc31SAndrzej Bialecki printf("can't re-use a leaf (%s)!\n", p->oid_name); 309bd3cdc31SAndrzej Bialecki return; 310bd3cdc31SAndrzej Bialecki } 311bd3cdc31SAndrzej Bialecki } 312bd3cdc31SAndrzej Bialecki /* 313ce02431fSDoug Rabson * If this oid has a number OID_AUTO, give it a number which 3147ca4d05fSPeter Pentchev * is greater than any current oid. 3157ca4d05fSPeter Pentchev * NOTE: DO NOT change the starting value here, change it in 3167ca4d05fSPeter Pentchev * <sys/sysctl.h>, and make sure it is at least 256 to 3177ca4d05fSPeter Pentchev * accomodate e.g. net.inet.raw as a static sysctl node. 318ce02431fSDoug Rabson */ 319ce02431fSDoug Rabson if (oidp->oid_number == OID_AUTO) { 3207ca4d05fSPeter Pentchev static int newoid = CTL_AUTO_START; 3215ed57d32SKirk McKusick 3225ed57d32SKirk McKusick oidp->oid_number = newoid++; 3235ed57d32SKirk McKusick if (newoid == 0x7fffffff) 3245ed57d32SKirk McKusick panic("out of oids"); 325787d58f2SPoul-Henning Kamp } 32688fbb423SPeter Pentchev #if 0 32788fbb423SPeter Pentchev else if (oidp->oid_number >= CTL_AUTO_START) { 32888fbb423SPeter Pentchev /* do not panic; this happens when unregistering sysctl sets */ 32988fbb423SPeter Pentchev printf("static sysctl oid too high: %d", oidp->oid_number); 33088fbb423SPeter Pentchev } 33188fbb423SPeter Pentchev #endif 332787d58f2SPoul-Henning Kamp 333ce02431fSDoug Rabson /* 334ce02431fSDoug Rabson * Insert the oid into the parent's list in order. 335ce02431fSDoug Rabson */ 336ce02431fSDoug Rabson q = NULL; 337ce02431fSDoug Rabson SLIST_FOREACH(p, parent, oid_link) { 338ce02431fSDoug Rabson if (oidp->oid_number < p->oid_number) 339ce02431fSDoug Rabson break; 340ce02431fSDoug Rabson q = p; 341ce02431fSDoug Rabson } 342ce02431fSDoug Rabson if (q) 343ce02431fSDoug Rabson SLIST_INSERT_AFTER(q, oidp, oid_link); 344ce02431fSDoug Rabson else 345ce02431fSDoug Rabson SLIST_INSERT_HEAD(parent, oidp, oid_link); 346af3b2549SHans Petter Selasky 347af3b2549SHans Petter Selasky if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE && 348af3b2549SHans Petter Selasky #ifdef VIMAGE 349af3b2549SHans Petter Selasky (oidp->oid_kind & CTLFLAG_VNET) == 0 && 350af3b2549SHans Petter Selasky #endif 351af3b2549SHans Petter Selasky (oidp->oid_kind & CTLFLAG_TUN) != 0 && 352af3b2549SHans Petter Selasky (oidp->oid_kind & CTLFLAG_NOFETCH) == 0) { 353af3b2549SHans Petter Selasky sysctl_load_tunable_by_oid_locked(oidp); 354af3b2549SHans Petter Selasky } 355ce02431fSDoug Rabson } 356ce02431fSDoug Rabson 357107e7dc5SPeter Pentchev void 358107e7dc5SPeter Pentchev sysctl_unregister_oid(struct sysctl_oid *oidp) 359787d58f2SPoul-Henning Kamp { 360193f2edbSMaxime Henrion struct sysctl_oid *p; 361193f2edbSMaxime Henrion int error; 362193f2edbSMaxime Henrion 363875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 364193f2edbSMaxime Henrion error = ENOENT; 365193f2edbSMaxime Henrion if (oidp->oid_number == OID_AUTO) { 366193f2edbSMaxime Henrion error = EINVAL; 367193f2edbSMaxime Henrion } else { 368193f2edbSMaxime Henrion SLIST_FOREACH(p, oidp->oid_parent, oid_link) { 369193f2edbSMaxime Henrion if (p == oidp) { 370193f2edbSMaxime Henrion SLIST_REMOVE(oidp->oid_parent, oidp, 371193f2edbSMaxime Henrion sysctl_oid, oid_link); 372193f2edbSMaxime Henrion error = 0; 373193f2edbSMaxime Henrion break; 374193f2edbSMaxime Henrion } 375193f2edbSMaxime Henrion } 376193f2edbSMaxime Henrion } 377193f2edbSMaxime Henrion 378193f2edbSMaxime Henrion /* 379193f2edbSMaxime Henrion * This can happen when a module fails to register and is 380193f2edbSMaxime Henrion * being unloaded afterwards. It should not be a panic() 381193f2edbSMaxime Henrion * for normal use. 382193f2edbSMaxime Henrion */ 383193f2edbSMaxime Henrion if (error) 384193f2edbSMaxime Henrion printf("%s: failed to unregister sysctl\n", __func__); 38561220614SPoul-Henning Kamp } 386946bb7a2SPoul-Henning Kamp 387bd3cdc31SAndrzej Bialecki /* Initialize a new context to keep track of dynamically added sysctls. */ 388bd3cdc31SAndrzej Bialecki int 389bd3cdc31SAndrzej Bialecki sysctl_ctx_init(struct sysctl_ctx_list *c) 390bd3cdc31SAndrzej Bialecki { 391bd3cdc31SAndrzej Bialecki 392bd3cdc31SAndrzej Bialecki if (c == NULL) { 393bd3cdc31SAndrzej Bialecki return (EINVAL); 394bd3cdc31SAndrzej Bialecki } 395875b66a0SJohn Baldwin 396875b66a0SJohn Baldwin /* 397875b66a0SJohn Baldwin * No locking here, the caller is responsible for not adding 398875b66a0SJohn Baldwin * new nodes to a context until after this function has 399875b66a0SJohn Baldwin * returned. 400875b66a0SJohn Baldwin */ 401bd3cdc31SAndrzej Bialecki TAILQ_INIT(c); 402bd3cdc31SAndrzej Bialecki return (0); 403bd3cdc31SAndrzej Bialecki } 404bd3cdc31SAndrzej Bialecki 405bd3cdc31SAndrzej Bialecki /* Free the context, and destroy all dynamic oids registered in this context */ 406bd3cdc31SAndrzej Bialecki int 407bd3cdc31SAndrzej Bialecki sysctl_ctx_free(struct sysctl_ctx_list *clist) 408bd3cdc31SAndrzej Bialecki { 409bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e, *e1; 410bd3cdc31SAndrzej Bialecki int error; 411bd3cdc31SAndrzej Bialecki 412bd3cdc31SAndrzej Bialecki error = 0; 413bd3cdc31SAndrzej Bialecki /* 414bd3cdc31SAndrzej Bialecki * First perform a "dry run" to check if it's ok to remove oids. 415bd3cdc31SAndrzej Bialecki * XXX FIXME 416bd3cdc31SAndrzej Bialecki * XXX This algorithm is a hack. But I don't know any 417bd3cdc31SAndrzej Bialecki * XXX better solution for now... 418bd3cdc31SAndrzej Bialecki */ 419875b66a0SJohn Baldwin SYSCTL_XLOCK(); 420bd3cdc31SAndrzej Bialecki TAILQ_FOREACH(e, clist, link) { 421875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(e->entry, 0, 0); 422bd3cdc31SAndrzej Bialecki if (error) 423bd3cdc31SAndrzej Bialecki break; 424bd3cdc31SAndrzej Bialecki } 425bd3cdc31SAndrzej Bialecki /* 426bd3cdc31SAndrzej Bialecki * Restore deregistered entries, either from the end, 427bd3cdc31SAndrzej Bialecki * or from the place where error occured. 428bd3cdc31SAndrzej Bialecki * e contains the entry that was not unregistered 429bd3cdc31SAndrzej Bialecki */ 430bd3cdc31SAndrzej Bialecki if (error) 431bd3cdc31SAndrzej Bialecki e1 = TAILQ_PREV(e, sysctl_ctx_list, link); 432bd3cdc31SAndrzej Bialecki else 433bd3cdc31SAndrzej Bialecki e1 = TAILQ_LAST(clist, sysctl_ctx_list); 434bd3cdc31SAndrzej Bialecki while (e1 != NULL) { 435bd3cdc31SAndrzej Bialecki sysctl_register_oid(e1->entry); 436bd3cdc31SAndrzej Bialecki e1 = TAILQ_PREV(e1, sysctl_ctx_list, link); 437bd3cdc31SAndrzej Bialecki } 438875b66a0SJohn Baldwin if (error) { 439875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 440bd3cdc31SAndrzej Bialecki return(EBUSY); 441875b66a0SJohn Baldwin } 442bd3cdc31SAndrzej Bialecki /* Now really delete the entries */ 443bd3cdc31SAndrzej Bialecki e = TAILQ_FIRST(clist); 444bd3cdc31SAndrzej Bialecki while (e != NULL) { 445bd3cdc31SAndrzej Bialecki e1 = TAILQ_NEXT(e, link); 446875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(e->entry, 1, 0); 447bd3cdc31SAndrzej Bialecki if (error) 448bd3cdc31SAndrzej Bialecki panic("sysctl_remove_oid: corrupt tree, entry: %s", 449bd3cdc31SAndrzej Bialecki e->entry->oid_name); 450bd3cdc31SAndrzej Bialecki free(e, M_SYSCTLOID); 451bd3cdc31SAndrzej Bialecki e = e1; 452bd3cdc31SAndrzej Bialecki } 453875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 454bd3cdc31SAndrzej Bialecki return (error); 455bd3cdc31SAndrzej Bialecki } 456bd3cdc31SAndrzej Bialecki 457bd3cdc31SAndrzej Bialecki /* Add an entry to the context */ 458bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry * 459bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_add(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp) 460bd3cdc31SAndrzej Bialecki { 461bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e; 462bd3cdc31SAndrzej Bialecki 463875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 464bd3cdc31SAndrzej Bialecki if (clist == NULL || oidp == NULL) 465bd3cdc31SAndrzej Bialecki return(NULL); 466a163d034SWarner Losh e = malloc(sizeof(struct sysctl_ctx_entry), M_SYSCTLOID, M_WAITOK); 467bd3cdc31SAndrzej Bialecki e->entry = oidp; 468bd3cdc31SAndrzej Bialecki TAILQ_INSERT_HEAD(clist, e, link); 469bd3cdc31SAndrzej Bialecki return (e); 470bd3cdc31SAndrzej Bialecki } 471bd3cdc31SAndrzej Bialecki 472bd3cdc31SAndrzej Bialecki /* Find an entry in the context */ 473bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry * 474bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_find(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp) 475bd3cdc31SAndrzej Bialecki { 476bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e; 477bd3cdc31SAndrzej Bialecki 478ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 479bd3cdc31SAndrzej Bialecki if (clist == NULL || oidp == NULL) 480bd3cdc31SAndrzej Bialecki return(NULL); 481fc2ffbe6SPoul-Henning Kamp TAILQ_FOREACH(e, clist, link) { 482bd3cdc31SAndrzej Bialecki if(e->entry == oidp) 483bd3cdc31SAndrzej Bialecki return(e); 484bd3cdc31SAndrzej Bialecki } 485bd3cdc31SAndrzej Bialecki return (e); 486bd3cdc31SAndrzej Bialecki } 487bd3cdc31SAndrzej Bialecki 488bd3cdc31SAndrzej Bialecki /* 489bd3cdc31SAndrzej Bialecki * Delete an entry from the context. 490bd3cdc31SAndrzej Bialecki * NOTE: this function doesn't free oidp! You have to remove it 491bd3cdc31SAndrzej Bialecki * with sysctl_remove_oid(). 