#include <sys/param.h>
#include <sys/systm.h>
#include <sys/kernel.h>
#include <sys/malloc.h>
#include <sys/proc_internal.h>
#include <sys/kauth.h>
#include <sys/file_internal.h>
#include <sys/vnode_internal.h>
#include <sys/unistd.h>
#include <sys/buf.h>
#include <sys/ioctl.h>
#include <sys/namei.h>
#include <sys/tty.h>
#include <sys/disklabel.h>
#include <sys/vm.h>
#include <sys/sysctl.h>
#include <sys/user.h>
#include <sys/aio_kern.h>
#include <sys/reboot.h>
#include <sys/memory_maintenance.h>
#include <sys/priv.h>
#include <security/audit/audit.h>
#include <kern/kalloc.h>
#include <mach/machine.h>
#include <mach/mach_host.h>
#include <mach/mach_types.h>
#include <mach/vm_param.h>
#include <kern/mach_param.h>
#include <kern/task.h>
#include <kern/thread.h>
#include <kern/processor.h>
#include <kern/debug.h>
#include <kern/sched_prim.h>
#include <vm/vm_kern.h>
#include <vm/vm_map.h>
#include <mach/host_info.h>
#include <sys/mount_internal.h>
#include <sys/kdebug.h>
#include <IOKit/IOPlatformExpert.h>
#include <pexpert/pexpert.h>
#include <machine/machine_routines.h>
#include <machine/exec.h>
#include <vm/vm_protos.h>
#include <vm/vm_pageout.h>
#include <sys/imgsrc.h>
#include <kern/timer_call.h>
#if defined(__i386__) || defined(__x86_64__)
#include <i386/cpuid.h>
#endif
#if CONFIG_FREEZE
#include <sys/kern_memorystatus.h>
#endif
#if KPERF
#include <kperf/kperf.h>
#endif
#if HYPERVISOR
#include <kern/hv_support.h>
#endif
#define AIO_MAX_REQUESTS (128 * CONFIG_AIO_MAX)
extern int aio_max_requests;
extern int aio_max_requests_per_process;
extern int aio_worker_threads;
extern int lowpri_IO_window_msecs;
extern int lowpri_IO_delay_msecs;
extern int nx_enabled;
extern int speculative_reads_disabled;
extern int ignore_is_ssd;
extern unsigned int speculative_prefetch_max;
extern unsigned int speculative_prefetch_max_iosize;
extern unsigned int preheat_max_bytes;
extern unsigned int preheat_min_bytes;
extern long numvnodes;
extern uuid_string_t bootsessionuuid_string;
extern unsigned int vm_max_delayed_work_limit;
extern unsigned int vm_max_batch;
extern unsigned int vm_page_free_min;
extern unsigned int vm_page_free_target;
extern unsigned int vm_page_free_reserved;
extern unsigned int vm_page_speculative_percentage;
extern unsigned int vm_page_speculative_q_age_ms;
#if (DEVELOPMENT || DEBUG)
extern uint32_t vm_page_creation_throttled_hard;
extern uint32_t vm_page_creation_throttled_soft;
#endif
#ifdef STATIC
#undef STATIC
#endif
#if 0
#define STATIC
#else
#define STATIC static
#endif
extern boolean_t mach_timer_coalescing_enabled;
extern uint64_t timer_deadline_tracking_bin_1, timer_deadline_tracking_bin_2;
STATIC void
fill_user32_eproc(proc_t, struct user32_eproc *__restrict);
STATIC void
fill_user32_externproc(proc_t, struct user32_extern_proc *__restrict);
STATIC void
fill_user64_eproc(proc_t, struct user64_eproc *__restrict);
STATIC void
fill_user64_proc(proc_t, struct user64_kinfo_proc *__restrict);
STATIC void
fill_user64_externproc(proc_t, struct user64_extern_proc *__restrict);
STATIC void
fill_user32_proc(proc_t, struct user32_kinfo_proc *__restrict);
extern int
kdbg_control(int *name, u_int namelen, user_addr_t where, size_t * sizep);
#if NFSCLIENT
extern int
netboot_root(void);
#endif
int
pcsamples_ops(int *name, u_int namelen, user_addr_t where, size_t *sizep,
proc_t p);
__private_extern__ kern_return_t
reset_vmobjectcache(unsigned int val1, unsigned int val2);
int
sysctl_procargs(int *name, u_int namelen, user_addr_t where,
size_t *sizep, proc_t cur_proc);
STATIC int
sysctl_procargsx(int *name, u_int namelen, user_addr_t where, size_t *sizep,
proc_t cur_proc, int argc_yes);
int
sysctl_struct(user_addr_t oldp, size_t *oldlenp, user_addr_t newp,
size_t newlen, void *sp, int len);
STATIC int sysdoproc_filt_KERN_PROC_PID(proc_t p, void * arg);
STATIC int sysdoproc_filt_KERN_PROC_PGRP(proc_t p, void * arg);
STATIC int sysdoproc_filt_KERN_PROC_TTY(proc_t p, void * arg);
STATIC int sysdoproc_filt_KERN_PROC_UID(proc_t p, void * arg);
STATIC int sysdoproc_filt_KERN_PROC_RUID(proc_t p, void * arg);
int sysdoproc_callback(proc_t p, void *arg);
STATIC void fill_loadavg64(struct loadavg *la, struct user64_loadavg *la64);
STATIC void fill_loadavg32(struct loadavg *la, struct user32_loadavg *la32);
STATIC int sysctl_handle_kern_threadname(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_sched_stats(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_sched_stats_enable(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_kdebug_ops SYSCTL_HANDLER_ARGS;
#if COUNT_SYSCALLS
STATIC int sysctl_docountsyscalls SYSCTL_HANDLER_ARGS;
#endif
STATIC int sysctl_doprocargs SYSCTL_HANDLER_ARGS;
STATIC int sysctl_doprocargs2 SYSCTL_HANDLER_ARGS;
STATIC int sysctl_prochandle SYSCTL_HANDLER_ARGS;
STATIC int sysctl_aiomax(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_aioprocmax(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_aiothreads(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_maxproc(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_osversion(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_sysctl_bootargs(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_maxvnodes(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_securelvl(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_domainname(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_hostname(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_procname(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_boottime(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_symfile(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
#if NFSCLIENT
STATIC int sysctl_netboot(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
#endif
#ifdef CONFIG_IMGSRC_ACCESS
STATIC int sysctl_imgsrcdev(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
#endif
STATIC int sysctl_usrstack(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_usrstack64(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_coredump(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_suid_coredump(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_delayterm(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_rage_vnode(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_kern_check_openevt(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_nx(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_loadavg(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_vm_toggle_address_reuse(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_swapusage(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int fetch_process_cputype( proc_t cur_proc, int *name, u_int namelen, cpu_type_t *cputype);
STATIC int sysctl_sysctl_native(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_sysctl_cputype(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_safeboot(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_singleuser(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_minimalboot(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
STATIC int sysctl_slide(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req);
extern void IORegistrySetOSBuildVersion(char * build_version);
STATIC void
fill_loadavg64(struct loadavg *la, struct user64_loadavg *la64)
{
la64->ldavg[0] = la->ldavg[0];
la64->ldavg[1] = la->ldavg[1];
la64->ldavg[2] = la->ldavg[2];
la64->fscale = (user64_long_t)la->fscale;
}
STATIC void
fill_loadavg32(struct loadavg *la, struct user32_loadavg *la32)
{
la32->ldavg[0] = la->ldavg[0];
la32->ldavg[1] = la->ldavg[1];
la32->ldavg[2] = la->ldavg[2];
la32->fscale = (user32_long_t)la->fscale;
}
extern char corefilename[MAXPATHLEN+1];
extern int do_coredump;
extern int sugid_coredump;
#if COUNT_SYSCALLS
extern int do_count_syscalls;
#endif
#ifdef INSECURE
int securelevel = -1;
#else
int securelevel;
#endif
STATIC int
sysctl_handle_kern_threadname( __unused struct sysctl_oid *oidp, __unused void *arg1,
__unused int arg2, struct sysctl_req *req)
{
int error;
struct uthread *ut = get_bsdthread_info(current_thread());
user_addr_t oldp=0, newp=0;
size_t *oldlenp=NULL;
size_t newlen=0;
oldp = req->oldptr;
oldlenp = &(req->oldlen);
newp = req->newptr;
newlen = req->newlen;
if(oldlenp) {
size_t currlen = MAXTHREADNAMESIZE - 1;
if(ut->pth_name)
currlen = strlen(ut->pth_name);
if(oldp) {
if(*oldlenp < currlen)
return ENOMEM;
if(ut->pth_name) {
error = copyout(ut->pth_name,oldp,currlen);
if(error)
return error;
}
}
req->oldidx = currlen;
}
if(newp)
{
