kern_sysctl.c revision 1.14 1 1.14 christos /* $NetBSD: kern_sysctl.c,v 1.14 1996/02/09 18:59:52 christos Exp $ */
2 1.2 cgd
3 1.1 cgd /*-
4 1.1 cgd * Copyright (c) 1982, 1986, 1989, 1993
5 1.1 cgd * The Regents of the University of California. All rights reserved.
6 1.1 cgd *
7 1.1 cgd * This code is derived from software contributed to Berkeley by
8 1.1 cgd * Mike Karels at Berkeley Software Design, Inc.
9 1.1 cgd *
10 1.1 cgd * Redistribution and use in source and binary forms, with or without
11 1.1 cgd * modification, are permitted provided that the following conditions
12 1.1 cgd * are met:
13 1.1 cgd * 1. Redistributions of source code must retain the above copyright
14 1.1 cgd * notice, this list of conditions and the following disclaimer.
15 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 cgd * notice, this list of conditions and the following disclaimer in the
17 1.1 cgd * documentation and/or other materials provided with the distribution.
18 1.1 cgd * 3. All advertising materials mentioning features or use of this software
19 1.1 cgd * must display the following acknowledgement:
20 1.1 cgd * This product includes software developed by the University of
21 1.1 cgd * California, Berkeley and its contributors.
22 1.1 cgd * 4. Neither the name of the University nor the names of its contributors
23 1.1 cgd * may be used to endorse or promote products derived from this software
24 1.1 cgd * without specific prior written permission.
25 1.1 cgd *
26 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
27 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
28 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
29 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
31 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
32 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
33 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
34 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
35 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 1.1 cgd * SUCH DAMAGE.
37 1.1 cgd *
38 1.2 cgd * @(#)kern_sysctl.c 8.4 (Berkeley) 4/14/94
39 1.1 cgd */
40 1.1 cgd
41 1.1 cgd /*
42 1.1 cgd * sysctl system call.
43 1.1 cgd */
44 1.1 cgd
45 1.1 cgd #include <sys/param.h>
46 1.1 cgd #include <sys/systm.h>
47 1.1 cgd #include <sys/kernel.h>
48 1.1 cgd #include <sys/malloc.h>
49 1.1 cgd #include <sys/proc.h>
50 1.1 cgd #include <sys/file.h>
51 1.1 cgd #include <sys/vnode.h>
52 1.1 cgd #include <sys/unistd.h>
53 1.1 cgd #include <sys/buf.h>
54 1.1 cgd #include <sys/ioctl.h>
55 1.1 cgd #include <sys/tty.h>
56 1.7 cgd #include <sys/disklabel.h>
57 1.1 cgd #include <vm/vm.h>
58 1.1 cgd #include <sys/sysctl.h>
59 1.1 cgd
60 1.5 cgd #include <sys/mount.h>
61 1.5 cgd #include <sys/syscallargs.h>
62 1.1 cgd
63 1.1 cgd /*
64 1.1 cgd * Locking and stats
65 1.1 cgd */
66 1.1 cgd static struct sysctl_lock {
67 1.1 cgd int sl_lock;
68 1.1 cgd int sl_want;
69 1.1 cgd int sl_locked;
70 1.1 cgd } memlock;
71 1.1 cgd
72 1.1 cgd int
73 1.12 mycroft sys___sysctl(p, v, retval)
74 1.1 cgd struct proc *p;
75 1.11 thorpej void *v;
76 1.11 thorpej register_t *retval;
77 1.11 thorpej {
78 1.12 mycroft register struct sys___sysctl_args /* {
79 1.5 cgd syscallarg(int *) name;
80 1.5 cgd syscallarg(u_int) namelen;
81 1.5 cgd syscallarg(void *) old;
