kern_sysctl.c revision 1.33 1 1.33 thorpej /* $NetBSD: kern_sysctl.c,v 1.33 1998/02/14 00:37:33 thorpej Exp $ */
2 1.2 cgd
3 1.1 cgd /*-
4 1.1 cgd * Copyright (c) 1982, 1986, 1989, 1993
5 1.1 cgd * The Regents of the University of California. All rights reserved.
6 1.1 cgd *
7 1.1 cgd * This code is derived from software contributed to Berkeley by
8 1.1 cgd * Mike Karels at Berkeley Software Design, Inc.
9 1.1 cgd *
10 1.1 cgd * Redistribution and use in source and binary forms, with or without
11 1.1 cgd * modification, are permitted provided that the following conditions
12 1.1 cgd * are met:
13 1.1 cgd * 1. Redistributions of source code must retain the above copyright
14 1.1 cgd * notice, this list of conditions and the following disclaimer.
15 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 cgd * notice, this list of conditions and the following disclaimer in the
17 1.1 cgd * documentation and/or other materials provided with the distribution.
18 1.1 cgd * 3. All advertising materials mentioning features or use of this software
19 1.1 cgd * must display the following acknowledgement:
20 1.1 cgd * This product includes software developed by the University of
21 1.1 cgd * California, Berkeley and its contributors.
22 1.1 cgd * 4. Neither the name of the University nor the names of its contributors
23 1.1 cgd * may be used to endorse or promote products derived from this software
24 1.1 cgd * without specific prior written permission.
25 1.1 cgd *
26 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
27 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
28 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
29 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
31 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
32 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
33 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
34 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
35 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 1.1 cgd * SUCH DAMAGE.
37 1.1 cgd *
38 1.2 cgd * @(#)kern_sysctl.c 8.4 (Berkeley) 4/14/94
39 1.1 cgd */
40 1.1 cgd
41 1.1 cgd /*
42 1.1 cgd * sysctl system call.
43 1.1 cgd */
44 1.30 thorpej
45 1.30 thorpej #include "opt_insecure.h"
46 1.32 mrg #include "opt_uvm.h"
47 1.1 cgd
48 1.1 cgd #include <sys/param.h>
49 1.1 cgd #include <sys/systm.h>
50 1.1 cgd #include <sys/kernel.h>
51 1.1 cgd #include <sys/malloc.h>
52 1.1 cgd #include <sys/proc.h>
53 1.1 cgd #include <sys/file.h>
54 1.1 cgd #include <sys/vnode.h>
55 1.1 cgd #include <sys/unistd.h>
56 1.1 cgd #include <sys/buf.h>
57 1.1 cgd #include <sys/ioctl.h>
58 1.1 cgd #include <sys/tty.h>
59 1.7 cgd #include <sys/disklabel.h>
60 1.23 thorpej #include <sys/device.h>
61 1.1 cgd #include <vm/vm.h>
62 1.1 cgd #include <sys/sysctl.h>
63 1.28 leo #include <sys/msgbuf.h>
64 1.1 cgd
65 1.31 mrg #if defined(UVM)
66 1.31 mrg #include <uvm/uvm_extern.h>
67 1.31 mrg #endif
68 1.31 mrg
69 1.5 cgd #include <sys/mount.h>
70 1.5 cgd #include <sys/syscallargs.h>
71 1.1 cgd
72 1.31 mrg #if defined(UVM)
73 1.31 mrg #include <uvm/uvm_extern.h>
74 1.31 mrg #endif
75 1.31 mrg
76 1.1 cgd /*
77 1.1 cgd * Locking and stats
78 1.1 cgd */
79 1.1 cgd static struct sysctl_lock {
80 1.1 cgd int sl_lock;
81 1.1 cgd int sl_want;
82 1.1 cgd int sl_locked;
83 1.1 cgd } memlock;
84 1.1 cgd
85 1.1 cgd int
86 1.12 mycroft sys___sysctl(p, v, retval)
87 1.1 cgd struct proc *p;
88 1.11 thorpej void *v;
89 1.11 thorpej register_t *retval;
90 1.11 thorpej {
91 1.12 mycroft register struct sys___sysctl_args /* {
92 1.5 cgd syscallarg(int *) name;