if(newlen > (MAXTHREADNAMESIZE - 1))
return ENAMETOOLONG;
if(!ut->pth_name)
{
ut->pth_name = (char*)kalloc( MAXTHREADNAMESIZE );
if(!ut->pth_name)
return ENOMEM;
}
bzero(ut->pth_name, MAXTHREADNAMESIZE);
error = copyin(newp, ut->pth_name, newlen);
if(error)
return error;
}
return 0;
}
SYSCTL_PROC(_kern, KERN_THREADNAME, threadname, CTLFLAG_ANYBODY | CTLTYPE_STRING | CTLFLAG_RW | CTLFLAG_LOCKED, 0, 0, sysctl_handle_kern_threadname,"A","");
#define BSD_HOST 1
STATIC int
sysctl_sched_stats(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
host_basic_info_data_t hinfo;
kern_return_t kret;
uint32_t size;
int changed;
mach_msg_type_number_t count = HOST_BASIC_INFO_COUNT;
struct _processor_statistics_np *buf;
int error;
kret = host_info((host_t)BSD_HOST, HOST_BASIC_INFO, (host_info_t)&hinfo, &count);
if (kret != KERN_SUCCESS) {
return EINVAL;
}
size = sizeof(struct _processor_statistics_np) * (hinfo.logical_cpu_max + 2);
if (req->oldlen < size) {
return EINVAL;
}
MALLOC(buf, struct _processor_statistics_np*, size, M_TEMP, M_ZERO | M_WAITOK);
kret = get_sched_statistics(buf, &size);
if (kret != KERN_SUCCESS) {
error = EINVAL;
goto out;
}
error = sysctl_io_opaque(req, buf, size, &changed);
if (error) {
goto out;
}
if (changed) {
panic("Sched info changed?!");
}
out:
FREE(buf, M_TEMP);
return error;
}
SYSCTL_PROC(_kern, OID_AUTO, sched_stats, CTLFLAG_LOCKED, 0, 0, sysctl_sched_stats, "-", "");
STATIC int
sysctl_sched_stats_enable(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, __unused struct sysctl_req *req)
{
boolean_t active;
int res;
if (req->newlen != sizeof(active)) {
return EINVAL;
}
res = copyin(req->newptr, &active, sizeof(active));
if (res != 0) {
return res;
}
return set_sched_stats_active(active);
}
SYSCTL_PROC(_kern, OID_AUTO, sched_stats_enable, CTLFLAG_LOCKED | CTLFLAG_WR, 0, 0, sysctl_sched_stats_enable, "-", "");
extern uint32_t sched_debug_flags;
SYSCTL_INT(_debug, OID_AUTO, sched, CTLFLAG_RW | CTLFLAG_LOCKED, &sched_debug_flags, 0, "scheduler debug");
#if (DEBUG || DEVELOPMENT)
extern boolean_t doprnt_hide_pointers;
SYSCTL_INT(_debug, OID_AUTO, hide_kernel_pointers, CTLFLAG_RW | CTLFLAG_LOCKED, &doprnt_hide_pointers, 0, "hide kernel pointers from log");
#endif
extern int get_kernel_symfile(proc_t, char **);
#if COUNT_SYSCALLS
#define KERN_COUNT_SYSCALLS (KERN_OSTYPE + 1000)
extern int nsysent;
extern int syscalls_log[];
extern const char *syscallnames[];
STATIC int
sysctl_docountsyscalls SYSCTL_HANDLER_ARGS
{
__unused int cmd = oidp->oid_arg2;
__unused int *name = arg1;
__unused int namelen = arg2;
user_addr_t oldp = req->oldptr;
size_t *oldlenp = &req->oldlen;
user_addr_t newp = req->newptr;
size_t newlen = req->newlen;
int error;
int tmp;
error = sysctl_int(oldp, oldlenp, newp, newlen, &tmp);
if ( error != 0 ) {
return (error);
}
if ( tmp == 1 ) {
do_count_syscalls = 1;
}
else if ( tmp == 0 || tmp == 2 || tmp == 3 ) {
int i;
for ( i = 0; i < nsysent; i++ ) {
if ( syscalls_log[i] != 0 ) {
if ( tmp == 2 ) {
printf("%d calls - name %s \n", syscalls_log[i], syscallnames[i]);
}
else {
syscalls_log[i] = 0;
}
}
}
if ( tmp != 0 ) {
do_count_syscalls = 1;
}
}
if (!error)
req->oldidx += req->oldlen;
return (error);
}
SYSCTL_PROC(_kern, KERN_COUNT_SYSCALLS, count_syscalls, CTLTYPE_NODE|CTLFLAG_RD | CTLFLAG_LOCKED,
0,
0,
sysctl_docountsyscalls,
NULL,
"");
#endif
int
sysctl_int(user_addr_t oldp, size_t *oldlenp,
user_addr_t newp, size_t newlen, int *valp)
{
int error = 0;
if (oldp != USER_ADDR_NULL && oldlenp == NULL)
return (EFAULT);
if (oldp && *oldlenp < sizeof(int))
return (ENOMEM);
if (newp && newlen != sizeof(int))
return (EINVAL);
*oldlenp = sizeof(int);
if (oldp)
error = copyout(valp, oldp, sizeof(int));
if (error == 0 && newp) {
error = copyin(newp, valp, sizeof(int));
AUDIT_ARG(value32, *valp);
}
return (error);
}
int
sysctl_quad(user_addr_t oldp, size_t *oldlenp,
user_addr_t newp, size_t newlen, quad_t *valp)
{
int error = 0;
if (oldp != USER_ADDR_NULL && oldlenp == NULL)
return (EFAULT);
if (oldp && *oldlenp < sizeof(quad_t))
return (ENOMEM);
if (newp && newlen != sizeof(quad_t))
return (EINVAL);
*oldlenp = sizeof(quad_t);
if (oldp)
error = copyout(valp, oldp, sizeof(quad_t));
if (error == 0 && newp)
error = copyin(newp, valp, sizeof(quad_t));
return (error);
}
STATIC int
sysdoproc_filt_KERN_PROC_PID(proc_t p, void * arg)
{
if (p->p_pid != (pid_t)*(int*)arg)
return(0);
else
return(1);
}
STATIC int
sysdoproc_filt_KERN_PROC_PGRP(proc_t p, void * arg)
{
if (p->p_pgrpid != (pid_t)*(int*)arg)
return(0);
else
return(1);
}
STATIC int
sysdoproc_filt_KERN_PROC_TTY(proc_t p, void * arg)
{
int retval;
struct tty *tp;
if ((p->p_flag & P_CONTROLT) == 0 ||
(p->p_pgrp == NULL) || (p->p_pgrp->pg_session == NULL) ||
(tp = SESSION_TP(p->p_pgrp->pg_session)) == TTY_NULL ||
tp->t_dev != (dev_t)*(int*)arg)
retval = 0;
else
retval = 1;
return(retval);
}
STATIC int
sysdoproc_filt_KERN_PROC_UID(proc_t p, void * arg)
{
kauth_cred_t my_cred;
uid_t uid;
if (p->p_ucred == NULL)
return(0);
my_cred = kauth_cred_proc_ref(p);
uid = kauth_cred_getuid(my_cred);
kauth_cred_unref(&my_cred);
if (uid != (uid_t)*(int*)arg)
return(0);
else
return(1);
}
STATIC int
sysdoproc_filt_KERN_PROC_RUID(proc_t p, void * arg)
{
kauth_cred_t my_cred;
uid_t ruid;
if (p->p_ucred == NULL)
return(0);
my_cred = kauth_cred_proc_ref(p);
ruid = kauth_cred_getruid(my_cred);
kauth_cred_unref(&my_cred);
if (ruid != (uid_t)*(int*)arg)
return(0);
else
return(1);
}
#define KERN_PROCSLOP (5 * sizeof (struct kinfo_proc))
struct sysdoproc_args {
int buflen;
void *kprocp;
boolean_t is_64_bit;
user_addr_t dp;
size_t needed;
int sizeof_kproc;
int *errorp;
int uidcheck;
int ruidcheck;
int ttycheck;
int uidval;
};
int
sysdoproc_callback(proc_t p, void *arg)
{
struct sysdoproc_args *args = arg;
if (args->buflen >= args->sizeof_kproc) {
if ((args->ruidcheck != 0) && (sysdoproc_filt_KERN_PROC_RUID(p, &args->uidval) == 0))
return (PROC_RETURNED);
if ((args->uidcheck != 0) && (sysdoproc_filt_KERN_PROC_UID(p, &args->uidval) == 0))
return (PROC_RETURNED);
if ((args->ttycheck != 0) && (sysdoproc_filt_KERN_PROC_TTY(p, &args->uidval) == 0))
return (PROC_RETURNED);
bzero(args->kprocp, args->sizeof_kproc);
if (args->is_64_bit)
fill_user64_proc(p, args->kprocp);
else
fill_user32_proc(p, args->kprocp);
int error = copyout(args->kprocp, args->dp, args->sizeof_kproc);
if (error) {
*args->errorp = error;
return (PROC_RETURNED_DONE);
}
args->dp += args->sizeof_kproc;
args->buflen -= args->sizeof_kproc;
}
args->needed += args->sizeof_kproc;
return (PROC_RETURNED);
}
SYSCTL_NODE(_kern, KERN_PROC, proc, CTLFLAG_RD | CTLFLAG_LOCKED, 0, "");
STATIC int
sysctl_prochandle SYSCTL_HANDLER_ARGS
{
int cmd = oidp->oid_arg2;
int *name = arg1;
int namelen = arg2;
user_addr_t where = req->oldptr;
user_addr_t dp = where;
size_t needed = 0;
int buflen = where != USER_ADDR_NULL ? req->oldlen : 0;
int error = 0;
boolean_t is_64_bit = proc_is64bit(current_proc());
struct user32_kinfo_proc user32_kproc;
struct user64_kinfo_proc user_kproc;
int sizeof_kproc;
void *kprocp;
int (*filterfn)(proc_t, void *) = 0;
struct sysdoproc_args args;
int uidcheck = 0;
int ruidcheck = 0;
int ttycheck = 0;
if (namelen != 1 && !(namelen == 0 && cmd == KERN_PROC_ALL))
return (EINVAL);
if (is_64_bit) {
sizeof_kproc = sizeof(user_kproc);
kprocp = &user_kproc;
} else {
sizeof_kproc = sizeof(user32_kproc);
kprocp = &user32_kproc;
}
switch (cmd) {
case KERN_PROC_PID:
filterfn = sysdoproc_filt_KERN_PROC_PID;
break;
case KERN_PROC_PGRP:
filterfn = sysdoproc_filt_KERN_PROC_PGRP;
break;
case KERN_PROC_TTY:
ttycheck = 1;
break;
case KERN_PROC_UID:
uidcheck = 1;
break;
case KERN_PROC_RUID:
ruidcheck = 1;
break;
case KERN_PROC_ALL:
break;
default:
return (ENOTSUP);
}
error = 0;
args.buflen = buflen;
args.kprocp = kprocp;
args.is_64_bit = is_64_bit;
args.dp = dp;
args.needed = needed;
args.errorp = &error;
args.uidcheck = uidcheck;
args.ruidcheck = ruidcheck;
args.ttycheck = ttycheck;
args.sizeof_kproc = sizeof_kproc;
if (namelen)
args.uidval = name[0];
proc_iterate((PROC_ALLPROCLIST | PROC_ZOMBPROCLIST),
sysdoproc_callback, &args, filterfn, name);
if (error)
return (error);
dp = args.dp;
needed = args.needed;
if (where != USER_ADDR_NULL) {
req->oldlen = dp - where;
if (needed > req->oldlen)
return (ENOMEM);
} else {
needed += KERN_PROCSLOP;
req->oldlen = needed;
}
req->oldidx += req->oldlen;
return (0);
}
SYSCTL_PROC(_kern_proc, KERN_PROC_ALL, all, CTLTYPE_NODE|CTLFLAG_RD | CTLFLAG_LOCKED,
0,
KERN_PROC_ALL,