82 1.5 cgd syscallarg(size_t *) oldlenp;
83 1.5 cgd syscallarg(void *) new;
84 1.5 cgd syscallarg(size_t) newlen;
85 1.11 thorpej } */ *uap = v;
86 1.1 cgd int error, dolock = 1;
87 1.13 christos size_t savelen = 0, oldlen = 0;
88 1.1 cgd sysctlfn *fn;
89 1.1 cgd int name[CTL_MAXNAME];
90 1.1 cgd
91 1.5 cgd if (SCARG(uap, new) != NULL &&
92 1.5 cgd (error = suser(p->p_ucred, &p->p_acflag)))
93 1.1 cgd return (error);
94 1.1 cgd /*
95 1.1 cgd * all top-level sysctl names are non-terminal
96 1.1 cgd */
97 1.5 cgd if (SCARG(uap, namelen) > CTL_MAXNAME || SCARG(uap, namelen) < 2)
98 1.1 cgd return (EINVAL);
99 1.13 christos error = copyin(SCARG(uap, name), &name,
100 1.13 christos SCARG(uap, namelen) * sizeof(int));
101 1.13 christos if (error)
102 1.1 cgd return (error);
103 1.1 cgd
104 1.1 cgd switch (name[0]) {
105 1.1 cgd case CTL_KERN:
106 1.1 cgd fn = kern_sysctl;
107 1.1 cgd if (name[2] != KERN_VNODE) /* XXX */
108 1.1 cgd dolock = 0;
109 1.1 cgd break;
110 1.1 cgd case CTL_HW:
111 1.1 cgd fn = hw_sysctl;
112 1.1 cgd break;
113 1.1 cgd case CTL_VM:
114 1.1 cgd fn = vm_sysctl;
115 1.1 cgd break;
116 1.1 cgd case CTL_NET:
117 1.1 cgd fn = net_sysctl;
118 1.1 cgd break;
119 1.1 cgd #ifdef notyet
120 1.1 cgd case CTL_FS:
121 1.1 cgd fn = fs_sysctl;
122 1.1 cgd break;
123 1.1 cgd #endif
124 1.1 cgd case CTL_MACHDEP:
125 1.1 cgd fn = cpu_sysctl;
126 1.1 cgd break;
127 1.1 cgd #ifdef DEBUG
128 1.1 cgd case CTL_DEBUG:
129 1.1 cgd fn = debug_sysctl;
130 1.1 cgd break;
131 1.1 cgd #endif
132 1.1 cgd default:
133 1.1 cgd return (EOPNOTSUPP);
134 1.1 cgd }
135 1.1 cgd
136 1.5 cgd if (SCARG(uap, oldlenp) &&
137 1.5 cgd (error = copyin(SCARG(uap, oldlenp), &oldlen, sizeof(oldlen))))
138 1.1 cgd return (error);
139 1.5 cgd if (SCARG(uap, old) != NULL) {
140 1.5 cgd if (!useracc(SCARG(uap, old), oldlen, B_WRITE))
141 1.1 cgd return (EFAULT);
142 1.1 cgd while (memlock.sl_lock) {
143 1.1 cgd memlock.sl_want = 1;
144 1.1 cgd sleep((caddr_t)&memlock, PRIBIO+1);
145 1.1 cgd memlock.sl_locked++;
146 1.1 cgd }
147 1.1 cgd memlock.sl_lock = 1;
148 1.1 cgd if (dolock)
149 1.5 cgd vslock(SCARG(uap, old), oldlen);
150 1.1 cgd savelen = oldlen;
151 1.1 cgd }
152 1.5 cgd error = (*fn)(name + 1, SCARG(uap, namelen) - 1, SCARG(uap, old),
153 1.5 cgd &oldlen, SCARG(uap, new), SCARG(uap, newlen), p);
154 1.5 cgd if (SCARG(uap, old) != NULL) {
155 1.1 cgd if (dolock)
156 1.13 christos vsunlock(SCARG(uap, old), savelen);
157 1.1 cgd memlock.sl_lock = 0;
158 1.1 cgd if (memlock.sl_want) {
159 1.1 cgd memlock.sl_want = 0;
160 1.1 cgd wakeup((caddr_t)&memlock);
161 1.1 cgd }
162 1.1 cgd }
163 1.1 cgd if (error)
164 1.1 cgd return (error);
165 1.5 cgd if (SCARG(uap, oldlenp))
166 1.5 cgd error = copyout(&oldlen, SCARG(uap, oldlenp), sizeof(oldlen));
167 1.1 cgd *retval = oldlen;
168 1.1 cgd return (0);
169 1.1 cgd }
170 1.1 cgd
171 1.1 cgd /*
172 1.1 cgd * Attributes stored in the kernel.
173 1.1 cgd */
174 1.1 cgd char hostname[MAXHOSTNAMELEN];
175 1.1 cgd int hostnamelen;
176 1.1 cgd char domainname[MAXHOSTNAMELEN];
177 1.1 cgd int domainnamelen;
178 1.1 cgd long hostid;
179 1.8 cgd #ifdef INSECURE
180 1.8 cgd int securelevel = -1;
181 1.8 cgd #else
182 1.1 cgd int securelevel;
183 1.8 cgd #endif
184 1.1 cgd
185 1.1 cgd /*
186 1.1 cgd * kernel related system variables.