93 1.5 cgd syscallarg(u_int) namelen;
94 1.5 cgd syscallarg(void *) old;
95 1.5 cgd syscallarg(size_t *) oldlenp;
96 1.5 cgd syscallarg(void *) new;
97 1.5 cgd syscallarg(size_t) newlen;
98 1.11 thorpej } */ *uap = v;
99 1.1 cgd int error, dolock = 1;
100 1.13 christos size_t savelen = 0, oldlen = 0;
101 1.1 cgd sysctlfn *fn;
102 1.1 cgd int name[CTL_MAXNAME];
103 1.1 cgd
104 1.5 cgd if (SCARG(uap, new) != NULL &&
105 1.5 cgd (error = suser(p->p_ucred, &p->p_acflag)))
106 1.1 cgd return (error);
107 1.1 cgd /*
108 1.1 cgd * all top-level sysctl names are non-terminal
109 1.1 cgd */
110 1.5 cgd if (SCARG(uap, namelen) > CTL_MAXNAME || SCARG(uap, namelen) < 2)
111 1.1 cgd return (EINVAL);
112 1.13 christos error = copyin(SCARG(uap, name), &name,
113 1.13 christos SCARG(uap, namelen) * sizeof(int));
114 1.13 christos if (error)
115 1.1 cgd return (error);
116 1.1 cgd
117 1.1 cgd switch (name[0]) {
118 1.1 cgd case CTL_KERN:
119 1.1 cgd fn = kern_sysctl;
120 1.1 cgd if (name[2] != KERN_VNODE) /* XXX */
121 1.1 cgd dolock = 0;
122 1.1 cgd break;
123 1.1 cgd case CTL_HW:
124 1.1 cgd fn = hw_sysctl;
125 1.1 cgd break;
126 1.1 cgd case CTL_VM:
127 1.31 mrg #if defined(UVM)
128 1.31 mrg fn = uvm_sysctl;
129 1.31 mrg #else
130 1.1 cgd fn = vm_sysctl;
131 1.31 mrg #endif
132 1.1 cgd break;
133 1.1 cgd case CTL_NET:
134 1.1 cgd fn = net_sysctl;
135 1.1 cgd break;
136 1.1 cgd #ifdef notyet
137 1.1 cgd case CTL_FS:
138 1.1 cgd fn = fs_sysctl;
139 1.1 cgd break;
140 1.1 cgd #endif
141 1.1 cgd case CTL_MACHDEP:
142 1.1 cgd fn = cpu_sysctl;
143 1.1 cgd break;
144 1.1 cgd #ifdef DEBUG
145 1.1 cgd case CTL_DEBUG:
146 1.1 cgd fn = debug_sysctl;
147 1.20 thorpej break;
148 1.20 thorpej #endif
149 1.20 thorpej #ifdef DDB
150 1.20 thorpej case CTL_DDB:
151 1.20 thorpej fn = ddb_sysctl;
152 1.1 cgd break;
153 1.1 cgd #endif
154 1.1 cgd default:
155 1.1 cgd return (EOPNOTSUPP);
156 1.1 cgd }
157 1.1 cgd
158 1.5 cgd if (SCARG(uap, oldlenp) &&
159 1.5 cgd (error = copyin(SCARG(uap, oldlenp), &oldlen, sizeof(oldlen))))
160 1.1 cgd return (error);
161 1.5 cgd if (SCARG(uap, old) != NULL) {
162 1.31 mrg #if defined(UVM)
163 1.31 mrg if (!uvm_useracc(SCARG(uap, old), oldlen, B_WRITE))
164 1.31 mrg #else
165 1.5 cgd if (!useracc(SCARG(uap, old), oldlen, B_WRITE))
166 1.31 mrg #endif
167 1.1 cgd return (EFAULT);
168 1.1 cgd while (memlock.sl_lock) {
169 1.1 cgd memlock.sl_want = 1;
170 1.1 cgd sleep((caddr_t)&memlock, PRIBIO+1);
171 1.1 cgd memlock.sl_locked++;
172 1.1 cgd }
173 1.1 cgd memlock.sl_lock = 1;
174 1.1 cgd if (dolock)
175 1.31 mrg #if defined(UVM)
176 1.31 mrg uvm_vslock(SCARG(uap, old), oldlen);
177 1.31 mrg #else
178 1.5 cgd vslock(SCARG(uap, old), oldlen);
179 1.31 mrg #endif
180 1.1 cgd savelen = oldlen;
181 1.1 cgd }
182 1.5 cgd error = (*fn)(name + 1, SCARG(uap, namelen) - 1, SCARG(uap, old),
183 1.5 cgd &oldlen, SCARG(uap, new), SCARG(uap, newlen), p);
184 1.5 cgd if (SCARG(uap, old) != NULL) {
185 1.1 cgd if (dolock)
186 1.31 mrg #if defined(UVM)
187 1.31 mrg uvm_vsunlock(SCARG(uap, old), savelen);
188 1.31 mrg #else
189 1.13 christos vsunlock(SCARG(uap, old), savelen);
190 1.31 mrg #endif
191 1.1 cgd memlock.sl_lock = 0;
192 1.1 cgd if (memlock.sl_want) {
193 1.1 cgd memlock.sl_want = 0;
194 1.1 cgd wakeup((caddr_t)&memlock);
195 1.1 cgd }
196 1.1 cgd }
197 1.1 cgd if (error)
198 1.1 cgd return (error);
199 1.5 cgd if (SCARG(uap, oldlenp))
200 1.5 cgd error = copyout(&oldlen, SCARG(uap, oldlenp), sizeof(oldlen));
201 1.16 thorpej return (error);
202 1.1 cgd }
203 1.1 cgd
204 1.1 cgd /*
205 1.1 cgd * Attributes stored in the kernel.