sysctl_prochandle,
NULL,
"");
SYSCTL_PROC(_kern_proc, KERN_PROC_PID, pid, CTLTYPE_NODE|CTLFLAG_RD | CTLFLAG_LOCKED,
0,
KERN_PROC_PID,
sysctl_prochandle,
NULL,
"");
SYSCTL_PROC(_kern_proc, KERN_PROC_TTY, tty, CTLTYPE_NODE|CTLFLAG_RD | CTLFLAG_LOCKED,
0,
KERN_PROC_TTY,
sysctl_prochandle,
NULL,
"");
SYSCTL_PROC(_kern_proc, KERN_PROC_PGRP, pgrp, CTLTYPE_NODE|CTLFLAG_RD | CTLFLAG_LOCKED,
0,
KERN_PROC_PGRP,
sysctl_prochandle,
NULL,
"");
SYSCTL_PROC(_kern_proc, KERN_PROC_UID, uid, CTLTYPE_NODE|CTLFLAG_RD | CTLFLAG_LOCKED,
0,
KERN_PROC_UID,
sysctl_prochandle,
NULL,
"");
SYSCTL_PROC(_kern_proc, KERN_PROC_RUID, ruid, CTLTYPE_NODE|CTLFLAG_RD | CTLFLAG_LOCKED,
0,
KERN_PROC_RUID,
sysctl_prochandle,
NULL,
"");
SYSCTL_PROC(_kern_proc, KERN_PROC_LCID, lcid, CTLTYPE_NODE|CTLFLAG_RD | CTLFLAG_LOCKED,
0,
KERN_PROC_LCID,
sysctl_prochandle,
NULL,
"");
STATIC void
fill_user32_eproc(proc_t p, struct user32_eproc *__restrict ep)
{
struct tty *tp;
struct pgrp *pg;
struct session *sessp;
kauth_cred_t my_cred;
pg = proc_pgrp(p);
sessp = proc_session(p);
if (pg != PGRP_NULL) {
ep->e_pgid = p->p_pgrpid;
ep->e_jobc = pg->pg_jobc;
if (sessp != SESSION_NULL && sessp->s_ttyvp)
ep->e_flag = EPROC_CTTY;
}
ep->e_ppid = p->p_ppid;
if (p->p_ucred) {
my_cred = kauth_cred_proc_ref(p);
ep->e_pcred.p_ruid = kauth_cred_getruid(my_cred);
ep->e_pcred.p_svuid = kauth_cred_getsvuid(my_cred);
ep->e_pcred.p_rgid = kauth_cred_getrgid(my_cred);
ep->e_pcred.p_svgid = kauth_cred_getsvgid(my_cred);
ep->e_ucred.cr_ref = my_cred->cr_ref;
ep->e_ucred.cr_uid = kauth_cred_getuid(my_cred);
ep->e_ucred.cr_ngroups = posix_cred_get(my_cred)->cr_ngroups;
bcopy(posix_cred_get(my_cred)->cr_groups,
ep->e_ucred.cr_groups, NGROUPS * sizeof (gid_t));
kauth_cred_unref(&my_cred);
}
if ((p->p_flag & P_CONTROLT) && (sessp != SESSION_NULL) &&
(tp = SESSION_TP(sessp))) {
ep->e_tdev = tp->t_dev;
ep->e_tpgid = sessp->s_ttypgrpid;
} else
ep->e_tdev = NODEV;
if (sessp != SESSION_NULL) {
if (SESS_LEADER(p, sessp))
ep->e_flag |= EPROC_SLEADER;
session_rele(sessp);
}
if (pg != PGRP_NULL)
pg_rele(pg);
}
STATIC void
fill_user64_eproc(proc_t p, struct user64_eproc *__restrict ep)
{
struct tty *tp;
struct pgrp *pg;
struct session *sessp;
kauth_cred_t my_cred;
pg = proc_pgrp(p);
sessp = proc_session(p);
if (pg != PGRP_NULL) {
ep->e_pgid = p->p_pgrpid;
ep->e_jobc = pg->pg_jobc;
if (sessp != SESSION_NULL && sessp->s_ttyvp)
ep->e_flag = EPROC_CTTY;
}
ep->e_ppid = p->p_ppid;
if (p->p_ucred) {
my_cred = kauth_cred_proc_ref(p);
ep->e_pcred.p_ruid = kauth_cred_getruid(my_cred);
ep->e_pcred.p_svuid = kauth_cred_getsvuid(my_cred);
ep->e_pcred.p_rgid = kauth_cred_getrgid(my_cred);
ep->e_pcred.p_svgid = kauth_cred_getsvgid(my_cred);
ep->e_ucred.cr_ref = my_cred->cr_ref;
ep->e_ucred.cr_uid = kauth_cred_getuid(my_cred);
ep->e_ucred.cr_ngroups = posix_cred_get(my_cred)->cr_ngroups;
bcopy(posix_cred_get(my_cred)->cr_groups,
ep->e_ucred.cr_groups, NGROUPS * sizeof (gid_t));
kauth_cred_unref(&my_cred);
}
if ((p->p_flag & P_CONTROLT) && (sessp != SESSION_NULL) &&
(tp = SESSION_TP(sessp))) {
ep->e_tdev = tp->t_dev;
ep->e_tpgid = sessp->s_ttypgrpid;
} else
ep->e_tdev = NODEV;
if (sessp != SESSION_NULL) {
if (SESS_LEADER(p, sessp))
ep->e_flag |= EPROC_SLEADER;
session_rele(sessp);
}
if (pg != PGRP_NULL)
pg_rele(pg);
}
STATIC void
fill_user32_externproc(proc_t p, struct user32_extern_proc *__restrict exp)
{
exp->p_starttime.tv_sec = p->p_start.tv_sec;
exp->p_starttime.tv_usec = p->p_start.tv_usec;
exp->p_flag = p->p_flag;
if (p->p_lflag & P_LTRACED)
exp->p_flag |= P_TRACED;
if (p->p_lflag & P_LPPWAIT)
exp->p_flag |= P_PPWAIT;
if (p->p_lflag & P_LEXIT)
exp->p_flag |= P_WEXIT;
exp->p_stat = p->p_stat;
exp->p_pid = p->p_pid;
exp->p_oppid = p->p_oppid;
exp->user_stack = p->user_stack;
exp->p_debugger = p->p_debugger;
exp->sigwait = p->sigwait;
#ifdef _PROC_HAS_SCHEDINFO_
exp->p_estcpu = p->p_estcpu;
exp->p_pctcpu = p->p_pctcpu;
exp->p_slptime = p->p_slptime;
#endif
exp->p_realtimer.it_interval.tv_sec =
(user32_time_t)p->p_realtimer.it_interval.tv_sec;
exp->p_realtimer.it_interval.tv_usec =
(__int32_t)p->p_realtimer.it_interval.tv_usec;
exp->p_realtimer.it_value.tv_sec =
(user32_time_t)p->p_realtimer.it_value.tv_sec;
exp->p_realtimer.it_value.tv_usec =
(__int32_t)p->p_realtimer.it_value.tv_usec;
exp->p_rtime.tv_sec = (user32_time_t)p->p_rtime.tv_sec;
exp->p_rtime.tv_usec = (__int32_t)p->p_rtime.tv_usec;
exp->p_sigignore = p->p_sigignore;
exp->p_sigcatch = p->p_sigcatch;
exp->p_priority = p->p_priority;
exp->p_nice = p->p_nice;
bcopy(&p->p_comm, &exp->p_comm, MAXCOMLEN);
exp->p_xstat = p->p_xstat;
exp->p_acflag = p->p_acflag;
}
STATIC void
fill_user64_externproc(proc_t p, struct user64_extern_proc *__restrict exp)
{
exp->p_starttime.tv_sec = p->p_start.tv_sec;
exp->p_starttime.tv_usec = p->p_start.tv_usec;
exp->p_flag = p->p_flag;
if (p->p_lflag & P_LTRACED)
exp->p_flag |= P_TRACED;
if (p->p_lflag & P_LPPWAIT)
exp->p_flag |= P_PPWAIT;
if (p->p_lflag & P_LEXIT)
exp->p_flag |= P_WEXIT;
exp->p_stat = p->p_stat;
exp->p_pid = p->p_pid;
exp->p_oppid = p->p_oppid;
exp->user_stack = p->user_stack;
exp->p_debugger = p->p_debugger;
exp->sigwait = p->sigwait;
#ifdef _PROC_HAS_SCHEDINFO_
exp->p_estcpu = p->p_estcpu;
exp->p_pctcpu = p->p_pctcpu;
exp->p_slptime = p->p_slptime;
#endif
exp->p_realtimer.it_interval.tv_sec = p->p_realtimer.it_interval.tv_sec;
exp->p_realtimer.it_interval.tv_usec = p->p_realtimer.it_interval.tv_usec;
exp->p_realtimer.it_value.tv_sec = p->p_realtimer.it_value.tv_sec;
exp->p_realtimer.it_value.tv_usec = p->p_realtimer.it_value.tv_usec;
exp->p_rtime.tv_sec = p->p_rtime.tv_sec;
exp->p_rtime.tv_usec = p->p_rtime.tv_usec;
exp->p_sigignore = p->p_sigignore;
exp->p_sigcatch = p->p_sigcatch;
exp->p_priority = p->p_priority;
exp->p_nice = p->p_nice;
bcopy(&p->p_comm, &exp->p_comm, MAXCOMLEN);
exp->p_xstat = p->p_xstat;
exp->p_acflag = p->p_acflag;
}
STATIC void
fill_user32_proc(proc_t p, struct user32_kinfo_proc *__restrict kp)
{
fill_user32_externproc(p, &kp->kp_proc);
fill_user32_eproc(p, &kp->kp_eproc);
}
STATIC void
fill_user64_proc(proc_t p, struct user64_kinfo_proc *__restrict kp)
{
fill_user64_externproc(p, &kp->kp_proc);
fill_user64_eproc(p, &kp->kp_eproc);
}
STATIC int
sysctl_kdebug_ops SYSCTL_HANDLER_ARGS
{
__unused int cmd = oidp->oid_arg2;
int *name = arg1;
int namelen = arg2;
user_addr_t oldp = req->oldptr;
size_t *oldlenp = &req->oldlen;
proc_t p = current_proc();
int ret=0;
if (namelen == 0)
return(ENOTSUP);
ret = suser(kauth_cred_get(), &p->p_acflag);
#if KPERF
if (ret)
ret = kperf_access_check();
#endif
if (ret)
return(ret);
switch(name[0]) {
case KERN_KDEFLAGS:
case KERN_KDDFLAGS:
case KERN_KDENABLE:
case KERN_KDGETBUF:
case KERN_KDSETUP:
case KERN_KDREMOVE:
case KERN_KDSETREG:
case KERN_KDGETREG:
case KERN_KDREADTR:
case KERN_KDWRITETR:
case KERN_KDWRITEMAP:
case KERN_KDPIDTR:
case KERN_KDTHRMAP:
case KERN_KDPIDEX:
case KERN_KDSETRTCDEC:
case KERN_KDSETBUF:
case KERN_KDGETENTROPY:
case KERN_KDENABLE_BG_TRACE:
case KERN_KDDISABLE_BG_TRACE:
case KERN_KDREADCURTHRMAP:
case KERN_KDSET_TYPEFILTER:
case KERN_KDBUFWAIT:
case KERN_KDCPUMAP:
case KERN_KDWAIT_BG_TRACE_RESET:
case KERN_KDSET_BG_TYPEFILTER:
case KERN_KDWRITEMAP_V3:
case KERN_KDWRITETR_V3:
ret = kdbg_control(name, namelen, oldp, oldlenp);
break;
default:
ret= ENOTSUP;
break;
}
if (!ret)
req->oldidx += req->oldlen;
return (ret);
}
SYSCTL_PROC(_kern, KERN_KDEBUG, kdebug, CTLTYPE_NODE|CTLFLAG_RD | CTLFLAG_LOCKED,
0,
0,
sysctl_kdebug_ops,
NULL,
"");
STATIC int
sysctl_doprocargs SYSCTL_HANDLER_ARGS
{
__unused int cmd = oidp->oid_arg2;
int *name = arg1;
int namelen = arg2;
user_addr_t oldp = req->oldptr;
size_t *oldlenp = &req->oldlen;
int error;
error = sysctl_procargsx( name, namelen, oldp, oldlenp, current_proc(), 0);
if (!error)
req->oldidx += req->oldlen;
return (error);
}
SYSCTL_PROC(_kern, KERN_PROCARGS, procargs, CTLTYPE_NODE|CTLFLAG_RD | CTLFLAG_LOCKED,
0,
0,
sysctl_doprocargs,
NULL,
"");
STATIC int
sysctl_doprocargs2 SYSCTL_HANDLER_ARGS
{
__unused int cmd = oidp->oid_arg2;
int *name = arg1;
int namelen = arg2;
user_addr_t oldp = req->oldptr;
size_t *oldlenp = &req->oldlen;
int error;
error = sysctl_procargsx( name, namelen, oldp, oldlenp, current_proc(), 1);
if (!error)
req->oldidx += req->oldlen;
return (error);
}
SYSCTL_PROC(_kern, KERN_PROCARGS2, procargs2, CTLTYPE_NODE|CTLFLAG_RD | CTLFLAG_LOCKED,
0,
0,
sysctl_doprocargs2,
NULL,
"");
STATIC int
sysctl_procargsx(int *name, u_int namelen, user_addr_t where,