187 1.1 cgd */
188 1.13 christos int
189 1.1 cgd kern_sysctl(name, namelen, oldp, oldlenp, newp, newlen, p)
190 1.1 cgd int *name;
191 1.1 cgd u_int namelen;
192 1.1 cgd void *oldp;
193 1.1 cgd size_t *oldlenp;
194 1.1 cgd void *newp;
195 1.1 cgd size_t newlen;
196 1.1 cgd struct proc *p;
197 1.1 cgd {
198 1.1 cgd int error, level, inthostid;
199 1.1 cgd extern char ostype[], osrelease[], version[];
200 1.1 cgd
201 1.1 cgd /* all sysctl names at this level are terminal */
202 1.1 cgd if (namelen != 1 && !(name[0] == KERN_PROC || name[0] == KERN_PROF))
203 1.1 cgd return (ENOTDIR); /* overloaded */
204 1.1 cgd
205 1.1 cgd switch (name[0]) {
206 1.1 cgd case KERN_OSTYPE:
207 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, ostype));
208 1.1 cgd case KERN_OSRELEASE:
209 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, osrelease));
210 1.1 cgd case KERN_OSREV:
211 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, BSD));
212 1.1 cgd case KERN_VERSION:
213 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, version));
214 1.1 cgd case KERN_MAXVNODES:
215 1.1 cgd return(sysctl_int(oldp, oldlenp, newp, newlen, &desiredvnodes));
216 1.1 cgd case KERN_MAXPROC:
217 1.1 cgd return (sysctl_int(oldp, oldlenp, newp, newlen, &maxproc));
218 1.1 cgd case KERN_MAXFILES:
219 1.1 cgd return (sysctl_int(oldp, oldlenp, newp, newlen, &maxfiles));
220 1.1 cgd case KERN_ARGMAX:
221 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, ARG_MAX));
222 1.1 cgd case KERN_SECURELVL:
223 1.1 cgd level = securelevel;
224 1.1 cgd if ((error = sysctl_int(oldp, oldlenp, newp, newlen, &level)) ||
225 1.1 cgd newp == NULL)
226 1.1 cgd return (error);
227 1.1 cgd if (level < securelevel && p->p_pid != 1)
228 1.1 cgd return (EPERM);
229 1.1 cgd securelevel = level;
230 1.1 cgd return (0);
231 1.1 cgd case KERN_HOSTNAME:
232 1.1 cgd error = sysctl_string(oldp, oldlenp, newp, newlen,
233 1.1 cgd hostname, sizeof(hostname));
234 1.1 cgd if (newp && !error)
235 1.1 cgd hostnamelen = newlen;
236 1.1 cgd return (error);
237 1.1 cgd case KERN_DOMAINNAME:
238 1.1 cgd error = sysctl_string(oldp, oldlenp, newp, newlen,
239 1.1 cgd domainname, sizeof(domainname));
240 1.1 cgd if (newp && !error)
241 1.1 cgd domainnamelen = newlen;
242 1.1 cgd return (error);
243 1.1 cgd case KERN_HOSTID:
244 1.1 cgd inthostid = hostid; /* XXX assumes sizeof long <= sizeof int */
245 1.1 cgd error = sysctl_int(oldp, oldlenp, newp, newlen, &inthostid);
246 1.1 cgd hostid = inthostid;
247 1.1 cgd return (error);
248 1.1 cgd case KERN_CLOCKRATE:
249 1.1 cgd return (sysctl_clockrate(oldp, oldlenp));
250 1.1 cgd case KERN_BOOTTIME:
251 1.1 cgd return (sysctl_rdstruct(oldp, oldlenp, newp, &boottime,
252 1.1 cgd sizeof(struct timeval)));
253 1.1 cgd case KERN_VNODE:
254 1.1 cgd return (sysctl_vnode(oldp, oldlenp));
255 1.1 cgd case KERN_PROC:
256 1.1 cgd return (sysctl_doproc(name + 1, namelen - 1, oldp, oldlenp));
257 1.1 cgd case KERN_FILE:
258 1.1 cgd return (sysctl_file(oldp, oldlenp));
259 1.1 cgd #ifdef GPROF
260 1.1 cgd case KERN_PROF:
261 1.1 cgd return (sysctl_doprof(name + 1, namelen - 1, oldp, oldlenp,
262 1.1 cgd newp, newlen));
263 1.1 cgd #endif
264 1.1 cgd case KERN_POSIX1:
265 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, _POSIX_VERSION));
266 1.1 cgd case KERN_NGROUPS:
267 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, NGROUPS_MAX));
268 1.1 cgd case KERN_JOB_CONTROL:
269 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, 1));
270 1.1 cgd case KERN_SAVED_IDS:
271 1.1 cgd #ifdef _POSIX_SAVED_IDS
272 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, 1));
273 1.1 cgd #else
274 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, 0));
275 1.1 cgd #endif
276 1.7 cgd case KERN_MAXPARTITIONS:
277 1.7 cgd return (sysctl_rdint(oldp, oldlenp, newp, MAXPARTITIONS));
278 1.10 thorpej case KERN_RAWPARTITION:
279 1.10 thorpej return (sysctl_rdint(oldp, oldlenp, newp, RAW_PART));
280 1.1 cgd default:
281 1.1 cgd return (EOPNOTSUPP);
282 1.1 cgd }
283 1.1 cgd /* NOTREACHED */
284 1.1 cgd }
285 1.1 cgd
286 1.1 cgd /*
287 1.1 cgd * hardware related system variables.
