kern_sysctl.c revision 1.15 1 1.15 jonathan /* $NetBSD: kern_sysctl.c,v 1.15 1996/02/27 04:20:40 jonathan Exp $ */
2 1.2 cgd
3 1.1 cgd /*-
4 1.1 cgd * Copyright (c) 1982, 1986, 1989, 1993
5 1.1 cgd * The Regents of the University of California. All rights reserved.
6 1.1 cgd *
7 1.1 cgd * This code is derived from software contributed to Berkeley by
8 1.1 cgd * Mike Karels at Berkeley Software Design, Inc.
9 1.1 cgd *
10 1.1 cgd * Redistribution and use in source and binary forms, with or without
11 1.1 cgd * modification, are permitted provided that the following conditions
12 1.1 cgd * are met:
13 1.1 cgd * 1. Redistributions of source code must retain the above copyright
14 1.1 cgd * notice, this list of conditions and the following disclaimer.
15 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 cgd * notice, this list of conditions and the following disclaimer in the
17 1.1 cgd * documentation and/or other materials provided with the distribution.
18 1.1 cgd * 3. All advertising materials mentioning features or use of this software
19 1.1 cgd * must display the following acknowledgement:
20 1.1 cgd * This product includes software developed by the University of
21 1.1 cgd * California, Berkeley and its contributors.
22 1.1 cgd * 4. Neither the name of the University nor the names of its contributors
23 1.1 cgd * may be used to endorse or promote products derived from this software
24 1.1 cgd * without specific prior written permission.
25 1.1 cgd *
26 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
27 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
28 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
29 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
31 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
32 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
33 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
34 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
35 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 1.1 cgd * SUCH DAMAGE.
37 1.1 cgd *
38 1.2 cgd * @(#)kern_sysctl.c 8.4 (Berkeley) 4/14/94
39 1.1 cgd */
40 1.1 cgd
41 1.1 cgd /*
42 1.1 cgd * sysctl system call.
43 1.1 cgd */
44 1.1 cgd
45 1.1 cgd #include <sys/param.h>
46 1.1 cgd #include <sys/systm.h>
47 1.1 cgd #include <sys/kernel.h>
48 1.1 cgd #include <sys/malloc.h>
49 1.1 cgd #include <sys/proc.h>
50 1.1 cgd #include <sys/file.h>
51 1.1 cgd #include <sys/vnode.h>
52 1.1 cgd #include <sys/unistd.h>
53 1.1 cgd #include <sys/buf.h>
54 1.1 cgd #include <sys/ioctl.h>
55 1.1 cgd #include <sys/tty.h>
56 1.7 cgd #include <sys/disklabel.h>
57 1.1 cgd #include <vm/vm.h>
58 1.1 cgd #include <sys/sysctl.h>
59 1.1 cgd
60 1.5 cgd #include <sys/mount.h>
61 1.5 cgd #include <sys/syscallargs.h>
62 1.1 cgd
63 1.1 cgd /*
64 1.1 cgd * Locking and stats
65 1.1 cgd */
66 1.1 cgd static struct sysctl_lock {
67 1.1 cgd int sl_lock;
68 1.1 cgd int sl_want;
69 1.1 cgd int sl_locked;
70 1.1 cgd } memlock;
71 1.1 cgd
72 1.1 cgd int
73 1.12 mycroft sys___sysctl(p, v, retval)
74 1.1 cgd struct proc *p;
75 1.11 thorpej void *v;
76 1.11 thorpej register_t *retval;
77 1.11 thorpej {
78 1.12 mycroft register struct sys___sysctl_args /* {
79 1.5 cgd syscallarg(int *) name;
80 1.5 cgd syscallarg(u_int) namelen;
81 1.5 cgd syscallarg(void *) old;