206 1.1 cgd */
207 1.1 cgd char hostname[MAXHOSTNAMELEN];
208 1.1 cgd int hostnamelen;
209 1.1 cgd char domainname[MAXHOSTNAMELEN];
210 1.1 cgd int domainnamelen;
211 1.1 cgd long hostid;
212 1.8 cgd #ifdef INSECURE
213 1.8 cgd int securelevel = -1;
214 1.8 cgd #else
215 1.17 mrg int securelevel = 0;
216 1.8 cgd #endif
217 1.1 cgd
218 1.1 cgd /*
219 1.1 cgd * kernel related system variables.
220 1.1 cgd */
221 1.13 christos int
222 1.1 cgd kern_sysctl(name, namelen, oldp, oldlenp, newp, newlen, p)
223 1.1 cgd int *name;
224 1.1 cgd u_int namelen;
225 1.1 cgd void *oldp;
226 1.1 cgd size_t *oldlenp;
227 1.1 cgd void *newp;
228 1.1 cgd size_t newlen;
229 1.1 cgd struct proc *p;
230 1.1 cgd {
231 1.1 cgd int error, level, inthostid;
232 1.18 explorer int old_autonicetime;
233 1.22 tls int old_vnodes;
234 1.1 cgd extern char ostype[], osrelease[], version[];
235 1.1 cgd
236 1.1 cgd /* all sysctl names at this level are terminal */
237 1.1 cgd if (namelen != 1 && !(name[0] == KERN_PROC || name[0] == KERN_PROF))
238 1.1 cgd return (ENOTDIR); /* overloaded */
239 1.1 cgd
240 1.1 cgd switch (name[0]) {
241 1.1 cgd case KERN_OSTYPE:
242 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, ostype));
243 1.1 cgd case KERN_OSRELEASE:
244 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, osrelease));
245 1.1 cgd case KERN_OSREV:
246 1.25 mikel return (sysctl_rdint(oldp, oldlenp, newp, NetBSD));
247 1.1 cgd case KERN_VERSION:
248 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, version));
249 1.1 cgd case KERN_MAXVNODES:
250 1.22 tls old_vnodes = desiredvnodes;
251 1.29 sommerfe error = sysctl_int(oldp, oldlenp, newp, newlen, &desiredvnodes);
252 1.29 sommerfe if (old_vnodes > desiredvnodes) {
253 1.29 sommerfe desiredvnodes = old_vnodes;
254 1.22 tls return (EINVAL);
255 1.29 sommerfe }
256 1.22 tls return (error);
257 1.1 cgd case KERN_MAXPROC:
258 1.1 cgd return (sysctl_int(oldp, oldlenp, newp, newlen, &maxproc));
259 1.1 cgd case KERN_MAXFILES:
260 1.1 cgd return (sysctl_int(oldp, oldlenp, newp, newlen, &maxfiles));
261 1.1 cgd case KERN_ARGMAX:
262 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, ARG_MAX));
263 1.1 cgd case KERN_SECURELVL:
264 1.1 cgd level = securelevel;
265 1.1 cgd if ((error = sysctl_int(oldp, oldlenp, newp, newlen, &level)) ||
266 1.1 cgd newp == NULL)
267 1.1 cgd return (error);
268 1.1 cgd if (level < securelevel && p->p_pid != 1)
269 1.1 cgd return (EPERM);
270 1.1 cgd securelevel = level;
271 1.1 cgd return (0);
272 1.1 cgd case KERN_HOSTNAME:
273 1.1 cgd error = sysctl_string(oldp, oldlenp, newp, newlen,
274 1.1 cgd hostname, sizeof(hostname));
275 1.1 cgd if (newp && !error)
276 1.1 cgd hostnamelen = newlen;
277 1.1 cgd return (error);
278 1.1 cgd case KERN_DOMAINNAME:
279 1.1 cgd error = sysctl_string(oldp, oldlenp, newp, newlen,
280 1.1 cgd domainname, sizeof(domainname));
281 1.1 cgd if (newp && !error)
282 1.1 cgd domainnamelen = newlen;
283 1.1 cgd return (error);
284 1.1 cgd case KERN_HOSTID:
285 1.1 cgd inthostid = hostid; /* XXX assumes sizeof long <= sizeof int */
286 1.1 cgd error = sysctl_int(oldp, oldlenp, newp, newlen, &inthostid);
287 1.1 cgd hostid = inthostid;
288 1.1 cgd return (error);
289 1.1 cgd case KERN_CLOCKRATE:
290 1.1 cgd return (sysctl_clockrate(oldp, oldlenp));
291 1.1 cgd case KERN_BOOTTIME:
292 1.1 cgd return (sysctl_rdstruct(oldp, oldlenp, newp, &boottime,
293 1.1 cgd sizeof(struct timeval)));
294 1.1 cgd case KERN_VNODE:
295 1.1 cgd return (sysctl_vnode(oldp, oldlenp));
296 1.1 cgd case KERN_PROC:
297 1.1 cgd return (sysctl_doproc(name + 1, namelen - 1, oldp, oldlenp));
298 1.1 cgd case KERN_FILE:
299 1.1 cgd return (sysctl_file(oldp, oldlenp));
300 1.1 cgd #ifdef GPROF
301 1.1 cgd case KERN_PROF:
302 1.1 cgd return (sysctl_doprof(name + 1, namelen - 1, oldp, oldlenp,
303 1.1 cgd newp, newlen));
304 1.1 cgd #endif
305 1.1 cgd case KERN_POSIX1:
306 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, _POSIX_VERSION));
307 1.1 cgd case KERN_NGROUPS:
308 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, NGROUPS_MAX));
309 1.1 cgd case KERN_JOB_CONTROL:
310 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, 1));
311 1.1 cgd case KERN_SAVED_IDS:
312 1.1 cgd #ifdef _POSIX_SAVED_IDS
313 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, 1));
314 1.1 cgd #else
315 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, 0));
316 1.1 cgd #endif
317 1.7 cgd case KERN_MAXPARTITIONS:
318 1.7 cgd return (sysctl_rdint(oldp, oldlenp, newp, MAXPARTITIONS));
319 1.10 thorpej case KERN_RAWPARTITION:
320 1.10 thorpej return (sysctl_rdint(oldp, oldlenp, newp, RAW_PART));
321 1.19 thorpej #ifdef NTP
322 1.15 jonathan case KERN_NTPTIME:
323 1.15 jonathan return (sysctl_ntptime(oldp, oldlenp));
324 1.19 thorpej #endif
325 1.18 explorer case KERN_AUTONICETIME:
326 1.18 explorer old_autonicetime = autonicetime;
327 1.18 explorer error = sysctl_int(oldp, oldlenp, newp, newlen, &autonicetime);
328 1.18 explorer if (autonicetime < 0)
329 1.18 explorer autonicetime = old_autonicetime;
330 1.18 explorer return (error);
331 1.18 explorer case KERN_AUTONICEVAL:
332 1.18 explorer error = sysctl_int(oldp, oldlenp, newp, newlen, &autoniceval);
333 1.18 explorer if (autoniceval < PRIO_MIN)
334 1.18 explorer autoniceval = PRIO_MIN;
335 1.18 explorer if (autoniceval > PRIO_MAX)
336 1.18 explorer autoniceval = PRIO_MAX;
337 1.18 explorer return (error);
338 1.21 perry case KERN_RTC_OFFSET:
339 1.21 perry return (sysctl_rdint(oldp, oldlenp, newp, rtc_offset));
340 1.23 thorpej case KERN_ROOT_DEVICE:
341 1.23 thorpej return (sysctl_rdstring(oldp, oldlenp, newp,
342 1.23 thorpej root_device->dv_xname));
343 1.28 leo case KERN_MSGBUFSIZE:
344 1.28 leo /*
345 1.28 leo * deal with cases where the message buffer has
346 1.28 leo * become corrupted.
347 1.28 leo */
348 1.28 leo if (!msgbufenabled || msgbufp->msg_magic != MSG_MAGIC) {
349 1.28 leo msgbufenabled = 0;
350 1.28 leo return (ENXIO);
351 1.28 leo }
352 1.28 leo return (sysctl_rdint(oldp, oldlenp, newp, msgbufp->msg_bufs));
353 1.1 cgd default:
354 1.1 cgd return (EOPNOTSUPP);
355 1.1 cgd }
356 1.1 cgd /* NOTREACHED */
357 1.1 cgd }
358 1.1 cgd
359 1.1 cgd /*
360 1.1 cgd * hardware related system variables.
361 1.1 cgd */
362 1.13 christos int
363 1.1 cgd hw_sysctl(name, namelen, oldp, oldlenp, newp, newlen, p)
364 1.1 cgd int *name;
365 1.1 cgd u_int namelen;
366 1.1 cgd void *oldp;
367 1.1 cgd size_t *oldlenp;
368 1.1 cgd void *newp;
369 1.1 cgd size_t newlen;
370 1.1 cgd struct proc *p;
371 1.1 cgd {
372 1.27 veego extern char machine[], machine_arch[], cpu_model[];
373 1.1 cgd
374 1.1 cgd /* all sysctl names at this level are terminal */
375 1.1 cgd if (namelen != 1)
376 1.1 cgd return (ENOTDIR); /* overloaded */
377 1.1 cgd
378 1.1 cgd switch (name[0]) {
379 1.1 cgd case HW_MACHINE:
380 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, machine));
381 1.27 veego case HW_MACHINE_ARCH:
382 1.27 veego return (sysctl_rdstring(oldp, oldlenp, newp, machine_arch));
383 1.1 cgd case HW_MODEL:
384 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, cpu_model));
385 1.1 cgd case HW_NCPU:
386 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, 1)); /* XXX */
387 1.1 cgd case HW_BYTEORDER:
388 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, BYTE_ORDER));
389 1.1 cgd case HW_PHYSMEM:
390 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, ctob(physmem)));
391 1.1 cgd case HW_USERMEM:
392 1.31 mrg #if defined(UVM)
393 1.31 mrg return (sysctl_rdint(oldp, oldlenp, newp,
394 1.31 mrg ctob(physmem - uvmexp.wired)));
395 1.31 mrg #else
396 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp,
397 1.1 cgd ctob(physmem - cnt.v_wire_count)));
398 1.31 mrg #endif
399 1.1 cgd case HW_PAGESIZE:
400 1.1 cgd return (sysctl_rdint(oldp, oldlenp, newp, PAGE_SIZE));
401 1.1 cgd default:
402 1.1 cgd return (EOPNOTSUPP);
403 1.1 cgd }
404 1.1 cgd /* NOTREACHED */
405 1.1 cgd }
406 1.1 cgd
407 1.1 cgd #ifdef DEBUG
408 1.1 cgd /*
409 1.1 cgd * Debugging related system variables.