288 1.1 cgd */
289 1.13 christos int
290 1.1 cgd hw_sysctl(name, namelen, oldp, oldlenp, newp, newlen, p)
291 1.1 cgd int *name;
292 1.1 cgd u_int namelen;
293 1.1 cgd void *oldp;
294 1.1 cgd size_t *oldlenp;
295 1.1 cgd void *newp;
296 1.1 cgd size_t newlen;
297 1.1 cgd struct proc *p;
298 1.1 cgd {
299 1.1 cgd extern char machine[], cpu_model[];
300 1.1 cgd
301 1.1 cgd /* all sysctl names at this level are terminal */
302 1.1 cgd if (namelen != 1)
303 1.1 cgd return (ENOTDIR); /* overloaded */
304 1.1 cgd
305 1.1 cgd switch (name[0]) {
306 1.1 cgd case HW_MACHINE:
307 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, machine));
308 1.1 cgd case HW_MODEL:
309 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, cpu_model));
310 1.1 cgd case HW_NCPU:
311 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, 1)); /* XXX */
312 1.1 cgd case HW_BYTEORDER:
313 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, BYTE_ORDER));
314 1.1 cgd case HW_PHYSMEM:
315 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, ctob(physmem)));
316 1.1 cgd case HW_USERMEM:
317 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp,
318 1.1 cgd ctob(physmem - cnt.v_wire_count)));
319 1.1 cgd case HW_PAGESIZE:
320 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, PAGE_SIZE));
321 1.1 cgd default:
322 1.1 cgd return (EOPNOTSUPP);
323 1.1 cgd }
324 1.1 cgd /* NOTREACHED */
325 1.1 cgd }
326 1.1 cgd
327 1.1 cgd #ifdef DEBUG
328 1.1 cgd /*
329 1.1 cgd * Debugging related system variables.
330 1.1 cgd */
331 1.1 cgd struct ctldebug debug0, debug1, debug2, debug3, debug4;
332 1.1 cgd struct ctldebug debug5, debug6, debug7, debug8, debug9;
333 1.1 cgd struct ctldebug debug10, debug11, debug12, debug13, debug14;
334 1.1 cgd struct ctldebug debug15, debug16, debug17, debug18, debug19;
335 1.1 cgd static struct ctldebug *debugvars[CTL_DEBUG_MAXID] = {
336 1.1 cgd &debug0, &debug1, &debug2, &debug3, &debug4,
337 1.1 cgd &debug5, &debug6, &debug7, &debug8, &debug9,
338 1.1 cgd &debug10, &debug11, &debug12, &debug13, &debug14,
339 1.1 cgd &debug15, &debug16, &debug17, &debug18, &debug19,
340 1.1 cgd };
341 1.1 cgd int
342 1.1 cgd debug_sysctl(name, namelen, oldp, oldlenp, newp, newlen, p)
343 1.1 cgd int *name;
344 1.1 cgd u_int namelen;
345 1.1 cgd void *oldp;
346 1.1 cgd size_t *oldlenp;
347 1.1 cgd void *newp;
348 1.1 cgd size_t newlen;
349 1.1 cgd struct proc *p;
350 1.1 cgd {
351 1.1 cgd struct ctldebug *cdp;
352 1.1 cgd
353 1.1 cgd /* all sysctl names at this level are name and field */
354 1.1 cgd if (namelen != 2)
355 1.1 cgd return (ENOTDIR); /* overloaded */
356 1.1 cgd cdp = debugvars[name[0]];
357 1.1 cgd if (cdp->debugname == 0)
358 1.1 cgd return (EOPNOTSUPP);
359 1.1 cgd switch (name[1]) {
360 1.1 cgd case CTL_DEBUG_NAME:
361 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, cdp->debugname));
362 1.1 cgd case CTL_DEBUG_VALUE:
363 1.1 cgd return (sysctl_int(oldp, oldlenp, newp, newlen, cdp->debugvar));
364 1.1 cgd default:
365 1.1 cgd return (EOPNOTSUPP);
366 1.1 cgd }
367 1.1 cgd /* NOTREACHED */
368 1.1 cgd }
369 1.1 cgd #endif /* DEBUG */
370 1.1 cgd
371 1.1 cgd /*
372 1.1 cgd * Validate parameters and get old / set new parameters
373 1.1 cgd * for an integer-valued sysctl function.