82 1.5 cgd syscallarg(size_t *) oldlenp;
83 1.5 cgd syscallarg(void *) new;
84 1.5 cgd syscallarg(size_t) newlen;
85 1.11 thorpej } */ *uap = v;
86 1.1 cgd int error, dolock = 1;
87 1.13 christos size_t savelen = 0, oldlen = 0;
88 1.1 cgd sysctlfn *fn;
89 1.1 cgd int name[CTL_MAXNAME];
90 1.1 cgd
91 1.5 cgd if (SCARG(uap, new) != NULL &&
92 1.5 cgd (error = suser(p->p_ucred, &p->p_acflag)))
93 1.1 cgd return (error);
94 1.1 cgd /*
95 1.1 cgd * all top-level sysctl names are non-terminal
96 1.1 cgd */
97 1.5 cgd if (SCARG(uap, namelen) > CTL_MAXNAME || SCARG(uap, namelen) < 2)
98 1.1 cgd return (EINVAL);
99 1.13 christos error = copyin(SCARG(uap, name), &name,
100 1.13 christos SCARG(uap, namelen) * sizeof(int));
101 1.13 christos if (error)
102 1.1 cgd return (error);
103 1.1 cgd
104 1.1 cgd switch (name[0]) {
105 1.1 cgd case CTL_KERN:
106 1.1 cgd fn = kern_sysctl;
107 1.1 cgd if (name[2] != KERN_VNODE) /* XXX */
108 1.1 cgd dolock = 0;
109 1.1 cgd break;
110 1.1 cgd case CTL_HW:
111 1.1 cgd fn = hw_sysctl;
112 1.1 cgd break;
113 1.1 cgd case CTL_VM:
114 1.1 cgd fn = vm_sysctl;
115 1.1 cgd break;
116 1.1 cgd case CTL_NET:
117 1.1 cgd fn = net_sysctl;
118 1.1 cgd break;
119 1.1 cgd #ifdef notyet
120 1.1 cgd case CTL_FS:
121 1.1 cgd fn = fs_sysctl;
122 1.1 cgd break;
123 1.1 cgd #endif
124 1.1 cgd case CTL_MACHDEP:
125 1.1 cgd fn = cpu_sysctl;
126 1.1 cgd break;
127 1.1 cgd #ifdef DEBUG
128 1.1 cgd case CTL_DEBUG:
129 1.1 cgd fn = debug_sysctl;
130 1.1 cgd break;
131 1.1 cgd #endif
132 1.1 cgd default:
133 1.1 cgd return (EOPNOTSUPP);
134 1.1 cgd }
135 1.1 cgd
136 1.5 cgd if (SCARG(uap, oldlenp) &&
137 1.5 cgd (error = copyin(SCARG(uap, oldlenp), &oldlen, sizeof(oldlen))))
138 1.1 cgd return (error);
139 1.5 cgd if (SCARG(uap, old) != NULL) {
140 1.5 cgd if (!useracc(SCARG(uap, old), oldlen, B_WRITE))
141 1.1 cgd return (EFAULT);
142 1.1 cgd while (memlock.sl_lock) {
143 1.1 cgd memlock.sl_want = 1;
144 1.1 cgd sleep((caddr_t)&memlock, PRIBIO+1);
145 1.1 cgd memlock.sl_locked++;
146 1.1 cgd }
147 1.1 cgd memlock.sl_lock = 1;
148 1.1 cgd if (dolock)
149 1.5 cgd vslock(SCARG(uap, old), oldlen);
150 1.1 cgd savelen = oldlen;
151 1.1 cgd }
152 1.5 cgd error = (*fn)(name + 1, SCARG(uap, namelen) - 1, SCARG(uap, old),
153 1.5 cgd &oldlen, SCARG(uap, new), SCARG(uap, newlen), p);
154 1.5 cgd if (SCARG(uap, old) != NULL) {
155 1.1 cgd if (dolock)
156 1.13 christos vsunlock(SCARG(uap, old), savelen);
157 1.1 cgd memlock.sl_lock = 0;
158 1.1 cgd if (memlock.sl_want) {
159 1.1 cgd memlock.sl_want = 0;
160 1.1 cgd wakeup((caddr_t)&memlock);
161 1.1 cgd }
162 1.1 cgd }
163 1.1 cgd if (error)
164 1.1 cgd return (error);
165 1.5 cgd if (SCARG(uap, oldlenp))
166 1.5 cgd error = copyout(&oldlen, SCARG(uap, oldlenp), sizeof(oldlen));
167 1.1 cgd *retval = oldlen;
168 1.1 cgd return (0);
169 1.1 cgd }
170 1.1 cgd
171 1.1 cgd /*
172 1.1 cgd * Attributes stored in the kernel.
173 1.1 cgd */
174 1.1 cgd char hostname[MAXHOSTNAMELEN];
175 1.1 cgd int hostnamelen;
176 1.1 cgd char domainname[MAXHOSTNAMELEN];
177 1.1 cgd int domainnamelen;
178 1.1 cgd long hostid;
179 1.8 cgd #ifdef INSECURE
180 1.8 cgd int securelevel = -1;
181 1.8 cgd #else
182 1.1 cgd int securelevel;
183 1.8 cgd #endif
184 1.1 cgd
185 1.1 cgd /*
186 1.1 cgd * kernel related system variables.