492bd3cdc31SAndrzej Bialecki */ 493bd3cdc31SAndrzej Bialecki int 494bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_del(struct sysctl_ctx_list *clist, struct sysctl_oid *oidp) 495bd3cdc31SAndrzej Bialecki { 496bd3cdc31SAndrzej Bialecki struct sysctl_ctx_entry *e; 497bd3cdc31SAndrzej Bialecki 498bd3cdc31SAndrzej Bialecki if (clist == NULL || oidp == NULL) 499bd3cdc31SAndrzej Bialecki return (EINVAL); 500875b66a0SJohn Baldwin SYSCTL_XLOCK(); 501bd3cdc31SAndrzej Bialecki e = sysctl_ctx_entry_find(clist, oidp); 502bd3cdc31SAndrzej Bialecki if (e != NULL) { 503bd3cdc31SAndrzej Bialecki TAILQ_REMOVE(clist, e, link); 504875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 505bd3cdc31SAndrzej Bialecki free(e, M_SYSCTLOID); 506bd3cdc31SAndrzej Bialecki return (0); 507875b66a0SJohn Baldwin } else { 508875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 509bd3cdc31SAndrzej Bialecki return (ENOENT); 510bd3cdc31SAndrzej Bialecki } 511875b66a0SJohn Baldwin } 512bd3cdc31SAndrzej Bialecki 513bd3cdc31SAndrzej Bialecki /* 514bd3cdc31SAndrzej Bialecki * Remove dynamically created sysctl trees. 515bd3cdc31SAndrzej Bialecki * oidp - top of the tree to be removed 516bd3cdc31SAndrzej Bialecki * del - if 0 - just deregister, otherwise free up entries as well 517bd3cdc31SAndrzej Bialecki * recurse - if != 0 traverse the subtree to be deleted 518bd3cdc31SAndrzej Bialecki */ 519bd3cdc31SAndrzej Bialecki int 520bd3cdc31SAndrzej Bialecki sysctl_remove_oid(struct sysctl_oid *oidp, int del, int recurse) 521bd3cdc31SAndrzej Bialecki { 522875b66a0SJohn Baldwin int error; 523875b66a0SJohn Baldwin 524875b66a0SJohn Baldwin SYSCTL_XLOCK(); 525875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(oidp, del, recurse); 526875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 527875b66a0SJohn Baldwin return (error); 528875b66a0SJohn Baldwin } 529875b66a0SJohn Baldwin 530e4cd31ddSJeff Roberson int 531e4cd31ddSJeff Roberson sysctl_remove_name(struct sysctl_oid *parent, const char *name, 532e4cd31ddSJeff Roberson int del, int recurse) 533e4cd31ddSJeff Roberson { 534e4cd31ddSJeff Roberson struct sysctl_oid *p, *tmp; 535e4cd31ddSJeff Roberson int error; 536e4cd31ddSJeff Roberson 537e4cd31ddSJeff Roberson error = ENOENT; 538e4cd31ddSJeff Roberson SYSCTL_XLOCK(); 539e4cd31ddSJeff Roberson SLIST_FOREACH_SAFE(p, SYSCTL_CHILDREN(parent), oid_link, tmp) { 540e4cd31ddSJeff Roberson if (strcmp(p->oid_name, name) == 0) { 541e4cd31ddSJeff Roberson error = sysctl_remove_oid_locked(p, del, recurse); 542e4cd31ddSJeff Roberson break; 543e4cd31ddSJeff Roberson } 544e4cd31ddSJeff Roberson } 545e4cd31ddSJeff Roberson SYSCTL_XUNLOCK(); 546e4cd31ddSJeff Roberson 547e4cd31ddSJeff Roberson return (error); 548e4cd31ddSJeff Roberson } 549e4cd31ddSJeff Roberson 550e4cd31ddSJeff Roberson 551875b66a0SJohn Baldwin static int 552875b66a0SJohn Baldwin sysctl_remove_oid_locked(struct sysctl_oid *oidp, int del, int recurse) 553875b66a0SJohn Baldwin { 554e4cd31ddSJeff Roberson struct sysctl_oid *p, *tmp; 555bd3cdc31SAndrzej Bialecki int error; 556bd3cdc31SAndrzej Bialecki 557875b66a0SJohn Baldwin SYSCTL_ASSERT_XLOCKED(); 558bd3cdc31SAndrzej Bialecki if (oidp == NULL) 559bd3cdc31SAndrzej Bialecki return(EINVAL); 560bd3cdc31SAndrzej Bialecki if ((oidp->oid_kind & CTLFLAG_DYN) == 0) { 561bd3cdc31SAndrzej Bialecki printf("can't remove non-dynamic nodes!\n"); 562bd3cdc31SAndrzej Bialecki return (EINVAL); 563bd3cdc31SAndrzej Bialecki } 564bd3cdc31SAndrzej Bialecki /* 565bd3cdc31SAndrzej Bialecki * WARNING: normal method to do this should be through 566bd3cdc31SAndrzej Bialecki * sysctl_ctx_free(). Use recursing as the last resort 567bd3cdc31SAndrzej Bialecki * method to purge your sysctl tree of leftovers... 568bd3cdc31SAndrzej Bialecki * However, if some other code still references these nodes, 569bd3cdc31SAndrzej Bialecki * it will panic. 570bd3cdc31SAndrzej Bialecki */ 571bd3cdc31SAndrzej Bialecki if ((oidp->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 572bd3cdc31SAndrzej Bialecki if (oidp->oid_refcnt == 1) { 573e4cd31ddSJeff Roberson SLIST_FOREACH_SAFE(p, 574e4cd31ddSJeff Roberson SYSCTL_CHILDREN(oidp), oid_link, tmp) { 575f510415dSScott Long if (!recurse) { 576f510415dSScott Long printf("Warning: failed attempt to " 577f510415dSScott Long "remove oid %s with child %s\n", 578f510415dSScott Long oidp->oid_name, p->oid_name); 579bd3cdc31SAndrzej Bialecki return (ENOTEMPTY); 580f510415dSScott Long } 581875b66a0SJohn Baldwin error = sysctl_remove_oid_locked(p, del, 582875b66a0SJohn Baldwin recurse); 583bd3cdc31SAndrzej Bialecki if (error) 584bd3cdc31SAndrzej Bialecki return (error); 585bd3cdc31SAndrzej Bialecki } 586bd3cdc31SAndrzej Bialecki } 587bd3cdc31SAndrzej Bialecki } 588bd3cdc31SAndrzej Bialecki if (oidp->oid_refcnt > 1 ) { 589bd3cdc31SAndrzej Bialecki oidp->oid_refcnt--; 590bd3cdc31SAndrzej Bialecki } else { 591bd3cdc31SAndrzej Bialecki if (oidp->oid_refcnt == 0) { 592bd3cdc31SAndrzej Bialecki printf("Warning: bad oid_refcnt=%u (%s)!\n", 593bd3cdc31SAndrzej Bialecki oidp->oid_refcnt, oidp->oid_name); 594bd3cdc31SAndrzej Bialecki return (EINVAL); 595bd3cdc31SAndrzej Bialecki } 596bd3cdc31SAndrzej Bialecki sysctl_unregister_oid(oidp); 597bd3cdc31SAndrzej Bialecki if (del) { 598ccecef29SMatthew D Fleming /* 599ccecef29SMatthew D Fleming * Wait for all threads running the handler to drain. 600ccecef29SMatthew D Fleming * This preserves the previous behavior when the 601ccecef29SMatthew D Fleming * sysctl lock was held across a handler invocation, 602ccecef29SMatthew D Fleming * and is necessary for module unload correctness. 603ccecef29SMatthew D Fleming */ 604ccecef29SMatthew D Fleming while (oidp->oid_running > 0) { 605ccecef29SMatthew D Fleming oidp->oid_kind |= CTLFLAG_DYING; 606ccecef29SMatthew D Fleming SYSCTL_SLEEP(&oidp->oid_running, "oidrm", 0); 607ccecef29SMatthew D Fleming } 6085937226dSPoul-Henning Kamp if (oidp->oid_descr) 609db9066f7SMarius Strobl free(__DECONST(char *, oidp->oid_descr), 61093e8459aSPeter Wemm M_SYSCTLOID); 611db9066f7SMarius Strobl free(__DECONST(char *, oidp->oid_name), M_SYSCTLOID); 612bd3cdc31SAndrzej Bialecki free(oidp, M_SYSCTLOID); 613bd3cdc31SAndrzej Bialecki } 614bd3cdc31SAndrzej Bialecki } 615bd3cdc31SAndrzej Bialecki return (0); 616bd3cdc31SAndrzej Bialecki } 617bd3cdc31SAndrzej Bialecki /* 618bd3cdc31SAndrzej Bialecki * Create new sysctls at run time. 619bd3cdc31SAndrzej Bialecki * clist may point to a valid context initialized with sysctl_ctx_init(). 620bd3cdc31SAndrzej Bialecki */ 621bd3cdc31SAndrzej Bialecki struct sysctl_oid * 622bd3cdc31SAndrzej Bialecki sysctl_add_oid(struct sysctl_ctx_list *clist, struct sysctl_oid_list *parent, 623e4cd31ddSJeff Roberson int number, const char *name, int kind, void *arg1, intptr_t arg2, 624c5f9b6d0SJohn Baldwin int (*handler)(SYSCTL_HANDLER_ARGS), const char *fmt, const char *descr) 625bd3cdc31SAndrzej Bialecki { 626bd3cdc31SAndrzej Bialecki struct sysctl_oid *oidp; 627bd3cdc31SAndrzej Bialecki 628bd3cdc31SAndrzej Bialecki /* You have to hook up somewhere.. */ 629bd3cdc31SAndrzej Bialecki if (parent == NULL) 630bd3cdc31SAndrzej Bialecki return(NULL); 631bd3cdc31SAndrzej Bialecki /* Check if the node already exists, otherwise create it */ 632875b66a0SJohn Baldwin SYSCTL_XLOCK(); 633bd3cdc31SAndrzej Bialecki oidp = sysctl_find_oidname(name, parent); 634bd3cdc31SAndrzej Bialecki if (oidp != NULL) { 635bd3cdc31SAndrzej Bialecki if ((oidp->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 636bd3cdc31SAndrzej Bialecki oidp->oid_refcnt++; 637bd3cdc31SAndrzej Bialecki /* Update the context */ 638bd3cdc31SAndrzej Bialecki if (clist != NULL) 639bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_add(clist, oidp); 640875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 641bd3cdc31SAndrzej Bialecki return (oidp); 642bd3cdc31SAndrzej Bialecki } else { 643875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 644bd3cdc31SAndrzej Bialecki printf("can't re-use a leaf (%s)!