374 1.1 cgd */
375 1.13 christos int
376 1.1 cgd sysctl_int(oldp, oldlenp, newp, newlen, valp)
377 1.1 cgd void *oldp;
378 1.1 cgd size_t *oldlenp;
379 1.1 cgd void *newp;
380 1.1 cgd size_t newlen;
381 1.1 cgd int *valp;
382 1.1 cgd {
383 1.1 cgd int error = 0;
384 1.1 cgd
385 1.1 cgd if (oldp && *oldlenp < sizeof(int))
386 1.1 cgd return (ENOMEM);
387 1.1 cgd if (newp && newlen != sizeof(int))
388 1.1 cgd return (EINVAL);
389 1.1 cgd *oldlenp = sizeof(int);
390 1.1 cgd if (oldp)
391 1.1 cgd error = copyout(valp, oldp, sizeof(int));
392 1.1 cgd if (error == 0 && newp)
393 1.1 cgd error = copyin(newp, valp, sizeof(int));
394 1.1 cgd return (error);
395 1.1 cgd }
396 1.1 cgd
397 1.1 cgd /*
398 1.1 cgd * As above, but read-only.
399 1.1 cgd */
400 1.13 christos int
401 1.1 cgd sysctl_rdint(oldp, oldlenp, newp, val)
402 1.1 cgd void *oldp;
403 1.1 cgd size_t *oldlenp;
404 1.1 cgd void *newp;
405 1.1 cgd int val;
406 1.1 cgd {
407 1.1 cgd int error = 0;
408 1.1 cgd
409 1.1 cgd if (oldp && *oldlenp < sizeof(int))
410 1.1 cgd return (ENOMEM);
411 1.1 cgd if (newp)
412 1.1 cgd return (EPERM);
413 1.1 cgd *oldlenp = sizeof(int);
414 1.1 cgd if (oldp)
415 1.1 cgd error = copyout((caddr_t)&val, oldp, sizeof(int));
416 1.1 cgd return (error);
417 1.1 cgd }
418 1.1 cgd
419 1.1 cgd /*
420 1.1 cgd * Validate parameters and get old / set new parameters
421 1.1 cgd * for a string-valued sysctl function.
422 1.1 cgd */
423 1.13 christos int
424 1.1 cgd sysctl_string(oldp, oldlenp, newp, newlen, str, maxlen)
425 1.1 cgd void *oldp;
426 1.1 cgd size_t *oldlenp;
427 1.1 cgd void *newp;
428 1.1 cgd size_t newlen;
429 1.1 cgd char *str;
430 1.1 cgd int maxlen;
431 1.1 cgd {
432 1.1 cgd int len, error = 0;
433 1.1 cgd
434 1.1 cgd len = strlen(str) + 1;
435 1.1 cgd if (oldp && *oldlenp < len)
436 1.1 cgd return (ENOMEM);
437 1.1 cgd if (newp && newlen >= maxlen)
438 1.1 cgd return (EINVAL);
439 1.1 cgd if (oldp) {
440 1.1 cgd *oldlenp = len;
441 1.1 cgd error = copyout(str, oldp, len);
442 1.1 cgd }
443 1.1 cgd if (error == 0 && newp) {
444 1.1 cgd error = copyin(newp, str, newlen);
445 1.1 cgd str[newlen] = 0;
446 1.1 cgd }
447 1.1 cgd return (error);
448 1.1 cgd }
449 1.1 cgd
450 1.1 cgd /*
451 1.1 cgd * As above, but read-only.