187 1.1 cgd */
188 1.13 christos int
189 1.1 cgd kern_sysctl(name, namelen, oldp, oldlenp, newp, newlen, p)
190 1.1 cgd int *name;
191 1.1 cgd u_int namelen;
192 1.1 cgd void *oldp;
193 1.1 cgd size_t *oldlenp;
194 1.1 cgd void *newp;
195 1.1 cgd size_t newlen;
196 1.1 cgd struct proc *p;
197 1.1 cgd {
198 1.1 cgd int error, level, inthostid;
199 1.1 cgd extern char ostype[], osrelease[], version[];
200 1.1 cgd
201 1.1 cgd /* all sysctl names at this level are terminal */
202 1.1 cgd if (namelen != 1 && !(name[0] == KERN_PROC || name[0] == KERN_PROF))
203 1.1 cgd return (ENOTDIR); /* overloaded */
204 1.1 cgd
205 1.1 cgd switch (name[0]) {
206 1.1 cgd case KERN_OSTYPE:
207 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, ostype));
208 1.1 cgd case KERN_OSRELEASE:
209 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, osrelease));
210 1.1 cgd case KERN_OSREV:
211 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, BSD));
212 1.1 cgd case KERN_VERSION:
213 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, version));
214 1.1 cgd case KERN_MAXVNODES:
215 1.1 cgd return(sysctl_int(oldp, oldlenp, newp, newlen, &desiredvnodes));
216 1.1 cgd case KERN_MAXPROC:
217 1.1 cgd return (sysctl_int(oldp, oldlenp, newp, newlen, &maxproc));
218 1.1 cgd case KERN_MAXFILES:
219 1.1 cgd return (sysctl_int(oldp, oldlenp, newp, newlen, &maxfiles));
220 1.1 cgd case KERN_ARGMAX:
221 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, ARG_MAX));
222 1.1 cgd case KERN_SECURELVL:
223 1.1 cgd level = securelevel;
224 1.1 cgd if ((error = sysctl_int(oldp, oldlenp, newp, newlen, &level)) ||
225 1.1 cgd newp == NULL)
226 1.1 cgd return (error);
227 1.1 cgd if (level < securelevel && p->p_pid != 1)
228 1.1 cgd return (EPERM);
229 1.1 cgd securelevel = level;
230 1.1 cgd return (0);
231 1.1 cgd case KERN_HOSTNAME:
232 1.1 cgd error = sysctl_string(oldp, oldlenp, newp, newlen,
233 1.1 cgd hostname, sizeof(hostname));
234 1.1 cgd if (newp && !error)
235 1.1 cgd hostnamelen = newlen;
236 1.1 cgd return (error);
237 1.1 cgd case KERN_DOMAINNAME:
238 1.1 cgd error = sysctl_string(oldp, oldlenp, newp, newlen,
239 1.1 cgd domainname, sizeof(domainname));
240 1.1 cgd if (newp && !error)
241 1.1 cgd domainnamelen = newlen;
242 1.1 cgd return (error);
243 1.1 cgd case KERN_HOSTID:
244 1.1 cgd inthostid = hostid; /* XXX assumes sizeof long <= sizeof int */
245 1.1 cgd error = sysctl_int(oldp, oldlenp, newp, newlen, &inthostid);
246 1.1 cgd hostid = inthostid;
247 1.1 cgd return (error);
248 1.1 cgd case KERN_CLOCKRATE:
249 1.1 cgd return (sysctl_clockrate(oldp, oldlenp));
250 1.1 cgd case KERN_BOOTTIME:
251 1.1 cgd return (sysctl_rdstruct(oldp, oldlenp, newp, &boottime,
252 1.1 cgd sizeof(struct timeval)));
253 1.1 cgd case KERN_VNODE:
254 1.1 cgd return (sysctl_vnode(oldp, oldlenp));
255 1.1 cgd case KERN_PROC:
256 1.1 cgd return (sysctl_doproc(name + 1, namelen - 1, oldp, oldlenp));
257 1.1 cgd case KERN_FILE:
258 1.1 cgd return (sysctl_file(oldp, oldlenp));
259 1.1 cgd #ifdef GPROF
260 1.1 cgd case KERN_PROF:
261 1.1 cgd return (sysctl_doprof(name + 1, namelen - 1, oldp, oldlenp,
262 1.1 cgd newp, newlen));
263 1.1 cgd #endif
264 1.1 cgd case KERN_POSIX1:
265 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, _POSIX_VERSION));
266 1.1 cgd case KERN_NGROUPS:
267 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, NGROUPS_MAX));
268 1.1 cgd case KERN_JOB_CONTROL:
269 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, 1));
270 1.1 cgd case KERN_SAVED_IDS:
271 1.1 cgd #ifdef _POSIX_SAVED_IDS
272 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, 1));
273 1.1 cgd #else
274 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, 0));
275 1.1 cgd #endif
276 1.7 cgd case KERN_MAXPARTITIONS:
277 1.7 cgd return (sysctl_rdint(oldp, oldlenp, newp, MAXPARTITIONS));
278 1.10 thorpej case KERN_RAWPARTITION:
279 1.10 thorpej return (sysctl_rdint(oldp, oldlenp, newp, RAW_PART));
280 1.15 jonathan case KERN_NTPTIME:
281 1.15 jonathan return (sysctl_ntptime(oldp, oldlenp));
282 1.1 cgd default:
283 1.1 cgd return (EOPNOTSUPP);
284 1.1 cgd }
285 1.1 cgd /* NOTREACHED */
286 1.1 cgd }
287 1.1 cgd
288 1.1 cgd /*
289 1.1 cgd * hardware related system variables.