\n", name); 645bd3cdc31SAndrzej Bialecki return (NULL); 646bd3cdc31SAndrzej Bialecki } 647bd3cdc31SAndrzej Bialecki } 648a163d034SWarner Losh oidp = malloc(sizeof(struct sysctl_oid), M_SYSCTLOID, M_WAITOK|M_ZERO); 649bd3cdc31SAndrzej Bialecki oidp->oid_parent = parent; 650af3b2549SHans Petter Selasky SLIST_INIT(&oidp->oid_children); 651bd3cdc31SAndrzej Bialecki oidp->oid_number = number; 652bd3cdc31SAndrzej Bialecki oidp->oid_refcnt = 1; 653db9066f7SMarius Strobl oidp->oid_name = strdup(name, M_SYSCTLOID); 654bd3cdc31SAndrzej Bialecki oidp->oid_handler = handler; 655bd3cdc31SAndrzej Bialecki oidp->oid_kind = CTLFLAG_DYN | kind; 656bd3cdc31SAndrzej Bialecki oidp->oid_arg1 = arg1; 657bd3cdc31SAndrzej Bialecki oidp->oid_arg2 = arg2; 658bd3cdc31SAndrzej Bialecki oidp->oid_fmt = fmt; 659af3b2549SHans Petter Selasky if (descr != NULL) 660db9066f7SMarius Strobl oidp->oid_descr = strdup(descr, M_SYSCTLOID); 661bd3cdc31SAndrzej Bialecki /* Update the context, if used */ 662bd3cdc31SAndrzej Bialecki if (clist != NULL) 663bd3cdc31SAndrzej Bialecki sysctl_ctx_entry_add(clist, oidp); 664bd3cdc31SAndrzej Bialecki /* Register this oid */ 665bd3cdc31SAndrzej Bialecki sysctl_register_oid(oidp); 666875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 667bd3cdc31SAndrzej Bialecki return (oidp); 668bd3cdc31SAndrzej Bialecki } 669bd3cdc31SAndrzej Bialecki 670ce02431fSDoug Rabson /* 671cd17ceaaSPeter Wemm * Rename an existing oid. 672cd17ceaaSPeter Wemm */ 673cd17ceaaSPeter Wemm void 674cd17ceaaSPeter Wemm sysctl_rename_oid(struct sysctl_oid *oidp, const char *name) 675cd17ceaaSPeter Wemm { 676cd17ceaaSPeter Wemm char *newname; 677db9066f7SMarius Strobl char *oldname; 678cd17ceaaSPeter Wemm 679db9066f7SMarius Strobl newname = strdup(name, M_SYSCTLOID); 680875b66a0SJohn Baldwin SYSCTL_XLOCK(); 681db9066f7SMarius Strobl oldname = __DECONST(char *, oidp->oid_name); 682cd17ceaaSPeter Wemm oidp->oid_name = newname; 683875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 684cd17ceaaSPeter Wemm free(oldname, M_SYSCTLOID); 685cd17ceaaSPeter Wemm } 686cd17ceaaSPeter Wemm 687cd17ceaaSPeter Wemm /* 68821885af5SDag-Erling Smørgrav * Reparent an existing oid. 68921885af5SDag-Erling Smørgrav */ 69021885af5SDag-Erling Smørgrav int 69121885af5SDag-Erling Smørgrav sysctl_move_oid(struct sysctl_oid *oid, struct sysctl_oid_list *parent) 69221885af5SDag-Erling Smørgrav { 69321885af5SDag-Erling Smørgrav struct sysctl_oid *oidp; 69421885af5SDag-Erling Smørgrav 695875b66a0SJohn Baldwin SYSCTL_XLOCK(); 696875b66a0SJohn Baldwin if (oid->oid_parent == parent) { 697875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 69821885af5SDag-Erling Smørgrav return (0); 699875b66a0SJohn Baldwin } 70021885af5SDag-Erling Smørgrav oidp = sysctl_find_oidname(oid->oid_name, parent); 701875b66a0SJohn Baldwin if (oidp != NULL) { 702875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 70321885af5SDag-Erling Smørgrav return (EEXIST); 704875b66a0SJohn Baldwin } 70521885af5SDag-Erling Smørgrav sysctl_unregister_oid(oid); 70621885af5SDag-Erling Smørgrav oid->oid_parent = parent; 70721885af5SDag-Erling Smørgrav oid->oid_number = OID_AUTO; 70821885af5SDag-Erling Smørgrav sysctl_register_oid(oid); 709875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 71021885af5SDag-Erling Smørgrav return (0); 71121885af5SDag-Erling Smørgrav } 71221885af5SDag-Erling Smørgrav 71321885af5SDag-Erling Smørgrav /* 714ce02431fSDoug Rabson * Register the kernel's oids on startup. 715ce02431fSDoug Rabson */ 716f41325dbSPeter Wemm SET_DECLARE(sysctl_set, struct sysctl_oid); 717ce02431fSDoug Rabson 718107e7dc5SPeter Pentchev static void 719107e7dc5SPeter Pentchev sysctl_register_all(void *arg) 720ce02431fSDoug Rabson { 721f41325dbSPeter Wemm struct sysctl_oid **oidp; 722ce02431fSDoug Rabson 7233e829b18SJohn Baldwin sx_init(&sysctlmemlock, "sysctl mem"); 7243bd1da29SRobert Watson SYSCTL_INIT(); 725875b66a0SJohn Baldwin SYSCTL_XLOCK(); 726f41325dbSPeter Wemm SET_FOREACH(oidp, sysctl_set) 727f41325dbSPeter Wemm sysctl_register_oid(*oidp); 728875b66a0SJohn Baldwin SYSCTL_XUNLOCK(); 729f41325dbSPeter Wemm } 730af3b2549SHans Petter Selasky SYSINIT(sysctl, SI_SUB_KMEM, SI_ORDER_FIRST, sysctl_register_all, 0); 731ce02431fSDoug Rabson 732946bb7a2SPoul-Henning Kamp /* 733946bb7a2SPoul-Henning Kamp * "Staff-functions" 734946bb7a2SPoul-Henning Kamp * 73565d0bc13SPoul-Henning Kamp * These functions implement a presently undocumented interface 73665d0bc13SPoul-Henning Kamp * used by the sysctl program to walk the tree, and get the type 73765d0bc13SPoul-Henning Kamp * so it can print the value. 73865d0bc13SPoul-Henning Kamp * This interface is under work and consideration, and should probably 73965d0bc13SPoul-Henning Kamp * be killed with a big axe by the first person who can find the time. 74065d0bc13SPoul-Henning Kamp * (be aware though, that the proper interface isn't as obvious as it 74165d0bc13SPoul-Henning Kamp * may seem, there are various conflicting requirements. 74265d0bc13SPoul-Henning Kamp * 743946bb7a2SPoul-Henning Kamp * {0,0} printf the entire MIB-tree. 744946bb7a2SPoul-Henning Kamp * {0,1,...} return the name of the "..." OID. 74586415b71SPoul-Henning Kamp * {0,2,...} return the next OID. 746946bb7a2SPoul-Henning Kamp * {0,3} return the OID of the name in "new" 74765d0bc13SPoul-Henning Kamp * {0,4,...} return the kind & format info for the "..." OID. 7486105f815SLuigi Rizzo * {0,5,...} return the description the "..." OID. 749946bb7a2SPoul-Henning Kamp */ 750946bb7a2SPoul-Henning Kamp 751df970488SRobert Watson #ifdef SYSCTL_DEBUG 752787d58f2SPoul-Henning Kamp static void 753ce02431fSDoug Rabson sysctl_sysctl_debug_dump_node(struct sysctl_oid_list *l, int i) 754787d58f2SPoul-Henning Kamp { 755ce02431fSDoug Rabson int k; 756ce02431fSDoug Rabson struct sysctl_oid *oidp; 757787d58f2SPoul-Henning Kamp 758ccecef29SMatthew D Fleming SYSCTL_ASSERT_XLOCKED(); 759ce02431fSDoug Rabson SLIST_FOREACH(oidp, l, oid_link) { 760787d58f2SPoul-Henning Kamp 761787d58f2SPoul-Henning Kamp for (k=0; k<i; k++) 762787d58f2SPoul-Henning Kamp printf(" "); 763787d58f2SPoul-Henning Kamp 764ce02431fSDoug Rabson printf("%d %s ", oidp->oid_number, oidp->oid_name); 765787d58f2SPoul-Henning Kamp 766787d58f2SPoul-Henning Kamp printf("%c%c", 767ce02431fSDoug Rabson oidp->oid_kind & CTLFLAG_RD ? 'R':' ', 768ce02431fSDoug Rabson oidp->oid_kind & CTLFLAG_WR ? 'W':' '); 769787d58f2SPoul-Henning Kamp 770ce02431fSDoug Rabson if (oidp->oid_handler) 77161220614SPoul-Henning Kamp printf(" *Handler"); 77261220614SPoul-Henning Kamp 773ce02431fSDoug Rabson switch (oidp->oid_kind & CTLTYPE) { 774787d58f2SPoul-Henning Kamp case CTLTYPE_NODE: 775787d58f2SPoul-Henning Kamp printf(" Node\n"); 776ce02431fSDoug Rabson if (!oidp->oid_handler) { 777787d58f2SPoul-Henning Kamp sysctl_sysctl_debug_dump_node( 778af3b2549SHans Petter Selasky SYSCTL_CHILDREN(oidp), i + 2); 779787d58f2SPoul-Henning Kamp } 780787d58f2SPoul-Henning Kamp break; 781787d58f2SPoul-Henning Kamp case CTLTYPE_INT: printf(" Int\n"); break; 782cbc134adSMatthew D Fleming case CTLTYPE_UINT: printf(" u_int\n"); break; 783cbc134adSMatthew D Fleming case CTLTYPE_LONG: printf(" Long\n"); break; 784cbc134adSMatthew D Fleming case CTLTYPE_ULONG: printf(" u_long\n"); break; 785787d58f2SPoul-Henning Kamp case CTLTYPE_STRING: printf(" String\n"); break; 786cbc134adSMatthew D Fleming case CTLTYPE_U64: printf(" uint64_t\n"); break; 787cbc134adSMatthew D Fleming case CTLTYPE_S64: printf(" int64_t\n"); break; 788787d58f2SPoul-Henning Kamp case CTLTYPE_OPAQUE: printf(" Opaque/struct\n"); break; 789787d58f2SPoul-Henning Kamp default: printf("\n"); 790787d58f2SPoul-Henning Kamp } 791787d58f2SPoul-Henning Kamp 792787d58f2SPoul-Henning Kamp } 793787d58f2SPoul-Henning Kamp } 794787d58f2SPoul-Henning Kamp 795787d58f2SPoul-Henning Kamp static int 79682d9ae4eSPoul-Henning Kamp sysctl_sysctl_debug(SYSCTL_HANDLER_ARGS) 797787d58f2SPoul-Henning Kamp { 798023a0e61SPeter Wemm int error; 799023a0e61SPeter Wemm 800acd3428bSRobert Watson error = priv_check(req->td, PRIV_SYSCTL_DEBUG); 801023a0e61SPeter Wemm if (error) 80246003fb3SPawel Jakub Dawidek return (error); 803ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 804ce02431fSDoug Rabson sysctl_sysctl_debug_dump_node(&sysctl__children, 0); 805ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 80646003fb3SPawel Jakub Dawidek return (ENOENT); 807787d58f2SPoul-Henning Kamp } 808787d58f2SPoul-Henning Kamp 809787d58f2SPoul-Henning Kamp SYSCTL_PROC(_sysctl, 0, debug, CTLTYPE_STRING|CTLFLAG_RD, 810946bb7a2SPoul-Henning Kamp 0, 0, sysctl_sysctl_debug, "-", ""); 811df970488SRobert Watson #endif 8122e210993SPoul-Henning Kamp 813946bb7a2SPoul-Henning Kamp static int 81482d9ae4eSPoul-Henning Kamp sysctl_sysctl_name(SYSCTL_HANDLER_ARGS) 815946bb7a2SPoul-Henning Kamp { 816946bb7a2SPoul-Henning Kamp int *name = (int *) arg1; 817946bb7a2SPoul-Henning Kamp u_int namelen = arg2; 818ce02431fSDoug Rabson int error = 0; 819ce02431fSDoug Rabson struct sysctl_oid *oid; 8207f4173ccSPoul-Henning Kamp struct sysctl_oid_list *lsp = &sysctl__children, *lsp2; 821946bb7a2SPoul-Henning Kamp char buf[10]; 8222e210993SPoul-Henning Kamp 823ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 824946bb7a2SPoul-Henning Kamp while (namelen) { 825946bb7a2SPoul-Henning Kamp if (!lsp) { 8262127f260SArchie Cobbs snprintf(buf,sizeof(buf),"%d",*name); 827946bb7a2SPoul-Henning Kamp if (req->oldidx) 828946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, ".", 1); 829946bb7a2SPoul-Henning Kamp if (!error) 830946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, buf, strlen(buf)); 831946bb7a2SPoul-Henning Kamp if (error) 832ccecef29SMatthew D Fleming goto out; 833946bb7a2SPoul-Henning Kamp namelen--; 834946bb7a2SPoul-Henning Kamp name++; 835946bb7a2SPoul-Henning Kamp continue; 836946bb7a2SPoul-Henning Kamp } 8377f4173ccSPoul-Henning Kamp lsp2 = 0; 838ce02431fSDoug Rabson SLIST_FOREACH(oid, lsp, oid_link) { 839ce02431fSDoug Rabson if (oid->oid_number != *name) 840946bb7a2SPoul-Henning Kamp continue; 841946bb7a2SPoul-Henning Kamp 842946bb7a2SPoul-Henning Kamp if (req->oldidx) 843946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, ".", 1); 844946bb7a2SPoul-Henning Kamp if (!error) 845ce02431fSDoug Rabson error = SYSCTL_OUT(req, oid->oid_name, 846ce02431fSDoug Rabson strlen(oid->oid_name)); 847946bb7a2SPoul-Henning Kamp if (error) 