size_t *sizep, proc_t cur_proc, int argc_yes)
{
proc_t p;
int buflen = where != USER_ADDR_NULL ? *sizep : 0;
int error = 0;
struct _vm_map *proc_map;
struct task * task;
vm_map_copy_t tmp;
user_addr_t arg_addr;
size_t arg_size;
caddr_t data;
size_t argslen=0;
int size;
vm_offset_t copy_start, copy_end;
kern_return_t ret;
int pid;
kauth_cred_t my_cred;
uid_t uid;
if ( namelen < 1 )
return(EINVAL);
if (argc_yes)
buflen -= sizeof(int);
if (where != USER_ADDR_NULL && (buflen <= 0 || buflen > ARG_MAX)) {
return(EINVAL);
}
arg_size = buflen;
pid = name[0];
p = proc_find(pid);
if (p == NULL) {
return(EINVAL);
}
if (!p->user_stack) {
proc_rele(p);
return(EINVAL);
}
if (where == USER_ADDR_NULL) {
if (sizep == NULL) {
proc_rele(p);
return(EFAULT);
}
size = p->p_argslen;
proc_rele(p);
if (argc_yes) {
size += sizeof(int);
}
else {
size += PATH_MAX + (6 * sizeof(int));
}
size += (size & (sizeof(int) - 1)) ? (sizeof(int) - (size & (sizeof(int) - 1))) : 0;
*sizep = size;
return (0);
}
my_cred = kauth_cred_proc_ref(p);
uid = kauth_cred_getuid(my_cred);
kauth_cred_unref(&my_cred);
if ((uid != kauth_cred_getuid(kauth_cred_get()))
&& suser(kauth_cred_get(), &cur_proc->p_acflag)) {
proc_rele(p);
return (EINVAL);
}
if ((u_int)arg_size > p->p_argslen)
arg_size = round_page(p->p_argslen);
arg_addr = p->user_stack - arg_size;
task = p->task;
if (task == NULL) {
proc_rele(p);
return(EINVAL);
}
argslen = p->p_argslen;
task_reference(task);
proc_rele(p);
proc_map = get_task_map_reference(task);
task_deallocate(task);
if (proc_map == NULL)
return(EINVAL);
ret = kmem_alloc(kernel_map, ©_start, round_page(arg_size), VM_KERN_MEMORY_BSD);
if (ret != KERN_SUCCESS) {
vm_map_deallocate(proc_map);
return(ENOMEM);
}
copy_end = round_page(copy_start + arg_size);
if( vm_map_copyin(proc_map, (vm_map_address_t)arg_addr,
(vm_map_size_t)arg_size, FALSE, &tmp) != KERN_SUCCESS) {
vm_map_deallocate(proc_map);
kmem_free(kernel_map, copy_start,
round_page(arg_size));
return (EIO);
}
vm_map_deallocate(proc_map);
if( vm_map_copy_overwrite(kernel_map,
(vm_map_address_t)copy_start,
tmp, FALSE) != KERN_SUCCESS) {
kmem_free(kernel_map, copy_start,
round_page(arg_size));
vm_map_copy_discard(tmp);
return (EIO);
}
if (arg_size > argslen) {
data = (caddr_t) (copy_end - argslen);
size = argslen;
} else {
data = (caddr_t) (copy_end - arg_size);
size = arg_size;
}
#define EXECUTABLE_KEY "executable_path="
if (strncmp(EXECUTABLE_KEY, data, strlen(EXECUTABLE_KEY)) == 0){
data += strlen(EXECUTABLE_KEY);
size -= strlen(EXECUTABLE_KEY);
}
if (argc_yes) {
suword(where, p->p_argc);
error = copyout(data, (where + sizeof(int)), size);
size += sizeof(int);
} else {
error = copyout(data, where, size);
if ( (! error) && (buflen > 0 && (u_int)buflen > argslen) )
{
int binPath_sz, alignedBinPath_sz = 0;
int extraSpaceNeeded, addThis;
user_addr_t placeHere;
char * str = (char *) data;
int max_len = size;
if ( max_len > PATH_MAX ) max_len = PATH_MAX;
binPath_sz = 0;
while ( (binPath_sz < max_len-1) && (*str++ != 0) )
binPath_sz++;
if (binPath_sz < max_len-1) binPath_sz += 1;
alignedBinPath_sz += (binPath_sz & (sizeof(int)-1)) ? (sizeof(int)-(binPath_sz & (sizeof(int)-1))) : 0;
placeHere = where + size;
addThis = (placeHere & (sizeof(int)-1)) ? (sizeof(int)-(placeHere & (sizeof(int)-1))) : 0;
extraSpaceNeeded = alignedBinPath_sz + addThis + binPath_sz + (4 * sizeof(int));
if ( (buflen & ~(sizeof(int)-1)) >= ( argslen + extraSpaceNeeded ))
{
placeHere += addThis;
suword(placeHere, 0);
placeHere += sizeof(int);
suword(placeHere, 0xBFFF0000);
placeHere += sizeof(int);
suword(placeHere, 0);
placeHere += sizeof(int);
error = copyout(data, placeHere, binPath_sz);
if ( ! error )
{
placeHere += binPath_sz;
suword(placeHere, 0);
size += extraSpaceNeeded;
}
}
}
}
if (copy_start != (vm_offset_t) 0) {
kmem_free(kernel_map, copy_start, copy_end - copy_start);
}
if (error) {
return(error);
}
if (where != USER_ADDR_NULL)
*sizep = size;
return (0);
}
STATIC int
sysctl_aiomax
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
int new_value, changed;
int error = sysctl_io_number(req, aio_max_requests, sizeof(int), &new_value, &changed);
if (changed) {
if (new_value >= aio_max_requests_per_process && new_value <= AIO_MAX_REQUESTS)
aio_max_requests = new_value;
else
error = EINVAL;
}
return(error);
}
STATIC int
sysctl_aioprocmax
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
int new_value, changed;
int error = sysctl_io_number(req, aio_max_requests_per_process, sizeof(int), &new_value, &changed);
if (changed) {
if (new_value <= aio_max_requests && new_value >= AIO_LISTIO_MAX)
aio_max_requests_per_process = new_value;
else
error = EINVAL;
}
return(error);
}
STATIC int
sysctl_aiothreads
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
int new_value, changed;
int error = sysctl_io_number(req, aio_worker_threads, sizeof(int), &new_value, &changed);
if (changed) {
if (new_value > aio_worker_threads ) {
_aio_create_worker_threads((new_value - aio_worker_threads));
aio_worker_threads = new_value;
}
else
error = EINVAL;
}
return(error);
}
STATIC int
sysctl_maxproc
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
int new_value, changed;
int error = sysctl_io_number(req, maxproc, sizeof(int), &new_value, &changed);
if (changed) {
AUDIT_ARG(value32, new_value);
if (new_value <= hard_maxproc && new_value > 0)
maxproc = new_value;
else
error = EINVAL;
}
return(error);
}
SYSCTL_STRING(_kern, KERN_OSTYPE, ostype,
CTLFLAG_RD | CTLFLAG_KERN | CTLFLAG_LOCKED,
ostype, 0, "");
SYSCTL_STRING(_kern, KERN_OSRELEASE, osrelease,
CTLFLAG_RD | CTLFLAG_KERN | CTLFLAG_LOCKED,
osrelease, 0, "");
SYSCTL_INT(_kern, KERN_OSREV, osrevision,
CTLFLAG_RD | CTLFLAG_KERN | CTLFLAG_LOCKED,
(int *)NULL, BSD, "");
SYSCTL_STRING(_kern, KERN_VERSION, version,
CTLFLAG_RD | CTLFLAG_KERN | CTLFLAG_LOCKED,
version, 0, "");
SYSCTL_STRING(_kern, OID_AUTO, uuid,
CTLFLAG_RD | CTLFLAG_KERN | CTLFLAG_LOCKED,
&kernel_uuid_string[0], 0, "");
#if DEBUG
int debug_kprint_syscall = 0;
char debug_kprint_syscall_process[MAXCOMLEN+1];
SYSCTL_INT (_debug, OID_AUTO, kprint_syscall,
CTLFLAG_RW | CTLFLAG_LOCKED, &debug_kprint_syscall, 0, "kprintf syscall tracing");
SYSCTL_STRING(_debug, OID_AUTO, kprint_syscall_process,
CTLFLAG_RW | CTLFLAG_LOCKED, debug_kprint_syscall_process, sizeof(debug_kprint_syscall_process),
"name of process for kprintf syscall tracing");
int debug_kprint_current_process(const char **namep)
{
struct proc *p = current_proc();
if (p == NULL) {
return 0;
}
if (debug_kprint_syscall_process[0]) {
if(0 == strncmp(debug_kprint_syscall_process,
p->p_comm, sizeof(debug_kprint_syscall_process))) {
if(namep) *namep = NULL;
return 1;
} else {
return 0;
}
}
if (namep) {
*namep = p->p_comm;
}
return 1;
}
#endif
STATIC int
sysctl_osversion(__unused struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req)
{
int rval = 0;
rval = sysctl_handle_string(oidp, arg1, arg2, req);
if (req->newptr) {
IORegistrySetOSBuildVersion((char *)arg1);
}
return rval;
}
SYSCTL_PROC(_kern, KERN_OSVERSION, osversion,
CTLFLAG_RW | CTLFLAG_KERN | CTLTYPE_STRING | CTLFLAG_LOCKED,
osversion, 256 ,
sysctl_osversion, "A", "");
STATIC int
sysctl_sysctl_bootargs
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
int error;
char buf[256];
strlcpy(buf, PE_boot_args(), 256);
error = sysctl_io_string(req, buf, 256, 0, NULL);
return(error);
}
SYSCTL_PROC(_kern, OID_AUTO, bootargs,
CTLFLAG_LOCKED | CTLFLAG_RD | CTLFLAG_KERN | CTLTYPE_STRING,
NULL, 0,
sysctl_sysctl_bootargs, "A", "bootargs");
SYSCTL_INT(_kern, KERN_MAXFILES, maxfiles,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&maxfiles, 0, "");
SYSCTL_INT(_kern, KERN_ARGMAX, argmax,
CTLFLAG_RD | CTLFLAG_KERN | CTLFLAG_LOCKED,
(int *)NULL, ARG_MAX, "");
SYSCTL_INT(_kern, KERN_POSIX1, posix1version,
CTLFLAG_RD | CTLFLAG_KERN | CTLFLAG_LOCKED,
(int *)NULL, _POSIX_VERSION, "");
SYSCTL_INT(_kern, KERN_NGROUPS, ngroups,
CTLFLAG_RD | CTLFLAG_KERN | CTLFLAG_LOCKED,
(int *)NULL, NGROUPS_MAX, "");
SYSCTL_INT(_kern, KERN_JOB_CONTROL, job_control,
CTLFLAG_RD | CTLFLAG_KERN | CTLFLAG_LOCKED,
(int *)NULL, 1, "");
#if 1
SYSCTL_INT(_kern, KERN_SAVED_IDS, saved_ids,
CTLFLAG_RD | CTLFLAG_KERN | CTLFLAG_LOCKED,
(int *)NULL, 1, "");
#else
SYSCTL_INT(_kern, KERN_SAVED_IDS, saved_ids,
CTLFLAG_RD | CTLFLAG_KERN | CTLFLAG_LOCKED,
NULL, 0, "");
#endif
SYSCTL_INT(_kern, OID_AUTO, num_files,
CTLFLAG_RD | CTLFLAG_LOCKED,
&nfiles, 0, "");
SYSCTL_COMPAT_INT(_kern, OID_AUTO, num_vnodes,
CTLFLAG_RD | CTLFLAG_LOCKED,
&numvnodes, 0, "");