290 1.1 cgd */
291 1.13 christos int
292 1.1 cgd hw_sysctl(name, namelen, oldp, oldlenp, newp, newlen, p)
293 1.1 cgd int *name;
294 1.1 cgd u_int namelen;
295 1.1 cgd void *oldp;
296 1.1 cgd size_t *oldlenp;
297 1.1 cgd void *newp;
298 1.1 cgd size_t newlen;
299 1.1 cgd struct proc *p;
300 1.1 cgd {
301 1.1 cgd extern char machine[], cpu_model[];
302 1.1 cgd
303 1.1 cgd /* all sysctl names at this level are terminal */
304 1.1 cgd if (namelen != 1)
305 1.1 cgd return (ENOTDIR); /* overloaded */
306 1.1 cgd
307 1.1 cgd switch (name[0]) {
308 1.1 cgd case HW_MACHINE:
309 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, machine));
310 1.1 cgd case HW_MODEL:
311 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, cpu_model));
312 1.1 cgd case HW_NCPU:
313 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, 1)); /* XXX */
314 1.1 cgd case HW_BYTEORDER:
315 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, BYTE_ORDER));
316 1.1 cgd case HW_PHYSMEM:
317 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, ctob(physmem)));
318 1.1 cgd case HW_USERMEM:
319 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp,
320 1.1 cgd ctob(physmem - cnt.v_wire_count)));
321 1.1 cgd case HW_PAGESIZE:
322 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, PAGE_SIZE));
323 1.1 cgd default:
324 1.1 cgd return (EOPNOTSUPP);
325 1.1 cgd }
326 1.1 cgd /* NOTREACHED */
327 1.1 cgd }
328 1.1 cgd
329 1.1 cgd #ifdef DEBUG
330 1.1 cgd /*
331 1.1 cgd * Debugging related system variables.
332 1.1 cgd */
333 1.1 cgd struct ctldebug debug0, debug1, debug2, debug3, debug4;
334 1.1 cgd struct ctldebug debug5, debug6, debug7, debug8, debug9;
335 1.1 cgd struct ctldebug debug10, debug11, debug12, debug13, debug14;
336 1.1 cgd struct ctldebug debug15, debug16, debug17, debug18, debug19;
337 1.1 cgd static struct ctldebug *debugvars[CTL_DEBUG_MAXID] = {
338 1.1 cgd &debug0, &debug1, &debug2, &debug3, &debug4,
339 1.1 cgd &debug5, &debug6, &debug7, &debug8, &debug9,
340 1.1 cgd &debug10, &debug11, &debug12, &debug13, &debug14,
341 1.1 cgd &debug15, &debug16, &debug17, &debug18, &debug19,
342 1.1 cgd };
343 1.1 cgd int
344 1.1 cgd debug_sysctl(name, namelen, oldp, oldlenp, newp, newlen, p)
345 1.1 cgd int *name;
346 1.1 cgd u_int namelen;
347 1.1 cgd void *oldp;
348 1.1 cgd size_t *oldlenp;
349 1.1 cgd void *newp;
350 1.1 cgd size_t newlen;
351 1.1 cgd struct proc *p;
352 1.1 cgd {
353 1.1 cgd struct ctldebug *cdp;
354 1.1 cgd
355 1.1 cgd /* all sysctl names at this level are name and field */
356 1.1 cgd if (namelen != 2)
357 1.1 cgd return (ENOTDIR); /* overloaded */
358 1.1 cgd cdp = debugvars[name[0]];
359 1.1 cgd if (cdp->debugname == 0)
360 1.1 cgd return (EOPNOTSUPP);
361 1.1 cgd switch (name[1]) {
362 1.1 cgd case CTL_DEBUG_NAME:
363 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, cdp->debugname));
364 1.1 cgd case CTL_DEBUG_VALUE:
365 1.1 cgd return (sysctl_int(oldp, oldlenp, newp, newlen, cdp->debugvar));
366 1.1 cgd default:
367 1.1 cgd return (EOPNOTSUPP);
368 1.1 cgd }
369 1.1 cgd /* NOTREACHED */
370 1.1 cgd }
371 1.1 cgd #endif /* DEBUG */
372 1.1 cgd
373 1.1 cgd /*
374 1.1 cgd * Validate parameters and get old / set new parameters
375 1.1 cgd * for an integer-valued sysctl function.