452 1.1 cgd */
453 1.13 christos int
454 1.1 cgd sysctl_rdstring(oldp, oldlenp, newp, str)
455 1.1 cgd void *oldp;
456 1.1 cgd size_t *oldlenp;
457 1.1 cgd void *newp;
458 1.1 cgd char *str;
459 1.1 cgd {
460 1.1 cgd int len, error = 0;
461 1.1 cgd
462 1.1 cgd len = strlen(str) + 1;
463 1.1 cgd if (oldp && *oldlenp < len)
464 1.1 cgd return (ENOMEM);
465 1.1 cgd if (newp)
466 1.1 cgd return (EPERM);
467 1.1 cgd *oldlenp = len;
468 1.1 cgd if (oldp)
469 1.1 cgd error = copyout(str, oldp, len);
470 1.1 cgd return (error);
471 1.1 cgd }
472 1.1 cgd
473 1.1 cgd /*
474 1.1 cgd * Validate parameters and get old / set new parameters
475 1.1 cgd * for a structure oriented sysctl function.
476 1.1 cgd */
477 1.13 christos int
478 1.1 cgd sysctl_struct(oldp, oldlenp, newp, newlen, sp, len)
479 1.1 cgd void *oldp;
480 1.1 cgd size_t *oldlenp;
481 1.1 cgd void *newp;
482 1.1 cgd size_t newlen;
483 1.1 cgd void *sp;
484 1.1 cgd int len;
485 1.1 cgd {
486 1.1 cgd int error = 0;
487 1.1 cgd
488 1.1 cgd if (oldp && *oldlenp < len)
489 1.1 cgd return (ENOMEM);
490 1.1 cgd if (newp && newlen > len)
491 1.1 cgd return (EINVAL);
492 1.1 cgd if (oldp) {
493 1.1 cgd *oldlenp = len;
494 1.1 cgd error = copyout(sp, oldp, len);
495 1.1 cgd }
496 1.1 cgd if (error == 0 && newp)
497 1.1 cgd error = copyin(newp, sp, len);
498 1.1 cgd return (error);
499 1.1 cgd }
500 1.1 cgd
501 1.1 cgd /*
502 1.1 cgd * Validate parameters and get old parameters
503 1.1 cgd * for a structure oriented sysctl function.
504 1.1 cgd */
505 1.13 christos int
506 1.1 cgd sysctl_rdstruct(oldp, oldlenp, newp, sp, len)
507 1.1 cgd void *oldp;
508 1.1 cgd size_t *oldlenp;
509 1.1 cgd void *newp, *sp;
510 1.1 cgd int len;
511 1.1 cgd {
512 1.1 cgd int error = 0;
513 1.1 cgd
514 1.1 cgd if (oldp && *oldlenp < len)
515 1.1 cgd return (ENOMEM);
516 1.1 cgd if (newp)
517 1.1 cgd return (EPERM);
518 1.1 cgd *oldlenp = len;
519 1.1 cgd if (oldp)
520 1.1 cgd error = copyout(sp, oldp, len);
521 1.1 cgd return (error);
522 1.1 cgd }
523 1.1 cgd
524 1.1 cgd /*
525 1.1 cgd * Get file structures.
526 1.1 cgd */
527 1.13 christos int
528 1.1 cgd sysctl_file(where, sizep)
529 1.1 cgd char *where;
530 1.1 cgd size_t *sizep;
531 1.1 cgd {
532 1.1 cgd int buflen, error;
533 1.1 cgd struct file *fp;
534 1.1 cgd char *start = where;
535 1.1 cgd
536 1.1 cgd buflen = *sizep;
537 1.1 cgd if (where == NULL) {
538 1.1 cgd /*
539 1.1 cgd * overestimate by 10 files
540 1.1 cgd */
541 1.1 cgd *sizep = sizeof(filehead) + (nfiles + 10) * sizeof(struct file);
542 1.1 cgd return (0);
543 1.1 cgd }
544 1.1 cgd
545 1.1 cgd /*
546 1.1 cgd * first copyout filehead
547 1.1 cgd */
548 1.1 cgd if (buflen < sizeof(filehead)) {
549 1.1 cgd *sizep = 0;
550 1.1 cgd return (0);
551 1.1 cgd }
552 1.13 christos error = copyout((caddr_t)&filehead, where, sizeof(filehead));
553 1.13 christos if (error)
554 1.1 cgd return (error);
555 1.1 cgd buflen -= sizeof(filehead);
556 1.1 cgd where += sizeof(filehead);
557 1.1 cgd
558 1.1 cgd /*
559 1.1 cgd * followed by an array of file structures
560 1.1 cgd */
561 1.3 mycroft for (fp = filehead.lh_first; fp != 0; fp = fp->f_list.le_next) {
562 1.1 cgd if (buflen < sizeof(struct file)) {
563 1.1 cgd *sizep = where - start;
564 1.1 cgd return (ENOMEM);
565 1.1 cgd }
566 1.13 christos error = copyout((caddr_t)fp, where, sizeof (struct file));