SYSCTL_INT(_kern, OID_AUTO, num_tasks,
CTLFLAG_RD | CTLFLAG_LOCKED,
&task_max, 0, "");
SYSCTL_INT(_kern, OID_AUTO, num_threads,
CTLFLAG_RD | CTLFLAG_LOCKED,
&thread_max, 0, "");
SYSCTL_INT(_kern, OID_AUTO, num_taskthreads,
CTLFLAG_RD | CTLFLAG_LOCKED,
&task_threadmax, 0, "");
STATIC int
sysctl_maxvnodes (__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
int oldval = desiredvnodes;
int error = sysctl_io_number(req, desiredvnodes, sizeof(int), &desiredvnodes, NULL);
if (oldval != desiredvnodes) {
reset_vmobjectcache(oldval, desiredvnodes);
resize_namecache(desiredvnodes);
}
return(error);
}
SYSCTL_INT(_kern, OID_AUTO, namecache_disabled,
CTLFLAG_RW | CTLFLAG_LOCKED,
&nc_disabled, 0, "");
SYSCTL_PROC(_kern, KERN_MAXVNODES, maxvnodes,
CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_LOCKED,
0, 0, sysctl_maxvnodes, "I", "");
SYSCTL_PROC(_kern, KERN_MAXPROC, maxproc,
CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_LOCKED,
0, 0, sysctl_maxproc, "I", "");
SYSCTL_PROC(_kern, KERN_AIOMAX, aiomax,
CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_LOCKED,
0, 0, sysctl_aiomax, "I", "");
SYSCTL_PROC(_kern, KERN_AIOPROCMAX, aioprocmax,
CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_LOCKED,
0, 0, sysctl_aioprocmax, "I", "");
SYSCTL_PROC(_kern, KERN_AIOTHREADS, aiothreads,
CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_LOCKED,
0, 0, sysctl_aiothreads, "I", "");
#if (DEVELOPMENT || DEBUG)
extern int sched_smt_balance;
SYSCTL_INT(_kern, OID_AUTO, sched_smt_balance,
CTLFLAG_KERN| CTLFLAG_RW| CTLFLAG_LOCKED,
&sched_smt_balance, 0, "");
#endif
STATIC int
sysctl_securelvl
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
int new_value, changed;
int error = sysctl_io_number(req, securelevel, sizeof(int), &new_value, &changed);
if (changed) {
if (!(new_value < securelevel && req->p->p_pid != 1)) {
proc_list_lock();
securelevel = new_value;
proc_list_unlock();
} else {
error = EPERM;
}
}
return(error);
}
SYSCTL_PROC(_kern, KERN_SECURELVL, securelevel,
CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_LOCKED,
0, 0, sysctl_securelvl, "I", "");
STATIC int
sysctl_domainname
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
int error, changed;
error = sysctl_io_string(req, domainname, sizeof(domainname), 0, &changed);
if (changed) {
domainnamelen = strlen(domainname);
}
return(error);
}
SYSCTL_PROC(_kern, KERN_DOMAINNAME, nisdomainname,
CTLTYPE_STRING | CTLFLAG_RW | CTLFLAG_LOCKED,
0, 0, sysctl_domainname, "A", "");
SYSCTL_COMPAT_INT(_kern, KERN_HOSTID, hostid,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&hostid, 0, "");
STATIC int
sysctl_hostname
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
int error, changed;
error = sysctl_io_string(req, hostname, sizeof(hostname), 1, &changed);
if (changed) {
hostnamelen = req->newlen;
}
return(error);
}
SYSCTL_PROC(_kern, KERN_HOSTNAME, hostname,
CTLTYPE_STRING | CTLFLAG_RW | CTLFLAG_LOCKED,
0, 0, sysctl_hostname, "A", "");
STATIC int
sysctl_procname
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
return sysctl_io_string(req, &req->p->p_name[0], (2*MAXCOMLEN+1), 1, NULL);
}
SYSCTL_PROC(_kern, KERN_PROCNAME, procname,
CTLTYPE_STRING | CTLFLAG_RW | CTLFLAG_ANYBODY | CTLFLAG_LOCKED,
0, 0, sysctl_procname, "A", "");
SYSCTL_INT(_kern, KERN_SPECULATIVE_READS, speculative_reads_disabled,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&speculative_reads_disabled, 0, "");
SYSCTL_INT(_kern, OID_AUTO, ignore_is_ssd,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&ignore_is_ssd, 0, "");
SYSCTL_INT(_kern, OID_AUTO, root_is_CF_drive,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&root_is_CF_drive, 0, "");
SYSCTL_UINT(_kern, OID_AUTO, preheat_max_bytes,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&preheat_max_bytes, 0, "");
SYSCTL_UINT(_kern, OID_AUTO, preheat_min_bytes,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&preheat_min_bytes, 0, "");
SYSCTL_UINT(_kern, OID_AUTO, speculative_prefetch_max,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&speculative_prefetch_max, 0, "");
SYSCTL_UINT(_kern, OID_AUTO, speculative_prefetch_max_iosize,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&speculative_prefetch_max_iosize, 0, "");
SYSCTL_UINT(_kern, OID_AUTO, vm_page_free_target,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&vm_page_free_target, 0, "");
SYSCTL_UINT(_kern, OID_AUTO, vm_page_free_min,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&vm_page_free_min, 0, "");
SYSCTL_UINT(_kern, OID_AUTO, vm_page_free_reserved,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&vm_page_free_reserved, 0, "");
SYSCTL_UINT(_kern, OID_AUTO, vm_page_speculative_percentage,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&vm_page_speculative_percentage, 0, "");
SYSCTL_UINT(_kern, OID_AUTO, vm_page_speculative_q_age_ms,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&vm_page_speculative_q_age_ms, 0, "");
SYSCTL_UINT(_kern, OID_AUTO, vm_max_delayed_work_limit,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&vm_max_delayed_work_limit, 0, "");
SYSCTL_UINT(_kern, OID_AUTO, vm_max_batch,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&vm_max_batch, 0, "");
SYSCTL_STRING(_kern, OID_AUTO, bootsessionuuid,
CTLFLAG_RD | CTLFLAG_LOCKED,
&bootsessionuuid_string, sizeof(bootsessionuuid_string) , "");
STATIC int
sysctl_boottime
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
time_t tv_sec = boottime_sec();
struct proc *p = req->p;
if (proc_is64bit(p)) {
struct user64_timeval t;
t.tv_sec = tv_sec;
t.tv_usec = 0;
return sysctl_io_opaque(req, &t, sizeof(t), NULL);
} else {
struct user32_timeval t;
t.tv_sec = tv_sec;
t.tv_usec = 0;
return sysctl_io_opaque(req, &t, sizeof(t), NULL);
}
}
SYSCTL_PROC(_kern, KERN_BOOTTIME, boottime,
CTLTYPE_STRUCT | CTLFLAG_KERN | CTLFLAG_RD | CTLFLAG_LOCKED,
0, 0, sysctl_boottime, "S,timeval", "");
STATIC int
sysctl_symfile
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
char *str;
int error = get_kernel_symfile(req->p, &str);
if (error)
return (error);
return sysctl_io_string(req, str, 0, 0, NULL);
}
SYSCTL_PROC(_kern, KERN_SYMFILE, symfile,
CTLTYPE_STRING | CTLFLAG_RD | CTLFLAG_LOCKED,
0, 0, sysctl_symfile, "A", "");
#if NFSCLIENT
STATIC int
sysctl_netboot
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
return sysctl_io_number(req, netboot_root(), sizeof(int), NULL, NULL);
}
SYSCTL_PROC(_kern, KERN_NETBOOT, netboot,
CTLTYPE_INT | CTLFLAG_RD | CTLFLAG_LOCKED,
0, 0, sysctl_netboot, "I", "");
#endif
#ifdef CONFIG_IMGSRC_ACCESS
STATIC int
sysctl_imgsrcdev
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
vfs_context_t ctx = vfs_context_current();
vnode_t devvp;
int result;
if (!vfs_context_issuser(ctx)) {
return EPERM;
}
if (imgsrc_rootvnodes[0] == NULL) {
return ENOENT;
}
result = vnode_getwithref(imgsrc_rootvnodes[0]);
if (result != 0) {
return result;
}
devvp = vnode_mount(imgsrc_rootvnodes[0])->mnt_devvp;
result = vnode_getwithref(devvp);
if (result != 0) {
goto out;
}
result = sysctl_io_number(req, vnode_specrdev(devvp), sizeof(dev_t), NULL, NULL);
vnode_put(devvp);
out:
vnode_put(imgsrc_rootvnodes[0]);
return result;
}
SYSCTL_PROC(_kern, OID_AUTO, imgsrcdev,
CTLTYPE_INT | CTLFLAG_RD | CTLFLAG_LOCKED,
0, 0, sysctl_imgsrcdev, "I", "");
STATIC int
sysctl_imgsrcinfo
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
int error;
struct imgsrc_info info[MAX_IMAGEBOOT_NESTING];
uint32_t i;
vnode_t rvp, devvp;
if (imgsrc_rootvnodes[0] == NULLVP) {
return ENXIO;
}
for (i = 0; i < MAX_IMAGEBOOT_NESTING; i++) {
rvp = imgsrc_rootvnodes[i];
if (rvp == NULLVP) {
break;
}
error = vnode_get(rvp);
if (error != 0) {
return error;
}
devvp = vnode_mount(rvp)->mnt_devvp;
if (devvp == NULL) {
vnode_put(rvp);
return EINVAL;
}
error = vnode_getwithref(devvp);
if (error != 0) {
vnode_put(rvp);
return error;
}
info[i].ii_dev = vnode_specrdev(devvp);
info[i].ii_flags = 0;
info[i].ii_height = i;
bzero(info[i].ii_reserved, sizeof(info[i].ii_reserved));
vnode_put(devvp);
vnode_put(rvp);
}
return sysctl_io_opaque(req, info, i * sizeof(info[0]), NULL);
}
SYSCTL_PROC(_kern, OID_AUTO, imgsrcinfo,
CTLTYPE_OPAQUE | CTLFLAG_RD | CTLFLAG_LOCKED,
0, 0, sysctl_imgsrcinfo, "I", "");
#endif
SYSCTL_DECL(_kern_timer);
SYSCTL_NODE(_kern, OID_AUTO, timer, CTLFLAG_RW | CTLFLAG_LOCKED, 0, "timer");
SYSCTL_INT(_kern_timer, OID_AUTO, coalescing_enabled,
CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&mach_timer_coalescing_enabled, 0, "");
SYSCTL_QUAD(_kern_timer, OID_AUTO, deadline_tracking_bin_1,