376 1.1 cgd */
377 1.13 christos int
378 1.1 cgd sysctl_int(oldp, oldlenp, newp, newlen, valp)
379 1.1 cgd void *oldp;
380 1.1 cgd size_t *oldlenp;
381 1.1 cgd void *newp;
382 1.1 cgd size_t newlen;
383 1.1 cgd int *valp;
384 1.1 cgd {
385 1.1 cgd int error = 0;
386 1.1 cgd
387 1.1 cgd if (oldp && *oldlenp < sizeof(int))
388 1.1 cgd return (ENOMEM);
389 1.1 cgd if (newp && newlen != sizeof(int))
390 1.1 cgd return (EINVAL);
391 1.1 cgd *oldlenp = sizeof(int);
392 1.1 cgd if (oldp)
393 1.1 cgd error = copyout(valp, oldp, sizeof(int));
394 1.1 cgd if (error == 0 && newp)
395 1.1 cgd error = copyin(newp, valp, sizeof(int));
396 1.1 cgd return (error);
397 1.1 cgd }
398 1.1 cgd
399 1.1 cgd /*
400 1.1 cgd * As above, but read-only.
401 1.1 cgd */
402 1.13 christos int
403 1.1 cgd sysctl_rdint(oldp, oldlenp, newp, val)
404 1.1 cgd void *oldp;
405 1.1 cgd size_t *oldlenp;
406 1.1 cgd void *newp;
407 1.1 cgd int val;
408 1.1 cgd {
409 1.1 cgd int error = 0;
410 1.1 cgd
411 1.1 cgd if (oldp && *oldlenp < sizeof(int))
412 1.1 cgd return (ENOMEM);
413 1.1 cgd if (newp)
414 1.1 cgd return (EPERM);
415 1.1 cgd *oldlenp = sizeof(int);
416 1.1 cgd if (oldp)
417 1.1 cgd error = copyout((caddr_t)&val, oldp, sizeof(int));
418 1.1 cgd return (error);
419 1.1 cgd }
420 1.1 cgd
421 1.1 cgd /*
422 1.1 cgd * Validate parameters and get old / set new parameters
423 1.1 cgd * for a string-valued sysctl function.
424 1.1 cgd */
425 1.13 christos int
426 1.1 cgd sysctl_string(oldp, oldlenp, newp, newlen, str, maxlen)
427 1.1 cgd void *oldp;
428 1.1 cgd size_t *oldlenp;
429 1.1 cgd void *newp;
430 1.1 cgd size_t newlen;
431 1.1 cgd char *str;
432 1.1 cgd int maxlen;
433 1.1 cgd {
434 1.1 cgd int len, error = 0;
435 1.1 cgd
436 1.1 cgd len = strlen(str) + 1;
437 1.1 cgd if (oldp && *oldlenp < len)
438 1.1 cgd return (ENOMEM);
439 1.1 cgd if (newp && newlen >= maxlen)
440 1.1 cgd return (EINVAL);
441 1.1 cgd if (oldp) {
442 1.1 cgd *oldlenp = len;
443 1.1 cgd error = copyout(str, oldp, len);
444 1.1 cgd }
445 1.1 cgd if (error == 0 && newp) {
446 1.1 cgd error = copyin(newp, str, newlen);
447 1.1 cgd str[newlen] = 0;
448 1.1 cgd }
449 1.1 cgd return (error);
450 1.1 cgd }
451 1.1 cgd
452 1.1 cgd /*
453 1.1 cgd * As above, but read-only.