567 1.13 christos if (error)
568 1.1 cgd return (error);
569 1.1 cgd buflen -= sizeof(struct file);
570 1.1 cgd where += sizeof(struct file);
571 1.1 cgd }
572 1.1 cgd *sizep = where - start;
573 1.1 cgd return (0);
574 1.1 cgd }
575 1.1 cgd
576 1.1 cgd /*
577 1.1 cgd * try over estimating by 5 procs
578 1.1 cgd */
579 1.1 cgd #define KERN_PROCSLOP (5 * sizeof (struct kinfo_proc))
580 1.1 cgd
581 1.13 christos int
582 1.1 cgd sysctl_doproc(name, namelen, where, sizep)
583 1.1 cgd int *name;
584 1.1 cgd u_int namelen;
585 1.1 cgd char *where;
586 1.1 cgd size_t *sizep;
587 1.1 cgd {
588 1.1 cgd register struct proc *p;
589 1.1 cgd register struct kinfo_proc *dp = (struct kinfo_proc *)where;
590 1.1 cgd register int needed = 0;
591 1.1 cgd int buflen = where != NULL ? *sizep : 0;
592 1.1 cgd int doingzomb;
593 1.1 cgd struct eproc eproc;
594 1.1 cgd int error = 0;
595 1.1 cgd
596 1.1 cgd if (namelen != 2 && !(namelen == 1 && name[0] == KERN_PROC_ALL))
597 1.1 cgd return (EINVAL);
598 1.3 mycroft p = allproc.lh_first;
599 1.1 cgd doingzomb = 0;
600 1.1 cgd again:
601 1.3 mycroft for (; p != 0; p = p->p_list.le_next) {
602 1.1 cgd /*
603 1.1 cgd * Skip embryonic processes.
604 1.1 cgd */
605 1.1 cgd if (p->p_stat == SIDL)
606 1.1 cgd continue;
607 1.1 cgd /*
608 1.1 cgd * TODO - make more efficient (see notes below).
609 1.1 cgd * do by session.
610 1.1 cgd */
611 1.1 cgd switch (name[0]) {
612 1.1 cgd
613 1.1 cgd case KERN_PROC_PID:
614 1.1 cgd /* could do this with just a lookup */
615 1.1 cgd if (p->p_pid != (pid_t)name[1])
616 1.1 cgd continue;
617 1.1 cgd break;
618 1.1 cgd
619 1.1 cgd case KERN_PROC_PGRP:
620 1.1 cgd /* could do this by traversing pgrp */
621 1.1 cgd if (p->p_pgrp->pg_id != (pid_t)name[1])
622 1.1 cgd continue;
623 1.1 cgd break;
624 1.1 cgd
625 1.1 cgd case KERN_PROC_TTY:
626 1.1 cgd if ((p->p_flag & P_CONTROLT) == 0 ||
627 1.1 cgd p->p_session->s_ttyp == NULL ||
628 1.1 cgd p->p_session->s_ttyp->t_dev != (dev_t)name[1])
629 1.1 cgd continue;
630 1.1 cgd break;
631 1.1 cgd
632 1.1 cgd case KERN_PROC_UID:
633 1.1 cgd if (p->p_ucred->cr_uid != (uid_t)name[1])
634 1.1 cgd continue;
635 1.1 cgd break;
636 1.1 cgd
637 1.1 cgd case KERN_PROC_RUID:
638 1.1 cgd if (p->p_cred->p_ruid != (uid_t)name[1])
639 1.1 cgd continue;
640 1.1 cgd break;
641 1.1 cgd }
642 1.1 cgd if (buflen >= sizeof(struct kinfo_proc)) {
643 1.1 cgd fill_eproc(p, &eproc);
644 1.13 christos error = copyout((caddr_t)p, &dp->kp_proc,
645 1.13 christos sizeof(struct proc));
646 1.13 christos if (error)
647 1.1 cgd return (error);
648 1.13 christos error = copyout((caddr_t)&eproc, &dp->kp_eproc,
649 1.13 christos sizeof(eproc));
650 1.13 christos if (error)
651 1.1 cgd return (error);
652 1.1 cgd dp++;
653 1.1 cgd buflen -= sizeof(struct kinfo_proc);
654 1.1 cgd }
655 1.1 cgd needed += sizeof(struct kinfo_proc);
656 1.1 cgd }
657 1.1 cgd if (doingzomb == 0) {
658 1.3 mycroft p = zombproc.lh_first;
659 1.1 cgd doingzomb++;
660 1.1 cgd goto again;
661 1.1 cgd }
662 1.1 cgd if (where != NULL) {
663 1.1 cgd *sizep = (caddr_t)dp - where;
664 1.1 cgd if (needed > *sizep)
665 1.1 cgd return (ENOMEM);
666 1.1 cgd } else {
667 1.1 cgd needed += KERN_PROCSLOP;
668 1.1 cgd *sizep = needed;
669 1.1 cgd }
670 1.1 cgd return (0);
671 1.1 cgd }
672 1.1 cgd
673 1.1 cgd /*
674 1.1 cgd * Fill in an eproc structure for the specified process.