410 1.1 cgd */
411 1.1 cgd struct ctldebug debug0, debug1, debug2, debug3, debug4;
412 1.1 cgd struct ctldebug debug5, debug6, debug7, debug8, debug9;
413 1.1 cgd struct ctldebug debug10, debug11, debug12, debug13, debug14;
414 1.1 cgd struct ctldebug debug15, debug16, debug17, debug18, debug19;
415 1.1 cgd static struct ctldebug *debugvars[CTL_DEBUG_MAXID] = {
416 1.1 cgd &debug0, &debug1, &debug2, &debug3, &debug4,
417 1.1 cgd &debug5, &debug6, &debug7, &debug8, &debug9,
418 1.1 cgd &debug10, &debug11, &debug12, &debug13, &debug14,
419 1.1 cgd &debug15, &debug16, &debug17, &debug18, &debug19,
420 1.1 cgd };
421 1.1 cgd int
422 1.1 cgd debug_sysctl(name, namelen, oldp, oldlenp, newp, newlen, p)
423 1.1 cgd int *name;
424 1.1 cgd u_int namelen;
425 1.1 cgd void *oldp;
426 1.1 cgd size_t *oldlenp;
427 1.1 cgd void *newp;
428 1.1 cgd size_t newlen;
429 1.1 cgd struct proc *p;
430 1.1 cgd {
431 1.1 cgd struct ctldebug *cdp;
432 1.1 cgd
433 1.1 cgd /* all sysctl names at this level are name and field */
434 1.1 cgd if (namelen != 2)
435 1.1 cgd return (ENOTDIR); /* overloaded */
436 1.1 cgd cdp = debugvars[name[0]];
437 1.1 cgd if (cdp->debugname == 0)
438 1.1 cgd return (EOPNOTSUPP);
439 1.1 cgd switch (name[1]) {
440 1.1 cgd case CTL_DEBUG_NAME:
441 1.1 cgd return (sysctl_rdstring(oldp, oldlenp, newp, cdp->debugname));
442 1.1 cgd case CTL_DEBUG_VALUE:
443 1.1 cgd return (sysctl_int(oldp, oldlenp, newp, newlen, cdp->debugvar));
444 1.1 cgd default:
445 1.1 cgd return (EOPNOTSUPP);
446 1.1 cgd }
447 1.1 cgd /* NOTREACHED */
448 1.1 cgd }
449 1.1 cgd #endif /* DEBUG */
450 1.1 cgd
451 1.1 cgd /*
452 1.1 cgd * Validate parameters and get old / set new parameters
453 1.1 cgd * for an integer-valued sysctl function.
454 1.1 cgd */
455 1.13 christos int
456 1.1 cgd sysctl_int(oldp, oldlenp, newp, newlen, valp)
457 1.1 cgd void *oldp;
458 1.1 cgd size_t *oldlenp;
459 1.1 cgd void *newp;
460 1.1 cgd size_t newlen;
461 1.1 cgd int *valp;
462 1.1 cgd {
463 1.1 cgd int error = 0;
464 1.1 cgd
465 1.1 cgd if (oldp && *oldlenp < sizeof(int))
466 1.1 cgd return (ENOMEM);
467 1.1 cgd if (newp && newlen != sizeof(int))
468 1.1 cgd return (EINVAL);
469 1.1 cgd *oldlenp = sizeof(int);
470 1.1 cgd if (oldp)
471 1.1 cgd error = copyout(valp, oldp, sizeof(int));
472 1.1 cgd if (error == 0 && newp)
473 1.1 cgd error = copyin(newp, valp, sizeof(int));
474 1.1 cgd return (error);
475 1.1 cgd }
476 1.1 cgd
477 1.1 cgd /*
478 1.1 cgd * As above, but read-only.
479 1.1 cgd */
480 1.13 christos int
481 1.1 cgd sysctl_rdint(oldp, oldlenp, newp, val)
482 1.1 cgd void *oldp;
483 1.1 cgd size_t *oldlenp;
484 1.1 cgd void *newp;
485 1.1 cgd int val;
486 1.1 cgd {
487 1.1 cgd int error = 0;
488 1.1 cgd
489 1.1 cgd if (oldp && *oldlenp < sizeof(int))
490 1.1 cgd return (ENOMEM);
491 1.1 cgd if (newp)
492 1.1 cgd return (EPERM);
493 1.1 cgd *oldlenp = sizeof(int);
494 1.1 cgd if (oldp)
495 1.1 cgd error = copyout((caddr_t)&val, oldp, sizeof(int));
496 1.1 cgd return (error);
497 1.1 cgd }
498 1.1 cgd
499 1.1 cgd /*
500 1.1 cgd * Validate parameters and get old / set new parameters
501 1.1 cgd * for a string-valued sysctl function.