CTLFLAG_RW | CTLFLAG_LOCKED,
&timer_deadline_tracking_bin_1, "");
SYSCTL_QUAD(_kern_timer, OID_AUTO, deadline_tracking_bin_2,
CTLFLAG_RW | CTLFLAG_LOCKED,
&timer_deadline_tracking_bin_2, "");
SYSCTL_DECL(_kern_timer_longterm);
SYSCTL_NODE(_kern_timer, OID_AUTO, longterm, CTLFLAG_RW | CTLFLAG_LOCKED, 0, "longterm");
enum {
THRESHOLD, QCOUNT,
ENQUEUES, DEQUEUES, ESCALATES, SCANS, PREEMPTS,
LATENCY, LATENCY_MIN, LATENCY_MAX
};
extern uint64_t timer_sysctl_get(int);
extern int timer_sysctl_set(int, uint64_t);
STATIC int
sysctl_timer
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
int oid = (int)arg1;
uint64_t value = timer_sysctl_get(oid);
uint64_t new_value;
int error;
int changed;
error = sysctl_io_number(req, value, sizeof(value), &new_value, &changed);
if (changed)
error = timer_sysctl_set(oid, new_value);
return error;
}
SYSCTL_PROC(_kern_timer_longterm, OID_AUTO, threshold,
CTLTYPE_QUAD | CTLFLAG_RW | CTLFLAG_LOCKED,
(void *) THRESHOLD, 0, sysctl_timer, "Q", "");
SYSCTL_PROC(_kern_timer_longterm, OID_AUTO, qlen,
CTLTYPE_QUAD | CTLFLAG_RD | CTLFLAG_LOCKED,
(void *) QCOUNT, 0, sysctl_timer, "Q", "");
#if DEBUG
SYSCTL_PROC(_kern_timer_longterm, OID_AUTO, enqueues,
CTLTYPE_QUAD | CTLFLAG_RD | CTLFLAG_LOCKED,
(void *) ENQUEUES, 0, sysctl_timer, "Q", "");
SYSCTL_PROC(_kern_timer_longterm, OID_AUTO, dequeues,
CTLTYPE_QUAD | CTLFLAG_RD | CTLFLAG_LOCKED,
(void *) DEQUEUES, 0, sysctl_timer, "Q", "");
SYSCTL_PROC(_kern_timer_longterm, OID_AUTO, escalates,
CTLTYPE_QUAD | CTLFLAG_RD | CTLFLAG_LOCKED,
(void *) ESCALATES, 0, sysctl_timer, "Q", "");
SYSCTL_PROC(_kern_timer_longterm, OID_AUTO, scans,
CTLTYPE_QUAD | CTLFLAG_RD | CTLFLAG_LOCKED,
(void *) SCANS, 0, sysctl_timer, "Q", "");
SYSCTL_PROC(_kern_timer_longterm, OID_AUTO, preempts,
CTLTYPE_QUAD | CTLFLAG_RD | CTLFLAG_LOCKED,
(void *) PREEMPTS, 0, sysctl_timer, "Q", "");
SYSCTL_PROC(_kern_timer_longterm, OID_AUTO, latency,
CTLTYPE_QUAD | CTLFLAG_RD | CTLFLAG_LOCKED,
(void *) LATENCY, 0, sysctl_timer, "Q", "");
SYSCTL_PROC(_kern_timer_longterm, OID_AUTO, latency_min,
CTLTYPE_QUAD | CTLFLAG_RD | CTLFLAG_LOCKED,
(void *) LATENCY_MIN, 0, sysctl_timer, "Q", "");
SYSCTL_PROC(_kern_timer_longterm, OID_AUTO, latency_max,
CTLTYPE_QUAD | CTLFLAG_RD | CTLFLAG_LOCKED,
(void *) LATENCY_MAX, 0, sysctl_timer, "Q", "");
#endif
STATIC int
sysctl_usrstack
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
return sysctl_io_number(req, (int)req->p->user_stack, sizeof(int), NULL, NULL);
}
SYSCTL_PROC(_kern, KERN_USRSTACK32, usrstack,
CTLTYPE_INT | CTLFLAG_RD | CTLFLAG_LOCKED,
0, 0, sysctl_usrstack, "I", "");
STATIC int
sysctl_usrstack64
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
return sysctl_io_number(req, req->p->user_stack, sizeof(req->p->user_stack), NULL, NULL);
}
SYSCTL_PROC(_kern, KERN_USRSTACK64, usrstack64,
CTLTYPE_QUAD | CTLFLAG_RD | CTLFLAG_LOCKED,
0, 0, sysctl_usrstack64, "Q", "");
SYSCTL_STRING(_kern, KERN_COREFILE, corefile,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
corefilename, sizeof(corefilename), "");
STATIC int
sysctl_coredump
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
#ifdef SECURE_KERNEL
(void)req;
return (ENOTSUP);
#else
int new_value, changed;
int error = sysctl_io_number(req, do_coredump, sizeof(int), &new_value, &changed);
if (changed) {
if ((new_value == 0) || (new_value == 1))
do_coredump = new_value;
else
error = EINVAL;
}
return(error);
#endif
}
SYSCTL_PROC(_kern, KERN_COREDUMP, coredump,
CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_LOCKED,
0, 0, sysctl_coredump, "I", "");
STATIC int
sysctl_suid_coredump
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
#ifdef SECURE_KERNEL
(void)req;
return (ENOTSUP);
#else
int new_value, changed;
int error = sysctl_io_number(req, sugid_coredump, sizeof(int), &new_value, &changed);
if (changed) {
if ((new_value == 0) || (new_value == 1))
sugid_coredump = new_value;
else
error = EINVAL;
}
return(error);
#endif
}
SYSCTL_PROC(_kern, KERN_SUGID_COREDUMP, sugid_coredump,
CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_LOCKED,
0, 0, sysctl_suid_coredump, "I", "");
STATIC int
sysctl_delayterm
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
struct proc *p = req->p;
int new_value, changed;
int error = sysctl_io_number(req, (req->p->p_lflag & P_LDELAYTERM)? 1: 0, sizeof(int), &new_value, &changed);
if (changed) {
proc_lock(p);
if (new_value)
req->p->p_lflag |= P_LDELAYTERM;
else
req->p->p_lflag &= ~P_LDELAYTERM;
proc_unlock(p);
}
return(error);
}
SYSCTL_PROC(_kern, KERN_PROCDELAYTERM, delayterm,
CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_LOCKED,
0, 0, sysctl_delayterm, "I", "");
STATIC int
sysctl_rage_vnode
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
struct proc *p = req->p;
struct uthread *ut;
int new_value, old_value, changed;
int error;
ut = get_bsdthread_info(current_thread());
if (ut->uu_flag & UT_RAGE_VNODES)
old_value = KERN_RAGE_THREAD;
else if (p->p_lflag & P_LRAGE_VNODES)
old_value = KERN_RAGE_PROC;
else
old_value = 0;
error = sysctl_io_number(req, old_value, sizeof(int), &new_value, &changed);
if (error == 0) {
switch (new_value) {
case KERN_RAGE_PROC:
proc_lock(p);
p->p_lflag |= P_LRAGE_VNODES;
proc_unlock(p);
break;
case KERN_UNRAGE_PROC:
proc_lock(p);
p->p_lflag &= ~P_LRAGE_VNODES;
proc_unlock(p);
break;
case KERN_RAGE_THREAD:
ut->uu_flag |= UT_RAGE_VNODES;
break;
case KERN_UNRAGE_THREAD:
ut = get_bsdthread_info(current_thread());
ut->uu_flag &= ~UT_RAGE_VNODES;
break;
}
}
return(error);
}
SYSCTL_PROC(_kern, KERN_RAGEVNODE, rage_vnode,
CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_ANYBODY | CTLFLAG_LOCKED,
0, 0, sysctl_rage_vnode, "I", "");
STATIC int
sysctl_setthread_cpupercent
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
int new_value, old_value;
int error = 0;
kern_return_t kret = KERN_SUCCESS;
uint8_t percent = 0;
int ms_refill = 0;
if (!req->newptr)
return (0);
old_value = 0;
if ((error = sysctl_io_number(req, old_value, sizeof(old_value), &new_value, NULL)) != 0)
return (error);
percent = new_value & 0xff;
ms_refill = (new_value >> 8) & 0xffffff;
if (percent > 100)
return (EINVAL);
if ((kret = thread_set_cpulimit(THREAD_CPULIMIT_BLOCK, percent, ms_refill * (int)NSEC_PER_MSEC)) != 0)
return (EIO);
return (0);
}
SYSCTL_PROC(_kern, OID_AUTO, setthread_cpupercent,
CTLTYPE_INT | CTLFLAG_WR | CTLFLAG_ANYBODY,
0, 0, sysctl_setthread_cpupercent, "I", "set thread cpu percentage limit");
STATIC int
sysctl_kern_check_openevt
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
struct proc *p = req->p;
int new_value, old_value, changed;
int error;
if (p->p_flag & P_CHECKOPENEVT) {
old_value = KERN_OPENEVT_PROC;
} else {
old_value = 0;
}
error = sysctl_io_number(req, old_value, sizeof(int), &new_value, &changed);
if (error == 0) {
switch (new_value) {
case KERN_OPENEVT_PROC:
OSBitOrAtomic(P_CHECKOPENEVT, &p->p_flag);
break;
case KERN_UNOPENEVT_PROC:
OSBitAndAtomic(~((uint32_t)P_CHECKOPENEVT), &p->p_flag);
break;
default:
error = EINVAL;
}
}
return(error);
}
SYSCTL_PROC(_kern, KERN_CHECKOPENEVT, check_openevt, CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_ANYBODY | CTLFLAG_LOCKED,
0, 0, sysctl_kern_check_openevt, "I", "set the per-process check-open-evt flag");
STATIC int
sysctl_nx
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
#ifdef SECURE_KERNEL
(void)req;
return ENOTSUP;
#else
int new_value, changed;
int error;
error = sysctl_io_number(req, nx_enabled, sizeof(nx_enabled), &new_value, &changed);
if (error)
return error;
if (changed) {
#if defined(__i386__) || defined(__x86_64__)
if (!(cpuid_extfeatures() & CPUID_EXTFEATURE_XD))
return ENOTSUP;
#endif
nx_enabled = new_value;
}
return(error);
#endif
}
SYSCTL_PROC(_kern, KERN_NX_PROTECTION, nx,
CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
0, 0, sysctl_nx, "I", "");
STATIC int
sysctl_loadavg
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
if (proc_is64bit(req->p)) {
struct user64_loadavg loadinfo64;
fill_loadavg64(&averunnable, &loadinfo64);
return sysctl_io_opaque(req, &loadinfo64, sizeof(loadinfo64), NULL);
} else {
struct user32_loadavg loadinfo32;
fill_loadavg32(&averunnable, &loadinfo32);
return sysctl_io_opaque(req, &loadinfo32, sizeof(loadinfo32), NULL);
}
}
SYSCTL_PROC(_vm, VM_LOADAVG, loadavg,
CTLTYPE_STRUCT | CTLFLAG_RD | CTLFLAG_LOCKED,
0, 0, sysctl_loadavg, "S,loadavg", "");
STATIC int
sysctl_vm_toggle_address_reuse(__unused struct sysctl_oid *oidp, __unused void *arg1,
__unused int arg2, struct sysctl_req *req)
{