454 1.1 cgd */
455 1.13 christos int
456 1.1 cgd sysctl_rdstring(oldp, oldlenp, newp, str)
457 1.1 cgd void *oldp;
458 1.1 cgd size_t *oldlenp;
459 1.1 cgd void *newp;
460 1.1 cgd char *str;
461 1.1 cgd {
462 1.1 cgd int len, error = 0;
463 1.1 cgd
464 1.1 cgd len = strlen(str) + 1;
465 1.1 cgd if (oldp && *oldlenp < len)
466 1.1 cgd return (ENOMEM);
467 1.1 cgd if (newp)
468 1.1 cgd return (EPERM);
469 1.1 cgd *oldlenp = len;
470 1.1 cgd if (oldp)
471 1.1 cgd error = copyout(str, oldp, len);
472 1.1 cgd return (error);
473 1.1 cgd }
474 1.1 cgd
475 1.1 cgd /*
476 1.1 cgd * Validate parameters and get old / set new parameters
477 1.1 cgd * for a structure oriented sysctl function.
478 1.1 cgd */
479 1.13 christos int
480 1.1 cgd sysctl_struct(oldp, oldlenp, newp, newlen, sp, len)
481 1.1 cgd void *oldp;
482 1.1 cgd size_t *oldlenp;
483 1.1 cgd void *newp;
484 1.1 cgd size_t newlen;
485 1.1 cgd void *sp;
486 1.1 cgd int len;
487 1.1 cgd {
488 1.1 cgd int error = 0;
489 1.1 cgd
490 1.1 cgd if (oldp && *oldlenp < len)
491 1.1 cgd return (ENOMEM);
492 1.1 cgd if (newp && newlen > len)
493 1.1 cgd return (EINVAL);
494 1.1 cgd if (oldp) {
495 1.1 cgd *oldlenp = len;
496 1.1 cgd error = copyout(sp, oldp, len);
497 1.1 cgd }
498 1.1 cgd if (error == 0 && newp)
499 1.1 cgd error = copyin(newp, sp, len);
500 1.1 cgd return (error);
501 1.1 cgd }
502 1.1 cgd
503 1.1 cgd /*
504 1.1 cgd * Validate parameters and get old parameters
505 1.1 cgd * for a structure oriented sysctl function.
506 1.1 cgd */
507 1.13 christos int
508 1.1 cgd sysctl_rdstruct(oldp, oldlenp, newp, sp, len)
509 1.1 cgd void *oldp;
510 1.1 cgd size_t *oldlenp;
511 1.1 cgd void *newp, *sp;
512 1.1 cgd int len;
513 1.1 cgd {
514 1.1 cgd int error = 0;
515 1.1 cgd
516 1.1 cgd if (oldp && *oldlenp < len)
517 1.1 cgd return (ENOMEM);
518 1.1 cgd if (newp)
519 1.1 cgd return (EPERM);
520 1.1 cgd *oldlenp = len;
521 1.1 cgd if (oldp)
522 1.1 cgd error = copyout(sp, oldp, len);
523 1.1 cgd return (error);
524 1.1 cgd }
525 1.1 cgd
526 1.1 cgd /*
527 1.1 cgd * Get file structures.