848ccecef29SMatthew D Fleming goto out; 849946bb7a2SPoul-Henning Kamp 850946bb7a2SPoul-Henning Kamp namelen--; 851946bb7a2SPoul-Henning Kamp name++; 852946bb7a2SPoul-Henning Kamp 853ce02431fSDoug Rabson if ((oid->oid_kind & CTLTYPE) != CTLTYPE_NODE) 854946bb7a2SPoul-Henning Kamp break; 855946bb7a2SPoul-Henning Kamp 856ce02431fSDoug Rabson if (oid->oid_handler) 857946bb7a2SPoul-Henning Kamp break; 858946bb7a2SPoul-Henning Kamp 8595127ecb8SMatthew D Fleming lsp2 = SYSCTL_CHILDREN(oid); 860946bb7a2SPoul-Henning Kamp break; 861946bb7a2SPoul-Henning Kamp } 8627f4173ccSPoul-Henning Kamp lsp = lsp2; 863946bb7a2SPoul-Henning Kamp } 864ccecef29SMatthew D Fleming error = SYSCTL_OUT(req, "", 1); 865ccecef29SMatthew D Fleming out: 866ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 867ccecef29SMatthew D Fleming return (error); 868946bb7a2SPoul-Henning Kamp } 869946bb7a2SPoul-Henning Kamp 870ff66f6a4SRobert Watson /* 871ff66f6a4SRobert Watson * XXXRW/JA: Shouldn't return name data for nodes that we don't permit in 872ff66f6a4SRobert Watson * capability mode. 873ff66f6a4SRobert Watson */ 874ff66f6a4SRobert Watson static SYSCTL_NODE(_sysctl, 1, name, CTLFLAG_RD | CTLFLAG_CAPRD, 875ff66f6a4SRobert Watson sysctl_sysctl_name, ""); 876946bb7a2SPoul-Henning Kamp 877946bb7a2SPoul-Henning Kamp static int 878ce02431fSDoug Rabson sysctl_sysctl_next_ls(struct sysctl_oid_list *lsp, int *name, u_int namelen, 879ce02431fSDoug Rabson int *next, int *len, int level, struct sysctl_oid **oidpp) 880946bb7a2SPoul-Henning Kamp { 881ce02431fSDoug Rabson struct sysctl_oid *oidp; 882946bb7a2SPoul-Henning Kamp 883*efe0abddSMateusz Guzik SYSCTL_ASSERT_LOCKED(); 884946bb7a2SPoul-Henning Kamp *len = level; 885ce02431fSDoug Rabson SLIST_FOREACH(oidp, lsp, oid_link) { 886ce02431fSDoug Rabson *next = oidp->oid_number; 887ce02431fSDoug Rabson *oidpp = oidp; 888946bb7a2SPoul-Henning Kamp 889306e6b83SMaxime Henrion if (oidp->oid_kind & CTLFLAG_SKIP) 890306e6b83SMaxime Henrion continue; 891306e6b83SMaxime Henrion 892946bb7a2SPoul-Henning Kamp if (!namelen) { 893ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 89446003fb3SPawel Jakub Dawidek return (0); 895ce02431fSDoug Rabson if (oidp->oid_handler) 896946bb7a2SPoul-Henning Kamp /* We really should call the handler here...*/ 89746003fb3SPawel Jakub Dawidek return (0); 8985127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 89961220614SPoul-Henning Kamp if (!sysctl_sysctl_next_ls(lsp, 0, 0, next+1, 900ce02431fSDoug Rabson len, level+1, oidpp)) 90146003fb3SPawel Jakub Dawidek return (0); 90290623e1aSRobert Watson goto emptynode; 903946bb7a2SPoul-Henning Kamp } 904946bb7a2SPoul-Henning Kamp 905ce02431fSDoug Rabson if (oidp->oid_number < *name) 906946bb7a2SPoul-Henning Kamp continue; 907946bb7a2SPoul-Henning Kamp 908ce02431fSDoug Rabson if (oidp->oid_number > *name) { 909ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 91046003fb3SPawel Jakub Dawidek return (0); 911ce02431fSDoug Rabson if (oidp->oid_handler) 91246003fb3SPawel Jakub Dawidek return (0); 9135127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 914946bb7a2SPoul-Henning Kamp if (!sysctl_sysctl_next_ls(lsp, name+1, namelen-1, 915ce02431fSDoug Rabson next+1, len, level+1, oidpp)) 916946bb7a2SPoul-Henning Kamp return (0); 91761220614SPoul-Henning Kamp goto next; 918946bb7a2SPoul-Henning Kamp } 919ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 920946bb7a2SPoul-Henning Kamp continue; 921946bb7a2SPoul-Henning Kamp 922ce02431fSDoug Rabson if (oidp->oid_handler) 923946bb7a2SPoul-Henning Kamp continue; 924946bb7a2SPoul-Henning Kamp 9255127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 926946bb7a2SPoul-Henning Kamp if (!sysctl_sysctl_next_ls(lsp, name+1, namelen-1, next+1, 927ce02431fSDoug Rabson len, level+1, oidpp)) 928946bb7a2SPoul-Henning Kamp return (0); 92961220614SPoul-Henning Kamp next: 930946bb7a2SPoul-Henning Kamp namelen = 1; 93190623e1aSRobert Watson emptynode: 932946bb7a2SPoul-Henning Kamp *len = level; 933946bb7a2SPoul-Henning Kamp } 93446003fb3SPawel Jakub Dawidek return (1); 935946bb7a2SPoul-Henning Kamp } 936946bb7a2SPoul-Henning Kamp 937946bb7a2SPoul-Henning Kamp static int 93882d9ae4eSPoul-Henning Kamp sysctl_sysctl_next(SYSCTL_HANDLER_ARGS) 939946bb7a2SPoul-Henning Kamp { 940946bb7a2SPoul-Henning Kamp int *name = (int *) arg1; 941946bb7a2SPoul-Henning Kamp u_int namelen = arg2; 942946bb7a2SPoul-Henning Kamp int i, j, error; 943946bb7a2SPoul-Henning Kamp struct sysctl_oid *oid; 944ce02431fSDoug Rabson struct sysctl_oid_list *lsp = &sysctl__children; 945946bb7a2SPoul-Henning Kamp int newoid[CTL_MAXNAME]; 946946bb7a2SPoul-Henning Kamp 947ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 948946bb7a2SPoul-Henning Kamp i = sysctl_sysctl_next_ls(lsp, name, namelen, newoid, &j, 1, &oid); 949ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 950946bb7a2SPoul-Henning Kamp if (i) 95146003fb3SPawel Jakub Dawidek return (ENOENT); 952946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, newoid, j * sizeof (int)); 953946bb7a2SPoul-Henning Kamp return (error); 954946bb7a2SPoul-Henning Kamp } 955946bb7a2SPoul-Henning Kamp 956ff66f6a4SRobert Watson /* 957ff66f6a4SRobert Watson * XXXRW/JA: Shouldn't return next data for nodes that we don't permit in 958ff66f6a4SRobert Watson * capability mode. 959ff66f6a4SRobert Watson */ 960ff66f6a4SRobert Watson static SYSCTL_NODE(_sysctl, 2, next, CTLFLAG_RD | CTLFLAG_CAPRD, 961ff66f6a4SRobert Watson sysctl_sysctl_next, ""); 962946bb7a2SPoul-Henning Kamp 963946bb7a2SPoul-Henning Kamp static int 964ce02431fSDoug Rabson name2oid(char *name, int *oid, int *len, struct sysctl_oid **oidpp) 965946bb7a2SPoul-Henning Kamp { 966ce02431fSDoug Rabson struct sysctl_oid *oidp; 967ce02431fSDoug Rabson struct sysctl_oid_list *lsp = &sysctl__children; 968946bb7a2SPoul-Henning Kamp char *p; 969946bb7a2SPoul-Henning Kamp 970*efe0abddSMateusz Guzik SYSCTL_ASSERT_LOCKED(); 971ddf9d243SEd Schouten 972db9066f7SMarius Strobl for (*len = 0; *len < CTL_MAXNAME;) { 973db9066f7SMarius Strobl p = strsep(&name, "."); 974946bb7a2SPoul-Henning Kamp 975ce02431fSDoug Rabson oidp = SLIST_FIRST(lsp); 976db9066f7SMarius Strobl for (;; oidp = SLIST_NEXT(oidp, oid_link)) { 977db9066f7SMarius Strobl if (oidp == NULL) 978db9066f7SMarius Strobl return (ENOENT); 979db9066f7SMarius Strobl if (strcmp(p, oidp->oid_name) == 0) 980db9066f7SMarius Strobl break; 981946bb7a2SPoul-Henning Kamp } 982ce02431fSDoug Rabson *oid++ = oidp->oid_number; 983946bb7a2SPoul-Henning Kamp (*len)++; 984946bb7a2SPoul-Henning Kamp 985db9066f7SMarius Strobl if (name == NULL || *name == '\0') { 986ce02431fSDoug Rabson if (oidpp) 987ce02431fSDoug Rabson *oidpp = oidp; 988946bb7a2SPoul-Henning Kamp return (0); 989946bb7a2SPoul-Henning Kamp } 990946bb7a2SPoul-Henning Kamp 991ce02431fSDoug Rabson if ((oidp->oid_kind & CTLTYPE) != CTLTYPE_NODE) 992946bb7a2SPoul-Henning Kamp break; 993946bb7a2SPoul-Henning Kamp 994ce02431fSDoug Rabson if (oidp->oid_handler) 995946bb7a2SPoul-Henning Kamp break; 996946bb7a2SPoul-Henning Kamp 9975127ecb8SMatthew D Fleming lsp = SYSCTL_CHILDREN(oidp); 998946bb7a2SPoul-Henning Kamp } 99946003fb3SPawel Jakub Dawidek return (ENOENT); 1000946bb7a2SPoul-Henning Kamp } 1001946bb7a2SPoul-Henning Kamp 1002946bb7a2SPoul-Henning Kamp static int 100382d9ae4eSPoul-Henning Kamp sysctl_sysctl_name2oid(SYSCTL_HANDLER_ARGS) 1004946bb7a2SPoul-Henning Kamp { 1005946bb7a2SPoul-Henning Kamp char *p; 1006dd6312a7SMatthew D Fleming int error, oid[CTL_MAXNAME], len = 0; 1007946bb7a2SPoul-Henning Kamp struct sysctl_oid *op = 0; 1008946bb7a2SPoul-Henning Kamp 1009946bb7a2SPoul-Henning Kamp if (!req->newlen) 101046003fb3SPawel Jakub Dawidek return (ENOENT); 10116a5d592aSPoul-Henning Kamp if (req->newlen >= MAXPATHLEN) /* XXX arbitrary, undocumented */ 10126a5d592aSPoul-Henning Kamp return (ENAMETOOLONG); 1013946bb7a2SPoul-Henning Kamp 1014a163d034SWarner Losh p = malloc(req->newlen+1, M_SYSCTL, M_WAITOK); 1015946bb7a2SPoul-Henning Kamp 1016946bb7a2SPoul-Henning Kamp error = SYSCTL_IN(req, p, req->newlen); 1017946bb7a2SPoul-Henning Kamp if (error) { 1018946bb7a2SPoul-Henning Kamp free(p, M_SYSCTL); 1019946bb7a2SPoul-Henning Kamp return (error); 1020946bb7a2SPoul-Henning Kamp } 1021946bb7a2SPoul-Henning Kamp 1022946bb7a2SPoul-Henning Kamp p [req->newlen] = '\0'; 1023946bb7a2SPoul-Henning Kamp 1024ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 1025946bb7a2SPoul-Henning Kamp error = name2oid(p, oid, &len, &op); 1026ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 1027946bb7a2SPoul-Henning Kamp 1028946bb7a2SPoul-Henning Kamp free(p, M_SYSCTL); 1029946bb7a2SPoul-Henning Kamp 1030946bb7a2SPoul-Henning Kamp if (error) 1031946bb7a2SPoul-Henning Kamp return (error); 1032946bb7a2SPoul-Henning Kamp 1033946bb7a2SPoul-Henning Kamp error = SYSCTL_OUT(req, oid, len * sizeof *oid); 1034946bb7a2SPoul-Henning Kamp return (error); 1035946bb7a2SPoul-Henning Kamp } 1036946bb7a2SPoul-Henning Kamp 1037ff66f6a4SRobert Watson /* 1038ff66f6a4SRobert Watson * XXXRW/JA: Shouldn't return name2oid data for nodes that we don't permit in 1039ff66f6a4SRobert Watson * capability mode. 1040ff66f6a4SRobert Watson */ 10412fee06f0SMatthew D Fleming SYSCTL_PROC(_sysctl, 3, name2oid, 1042ff66f6a4SRobert