int old_value=0, new_value=0, error=0;
if(vm_toggle_entry_reuse( VM_TOGGLE_GETVALUE, &old_value ))
return(error);
error = sysctl_io_number(req, old_value, sizeof(int), &new_value, NULL);
if (!error) {
return (vm_toggle_entry_reuse(new_value, NULL));
}
return(error);
}
SYSCTL_PROC(_debug, OID_AUTO, toggle_address_reuse, CTLFLAG_ANYBODY | CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_LOCKED, 0, 0, sysctl_vm_toggle_address_reuse,"I","");
STATIC int
sysctl_swapusage
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
int error;
uint64_t swap_total;
uint64_t swap_avail;
vm_size_t swap_pagesize;
boolean_t swap_encrypted;
struct xsw_usage xsu;
error = macx_swapinfo(&swap_total,
&swap_avail,
&swap_pagesize,
&swap_encrypted);
if (error)
return error;
xsu.xsu_total = swap_total;
xsu.xsu_avail = swap_avail;
xsu.xsu_used = swap_total - swap_avail;
xsu.xsu_pagesize = swap_pagesize;
xsu.xsu_encrypted = swap_encrypted;
return sysctl_io_opaque(req, &xsu, sizeof(xsu), NULL);
}
SYSCTL_PROC(_vm, VM_SWAPUSAGE, swapusage,
CTLTYPE_STRUCT | CTLFLAG_RD | CTLFLAG_LOCKED,
0, 0, sysctl_swapusage, "S,xsw_usage", "");
#if CONFIG_FREEZE
extern void vm_page_reactivate_all_throttled(void);
static int
sysctl_freeze_enabled SYSCTL_HANDLER_ARGS
{
#pragma unused(arg1, arg2)
int error, val = memorystatus_freeze_enabled ? 1 : 0;
boolean_t disabled;
error = sysctl_handle_int(oidp, &val, 0, req);
if (error || !req->newptr)
return (error);
if (COMPRESSED_PAGER_IS_ACTIVE || DEFAULT_FREEZER_COMPRESSED_PAGER_IS_ACTIVE) {
printf("Failed attempt to set vm.freeze_enabled sysctl\n");
return EINVAL;
}
disabled = (!val && memorystatus_freeze_enabled);
memorystatus_freeze_enabled = val ? TRUE : FALSE;
if (disabled) {
vm_page_reactivate_all_throttled();
}
return (0);
}
SYSCTL_PROC(_vm, OID_AUTO, freeze_enabled, CTLTYPE_INT|CTLFLAG_RW, &memorystatus_freeze_enabled, 0, sysctl_freeze_enabled, "I", "");
#endif
SYSCTL_INT(_kern, KERN_SHREG_PRIVATIZABLE, shreg_private,
CTLFLAG_RD | CTLFLAG_LOCKED,
(int *)NULL, 0, "");
STATIC int
fetch_process_cputype(
proc_t cur_proc,
int *name,
u_int namelen,
cpu_type_t *cputype)
{
proc_t p = PROC_NULL;
int refheld = 0;
cpu_type_t ret = 0;
int error = 0;
if (namelen == 0)
p = cur_proc;
else if (namelen == 1) {
p = proc_find(name[0]);
if (p == NULL)
return (EINVAL);
refheld = 1;
} else {
error = EINVAL;
goto out;
}
ret = cpu_type() & ~CPU_ARCH_MASK;
if (IS_64BIT_PROCESS(p))
ret |= CPU_ARCH_ABI64;
*cputype = ret;
if (refheld != 0)
proc_rele(p);
out:
return (error);
}
STATIC int
sysctl_sysctl_native(__unused struct sysctl_oid *oidp, void *arg1, int arg2,
struct sysctl_req *req)
{
int error;
cpu_type_t proc_cputype = 0;
if ((error = fetch_process_cputype(req->p, (int *)arg1, arg2, &proc_cputype)) != 0)
return error;
int res = 1;
if ((proc_cputype & ~CPU_ARCH_MASK) != (cpu_type() & ~CPU_ARCH_MASK))
res = 0;
return SYSCTL_OUT(req, &res, sizeof(res));
}
SYSCTL_PROC(_sysctl, OID_AUTO, proc_native, CTLTYPE_NODE|CTLFLAG_RD | CTLFLAG_LOCKED, 0, 0, sysctl_sysctl_native ,"I","proc_native");
STATIC int
sysctl_sysctl_cputype(__unused struct sysctl_oid *oidp, void *arg1, int arg2,
struct sysctl_req *req)
{
int error;
cpu_type_t proc_cputype = 0;
if ((error = fetch_process_cputype(req->p, (int *)arg1, arg2, &proc_cputype)) != 0)
return error;
return SYSCTL_OUT(req, &proc_cputype, sizeof(proc_cputype));
}
SYSCTL_PROC(_sysctl, OID_AUTO, proc_cputype, CTLTYPE_NODE|CTLFLAG_RD | CTLFLAG_LOCKED, 0, 0, sysctl_sysctl_cputype ,"I","proc_cputype");
STATIC int
sysctl_safeboot
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
return sysctl_io_number(req, boothowto & RB_SAFEBOOT ? 1 : 0, sizeof(int), NULL, NULL);
}
SYSCTL_PROC(_kern, KERN_SAFEBOOT, safeboot,
CTLTYPE_INT | CTLFLAG_RD | CTLFLAG_LOCKED,
0, 0, sysctl_safeboot, "I", "");
STATIC int
sysctl_singleuser
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
return sysctl_io_number(req, boothowto & RB_SINGLE ? 1 : 0, sizeof(int), NULL, NULL);
}
SYSCTL_PROC(_kern, OID_AUTO, singleuser,
CTLTYPE_INT | CTLFLAG_RD | CTLFLAG_LOCKED,
0, 0, sysctl_singleuser, "I", "");
STATIC int sysctl_minimalboot
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
return sysctl_io_number(req, minimalboot, sizeof(int), NULL, NULL);
}
SYSCTL_PROC(_kern, OID_AUTO, minimalboot,
CTLTYPE_INT | CTLFLAG_RD | CTLFLAG_LOCKED,
0, 0, sysctl_minimalboot, "I", "");
extern boolean_t affinity_sets_enabled;
extern int affinity_sets_mapping;
SYSCTL_INT (_kern, OID_AUTO, affinity_sets_enabled,
CTLFLAG_RW | CTLFLAG_LOCKED, (int *) &affinity_sets_enabled, 0, "hinting enabled");
SYSCTL_INT (_kern, OID_AUTO, affinity_sets_mapping,
CTLFLAG_RW | CTLFLAG_LOCKED, &affinity_sets_mapping, 0, "mapping policy");
STATIC int
sysctl_slide
(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req)
{
uint32_t slide;
slide = vm_kernel_slide ? 1 : 0;
return sysctl_io_number( req, slide, sizeof(int), NULL, NULL);
}
SYSCTL_PROC(_kern, OID_AUTO, slide,
CTLTYPE_INT | CTLFLAG_RD | CTLFLAG_LOCKED,
0, 0, sysctl_slide, "I", "");
vm_map_size_t vm_global_no_user_wire_amount;
vm_map_size_t vm_global_user_wire_limit;
vm_map_size_t vm_user_wire_limit;
SYSCTL_QUAD(_vm, OID_AUTO, global_no_user_wire_amount, CTLFLAG_RW | CTLFLAG_LOCKED, &vm_global_no_user_wire_amount, "");
SYSCTL_QUAD(_vm, OID_AUTO, global_user_wire_limit, CTLFLAG_RW | CTLFLAG_LOCKED, &vm_global_user_wire_limit, "");
SYSCTL_QUAD(_vm, OID_AUTO, user_wire_limit, CTLFLAG_RW | CTLFLAG_LOCKED, &vm_user_wire_limit, "");
extern int vm_map_copy_overwrite_aligned_src_not_internal;
extern int vm_map_copy_overwrite_aligned_src_not_symmetric;
extern int vm_map_copy_overwrite_aligned_src_large;
SYSCTL_INT(_vm, OID_AUTO, vm_copy_src_not_internal, CTLFLAG_RD | CTLFLAG_LOCKED, &vm_map_copy_overwrite_aligned_src_not_internal, 0, "");
SYSCTL_INT(_vm, OID_AUTO, vm_copy_src_not_symmetric, CTLFLAG_RD | CTLFLAG_LOCKED, &vm_map_copy_overwrite_aligned_src_not_symmetric, 0, "");
SYSCTL_INT(_vm, OID_AUTO, vm_copy_src_large, CTLFLAG_RD | CTLFLAG_LOCKED, &vm_map_copy_overwrite_aligned_src_large, 0, "");
extern uint32_t vm_page_external_count;
extern uint32_t vm_page_filecache_min;
SYSCTL_INT(_vm, OID_AUTO, vm_page_external_count, CTLFLAG_RD | CTLFLAG_LOCKED, &vm_page_external_count, 0, "");
SYSCTL_INT(_vm, OID_AUTO, vm_page_filecache_min, CTLFLAG_RW | CTLFLAG_LOCKED, &vm_page_filecache_min, 0, "");
extern int vm_compressor_mode;
extern int vm_compressor_is_active;
extern int vm_compressor_available;
extern uint32_t vm_ripe_target_age;
extern uint32_t swapout_target_age;
extern int64_t compressor_bytes_used;
extern int64_t c_segment_input_bytes;
extern int64_t c_segment_compressed_bytes;
extern uint32_t compressor_eval_period_in_msecs;
extern uint32_t compressor_sample_min_in_msecs;
extern uint32_t compressor_sample_max_in_msecs;
extern uint32_t compressor_thrashing_threshold_per_10msecs;
extern uint32_t compressor_thrashing_min_per_10msecs;
extern uint32_t vm_compressor_minorcompact_threshold_divisor;
extern uint32_t vm_compressor_majorcompact_threshold_divisor;
extern uint32_t vm_compressor_unthrottle_threshold_divisor;
extern uint32_t vm_compressor_catchup_threshold_divisor;
SYSCTL_QUAD(_vm, OID_AUTO, compressor_input_bytes, CTLFLAG_RD | CTLFLAG_LOCKED, &c_segment_input_bytes, "");
SYSCTL_QUAD(_vm, OID_AUTO, compressor_compressed_bytes, CTLFLAG_RD | CTLFLAG_LOCKED, &c_segment_compressed_bytes, "");
SYSCTL_QUAD(_vm, OID_AUTO, compressor_bytes_used, CTLFLAG_RD | CTLFLAG_LOCKED, &compressor_bytes_used, "");
SYSCTL_INT(_vm, OID_AUTO, compressor_mode, CTLFLAG_RD | CTLFLAG_LOCKED, &vm_compressor_mode, 0, "");
SYSCTL_INT(_vm, OID_AUTO, compressor_is_active, CTLFLAG_RD | CTLFLAG_LOCKED, &vm_compressor_is_active, 0, "");
SYSCTL_INT(_vm, OID_AUTO, compressor_swapout_target_age, CTLFLAG_RD | CTLFLAG_LOCKED, &swapout_target_age, 0, "");
SYSCTL_INT(_vm, OID_AUTO, compressor_available, CTLFLAG_RD | CTLFLAG_LOCKED, &vm_compressor_available, 0, "");
SYSCTL_INT(_vm, OID_AUTO, vm_ripe_target_age_in_secs, CTLFLAG_RW | CTLFLAG_LOCKED, &vm_ripe_target_age, 0, "");
SYSCTL_INT(_vm, OID_AUTO, compressor_eval_period_in_msecs, CTLFLAG_RW | CTLFLAG_LOCKED, &compressor_eval_period_in_msecs, 0, "");
SYSCTL_INT(_vm, OID_AUTO, compressor_sample_min_in_msecs, CTLFLAG_RW | CTLFLAG_LOCKED, &compressor_sample_min_in_msecs, 0, "");
SYSCTL_INT(_vm, OID_AUTO, compressor_sample_max_in_msecs, CTLFLAG_RW | CTLFLAG_LOCKED, &compressor_sample_max_in_msecs, 0, "");