528 1.1 cgd */
529 1.13 christos int
530 1.1 cgd sysctl_file(where, sizep)
531 1.1 cgd char *where;
532 1.1 cgd size_t *sizep;
533 1.1 cgd {
534 1.1 cgd int buflen, error;
535 1.1 cgd struct file *fp;
536 1.1 cgd char *start = where;
537 1.1 cgd
538 1.1 cgd buflen = *sizep;
539 1.1 cgd if (where == NULL) {
540 1.1 cgd /*
541 1.1 cgd * overestimate by 10 files
542 1.1 cgd */
543 1.1 cgd *sizep = sizeof(filehead) + (nfiles + 10) * sizeof(struct file);
544 1.1 cgd return (0);
545 1.1 cgd }
546 1.1 cgd
547 1.1 cgd /*
548 1.1 cgd * first copyout filehead
549 1.1 cgd */
550 1.1 cgd if (buflen < sizeof(filehead)) {
551 1.1 cgd *sizep = 0;
552 1.1 cgd return (0);
553 1.1 cgd }
554 1.13 christos error = copyout((caddr_t)&filehead, where, sizeof(filehead));
555 1.13 christos if (error)
556 1.1 cgd return (error);
557 1.1 cgd buflen -= sizeof(filehead);
558 1.1 cgd where += sizeof(filehead);
559 1.1 cgd
560 1.1 cgd /*
561 1.1 cgd * followed by an array of file structures
562 1.1 cgd */
563 1.3 mycroft for (fp = filehead.lh_first; fp != 0; fp = fp->f_list.le_next) {
564 1.1 cgd if (buflen < sizeof(struct file)) {
565 1.1 cgd *sizep = where - start;
566 1.1 cgd return (ENOMEM);
567 1.1 cgd }
568 1.13 christos error = copyout((caddr_t)fp, where, sizeof (struct file));
569 1.13 christos if (error)
570 1.1 cgd return (error);
571 1.1 cgd buflen -= sizeof(struct file);
572 1.1 cgd where += sizeof(struct file);
573 1.1 cgd }
574 1.1 cgd *sizep = where - start;
575 1.1 cgd return (0);
576 1.1 cgd }
577 1.1 cgd
578 1.1 cgd /*
579 1.1 cgd * try over estimating by 5 procs
580 1.1 cgd */
581 1.1 cgd #define KERN_PROCSLOP (5 * sizeof (struct kinfo_proc))
582 1.1 cgd
583 1.13 christos int
584 1.1 cgd sysctl_doproc(name, namelen, where, sizep)
585 1.1 cgd int *name;
586 1.1 cgd u_int namelen;
587 1.1 cgd char *where;
588 1.1 cgd size_t *sizep;
589 1.1 cgd {
590 1.1 cgd register struct proc *p;
591 1.1 cgd register struct kinfo_proc *dp = (struct kinfo_proc *)where;
592 1.1 cgd register int needed = 0;
593 1.1 cgd int buflen = where != NULL ? *sizep : 0;
594 1.1 cgd int doingzomb;
595 1.1 cgd struct eproc eproc;
596 1.1 cgd int error = 0;
597 1.1 cgd
598 1.1 cgd if (namelen != 2 && !(namelen == 1 && name[0] == KERN_PROC_ALL))
599 1.1 cgd return (EINVAL);
600 1.3 mycroft p = allproc.lh_first;
601 1.1 cgd doingzomb = 0;
602 1.1 cgd again:
603 1.3 mycroft for (; p != 0; p = p->p_list.le_next) {
604 1.1 cgd /*
605 1.1 cgd * Skip embryonic processes.
606 1.1 cgd */
607 1.1 cgd if (p->p_stat == SIDL)
608 1.1 cgd continue;
609 1.1 cgd /*
610 1.1 cgd * TODO - make more efficient (see notes below).
611 1.1 cgd * do by session.
612 1.1 cgd */
613 1.1 cgd switch (name[0]) {
614 1.1 cgd
615 1.1 cgd case KERN_PROC_PID:
616 1.1 cgd /* could do this with just a lookup */
617 1.1 cgd if (p->p_pid != (pid_t)name[1])
618 1.1 cgd continue;
619 1.1 cgd break;
620 1.1 cgd
621 1.1 cgd case KERN_PROC_PGRP:
622 1.1 cgd /* could do this by traversing pgrp */
623 1.1 cgd if (p->p_pgrp->pg_id != (pid_t)name[1])
624 1.1 cgd continue;
625 1.1 cgd break;
626 1.1 cgd
627 1.1 cgd case KERN_PROC_TTY:
628 1.1 cgd if ((p->p_flag & P_CONTROLT) == 0 ||
629 1.1 cgd p->p_session->s_ttyp == NULL ||
630 1.1 cgd p->p_session->s_ttyp->t_dev != (dev_t)name[1])
631 1.1 cgd continue;
632 1.1 cgd break;
633 1.1 cgd
634 1.1 cgd case KERN_PROC_UID:
635 1.1 cgd if (p->p_ucred->cr_uid != (uid_t)name[1])
636 1.1 cgd continue;
637 1.1 cgd break;
638 1.1 cgd
639 1.1 cgd case KERN_PROC_RUID:
640 1.1 cgd if (p->p_cred->p_ruid != (uid_t)name[1])
641 1.1 cgd continue;
642 1.1 cgd break;
643 1.1 cgd }
644 1.1 cgd if (buflen >= sizeof(struct kinfo_proc)) {
645 1.1 cgd fill_eproc(p, &eproc);
646 1.13 christos error = copyout((caddr_t)p, &dp->kp_proc,
647 1.13 christos sizeof(struct proc));
648 1.13 christos if (error)
649 1.1 cgd return (error);
650 1.13 christos error = copyout((caddr_t)&eproc, &dp->kp_eproc,
651 1.13 christos sizeof(eproc));
652 1.13 christos if (error)
653 1.1 cgd return (error);
654 1.1 cgd dp++;
655 1.1 cgd buflen -= sizeof(struct kinfo_proc);
656 1.1 cgd }
657 1.1 cgd needed += sizeof(struct kinfo_proc);
658 1.1 cgd }
659 1.1 cgd if (doingzomb == 0) {
660 1.3 mycroft p = zombproc.lh_first;
661 1.1 cgd doingzomb++;
662 1.1 cgd goto again;
663 1.1 cgd }
664 1.1 cgd if (where != NULL) {
665 1.1 cgd *sizep = (caddr_t)dp - where;
666 1.1 cgd if (needed > *sizep)
667 1.1 cgd return (ENOMEM);
668 1.1 cgd } else {
669 1.1 cgd needed += KERN_PROCSLOP;
670 1.1 cgd *sizep = needed;
671 1.1 cgd }
672 1.1 cgd return (0);
673 1.1 cgd }
674 1.1 cgd
675 1.1 cgd /*
676 1.1 cgd * Fill in an eproc structure for the specified process.