Watson CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_ANYBODY | CTLFLAG_MPSAFE 1043ff66f6a4SRobert Watson | CTLFLAG_CAPRW, 0, 0, sysctl_sysctl_name2oid, "I", ""); 1044946bb7a2SPoul-Henning Kamp 1045946bb7a2SPoul-Henning Kamp static int 104682d9ae4eSPoul-Henning Kamp sysctl_sysctl_oidfmt(SYSCTL_HANDLER_ARGS) 1047946bb7a2SPoul-Henning Kamp { 1048ce02431fSDoug Rabson struct sysctl_oid *oid; 1049226420a4SBrian Feldman int error; 1050946bb7a2SPoul-Henning Kamp 1051ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 1052226420a4SBrian Feldman error = sysctl_find_oid(arg1, arg2, &oid, NULL, req); 1053226420a4SBrian Feldman if (error) 1054ccecef29SMatthew D Fleming goto out; 1055946bb7a2SPoul-Henning Kamp 1056ccecef29SMatthew D Fleming if (oid->oid_fmt == NULL) { 1057ccecef29SMatthew D Fleming error = ENOENT; 1058ccecef29SMatthew D Fleming goto out; 1059ccecef29SMatthew D Fleming } 1060226420a4SBrian Feldman error = SYSCTL_OUT(req, &oid->oid_kind, sizeof(oid->oid_kind)); 1061226420a4SBrian Feldman if (error) 1062ccecef29SMatthew D Fleming goto out; 1063226420a4SBrian Feldman error = SYSCTL_OUT(req, oid->oid_fmt, strlen(oid->oid_fmt) + 1); 1064ccecef29SMatthew D Fleming out: 1065ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 106665d0bc13SPoul-Henning Kamp return (error); 1067946bb7a2SPoul-Henning Kamp } 1068946bb7a2SPoul-Henning Kamp 106986415b71SPoul-Henning Kamp 1070ff66f6a4SRobert Watson static SYSCTL_NODE(_sysctl, 4, oidfmt, CTLFLAG_RD|CTLFLAG_MPSAFE|CTLFLAG_CAPRD, 1071f3b86a5fSEd Schouten sysctl_sysctl_oidfmt, ""); 1072946bb7a2SPoul-Henning Kamp 10736105f815SLuigi Rizzo static int 10746105f815SLuigi Rizzo sysctl_sysctl_oiddescr(SYSCTL_HANDLER_ARGS) 10756105f815SLuigi Rizzo { 10766105f815SLuigi Rizzo struct sysctl_oid *oid; 10776105f815SLuigi Rizzo int error; 10786105f815SLuigi Rizzo 1079ccecef29SMatthew D Fleming SYSCTL_XLOCK(); 10806105f815SLuigi Rizzo error = sysctl_find_oid(arg1, arg2, &oid, NULL, req); 10816105f815SLuigi Rizzo if (error) 1082ccecef29SMatthew D Fleming goto out; 10836105f815SLuigi Rizzo 1084ccecef29SMatthew D Fleming if (oid->oid_descr == NULL) { 1085ccecef29SMatthew D Fleming error = ENOENT; 1086ccecef29SMatthew D Fleming goto out; 1087ccecef29SMatthew D Fleming } 10885937226dSPoul-Henning Kamp error = SYSCTL_OUT(req, oid->oid_descr, strlen(oid->oid_descr) + 1); 1089ccecef29SMatthew D Fleming out: 1090ccecef29SMatthew D Fleming SYSCTL_XUNLOCK(); 10916105f815SLuigi Rizzo return (error); 10926105f815SLuigi Rizzo } 10936105f815SLuigi Rizzo 1094ff66f6a4SRobert Watson static SYSCTL_NODE(_sysctl, 5, oiddescr, CTLFLAG_RD|CTLFLAG_CAPRD, 1095ff66f6a4SRobert Watson sysctl_sysctl_oiddescr, ""); 10966105f815SLuigi Rizzo 1097946bb7a2SPoul-Henning Kamp /* 1098946bb7a2SPoul-Henning Kamp * Default "handler" functions. 1099946bb7a2SPoul-Henning Kamp */ 11002e210993SPoul-Henning Kamp 1101ae0eb976SPoul-Henning Kamp /* 1102486bddb0SDoug Rabson * Handle an int, signed or unsigned. 1103ae0eb976SPoul-Henning Kamp * Two cases: 1104ae0eb976SPoul-Henning Kamp * a variable: point arg1 at it. 1105ae0eb976SPoul-Henning Kamp * a constant: pass it in arg2. 1106ae0eb976SPoul-Henning Kamp */ 1107ae0eb976SPoul-Henning Kamp 11083a34a5c3SPoul-Henning Kamp int 110982d9ae4eSPoul-Henning Kamp sysctl_handle_int(SYSCTL_HANDLER_ARGS) 1110b396cd83SPoul-Henning Kamp { 11119e74cba3SDon Lewis int tmpout, error = 0; 1112b396cd83SPoul-Henning Kamp 11139e74cba3SDon Lewis /* 11149e74cba3SDon Lewis * Attempt to get a coherent snapshot by making a copy of the data. 11159e74cba3SDon Lewis */ 1116ae0eb976SPoul-Henning Kamp if (arg1) 11179e74cba3SDon Lewis tmpout = *(int *)arg1; 11181fbf1f71SBruce Evans else 11199e74cba3SDon Lewis tmpout = arg2; 11209e74cba3SDon Lewis error = SYSCTL_OUT(req, &tmpout, sizeof(int)); 1121b396cd83SPoul-Henning Kamp 1122ae0eb976SPoul-Henning Kamp if (error || !req->newptr) 1123ae0eb976SPoul-Henning Kamp return (error); 1124b396cd83SPoul-Henning Kamp 1125ae0eb976SPoul-Henning Kamp if (!arg1) 1126ae0eb976SPoul-Henning Kamp error = EPERM; 1127ae0eb976SPoul-Henning Kamp else 1128ae0eb976SPoul-Henning Kamp error = SYSCTL_IN(req, arg1, sizeof(int)); 1129ae0eb976SPoul-Henning Kamp return (error); 1130b396cd83SPoul-Henning Kamp } 1131b396cd83SPoul-Henning Kamp 1132a4684d74SAndre Oppermann /* 1133a4684d74SAndre Oppermann * Based on on sysctl_handle_int() convert milliseconds into ticks. 1134eddfbb76SRobert Watson * Note: this is used by TCP. 1135a4684d74SAndre Oppermann */ 1136a4684d74SAndre Oppermann 1137a4684d74SAndre Oppermann int 1138a4684d74SAndre Oppermann sysctl_msec_to_ticks(SYSCTL_HANDLER_ARGS) 1139a4684d74SAndre Oppermann { 1140a4684d74SAndre Oppermann int error, s, tt; 1141a4684d74SAndre Oppermann 1142f6dfe47aSMarko Zec tt = *(int *)arg1; 1143a4684d74SAndre Oppermann s = (int)((int64_t)tt * 1000 / hz); 1144a4684d74SAndre Oppermann 1145a4684d74SAndre Oppermann error = sysctl_handle_int(oidp, &s, 0, req); 1146a4684d74SAndre Oppermann if (error || !req->newptr) 1147a4684d74SAndre Oppermann return (error); 1148a4684d74SAndre Oppermann 1149a4684d74SAndre Oppermann tt = (int)((int64_t)s * hz / 1000); 1150a4684d74SAndre Oppermann if (tt < 1) 1151a4684d74SAndre Oppermann return (EINVAL); 1152a4684d74SAndre Oppermann 1153f6dfe47aSMarko Zec *(int *)arg1 = tt; 1154a4684d74SAndre Oppermann return (0); 1155a4684d74SAndre Oppermann } 1156a4684d74SAndre Oppermann 1157a4684d74SAndre Oppermann 1158ae0eb976SPoul-Henning Kamp /* 115918716f9fSMarius Strobl * Handle a long, signed or unsigned. 116018716f9fSMarius Strobl * Two cases: 116118716f9fSMarius Strobl * a variable: point arg1 at it. 116218716f9fSMarius Strobl * a constant: pass it in arg2. 1163069e9bc1SDoug Rabson */ 1164069e9bc1SDoug Rabson 1165069e9bc1SDoug Rabson int 116682d9ae4eSPoul-Henning Kamp sysctl_handle_long(SYSCTL_HANDLER_ARGS) 1167069e9bc1SDoug Rabson { 1168069e9bc1SDoug Rabson int error = 0; 1169a7bc3102SPeter Wemm long tmplong; 1170a7bc3102SPeter Wemm #ifdef SCTL_MASK32 1171a7bc3102SPeter Wemm int tmpint; 1172a7bc3102SPeter Wemm #endif 1173069e9bc1SDoug Rabson 11749e74cba3SDon Lewis /* 11759e74cba3SDon Lewis * Attempt to get a coherent snapshot by making a copy of the data. 11769e74cba3SDon Lewis */ 1177bdc5f017SMarius Strobl if (arg1) 1178a7bc3102SPeter Wemm tmplong = *(long *)arg1; 1179bdc5f017SMarius Strobl else 1180bdc5f017SMarius Strobl tmplong = arg2; 1181a7bc3102SPeter Wemm #ifdef SCTL_MASK32 1182a7bc3102SPeter Wemm if (req->flags & SCTL_MASK32) { 1183a7bc3102SPeter Wemm tmpint = tmplong; 1184a7bc3102SPeter Wemm error = SYSCTL_OUT(req, &tmpint, sizeof(int)); 1185a7bc3102SPeter Wemm } else 1186a7bc3102SPeter Wemm #endif 1187a7bc3102SPeter Wemm error = SYSCTL_OUT(req, &tmplong, sizeof(long)); 1188069e9bc1SDoug Rabson 1189069e9bc1SDoug Rabson if (error || !req->newptr) 1190069e9bc1SDoug Rabson return (error); 1191069e9bc1SDoug Rabson 1192bdc5f017SMarius Strobl if (!arg1) 1193bdc5f017SMarius Strobl error = EPERM; 1194a7bc3102SPeter Wemm #ifdef SCTL_MASK32 1195bdc5f017SMarius Strobl else if (req->flags & SCTL_MASK32) { 1196a7bc3102SPeter Wemm error = SYSCTL_IN(req, &tmpint, sizeof(int)); 1197a7bc3102SPeter Wemm *(long *)arg1 = (long)tmpint; 1198bdc5f017SMarius Strobl } 1199a7bc3102SPeter Wemm #endif 1200bdc5f017SMarius Strobl else 1201069e9bc1SDoug Rabson error = SYSCTL_IN(req, arg1, sizeof(long)); 1202069e9bc1SDoug Rabson return (error); 1203069e9bc1SDoug Rabson } 1204069e9bc1SDoug Rabson 1205069e9bc1SDoug Rabson /* 120618716f9fSMarius Strobl * Handle a 64 bit int, signed or unsigned. 120718716f9fSMarius Strobl * Two cases: 120818716f9fSMarius Strobl * a variable: point arg1 at it. 120918716f9fSMarius Strobl * a constant: pass it in arg2. 1210df82ff50SDavid Malone */ 1211df82ff50SDavid Malone int 1212cbc134adSMatthew D Fleming sysctl_handle_64(SYSCTL_HANDLER_ARGS) 1213df82ff50SDavid Malone { 1214df82ff50SDavid Malone int error = 0; 1215df82ff50SDavid Malone uint64_t tmpout; 1216df82ff50SDavid Malone 1217df82ff50SDavid Malone /* 1218df82ff50SDavid Malone * Attempt to get a coherent snapshot by making a copy of the data. 1219df82ff50SDavid Malone */ 1220bdc5f017SMarius Strobl if (arg1) 1221df82ff50SDavid Malone tmpout = *(uint64_t *)arg1; 1222bdc5f017SMarius Strobl else 1223bdc5f017SMarius Strobl tmpout = arg2; 1224df82ff50SDavid Malone error = SYSCTL_OUT(req, &tmpout, sizeof(uint64_t)); 1225df82ff50SDavid Malone 1226df82ff50SDavid Malone if (error || !req->newptr) 1227df82ff50SDavid Malone return (error); 1228df82ff50SDavid Malone 1229bdc5f017SMarius Strobl if (!arg1) 1230bdc5f017SMarius Strobl error = EPERM; 1231bdc5f017SMarius Strobl else 1232df82ff50SDavid Malone error = SYSCTL_IN(req, arg1, sizeof(uint64_t)); 1233df82ff50SDavid Malone return (error); 1234df82ff50SDavid Malone } 1235df82ff50SDavid Malone 1236df82ff50SDavid Malone /* 1237ae0eb976SPoul-Henning Kamp * Handle our generic '\0' terminated 'C' string. 1238ae0eb976SPoul-Henning Kamp * Two cases: 1239ae0eb976SPoul-Henning Kamp * a variable string: point arg1 at it, arg2 is max length. 