SYSCTL_INT(_vm, OID_AUTO, compressor_thrashing_threshold_per_10msecs, CTLFLAG_RW | CTLFLAG_LOCKED, &compressor_thrashing_threshold_per_10msecs, 0, "");
SYSCTL_INT(_vm, OID_AUTO, compressor_thrashing_min_per_10msecs, CTLFLAG_RW | CTLFLAG_LOCKED, &compressor_thrashing_min_per_10msecs, 0, "");
SYSCTL_INT(_vm, OID_AUTO, compressor_minorcompact_threshold_divisor, CTLFLAG_RW | CTLFLAG_LOCKED, &vm_compressor_minorcompact_threshold_divisor, 0, "");
SYSCTL_INT(_vm, OID_AUTO, compressor_majorcompact_threshold_divisor, CTLFLAG_RW | CTLFLAG_LOCKED, &vm_compressor_majorcompact_threshold_divisor, 0, "");
SYSCTL_INT(_vm, OID_AUTO, compressor_unthrottle_threshold_divisor, CTLFLAG_RW | CTLFLAG_LOCKED, &vm_compressor_unthrottle_threshold_divisor, 0, "");
SYSCTL_INT(_vm, OID_AUTO, compressor_catchup_threshold_divisor, CTLFLAG_RW | CTLFLAG_LOCKED, &vm_compressor_catchup_threshold_divisor, 0, "");
SYSCTL_STRING(_vm, OID_AUTO, swapfileprefix, CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED, swapfilename, sizeof(swapfilename) - SWAPFILENAME_INDEX_LEN, "");
#if CONFIG_PHANTOM_CACHE
extern uint32_t phantom_cache_thrashing_threshold;
extern uint32_t phantom_cache_eval_period_in_msecs;
extern uint32_t phantom_cache_thrashing_threshold_ssd;
SYSCTL_INT(_vm, OID_AUTO, phantom_cache_eval_period_in_msecs, CTLFLAG_RW | CTLFLAG_LOCKED, &phantom_cache_eval_period_in_msecs, 0, "");
SYSCTL_INT(_vm, OID_AUTO, phantom_cache_thrashing_threshold, CTLFLAG_RW | CTLFLAG_LOCKED, &phantom_cache_thrashing_threshold, 0, "");
SYSCTL_INT(_vm, OID_AUTO, phantom_cache_thrashing_threshold_ssd, CTLFLAG_RW | CTLFLAG_LOCKED, &phantom_cache_thrashing_threshold_ssd, 0, "");
#endif
#if (DEVELOPMENT || DEBUG)
SYSCTL_UINT(_vm, OID_AUTO, vm_page_creation_throttled_hard,
CTLFLAG_RD | CTLFLAG_KERN | CTLFLAG_LOCKED,
&vm_page_creation_throttled_hard, 0, "");
SYSCTL_UINT(_vm, OID_AUTO, vm_page_creation_throttled_soft,
CTLFLAG_RD | CTLFLAG_KERN | CTLFLAG_LOCKED,
&vm_page_creation_throttled_soft, 0, "");
#endif
extern uint32_t ipc_voucher_trace_contents;
SYSCTL_INT (_kern, OID_AUTO, ipc_voucher_trace_contents,
CTLFLAG_RW | CTLFLAG_LOCKED, &ipc_voucher_trace_contents, 0, "Enable tracing voucher contents");
SYSCTL_INT (_kern, OID_AUTO, stack_size,
CTLFLAG_RD | CTLFLAG_LOCKED, (int *) &kernel_stack_size, 0, "Kernel stack size");
SYSCTL_INT (_kern, OID_AUTO, stack_depth_max,
CTLFLAG_RD | CTLFLAG_LOCKED, (int *) &kernel_stack_depth_max, 0, "Max kernel stack depth at interrupt or context switch");
extern int ipc_portbt;
SYSCTL_INT(_kern, OID_AUTO, ipc_portbt,
CTLFLAG_RW | CTLFLAG_KERN | CTLFLAG_LOCKED,
&ipc_portbt, 0, "");
SYSCTL_STRING(_kern, OID_AUTO, sched,
CTLFLAG_RD | CTLFLAG_KERN | CTLFLAG_LOCKED,
sched_string, sizeof(sched_string),
"Timeshare scheduler implementation");
STATIC int
sysctl_timer_user_us_kernel_abstime SYSCTL_HANDLER_ARGS
{
#pragma unused(oidp)
int size = arg2;
int error;
int changed = 0;
uint64_t old_value_ns;
uint64_t new_value_ns;
uint64_t value_abstime;
if (size == sizeof(uint32_t))
value_abstime = *((uint32_t *)arg1);
else if (size == sizeof(uint64_t))
value_abstime = *((uint64_t *)arg1);
else return ENOTSUP;
absolutetime_to_nanoseconds(value_abstime, &old_value_ns);
error = sysctl_io_number(req, old_value_ns, sizeof(old_value_ns), &new_value_ns, &changed);
if ((error) || (!changed))
return error;
nanoseconds_to_absolutetime(new_value_ns, &value_abstime);
if (size == sizeof(uint32_t))
*((uint32_t *)arg1) = (uint32_t)value_abstime;
else
*((uint64_t *)arg1) = value_abstime;
return error;
}
SYSCTL_INT(_kern, OID_AUTO, timer_coalesce_bg_scale,
CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.timer_coalesce_bg_shift, 0, "");
SYSCTL_PROC(_kern, OID_AUTO, timer_resort_threshold_ns,
CTLTYPE_QUAD | CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.timer_resort_threshold_abstime,
sizeof(tcoal_prio_params.timer_resort_threshold_abstime),
sysctl_timer_user_us_kernel_abstime,
"Q", "");
SYSCTL_PROC(_kern, OID_AUTO, timer_coalesce_bg_ns_max,
CTLTYPE_QUAD | CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.timer_coalesce_bg_abstime_max,
sizeof(tcoal_prio_params.timer_coalesce_bg_abstime_max),
sysctl_timer_user_us_kernel_abstime,
"Q", "");
SYSCTL_INT(_kern, OID_AUTO, timer_coalesce_kt_scale,
CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.timer_coalesce_kt_shift, 0, "");
SYSCTL_PROC(_kern, OID_AUTO, timer_coalesce_kt_ns_max,
CTLTYPE_QUAD | CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.timer_coalesce_kt_abstime_max,
sizeof(tcoal_prio_params.timer_coalesce_kt_abstime_max),
sysctl_timer_user_us_kernel_abstime,
"Q", "");
SYSCTL_INT(_kern, OID_AUTO, timer_coalesce_fp_scale,
CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.timer_coalesce_fp_shift, 0, "");
SYSCTL_PROC(_kern, OID_AUTO, timer_coalesce_fp_ns_max,
CTLTYPE_QUAD | CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.timer_coalesce_fp_abstime_max,
sizeof(tcoal_prio_params.timer_coalesce_fp_abstime_max),
sysctl_timer_user_us_kernel_abstime,
"Q", "");
SYSCTL_INT(_kern, OID_AUTO, timer_coalesce_ts_scale,
CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.timer_coalesce_ts_shift, 0, "");
SYSCTL_PROC(_kern, OID_AUTO, timer_coalesce_ts_ns_max,
CTLTYPE_QUAD | CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.timer_coalesce_ts_abstime_max,
sizeof(tcoal_prio_params.timer_coalesce_ts_abstime_max),
sysctl_timer_user_us_kernel_abstime,
"Q", "");
SYSCTL_INT(_kern, OID_AUTO, timer_coalesce_tier0_scale,
CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.latency_qos_scale[0], 0, "");
SYSCTL_PROC(_kern, OID_AUTO, timer_coalesce_tier0_ns_max,
CTLTYPE_QUAD | CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.latency_qos_abstime_max[0],
sizeof(tcoal_prio_params.latency_qos_abstime_max[0]),
sysctl_timer_user_us_kernel_abstime,
"Q", "");
SYSCTL_INT(_kern, OID_AUTO, timer_coalesce_tier1_scale,
CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.latency_qos_scale[1], 0, "");
SYSCTL_PROC(_kern, OID_AUTO, timer_coalesce_tier1_ns_max,
CTLTYPE_QUAD | CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.latency_qos_abstime_max[1],
sizeof(tcoal_prio_params.latency_qos_abstime_max[1]),
sysctl_timer_user_us_kernel_abstime,
"Q", "");
SYSCTL_INT(_kern, OID_AUTO, timer_coalesce_tier2_scale,
CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.latency_qos_scale[2], 0, "");
SYSCTL_PROC(_kern, OID_AUTO, timer_coalesce_tier2_ns_max,
CTLTYPE_QUAD | CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.latency_qos_abstime_max[2],
sizeof(tcoal_prio_params.latency_qos_abstime_max[2]),
sysctl_timer_user_us_kernel_abstime,
"Q", "");
SYSCTL_INT(_kern, OID_AUTO, timer_coalesce_tier3_scale,
CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.latency_qos_scale[3], 0, "");
SYSCTL_PROC(_kern, OID_AUTO, timer_coalesce_tier3_ns_max,
CTLTYPE_QUAD | CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.latency_qos_abstime_max[3],
sizeof(tcoal_prio_params.latency_qos_abstime_max[3]),
sysctl_timer_user_us_kernel_abstime,
"Q", "");
SYSCTL_INT(_kern, OID_AUTO, timer_coalesce_tier4_scale,
CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.latency_qos_scale[4], 0, "");
SYSCTL_PROC(_kern, OID_AUTO, timer_coalesce_tier4_ns_max,
CTLTYPE_QUAD | CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.latency_qos_abstime_max[4],
sizeof(tcoal_prio_params.latency_qos_abstime_max[4]),
sysctl_timer_user_us_kernel_abstime,
"Q", "");
SYSCTL_INT(_kern, OID_AUTO, timer_coalesce_tier5_scale,
CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.latency_qos_scale[5], 0, "");
SYSCTL_PROC(_kern, OID_AUTO, timer_coalesce_tier5_ns_max,
CTLTYPE_QUAD | CTLFLAG_KERN | CTLFLAG_RW | CTLFLAG_LOCKED,
&tcoal_prio_params.latency_qos_abstime_max[5],
sizeof(tcoal_prio_params.latency_qos_abstime_max[5]),
sysctl_timer_user_us_kernel_abstime,
"Q", "");
static int
timer_user_idle_level(__unused struct sysctl_oid *oidp, __unused void *arg1, __unused int arg2, struct sysctl_req *req) {
int new_value = 0, old_value = 0, changed = 0, error;
old_value = timer_get_user_idle_level();
error = sysctl_io_number(req, old_value, sizeof(int), &new_value, &changed);
if (error == 0 && changed) {
if (timer_set_user_idle_level(new_value) != KERN_SUCCESS)
error = ERANGE;
}
return error;
}
SYSCTL_PROC(_machdep, OID_AUTO, user_idle_level,
CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_LOCKED,
0, 0,
timer_user_idle_level, "I", "User idle level heuristic, 0-128");
#if HYPERVISOR
SYSCTL_INT(_kern, OID_AUTO, hv_support,
CTLFLAG_KERN | CTLFLAG_RD | CTLFLAG_LOCKED,
&hv_support_available, 0, "");
#endif