675 1.1 cgd */
676 1.1 cgd void
677 1.1 cgd fill_eproc(p, ep)
678 1.1 cgd register struct proc *p;
679 1.1 cgd register struct eproc *ep;
680 1.1 cgd {
681 1.1 cgd register struct tty *tp;
682 1.1 cgd
683 1.1 cgd ep->e_paddr = p;
684 1.1 cgd ep->e_sess = p->p_pgrp->pg_session;
685 1.1 cgd ep->e_pcred = *p->p_cred;
686 1.1 cgd ep->e_ucred = *p->p_ucred;
687 1.1 cgd if (p->p_stat == SIDL || p->p_stat == SZOMB) {
688 1.1 cgd ep->e_vm.vm_rssize = 0;
689 1.1 cgd ep->e_vm.vm_tsize = 0;
690 1.1 cgd ep->e_vm.vm_dsize = 0;
691 1.1 cgd ep->e_vm.vm_ssize = 0;
692 1.1 cgd /* ep->e_vm.vm_pmap = XXX; */
693 1.1 cgd } else {
694 1.1 cgd register struct vmspace *vm = p->p_vmspace;
695 1.1 cgd
696 1.1 cgd #ifdef pmap_resident_count
697 1.1 cgd ep->e_vm.vm_rssize = pmap_resident_count(&vm->vm_pmap); /*XXX*/
698 1.1 cgd #else
699 1.1 cgd ep->e_vm.vm_rssize = vm->vm_rssize;
700 1.1 cgd #endif
701 1.1 cgd ep->e_vm.vm_tsize = vm->vm_tsize;
702 1.1 cgd ep->e_vm.vm_dsize = vm->vm_dsize;
703 1.1 cgd ep->e_vm.vm_ssize = vm->vm_ssize;
704 1.1 cgd ep->e_vm.vm_pmap = vm->vm_pmap;
705 1.1 cgd }
706 1.1 cgd if (p->p_pptr)
707 1.1 cgd ep->e_ppid = p->p_pptr->p_pid;
708 1.1 cgd else
709 1.1 cgd ep->e_ppid = 0;
710 1.1 cgd ep->e_pgid = p->p_pgrp->pg_id;
711 1.1 cgd ep->e_jobc = p->p_pgrp->pg_jobc;
712 1.1 cgd if ((p->p_flag & P_CONTROLT) &&
713 1.1 cgd (tp = ep->e_sess->s_ttyp)) {
714 1.1 cgd ep->e_tdev = tp->t_dev;
715 1.1 cgd ep->e_tpgid = tp->t_pgrp ? tp->t_pgrp->pg_id : NO_PID;
716 1.1 cgd ep->e_tsess = tp->t_session;
717 1.1 cgd } else
718 1.1 cgd ep->e_tdev = NODEV;
719 1.1 cgd ep->e_flag = ep->e_sess->s_ttyvp ? EPROC_CTTY : 0;
720 1.1 cgd if (SESS_LEADER(p))
721 1.1 cgd ep->e_flag |= EPROC_SLEADER;
722 1.1 cgd if (p->p_wmesg)
723 1.1 cgd strncpy(ep->e_wmesg, p->p_wmesg, WMESGLEN);
724 1.1 cgd ep->e_xsize = ep->e_xrssize = 0;
725 1.1 cgd ep->e_xccount = ep->e_xswrss = 0;
726 1.1 cgd }
727 1.1 cgd
728