1240ae0eb976SPoul-Henning Kamp * a constant string: point arg1 at it, arg2 is zero. 1241ae0eb976SPoul-Henning Kamp */ 1242ae0eb976SPoul-Henning Kamp 12433a34a5c3SPoul-Henning Kamp int 124482d9ae4eSPoul-Henning Kamp sysctl_handle_string(SYSCTL_HANDLER_ARGS) 1245b396cd83SPoul-Henning Kamp { 124637a107a4SGlen Barber size_t outlen; 124730d58d6bSMateusz Guzik int error = 0, ro_string = 0; 1248e80fb434SRobert Drehmel 12496a3287f8SHans Petter Selasky /* 12506a3287f8SHans Petter Selasky * A zero-length buffer indicates a fixed size read-only 12516a3287f8SHans Petter Selasky * string: 12526a3287f8SHans Petter Selasky */ 125330d58d6bSMateusz Guzik if (arg2 == 0) { 12546a3287f8SHans Petter Selasky arg2 = strlen((char *)arg1) + 1; 125530d58d6bSMateusz Guzik ro_string = 1; 125630d58d6bSMateusz Guzik } 12573da1cf1eSHans Petter Selasky 1258af3b2549SHans Petter Selasky if (req->oldptr != NULL) { 1259af3b2549SHans Petter Selasky char *tmparg; 126037a107a4SGlen Barber 126130d58d6bSMateusz Guzik if (ro_string) { 126230d58d6bSMateusz Guzik tmparg = arg1; 126330d58d6bSMateusz Guzik } else { 1264af3b2549SHans Petter Selasky /* try to make a coherent snapshot of the string */ 1265af3b2549SHans Petter Selasky tmparg = malloc(arg2, M_SYSCTLTMP, M_WAITOK); 1266af3b2549SHans Petter Selasky memcpy(tmparg, arg1, arg2); 126730d58d6bSMateusz Guzik } 1268af3b2549SHans Petter Selasky 1269af3b2549SHans Petter Selasky outlen = strnlen(tmparg, arg2 - 1) + 1; 127037a107a4SGlen Barber error = SYSCTL_OUT(req, tmparg, outlen); 127137a107a4SGlen Barber 127230d58d6bSMateusz Guzik if (!ro_string) 1273af3b2549SHans Petter Selasky free(tmparg, M_SYSCTLTMP); 1274af3b2549SHans Petter Selasky } else { 1275af3b2549SHans Petter Selasky outlen = strnlen((char *)arg1, arg2 - 1) + 1; 1276af3b2549SHans Petter Selasky error = SYSCTL_OUT(req, NULL, outlen); 1277af3b2549SHans Petter Selasky } 12786a5d592aSPoul-Henning Kamp if (error || !req->newptr) 1279ae0eb976SPoul-Henning Kamp return (error); 1280ae0eb976SPoul-Henning Kamp 12816a5d592aSPoul-Henning Kamp if ((req->newlen - req->newidx) >= arg2) { 12826a5d592aSPoul-Henning Kamp error = EINVAL; 1283ae0eb976SPoul-Henning Kamp } else { 1284ae0eb976SPoul-Henning Kamp arg2 = (req->newlen - req->newidx); 1285ae0eb976SPoul-Henning Kamp error = SYSCTL_IN(req, arg1, arg2); 1286ae0eb976SPoul-Henning Kamp ((char *)arg1)[arg2] = '\0'; 1287b396cd83SPoul-Henning Kamp } 12882e210993SPoul-Henning Kamp return (error); 1289b396cd83SPoul-Henning Kamp } 1290b396cd83SPoul-Henning Kamp 1291ae0eb976SPoul-Henning Kamp /* 1292ae0eb976SPoul-Henning Kamp * Handle any kind of opaque data. 1293ae0eb976SPoul-Henning Kamp * arg1 points to it, arg2 is the size. 1294ae0eb976SPoul-Henning Kamp */ 1295ae0eb976SPoul-Henning Kamp 12963a34a5c3SPoul-Henning Kamp int 129782d9ae4eSPoul-Henning Kamp sysctl_handle_opaque(SYSCTL_HANDLER_ARGS) 1298b396cd83SPoul-Henning Kamp { 1299dcf59a59SBruce M Simpson int error, tries; 1300dcf59a59SBruce M Simpson u_int generation; 1301f0597024SBruce M Simpson struct sysctl_req req2; 1302b396cd83SPoul-Henning Kamp 13039e74cba3SDon Lewis /* 1304dcf59a59SBruce M Simpson * Attempt to get a coherent snapshot, by using the thread 1305dcf59a59SBruce M Simpson * pre-emption counter updated from within mi_switch() to 1306dcf59a59SBruce M Simpson * determine if we were pre-empted during a bcopy() or 1307dcf59a59SBruce M Simpson * copyout(). Make 3 attempts at doing this before giving up. 1308dcf59a59SBruce M Simpson * If we encounter an error, stop immediately. 13099e74cba3SDon Lewis */ 1310dcf59a59SBruce M Simpson tries = 0; 1311f0597024SBruce M Simpson req2 = *req; 1312f0597024SBruce M Simpson retry: 1313dcf59a59SBruce M Simpson generation = curthread->td_generation; 1314ae0eb976SPoul-Henning Kamp error = SYSCTL_OUT(req, arg1, arg2); 1315dcf59a59SBruce M Simpson if (error) 1316ae0eb976SPoul-Henning Kamp return (error); 1317dcf59a59SBruce M Simpson tries++; 1318f0597024SBruce M Simpson if (generation != curthread->td_generation && tries < 3) { 1319f0597024SBruce M Simpson *req = req2; 1320f0597024SBruce M Simpson goto retry; 1321f0597024SBruce M Simpson } 1322ae0eb976SPoul-Henning Kamp 1323ae0eb976SPoul-Henning Kamp error = SYSCTL_IN(req, arg1, arg2); 1324ae0eb976SPoul-Henning Kamp 1325ae0eb976SPoul-Henning Kamp return (error); 1326b396cd83SPoul-Henning Kamp } 1327ae0eb976SPoul-Henning Kamp 1328deae269aSPoul-Henning Kamp /* 1329deae269aSPoul-Henning Kamp * Transfer functions to/from kernel space. 1330deae269aSPoul-Henning Kamp * XXX: rather untested at this point 1331deae269aSPoul-Henning Kamp */ 1332deae269aSPoul-Henning Kamp static int 1333069e9bc1SDoug Rabson sysctl_old_kernel(struct sysctl_req *req, const void *p, size_t l) 1334ae0eb976SPoul-Henning Kamp { 1335069e9bc1SDoug Rabson size_t i = 0; 1336deae269aSPoul-Henning Kamp 1337deae269aSPoul-Henning Kamp if (req->oldptr) { 1338069e9bc1SDoug Rabson i = l; 13393a515572SThomas Moestl if (req->oldlen <= req->oldidx) 13403a515572SThomas Moestl i = 0; 13413a515572SThomas Moestl else 1342069e9bc1SDoug Rabson if (i > req->oldlen - req->oldidx) 1343069e9bc1SDoug Rabson i = req->oldlen - req->oldidx; 1344deae269aSPoul-Henning Kamp if (i > 0) 134509a8dfa2SBruce Evans bcopy(p, (char *)req->oldptr + req->oldidx, i); 1346ae0eb976SPoul-Henning Kamp } 13476b72d8dbSKonstantin Belousov req->oldidx += l; 13481c346c70SNate Williams if (req->oldptr && i != l) 1349ae0eb976SPoul-Henning Kamp return (ENOMEM); 13502e210993SPoul-Henning Kamp return (0); 1351ae0eb976SPoul-Henning Kamp } 1352ae0eb976SPoul-Henning Kamp 1353deae269aSPoul-Henning Kamp static int 1354069e9bc1SDoug Rabson sysctl_new_kernel(struct sysctl_req *req, void *p, size_t l) 1355ae0eb976SPoul-Henning Kamp { 1356deae269aSPoul-Henning Kamp if (!req->newptr) 135746003fb3SPawel Jakub Dawidek return (0); 1358deae269aSPoul-Henning Kamp if (req->newlen - req->newidx < l) 1359ae0eb976SPoul-Henning Kamp return (EINVAL); 136009a8dfa2SBruce Evans bcopy((char *)req->newptr + req->newidx, p, l); 1361ae0eb976SPoul-Henning Kamp req->newidx += l; 1362ae0eb976SPoul-Henning Kamp return (0); 1363ae0eb976SPoul-Henning Kamp } 1364ae0eb976SPoul-Henning Kamp 13651c346c70SNate Williams int 1366b40ce416SJulian Elischer kernel_sysctl(struct thread *td, int *name, u_int namelen, void *old, 1367a7bc3102SPeter Wemm size_t *oldlenp, void *new, size_t newlen, size_t *retval, int flags) 13681c346c70SNate Williams { 13691c346c70SNate Williams int error = 0; 13701c346c70SNate Williams struct sysctl_req req; 13711c346c70SNate Williams 13721c346c70SNate Williams bzero(&req, sizeof req); 13731c346c70SNate Williams 1374ce178806SRobert Watson req.td = td; 1375a7bc3102SPeter Wemm req.flags = flags; 13761c346c70SNate Williams 13771c346c70SNate Williams if (oldlenp) { 13781c346c70SNate Williams req.oldlen = *oldlenp; 13791c346c70SNate Williams } 1380a961520cSDon Lewis req.validlen = req.oldlen; 13811c346c70SNate Williams 13821c346c70SNate Williams if (old) { 13831c346c70SNate Williams req.oldptr= old; 13841c346c70SNate Williams } 13851c346c70SNate Williams 1386b8edb44cSDima Dorfman if (new != NULL) { 13871c346c70SNate Williams req.newlen = newlen; 13881c346c70SNate Williams req.newptr = new; 13891c346c70SNate Williams } 13901c346c70SNate Williams 13911c346c70SNate Williams req.oldfunc = sysctl_old_kernel; 13921c346c70SNate Williams req.newfunc = sysctl_new_kernel; 139373d6f851SMatthew D Fleming req.lock = REQ_UNWIRED; 13941c346c70SNate Williams 1395*efe0abddSMateusz Guzik SYSCTL_SLOCK(); 13961c346c70SNate Williams error = sysctl_root(0, name, namelen, &req); 1397*efe0abddSMateusz Guzik SYSCTL_SUNLOCK(); 1398f0597024SBruce M Simpson 1399a961520cSDon Lewis if (req.lock == REQ_WIRED && req.validlen > 0) 1400a961520cSDon Lewis vsunlock(req.oldptr, req.validlen); 14011c346c70SNate Williams 14021c346c70SNate Williams if (error && error != ENOMEM) 14031c346c70SNate Williams return (error); 14041c346c70SNate Williams 14051c346c70SNate Williams if (retval) { 1406a961520cSDon Lewis if (req.oldptr && req.oldidx > req.validlen) 1407a961520cSDon Lewis *retval = req.validlen; 14081c346c70SNate Williams else 14091c346c70SNate Williams *retval = req.oldidx; 14101c346c70SNate Williams } 14111c346c70SNate Williams return (error); 14121c346c70SNate Williams } 14131c346c70SNate Williams 14141890520aSJonathan Lemon int 1415b40ce416SJulian Elischer kernel_sysctlbyname(struct thread *td, char *name, void *old, size_t *oldlenp, 1416a7bc3102SPeter Wemm void *new, size_t newlen, size_t *retval, int flags) 14171890520aSJonathan Lemon { 14181890520aSJonathan Lemon int oid[CTL_MAXNAME]; 14192f7f966cSMatt Jacob size_t oidlen, plen; 14202f7f966cSMatt Jacob int error; 14211890520aSJonathan Lemon 14221890520aSJonathan Lemon oid[0] = 0; /* sysctl internal magic */ 14231890520aSJonathan Lemon oid[1] = 3; /* name2oid */ 14241890520aSJonathan Lemon oidlen = sizeof(oid); 14251890520aSJonathan Lemon 1426b40ce416SJulian Elischer error = kernel_sysctl(td, oid, 2, oid, &oidlen, 1427a7bc3102SPeter Wemm (void *)name, strlen(name), &plen, flags); 14281890520aSJonathan Lemon if (error) 14291890520aSJonathan Lemon return (error); 14301890520aSJonathan Lemon 1431b40ce416SJulian Elischer error = kernel_sysctl(td, oid, plen / sizeof(int), old, oldlenp, 1432a7bc3102SPeter Wemm new, newlen, retval, flags); 14331890520aSJonathan Lemon return (error); 14341890520aSJonathan Lemon } 14351890520aSJonathan Lemon 1436deae269aSPoul-Henning Kamp /* 1437deae269aSPoul-Henning Kamp * Transfer function to/from user space. 