2009-01-26 18:43:59 +01:00
|
|
|
/* The kernel call implemented in this file:
|
|
|
|
* m_type: SYS_SYSCTL
|
|
|
|
*
|
|
|
|
* The parameters for this kernel call are:
|
|
|
|
* SYSCTL_CODE request
|
|
|
|
* and then request-specific arguments in SYSCTL_ARG1 and SYSCTL_ARG2.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "../system.h"
|
|
|
|
|
|
|
|
|
|
|
|
/*===========================================================================*
|
|
|
|
* do_sysctl *
|
|
|
|
*===========================================================================*/
|
2010-02-03 10:04:48 +01:00
|
|
|
PUBLIC int do_sysctl(struct proc * caller, message * m_ptr)
|
2009-01-26 18:43:59 +01:00
|
|
|
{
|
|
|
|
vir_bytes len, buf;
|
|
|
|
static char mybuf[DIAG_BUFSIZE];
|
2009-01-27 13:54:33 +01:00
|
|
|
int s, i, proc_nr;
|
2009-01-26 18:43:59 +01:00
|
|
|
|
|
|
|
switch (m_ptr->SYSCTL_CODE) {
|
|
|
|
case SYSCTL_CODE_DIAG:
|
|
|
|
buf = (vir_bytes) m_ptr->SYSCTL_ARG1;
|
|
|
|
len = (vir_bytes) m_ptr->SYSCTL_ARG2;
|
|
|
|
if(len < 1 || len > DIAG_BUFSIZE) {
|
|
|
|
kprintf("do_sysctl: diag for %d: len %d out of range\n",
|
|
|
|
caller->p_endpoint, len);
|
|
|
|
return EINVAL;
|
|
|
|
}
|
2010-02-03 10:04:48 +01:00
|
|
|
if((s=data_copy_vmcheck(caller, caller->p_endpoint, buf, SYSTEM,
|
|
|
|
(vir_bytes) mybuf, len)) != OK) {
|
2009-01-26 18:43:59 +01:00
|
|
|
kprintf("do_sysctl: diag for %d: len %d: copy failed: %d\n",
|
|
|
|
caller->p_endpoint, len, s);
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
for(i = 0; i < len; i++)
|
|
|
|
kputc(mybuf[i]);
|
|
|
|
kputc(END_OF_KMESS);
|
|
|
|
return OK;
|
2009-01-27 13:54:33 +01:00
|
|
|
case SYSCTL_CODE_STACKTRACE:
|
|
|
|
if(!isokendpt(m_ptr->SYSCTL_ARG2, &proc_nr))
|
|
|
|
return EINVAL;
|
|
|
|
proc_stacktrace(proc_addr(proc_nr));
|
|
|
|
return OK;
|
2009-01-26 18:43:59 +01:00
|
|
|
default:
|
|
|
|
kprintf("do_sysctl: invalid request %d\n", m_ptr->SYSCTL_CODE);
|
|
|
|
return(EINVAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
minix_panic("do_sysctl: can't happen", NO_NUM);
|
|
|
|
|
|
|
|
return(OK);
|
|
|
|
}
|
|
|
|
|