502 1.1 cgd */
503 1.13 christos int
504 1.1 cgd sysctl_string(oldp, oldlenp, newp, newlen, str, maxlen)
505 1.1 cgd void *oldp;
506 1.1 cgd size_t *oldlenp;
507 1.1 cgd void *newp;
508 1.1 cgd size_t newlen;
509 1.1 cgd char *str;
510 1.1 cgd int maxlen;
511 1.1 cgd {
512 1.1 cgd int len, error = 0;
513 1.1 cgd
514 1.1 cgd len = strlen(str) + 1;
515 1.1 cgd if (oldp && *oldlenp < len)
516 1.1 cgd return (ENOMEM);
517 1.1 cgd if (newp && newlen >= maxlen)
518 1.1 cgd return (EINVAL);
519 1.1 cgd if (oldp) {
520 1.1 cgd *oldlenp = len;
521 1.1 cgd error = copyout(str, oldp, len);
522 1.1 cgd }
523 1.1 cgd if (error == 0 && newp) {
524 1.1 cgd error = copyin(newp, str, newlen);
525 1.1 cgd str[newlen] = 0;
526 1.1 cgd }
527 1.1 cgd return (error);
528 1.1 cgd }
529 1.1 cgd
530 1.1 cgd /*
531 1.1 cgd * As above, but read-only.
532 1.1 cgd */
533 1.13 christos int
534 1.1 cgd sysctl_rdstring(oldp, oldlenp, newp, str)
535 1.1 cgd void *oldp;
536 1.1 cgd size_t *oldlenp;
537 1.1 cgd void *newp;
538 1.1 cgd char *str;
539 1.1 cgd {
540 1.1 cgd int len, error = 0;
541 1.1 cgd
542 1.1 cgd len = strlen(str) + 1;
543 1.1 cgd if (oldp && *oldlenp < len)
544 1.1 cgd return (ENOMEM);
545 1.1 cgd if (newp)
546 1.1 cgd return (EPERM);
547 1.1 cgd *oldlenp = len;
548 1.1 cgd if (oldp)
549 1.1 cgd error = copyout(str, oldp, len);
550 1.1 cgd return (error);
551 1.1 cgd }
552 1.1 cgd
553 1.1 cgd /*
554 1.1 cgd * Validate parameters and get old / set new parameters
555 1.1 cgd * for a structure oriented sysctl function.
556 1.1 cgd */
557 1.13 christos int
558 1.1 cgd sysctl_struct(oldp, oldlenp, newp, newlen, sp, len)
559 1.1 cgd void *oldp;
560 1.1 cgd size_t *oldlenp;
561 1.1 cgd void *newp;
562 1.1 cgd size_t newlen;
563 1.1 cgd void *sp;
564 1.1 cgd int len;
565 1.1 cgd {
566 1.1 cgd int error = 0;
567 1.1 cgd
568 1.1 cgd if (oldp && *oldlenp < len)
569 1.1 cgd return (ENOMEM);
570 1.1 cgd if (newp && newlen > len)
571 1.1 cgd return (EINVAL);
572 1.1 cgd if (oldp) {
573 1.1 cgd *oldlenp = len;
574 1.1 cgd error = copyout(sp, oldp, len);
575 1.1 cgd }
576 1.1 cgd if (error == 0 && newp)
577 1.1 cgd error = copyin(newp, sp, len);
578 1.1 cgd return (error);
579 1.1 cgd }
580 1.1 cgd
581 1.1 cgd /*
582 1.1 cgd * Validate parameters and get old parameters
583 1.1 cgd * for a structure oriented sysctl function.
584 1.1 cgd */
585 1.13 christos int
586 1.1 cgd sysctl_rdstruct(oldp, oldlenp, newp, sp, len)
587 1.1 cgd void *oldp;
588 1.1 cgd size_t *oldlenp;
589 1.1 cgd void *newp, *sp;
590 1.1 cgd int len;
591 1.1 cgd {
592 1.1 cgd int error = 0;
593 1.1 cgd
594 1.1 cgd if (oldp && *oldlenp < len)
595 1.1 cgd return (ENOMEM);
596 1.1 cgd if (newp)
597 1.1 cgd return (EPERM);
598 1.1 cgd *oldlenp = len;
599 1.1 cgd if (oldp)
600 1.1 cgd error = copyout(sp, oldp, len);
601 1.1 cgd return (error);
602 1.1 cgd }
603 1.1 cgd
604 1.1 cgd /*
605 1.1 cgd * Get file structures.