1438deae269aSPoul-Henning Kamp */ 1439deae269aSPoul-Henning Kamp static int 1440069e9bc1SDoug Rabson sysctl_old_user(struct sysctl_req *req, const void *p, size_t l) 1441ae0eb976SPoul-Henning Kamp { 144247934cefSDon Lewis size_t i, len, origidx; 14435730afc9SAlan Cox int error; 1444ae0eb976SPoul-Henning Kamp 144547934cefSDon Lewis origidx = req->oldidx; 144647934cefSDon Lewis req->oldidx += l; 14476b72d8dbSKonstantin Belousov if (req->oldptr == NULL) 144847934cefSDon Lewis return (0); 1449417ab24fSChristian S.J. Peron /* 1450417ab24fSChristian S.J. Peron * If we have not wired the user supplied buffer and we are currently 1451417ab24fSChristian S.J. Peron * holding locks, drop a witness warning, as it's possible that 1452417ab24fSChristian S.J. Peron * write operations to the user page can sleep. 1453417ab24fSChristian S.J. Peron */ 1454417ab24fSChristian S.J. Peron if (req->lock != REQ_WIRED) 145526306795SJohn Baldwin WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL, 145626306795SJohn Baldwin "sysctl_old_user()"); 1457069e9bc1SDoug Rabson i = l; 1458a961520cSDon Lewis len = req->validlen; 145947934cefSDon Lewis if (len <= origidx) 14603a515572SThomas Moestl i = 0; 146147934cefSDon Lewis else { 146247934cefSDon Lewis if (i > len - origidx) 146347934cefSDon Lewis i = len - origidx; 14645730afc9SAlan Cox if (req->lock == REQ_WIRED) { 14655730afc9SAlan Cox error = copyout_nofault(p, (char *)req->oldptr + 14665730afc9SAlan Cox origidx, i); 14675730afc9SAlan Cox } else 146847934cefSDon Lewis error = copyout(p, (char *)req->oldptr + origidx, i); 14695730afc9SAlan Cox if (error != 0) 1470ae0eb976SPoul-Henning Kamp return (error); 14715730afc9SAlan Cox } 147247934cefSDon Lewis if (i < l) 1473ae0eb976SPoul-Henning Kamp return (ENOMEM); 1474deae269aSPoul-Henning Kamp return (0); 1475ae0eb976SPoul-Henning Kamp } 1476ae0eb976SPoul-Henning Kamp 1477deae269aSPoul-Henning Kamp static int 1478069e9bc1SDoug Rabson sysctl_new_user(struct sysctl_req *req, void *p, size_t l) 1479ae0eb976SPoul-Henning Kamp { 148016cd04a3SPoul-Henning Kamp int error; 1481deae269aSPoul-Henning Kamp 1482deae269aSPoul-Henning Kamp if (!req->newptr) 148346003fb3SPawel Jakub Dawidek return (0); 1484deae269aSPoul-Henning Kamp if (req->newlen - req->newidx < l) 1485ae0eb976SPoul-Henning Kamp return (EINVAL); 1486d8339a26SChristian S.J. Peron WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL, 1487d8339a26SChristian S.J. Peron "sysctl_new_user()"); 148809a8dfa2SBruce Evans error = copyin((char *)req->newptr + req->newidx, p, l); 1489ae0eb976SPoul-Henning Kamp req->newidx += l; 1490ae0eb976SPoul-Henning Kamp return (error); 1491b396cd83SPoul-Henning Kamp } 1492b396cd83SPoul-Henning Kamp 14930600730dSDon Lewis /* 14940600730dSDon Lewis * Wire the user space destination buffer. If set to a value greater than 14950600730dSDon Lewis * zero, the len parameter limits the maximum amount of wired memory. 14960600730dSDon Lewis */ 149747934cefSDon Lewis int 14980600730dSDon Lewis sysctl_wire_old_buffer(struct sysctl_req *req, size_t len) 14990600730dSDon Lewis { 150047934cefSDon Lewis int ret; 1501433e2f47SDag-Erling Smørgrav size_t wiredlen; 150247934cefSDon Lewis 150347934cefSDon Lewis wiredlen = (len > 0 && len < req->oldlen) ? len : req->oldlen; 150447934cefSDon Lewis ret = 0; 150573d6f851SMatthew D Fleming if (req->lock != REQ_WIRED && req->oldptr && 15065be99846SBruce M Simpson req->oldfunc == sysctl_old_user) { 15078ac3e8e9SDon Lewis if (wiredlen != 0) { 1508ce8660e3SDon Lewis ret = vslock(req->oldptr, wiredlen); 1509b4adfcf2SBrian Feldman if (ret != 0) { 1510b4adfcf2SBrian Feldman if (ret != ENOMEM) 15118ac3e8e9SDon Lewis return (ret); 1512b4adfcf2SBrian Feldman wiredlen = 0; 1513b4adfcf2SBrian Feldman } 15148ac3e8e9SDon Lewis } 15155be99846SBruce M Simpson req->lock = REQ_WIRED; 1516a961520cSDon Lewis req->validlen = wiredlen; 15170600730dSDon Lewis } 15188ac3e8e9SDon Lewis return (0); 151947934cefSDon Lewis } 15200600730dSDon Lewis 15212e210993SPoul-Henning Kamp int 1522226420a4SBrian Feldman sysctl_find_oid(int *name, u_int namelen, struct sysctl_oid **noid, 1523226420a4SBrian Feldman int *nindx, struct sysctl_req *req) 15242e210993SPoul-Henning Kamp { 1525d0bb6f25SMatthew D Fleming struct sysctl_oid_list *lsp; 1526ce02431fSDoug Rabson struct sysctl_oid *oid; 1527226420a4SBrian Feldman int indx; 15282e210993SPoul-Henning Kamp 1529*efe0abddSMateusz Guzik SYSCTL_ASSERT_LOCKED(); 1530d0bb6f25SMatthew D Fleming lsp = &sysctl__children; 15312e210993SPoul-Henning Kamp indx = 0; 1532d0bb6f25SMatthew D Fleming while (indx < CTL_MAXNAME) { 1533d0bb6f25SMatthew D Fleming SLIST_FOREACH(oid, lsp, oid_link) { 1534d0bb6f25SMatthew D Fleming if (oid->oid_number == name[indx]) 1535d0bb6f25SMatthew D Fleming break; 1536d0bb6f25SMatthew D Fleming } 1537d0bb6f25SMatthew D Fleming if (oid == NULL) 1538d0bb6f25SMatthew D Fleming return (ENOENT); 1539d0bb6f25SMatthew D Fleming 15402e210993SPoul-Henning Kamp indx++; 1541ce02431fSDoug Rabson if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 1542d0bb6f25SMatthew D Fleming if (oid->oid_handler != NULL || indx == namelen) { 1543226420a4SBrian Feldman *noid = oid; 1544226420a4SBrian Feldman if (nindx != NULL) 1545226420a4SBrian Feldman *nindx = indx; 1546ccecef29SMatthew D Fleming KASSERT((oid->oid_kind & CTLFLAG_DYING) == 0, 1547ccecef29SMatthew D Fleming ("%s found DYING node %p", __func__, oid)); 1548226420a4SBrian Feldman return (0); 1549226420a4SBrian Feldman } 1550d0bb6f25SMatthew D Fleming lsp = SYSCTL_CHILDREN(oid); 1551226420a4SBrian Feldman } else if (indx == namelen) { 1552226420a4SBrian Feldman *noid = oid; 1553226420a4SBrian Feldman if (nindx != NULL) 1554226420a4SBrian Feldman *nindx = indx; 1555ccecef29SMatthew D Fleming KASSERT((oid->oid_kind & CTLFLAG_DYING) == 0, 1556ccecef29SMatthew D Fleming ("%s found DYING node %p", __func__, oid)); 1557226420a4SBrian Feldman return (0); 15582e210993SPoul-Henning Kamp } else { 1559226420a4SBrian Feldman return (ENOTDIR); 15602e210993SPoul-Henning Kamp } 15612e210993SPoul-Henning Kamp } 1562226420a4SBrian Feldman return (ENOENT); 1563226420a4SBrian Feldman } 1564226420a4SBrian Feldman 1565226420a4SBrian Feldman /* 1566226420a4SBrian Feldman * Traverse our tree, and find the right node, execute whatever it points 1567226420a4SBrian Feldman * to, and return the resulting error code. 1568226420a4SBrian Feldman */ 1569226420a4SBrian Feldman 157037c84183SPoul-Henning Kamp static int 157182d9ae4eSPoul-Henning Kamp sysctl_root(SYSCTL_HANDLER_ARGS) 1572226420a4SBrian Feldman { 1573226420a4SBrian Feldman struct sysctl_oid *oid; 1574fe41ca53SMatthew Dillon int error, indx, lvl; 1575226420a4SBrian Feldman 1576*efe0abddSMateusz Guzik SYSCTL_ASSERT_LOCKED(); 1577ddf9d243SEd Schouten 1578226420a4SBrian Feldman error = sysctl_find_oid(arg1, arg2, &oid, &indx, req); 1579226420a4SBrian Feldman if (error) 1580226420a4SBrian Feldman return (error); 1581226420a4SBrian Feldman 1582226420a4SBrian Feldman if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 1583226420a4SBrian Feldman /* 1584226420a4SBrian Feldman * You can't call a sysctl when it's a node, but has 1585226420a4SBrian Feldman * no handler. Inform the user that it's a node. 1586226420a4SBrian Feldman * The indx may or may not be the same as namelen. 1587226420a4SBrian Feldman */ 1588226420a4SBrian Feldman if (oid->oid_handler == NULL) 1589226420a4SBrian Feldman return (EISDIR); 1590226420a4SBrian Feldman } 1591226420a4SBrian Feldman 1592c2f413afSRobert Watson /* Is this sysctl writable? */ 1593c2f413afSRobert Watson if (req->newptr && !(oid->oid_kind & CTLFLAG_WR)) 15942e210993SPoul-Henning Kamp return (EPERM); 15952e210993SPoul-Henning Kamp 15967906271fSRobert Watson KASSERT(req->td != NULL, ("sysctl_root(): req->td == NULL")); 15977906271fSRobert Watson 1598ff66f6a4SRobert Watson #ifdef CAPABILITY_MODE 1599ff66f6a4SRobert Watson /* 1600ff66f6a4SRobert Watson * If the process is in capability mode, then don't permit reading or 1601ff66f6a4SRobert Watson * writing unless specifically granted for the node. 1602ff66f6a4SRobert Watson */ 1603ff66f6a4SRobert Watson if (IN_CAPABILITY_MODE(req->td)) { 1604ff66f6a4SRobert Watson if (req->oldptr && !(oid->oid_kind & CTLFLAG_CAPRD)) 1605ff66f6a4SRobert Watson return (EPERM); 1606ff66f6a4SRobert Watson if (req->newptr && !(oid->oid_kind & CTLFLAG_CAPWR)) 1607ff66f6a4SRobert Watson return (EPERM); 1608ff66f6a4SRobert Watson } 1609ff66f6a4SRobert Watson #endif 1610ff66f6a4SRobert Watson 1611c2f413afSRobert Watson /* Is this sysctl sensitive to securelevels? */ 1612c2f413afSRobert Watson if (req->newptr && (oid->oid_kind & CTLFLAG_SECURE)) { 1613fe41ca53SMatthew Dillon lvl = (oid->oid_kind & CTLMASK_SECURE) >> CTLSHIFT_SECURE; 1614fe41ca53SMatthew Dillon error = securelevel_gt(req->td->td_ucred, lvl); 1615c2f413afSRobert Watson if (error) 1616c2f413afSRobert Watson return (error); 1617c2f413afSRobert Watson } 1618c2f413afSRobert Watson 1619c2f413afSRobert Watson /* Is this sysctl writable by only privileged users? */ 1620c2f413afSRobert Watson if (req->newptr && !