677 1.1 cgd */
678 1.1 cgd void
679 1.1 cgd fill_eproc(p, ep)
680 1.1 cgd register struct proc *p;
681 1.1 cgd register struct eproc *ep;
682 1.1 cgd {
683 1.1 cgd register struct tty *tp;
684 1.1 cgd
685 1.1 cgd ep->e_paddr = p;
686 1.1 cgd ep->e_sess = p->p_pgrp->pg_session;
687 1.1 cgd ep->e_pcred = *p->p_cred;
688 1.1 cgd ep->e_ucred = *p->p_ucred;
689 1.1 cgd if (p->p_stat == SIDL || p->p_stat == SZOMB) {
690 1.1 cgd ep->e_vm.vm_rssize = 0;
691 1.1 cgd ep->e_vm.vm_tsize = 0;
692 1.1 cgd ep->e_vm.vm_dsize = 0;
693 1.1 cgd ep->e_vm.vm_ssize = 0;
694 1.1 cgd /* ep->e_vm.vm_pmap = XXX; */
695 1.1 cgd } else {
696 1.1 cgd register struct vmspace *vm = p->p_vmspace;
697 1.1 cgd
698 1.1 cgd #ifdef pmap_resident_count
699 1.1 cgd ep->e_vm.vm_rssize = pmap_resident_count(&vm->vm_pmap); /*XXX*/
700 1.1 cgd #else
701 1.1 cgd ep->e_vm.vm_rssize = vm->vm_rssize;
702 1.1 cgd #endif
703 1.1 cgd ep->e_vm.vm_tsize = vm->vm_tsize;
704 1.1 cgd ep->e_vm.vm_dsize = vm->vm_dsize;
705 1.1 cgd ep->e_vm.vm_ssize = vm->vm_ssize;
706 1.1 cgd ep->e_vm.vm_pmap = vm->vm_pmap;
707 1.1 cgd }
708 1.1 cgd if (p->p_pptr)
709 1.1 cgd ep->e_ppid = p->p_pptr->p_pid;
710 1.1 cgd else
711 1.1 cgd ep->e_ppid = 0;
712 1.1 cgd ep->e_pgid = p->p_pgrp->pg_id;
713 1.1 cgd ep->e_jobc = p->p_pgrp->pg_jobc;
714 1.1 cgd if ((p->p_flag & P_CONTROLT) &&
715 1.1 cgd (tp = ep->e_sess->s_ttyp)) {
716 1.1 cgd ep->e_tdev = tp->t_dev;
717 1.1 cgd ep->e_tpgid = tp->t_pgrp ? tp->t_pgrp->pg_id : NO_PID;
718 1.1 cgd ep->e_tsess = tp->t_session;
719 1.1 cgd } else
720 1.1 cgd ep->e_tdev = NODEV;
721 1.1 cgd ep->e_flag = ep->e_sess->s_ttyvp ? EPROC_CTTY : 0;
722 1.1 cgd if (SESS_LEADER(p))
723 1.1 cgd ep->e_flag |= EPROC_SLEADER;
724 1.1 cgd if (p->p_wmesg)
725 1.1 cgd strncpy(ep->e_wmesg, p->p_wmesg, WMESGLEN);
726 1.1 cgd ep->e_xsize = ep->e_xrssize = 0;
727 1.1 cgd ep->e_xccount = ep->e_xswrss = 0;
728 1.1 cgd }
729 1.1 cgd
730