606 1.1 cgd */
607 1.13 christos int
608 1.1 cgd sysctl_file(where, sizep)
609 1.1 cgd char *where;
610 1.1 cgd size_t *sizep;
611 1.1 cgd {
612 1.1 cgd int buflen, error;
613 1.1 cgd struct file *fp;
614 1.1 cgd char *start = where;
615 1.1 cgd
616 1.1 cgd buflen = *sizep;
617 1.1 cgd if (where == NULL) {
618 1.1 cgd /*
619 1.1 cgd * overestimate by 10 files
620 1.1 cgd */
621 1.1 cgd *sizep = sizeof(filehead) + (nfiles + 10) * sizeof(struct file);
622 1.1 cgd return (0);
623 1.1 cgd }
624 1.1 cgd
625 1.1 cgd /*
626 1.1 cgd * first copyout filehead
627 1.1 cgd */
628 1.1 cgd if (buflen < sizeof(filehead)) {
629 1.1 cgd *sizep = 0;
630 1.1 cgd return (0);
631 1.1 cgd }
632 1.13 christos error = copyout((caddr_t)&filehead, where, sizeof(filehead));
633 1.13 christos if (error)
634 1.1 cgd return (error);
635 1.1 cgd buflen -= sizeof(filehead);
636 1.1 cgd where += sizeof(filehead);
637 1.1 cgd
638 1.1 cgd /*
639 1.1 cgd * followed by an array of file structures
640 1.1 cgd */
641 1.3 mycroft for (fp = filehead.lh_first; fp != 0; fp = fp->f_list.le_next) {
642 1.1 cgd if (buflen < sizeof(struct file)) {
643 1.1 cgd *sizep = where - start;
644 1.1 cgd return (ENOMEM);
645 1.1 cgd }
646 1.13 christos error = copyout((caddr_t)fp, where, sizeof (struct file));
647 1.13 christos if (error)
648 1.1 cgd return (error);
649 1.1 cgd buflen -= sizeof(struct file);
650 1.1 cgd where += sizeof(struct file);
651 1.1 cgd }
652 1.1 cgd *sizep = where - start;
653 1.1 cgd return (0);
654 1.1 cgd }
655 1.1 cgd
656 1.1 cgd /*
657 1.1 cgd * try over estimating by 5 procs
658 1.1 cgd */
659 1.1 cgd #define KERN_PROCSLOP (5 * sizeof (struct kinfo_proc))
660 1.1 cgd
661 1.13 christos int
662 1.1 cgd sysctl_doproc(name, namelen, where, sizep)
663 1.1 cgd int *name;
664 1.1 cgd u_int namelen;
665 1.1 cgd char *where;
666 1.1 cgd size_t *sizep;
667 1.1 cgd {
668 1.1 cgd register struct proc *p;
669 1.1 cgd register struct kinfo_proc *dp = (struct kinfo_proc *)where;
670 1.1 cgd register int needed = 0;
671 1.1 cgd int buflen = where != NULL ? *sizep : 0;
672 1.1 cgd int doingzomb;
673 1.1 cgd struct eproc eproc;
674 1.1 cgd int error = 0;
675 1.1 cgd
676 1.1 cgd if (namelen != 2 && !(namelen == 1 && name[0] == KERN_PROC_ALL))
677 1.1 cgd return (EINVAL);
678 1.3 mycroft p = allproc.lh_first;
679 1.1 cgd doingzomb = 0;
680 1.1 cgd again:
681 1.3 mycroft for (; p != 0; p = p->p_list.le_next) {
682 1.1 cgd /*
683 1.1 cgd * Skip embryonic processes.
684 1.1 cgd */
685 1.1 cgd if (p->p_stat == SIDL)
686 1.1 cgd continue;
687 1.1 cgd /*
688 1.1 cgd * TODO - make more efficient (see notes below).
689 1.1 cgd * do by session.