(oid->oid_kind & CTLFLAG_ANYBODY)) { 1621eb79e1c7SBjoern A. Zeeb int priv; 1622eb79e1c7SBjoern A. Zeeb 1623c2f413afSRobert Watson if (oid->oid_kind & CTLFLAG_PRISON) 1624eb79e1c7SBjoern A. Zeeb priv = PRIV_SYSCTL_WRITEJAIL; 1625eb79e1c7SBjoern A. Zeeb #ifdef VIMAGE 1626eb79e1c7SBjoern A. Zeeb else if ((oid->oid_kind & CTLFLAG_VNET) && 1627eb79e1c7SBjoern A. Zeeb prison_owns_vnet(req->td->td_ucred)) 1628eb79e1c7SBjoern A. Zeeb priv = PRIV_SYSCTL_WRITEJAIL; 1629eb79e1c7SBjoern A. Zeeb #endif 1630c2f413afSRobert Watson else 1631eb79e1c7SBjoern A. Zeeb priv = PRIV_SYSCTL_WRITE; 1632eb79e1c7SBjoern A. Zeeb error = priv_check(req->td, priv); 1633c2f413afSRobert Watson if (error) 1634c2f413afSRobert Watson return (error); 1635c2f413afSRobert Watson } 16363ac9f819SPoul-Henning Kamp 1637ce02431fSDoug Rabson if (!oid->oid_handler) 163846003fb3SPawel Jakub Dawidek return (EINVAL); 16392e210993SPoul-Henning Kamp 164063dba32bSPawel Jakub Dawidek if ((oid->oid_kind & CTLTYPE) == CTLTYPE_NODE) { 164100fbcda8SAlexander Kabaev arg1 = (int *)arg1 + indx; 164263dba32bSPawel Jakub Dawidek arg2 -= indx; 164363dba32bSPawel Jakub Dawidek } else { 164463dba32bSPawel Jakub Dawidek arg1 = oid->oid_arg1; 164563dba32bSPawel Jakub Dawidek arg2 = oid->oid_arg2; 164663dba32bSPawel Jakub Dawidek } 164763dba32bSPawel Jakub Dawidek #ifdef MAC 164830d239bcSRobert Watson error = mac_system_check_sysctl(req->td->td_ucred, oid, arg1, arg2, 1649ae0eb976SPoul-Henning Kamp req); 165063dba32bSPawel Jakub Dawidek if (error != 0) 165163dba32bSPawel Jakub Dawidek return (error); 165263dba32bSPawel Jakub Dawidek #endif 1653b5c32cf4SGleb Smirnoff #ifdef VIMAGE 1654b5c32cf4SGleb Smirnoff if ((oid->oid_kind & CTLFLAG_VNET) && arg1 != NULL) 1655b5c32cf4SGleb Smirnoff arg1 = (void *)(curvnet->vnet_data_base + (uintptr_t)arg1); 1656b5c32cf4SGleb Smirnoff #endif 1657af3b2549SHans Petter Selasky error = sysctl_root_handler_locked(oid, arg1, arg2, req); 165863dba32bSPawel Jakub Dawidek 1659ccecef29SMatthew D Fleming KFAIL_POINT_ERROR(_debug_fail_point, sysctl_running, error); 1660ccecef29SMatthew D Fleming 1661226420a4SBrian Feldman return (error); 16622e210993SPoul-Henning Kamp } 16632e210993SPoul-Henning Kamp 1664d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_ 1665b8da2396SPoul-Henning Kamp struct sysctl_args { 1666b8da2396SPoul-Henning Kamp int *name; 1667b8da2396SPoul-Henning Kamp u_int namelen; 1668b8da2396SPoul-Henning Kamp void *old; 1669b8da2396SPoul-Henning Kamp size_t *oldlenp; 1670b8da2396SPoul-Henning Kamp void *new; 1671b8da2396SPoul-Henning Kamp size_t newlen; 1672b8da2396SPoul-Henning Kamp }; 1673d2d3e875SBruce Evans #endif 1674df8bae1dSRodney W. Grimes int 16758451d0ddSKip Macy sys___sysctl(struct thread *td, struct sysctl_args *uap) 1676df8bae1dSRodney W. Grimes { 1677875b66a0SJohn Baldwin int error, i, name[CTL_MAXNAME]; 1678069e9bc1SDoug Rabson size_t j; 1679b396cd83SPoul-Henning Kamp 1680df8bae1dSRodney W. Grimes if (uap->namelen > CTL_MAXNAME || uap->namelen < 2) 1681df8bae1dSRodney W. Grimes return (EINVAL); 1682b396cd83SPoul-Henning Kamp 1683797f2d22SPoul-Henning Kamp error = copyin(uap->name, &name, uap->namelen * sizeof(int)); 1684797f2d22SPoul-Henning Kamp if (error) 1685df8bae1dSRodney W. Grimes return (error); 1686df8bae1dSRodney W. Grimes 1687b40ce416SJulian Elischer error = userland_sysctl(td, name, uap->namelen, 1688b8da2396SPoul-Henning Kamp uap->old, uap->oldlenp, 0, 1689a7bc3102SPeter Wemm uap->new, uap->newlen, &j, 0); 1690deae269aSPoul-Henning Kamp if (error && error != ENOMEM) 1691ddf9d243SEd Schouten return (error); 16924cfe4790SEd Schouten if (uap->oldlenp) { 1693875b66a0SJohn Baldwin i = copyout(&j, uap->oldlenp, sizeof(j)); 16944cfe4790SEd Schouten if (i) 16954cfe4790SEd Schouten return (i); 16964cfe4790SEd Schouten } 1697deae269aSPoul-Henning Kamp return (error); 1698b8da2396SPoul-Henning Kamp } 1699b8da2396SPoul-Henning Kamp 1700b8da2396SPoul-Henning Kamp /* 1701b8da2396SPoul-Henning Kamp * This is used from various compatibility syscalls too. That's why name 1702b8da2396SPoul-Henning Kamp * must be in kernel space. 1703b8da2396SPoul-Henning Kamp */ 1704b8da2396SPoul-Henning Kamp int 1705b40ce416SJulian Elischer userland_sysctl(struct thread *td, int *name, u_int namelen, void *old, 1706a7bc3102SPeter Wemm size_t *oldlenp, int inkernel, void *new, size_t newlen, size_t *retval, 1707a7bc3102SPeter Wemm int flags) 1708b8da2396SPoul-Henning Kamp { 17093e829b18SJohn Baldwin int error = 0, memlocked; 1710a961520cSDon Lewis struct sysctl_req req; 1711ae0eb976SPoul-Henning Kamp 1712ae0eb976SPoul-Henning Kamp bzero(&req, sizeof req); 1713b8da2396SPoul-Henning Kamp 1714ce178806SRobert Watson req.td = td; 1715a7bc3102SPeter Wemm req.flags = flags; 171616cd04a3SPoul-Henning Kamp 1717b8da2396SPoul-Henning Kamp if (oldlenp) { 1718b8da2396SPoul-Henning Kamp if (inkernel) { 1719ae0eb976SPoul-Henning Kamp req.oldlen = *oldlenp; 1720b8da2396SPoul-Henning Kamp } else { 1721deae269aSPoul-Henning Kamp error = copyin(oldlenp, &req.oldlen, sizeof(*oldlenp)); 1722b8da2396SPoul-Henning Kamp if (error) 1723b8da2396SPoul-Henning Kamp return (error); 1724b8da2396SPoul-Henning Kamp } 1725b8da2396SPoul-Henning Kamp } 1726a961520cSDon Lewis req.validlen = req.oldlen; 1727b8da2396SPoul-Henning Kamp 1728ae0eb976SPoul-Henning Kamp if (old) { 172902c58685SPoul-Henning Kamp if (!useracc(old, req.oldlen, VM_PROT_WRITE)) 1730ae0eb976SPoul-Henning Kamp return (EFAULT); 1731ae0eb976SPoul-Henning Kamp req.oldptr= old; 1732ae0eb976SPoul-Henning Kamp } 17332e210993SPoul-Henning Kamp 1734b8edb44cSDima Dorfman if (new != NULL) { 173570ffc2fbSRobert Watson if (!useracc(new, newlen, VM_PROT_READ)) 1736ae0eb976SPoul-Henning Kamp return (EFAULT); 1737ae0eb976SPoul-Henning Kamp req.newlen = newlen; 1738ae0eb976SPoul-Henning Kamp req.newptr = new; 1739b396cd83SPoul-Henning Kamp } 1740b396cd83SPoul-Henning Kamp 1741ae0eb976SPoul-Henning Kamp req.oldfunc = sysctl_old_user; 1742ae0eb976SPoul-Henning Kamp req.newfunc = sysctl_new_user; 174373d6f851SMatthew D Fleming req.lock = REQ_UNWIRED; 17444b2af45fSPoul-Henning Kamp 1745a56be37eSJohn Baldwin #ifdef KTRACE 1746a56be37eSJohn Baldwin if (KTRPOINT(curthread, KTR_SYSCTL)) 1747a56be37eSJohn Baldwin ktrsysctl(name, namelen); 1748a56be37eSJohn Baldwin #endif 1749a56be37eSJohn Baldwin 17503e829b18SJohn Baldwin if (req.oldlen > PAGE_SIZE) { 17513e829b18SJohn Baldwin memlocked = 1; 17523e829b18SJohn Baldwin sx_xlock(&sysctlmemlock); 17533e829b18SJohn Baldwin } else 17543e829b18SJohn Baldwin memlocked = 0; 17559ed47d01SJamie Gritton CURVNET_SET(TD_TO_VNET(td)); 1756ae0eb976SPoul-Henning Kamp 1757af80b2c9SKonstantin Belousov for (;;) { 1758a961520cSDon Lewis req.oldidx = 0; 1759a961520cSDon Lewis req.newidx = 0; 1760*efe0abddSMateusz Guzik SYSCTL_SLOCK(); 1761a961520cSDon Lewis error = sysctl_root(0, name, namelen, &req); 1762*efe0abddSMateusz Guzik SYSCTL_SUNLOCK(); 1763af80b2c9SKonstantin Belousov if (error != EAGAIN) 1764af80b2c9SKonstantin Belousov break; 17653d08a76bSMatthew D Fleming kern_yield(PRI_USER); 1766af80b2c9SKonstantin Belousov } 1767b396cd83SPoul-Henning Kamp 176897021c24SMarko Zec CURVNET_RESTORE(); 17694b2af45fSPoul-Henning Kamp 1770ddf9d243SEd Schouten if (req.lock == REQ_WIRED && req.validlen > 0) 1771ddf9d243SEd Schouten vsunlock(req.oldptr, req.validlen); 17723e829b18SJohn Baldwin if (memlocked) 17733e829b18SJohn Baldwin sx_xunlock(&sysctlmemlock); 1774ddf9d243SEd Schouten 1775deae269aSPoul-Henning Kamp if (error && error != ENOMEM) 1776deae269aSPoul-Henning Kamp return (error); 1777deae269aSPoul-Henning Kamp 1778deae269aSPoul-Henning Kamp if (retval) { 1779a961520cSDon Lewis if (req.oldptr && req.oldidx > req.validlen) 1780a961520cSDon Lewis *retval = req.validlen; 1781deae269aSPoul-Henning Kamp else 1782deae269aSPoul-Henning Kamp *retval = req.oldidx; 1783b8da2396SPoul-Henning Kamp } 17842e210993SPoul-Henning Kamp return (error); 1785df8bae1dSRodney W. Grimes } 17864e657159SMatthew D Fleming 17874e657159SMatthew D Fleming /* 178800f0e671SMatthew D Fleming * Drain into a sysctl struct. The user buffer should be wired if a page 178900f0e671SMatthew D Fleming * fault would cause issue. 17904e657159SMatthew D Fleming */ 17914e657159SMatthew D Fleming static int 17924e657159SMatthew D Fleming sbuf_sysctl_drain(void *arg, const char *data, int len) 17934e657159SMatthew D Fleming { 17944e657159SMatthew D Fleming struct sysctl_req *req = arg; 17954e657159SMatthew D Fleming int error; 17964e657159SMatthew D Fleming 17974e657159SMatthew D Fleming error = SYSCTL_OUT(req, data, len); 17984e657159SMatthew D Fleming KASSERT(error >= 0, ("Got unexpected negative value %d", error)); 17994e657159SMatthew D Fleming return (error == 0 ? len : -error); 18004e657159SMatthew D Fleming } 18014e657159SMatthew D Fleming 18024e657159SMatthew D Fleming struct sbuf * 18034e657159SMatthew D Fleming sbuf_new_for_sysctl(struct sbuf *s, char *buf, int length, 18044e657159SMatthew D Fleming struct sysctl_req *req) 18054e657159SMatthew D Fleming { 18064e657159SMatthew D Fleming 18074e657159SMatthew D Fleming s = sbuf_new(s, buf, length, SBUF_FIXEDLEN); 18084e657159SMatthew D Fleming sbuf_set_drain(s, sbuf_sysctl_drain, req); 18094e657159SMatthew D Fleming return (s); 18104e657159SMatthew D Fleming } 1811