690 1.1 cgd */
691 1.1 cgd switch (name[0]) {
692 1.1 cgd
693 1.1 cgd case KERN_PROC_PID:
694 1.1 cgd /* could do this with just a lookup */
695 1.1 cgd if (p->p_pid != (pid_t)name[1])
696 1.1 cgd continue;
697 1.1 cgd break;
698 1.1 cgd
699 1.1 cgd case KERN_PROC_PGRP:
700 1.1 cgd /* could do this by traversing pgrp */
701 1.1 cgd if (p->p_pgrp->pg_id != (pid_t)name[1])
702 1.1 cgd continue;
703 1.1 cgd break;
704 1.1 cgd
705 1.1 cgd case KERN_PROC_TTY:
706 1.1 cgd if ((p->p_flag & P_CONTROLT) == 0 ||
707 1.1 cgd p->p_session->s_ttyp == NULL ||
708 1.1 cgd p->p_session->s_ttyp->t_dev != (dev_t)name[1])
709 1.1 cgd continue;
710 1.1 cgd break;
711 1.1 cgd
712 1.1 cgd case KERN_PROC_UID:
713 1.1 cgd if (p->p_ucred->cr_uid != (uid_t)name[1])
714 1.1 cgd continue;
715 1.1 cgd break;
716 1.1 cgd
717 1.1 cgd case KERN_PROC_RUID:
718 1.1 cgd if (p->p_cred->p_ruid != (uid_t)name[1])
719 1.1 cgd continue;
720 1.1 cgd break;
721 1.1 cgd }
722 1.1 cgd if (buflen >= sizeof(struct kinfo_proc)) {
723 1.1 cgd fill_eproc(p, &eproc);
724 1.13 christos error = copyout((caddr_t)p, &dp->kp_proc,
725 1.13 christos sizeof(struct proc));
726 1.13 christos if (error)
727 1.1 cgd return (error);
728 1.13 christos error = copyout((caddr_t)&eproc, &dp->kp_eproc,
729 1.13 christos sizeof(eproc));
730 1.13 christos if (error)
731 1.1 cgd return (error);
732 1.1 cgd dp++;
733 1.1 cgd buflen -= sizeof(struct kinfo_proc);
734 1.1 cgd }
735 1.1 cgd needed += sizeof(struct kinfo_proc);
736 1.1 cgd }
737 1.1 cgd if (doingzomb == 0) {
738 1.3 mycroft p = zombproc.lh_first;
739 1.1 cgd doingzomb++;
740 1.1 cgd goto again;
741 1.1 cgd }
742 1.1 cgd if (where != NULL) {
743 1.1 cgd *sizep = (caddr_t)dp - where;
744 1.1 cgd if (needed > *sizep)
745 1.1 cgd return (ENOMEM);
746 1.1 cgd } else {
747 1.1 cgd needed += KERN_PROCSLOP;
748 1.1 cgd *sizep = needed;
749 1.1 cgd }
750 1.1 cgd return (0);
751 1.1 cgd }
752 1.1 cgd
753 1.1 cgd /*
754 1.1 cgd * Fill in an eproc structure for the specified process.
755 1.1 cgd */
756 1.1 cgd void
757 1.1 cgd fill_eproc(p, ep)
758 1.1 cgd register struct proc *p;
759 1.1 cgd register struct eproc *ep;
760 1.1 cgd {
761 1.1 cgd register struct tty *tp;
762 1.1 cgd
763 1.1 cgd ep->e_paddr = p;
764 1.1 cgd ep->e_sess = p->p_pgrp->pg_session;
765 1.1 cgd ep->e_pcred = *p->p_cred;
766 1.1 cgd ep->e_ucred = *p->p_ucred;
767 1.1 cgd if (p->p_stat == SIDL || p->p_stat == SZOMB) {
768 1.1 cgd ep->e_vm.vm_rssize = 0;
769 1.1 cgd ep->e_vm.vm_tsize = 0;
770 1.1 cgd ep->e_vm.vm_dsize = 0;
771 1.1 cgd ep->e_vm.vm_ssize = 0;
772 1.1 cgd /* ep->e_vm.vm_pmap = XXX; */
773 1.1 cgd } else {
774 1.1 cgd register struct vmspace *vm = p->p_vmspace;
775 1.1 cgd
776 1.26 gwr ep->e_vm.vm_rssize = vm_resident_count(vm);
777 1.1 cgd ep->e_vm.vm_tsize = vm->vm_tsize;
778 1.1 cgd ep->e_vm.vm_dsize = vm->vm_dsize;
779 1.1 cgd ep->e_vm.vm_ssize = vm->vm_ssize;
780 1.1 cgd }
781 1.1 cgd if (p->p_pptr)
782 1.1 cgd ep->e_ppid = p->p_pptr->p_pid;
783 1.1 cgd else
784 1.1 cgd ep->e_ppid = 0;
785 1.1 cgd ep->e_pgid = p->p_pgrp->pg_id;
786 1.33 thorpej ep->e_sid = ep->e_sess->s_sid;
787 1.1 cgd ep->e_jobc = p->p_pgrp->pg_jobc;
788 1.1 cgd if ((p->p_flag & P_CONTROLT) &&
789 1.1 cgd (tp = ep->e_sess->s_ttyp)) {
790 1.1 cgd ep->e_tdev = tp->t_dev;
791 1.1 cgd ep->e_tpgid = tp->t_pgrp ? tp->t_pgrp->pg_id : NO_PID;
792 1.1 cgd ep->e_tsess = tp->t_session;
793 1.1 cgd } else
794 1.1 cgd ep->e_tdev = NODEV;
795 1.1 cgd if (p->p_wmesg)
796 1.1 cgd strncpy(ep->e_wmesg, p->p_wmesg, WMESGLEN);
797 1.1 cgd ep->e_xsize = ep->e_xrssize = 0;
798 1.1 cgd ep->e_xccount = ep->e_xswrss = 0;
799 1.24 mycroft ep->e_flag = ep->e_sess->s_ttyvp ? EPROC_CTTY : 0;
800 1.24 mycroft if (SESS_LEADER(p))
801 1.24 mycroft ep->e_flag |= EPROC_SLEADER;
802 1.24 mycroft strncpy(ep->e_login, ep->e_sess->s_login, MAXLOGNAME);
803 1.1 cgd }
804 1.1 cgd
805