kern_mib.c revision 116090
115103Sphk/*- 215103Sphk * Copyright (c) 1982, 1986, 1989, 1993 315103Sphk * The Regents of the University of California. All rights reserved. 415103Sphk * 515103Sphk * This code is derived from software contributed to Berkeley by 615103Sphk * Mike Karels at Berkeley Software Design, Inc. 715103Sphk * 815103Sphk * Quite extensively rewritten by Poul-Henning Kamp of the FreeBSD 915103Sphk * project, to make these variables more userfriendly. 1015103Sphk * 1115103Sphk * Redistribution and use in source and binary forms, with or without 1215103Sphk * modification, are permitted provided that the following conditions 1315103Sphk * are met: 1415103Sphk * 1. Redistributions of source code must retain the above copyright 1515103Sphk * notice, this list of conditions and the following disclaimer. 1615103Sphk * 2. Redistributions in binary form must reproduce the above copyright 1715103Sphk * notice, this list of conditions and the following disclaimer in the 1815103Sphk * documentation and/or other materials provided with the distribution. 1915103Sphk * 3. All advertising materials mentioning features or use of this software 2015103Sphk * must display the following acknowledgement: 2115103Sphk * This product includes software developed by the University of 2215103Sphk * California, Berkeley and its contributors. 2315103Sphk * 4. Neither the name of the University nor the names of its contributors 2415103Sphk * may be used to endorse or promote products derived from this software 2515103Sphk * without specific prior written permission. 2615103Sphk * 2715103Sphk * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 2815103Sphk * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 2915103Sphk * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 3015103Sphk * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 3115103Sphk * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 3215103Sphk * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 3315103Sphk * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 3415103Sphk * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 3515103Sphk * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 3615103Sphk * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 3715103Sphk * SUCH DAMAGE. 3815103Sphk * 3915103Sphk * @(#)kern_sysctl.c 8.4 (Berkeley) 4/14/94 4050477Speter * $FreeBSD: head/sys/kern/kern_mib.c 116090 2003-06-09 10:54:23Z jmallett $ 4115103Sphk */ 4215103Sphk 4386190Srwatson#include "opt_posix.h" 4484611Srwatson 4515103Sphk#include <sys/param.h> 4615103Sphk#include <sys/kernel.h> 4715103Sphk#include <sys/systm.h> 4815103Sphk#include <sys/sysctl.h> 4915103Sphk#include <sys/proc.h> 5087275Srwatson#include <sys/lock.h> 5187275Srwatson#include <sys/mutex.h> 5246155Sphk#include <sys/jail.h> 5376078Sjhb#include <sys/smp.h> 54105046Smike#include <sys/unistd.h> 5528918Skato 5615103SphkSYSCTL_NODE(, 0, sysctl, CTLFLAG_RW, 0, 5715103Sphk "Sysctl internal magic"); 5815103SphkSYSCTL_NODE(, CTL_KERN, kern, CTLFLAG_RW, 0, 5915103Sphk "High kernel, proc, limits &c"); 6015103SphkSYSCTL_NODE(, CTL_VM, vm, CTLFLAG_RW, 0, 6115103Sphk "Virtual memory"); 6223382SbdeSYSCTL_NODE(, CTL_VFS, vfs, CTLFLAG_RW, 0, 6315103Sphk "File system"); 6415103SphkSYSCTL_NODE(, CTL_NET, net, CTLFLAG_RW, 0, 6515103Sphk "Network, (see socket.h)"); 6615103SphkSYSCTL_NODE(, CTL_DEBUG, debug, CTLFLAG_RW, 0, 6715103Sphk "Debugging"); 6848891SphkSYSCTL_NODE(_debug, OID_AUTO, sizeof, CTLFLAG_RW, 0, 6948891Sphk "Sizeof various things"); 7015103SphkSYSCTL_NODE(, CTL_HW, hw, CTLFLAG_RW, 0, 7115103Sphk "hardware"); 7215103SphkSYSCTL_NODE(, CTL_MACHDEP, machdep, CTLFLAG_RW, 0, 7315103Sphk "machine dependent"); 7415103SphkSYSCTL_NODE(, CTL_USER, user, CTLFLAG_RW, 0, 7515103Sphk "user-level"); 7634925SdufaultSYSCTL_NODE(, CTL_P1003_1B, p1003_1b, CTLFLAG_RW, 0, 7734925Sdufault "p1003_1b, (see p1003_1b.h)"); 7834029Sdufault 7950465SmarcelSYSCTL_NODE(, OID_AUTO, compat, CTLFLAG_RW, 0, 8050465Smarcel "Compatibility code"); 8189414SarrSYSCTL_NODE(, OID_AUTO, security, CTLFLAG_RW, 0, 8289414Sarr "Security"); 8386190Srwatson#ifdef REGRESSION 8486190SrwatsonSYSCTL_NODE(, OID_AUTO, regression, CTLFLAG_RW, 0, 8586190Srwatson "Regression test MIB"); 8686190Srwatson#endif 8750465Smarcel 88116090SjmallettSYSCTL_STRING(_kern, OID_AUTO, ident, CTLFLAG_RD, 89116090Sjmallett ident, 0, "Kernel identifier"); 90116090Sjmallett 9186189SrwatsonSYSCTL_STRING(_kern, KERN_OSRELEASE, osrelease, CTLFLAG_RD, 9288019Sluigi osrelease, 0, "Operating system release"); 9315103Sphk 9486189SrwatsonSYSCTL_INT(_kern, KERN_OSREV, osrevision, CTLFLAG_RD, 9546381Sbillf 0, BSD, "Operating system revision"); 9615103Sphk 9786189SrwatsonSYSCTL_STRING(_kern, KERN_VERSION, version, CTLFLAG_RD, 9846381Sbillf version, 0, "Kernel version"); 9915103Sphk 10086189SrwatsonSYSCTL_STRING(_kern, KERN_OSTYPE, ostype, CTLFLAG_RD, 10146381Sbillf ostype, 0, "Operating system type"); 10215103Sphk 10315103Sphkextern int osreldate; 10486189SrwatsonSYSCTL_INT(_kern, KERN_OSRELDATE, osreldate, CTLFLAG_RD, 10546381Sbillf &osreldate, 0, "Operating system release date"); 10615103Sphk 10786189SrwatsonSYSCTL_INT(_kern, KERN_MAXPROC, maxproc, CTLFLAG_RD, 10846381Sbillf &maxproc, 0, "Maximum number of processes"); 10915103Sphk 11086189SrwatsonSYSCTL_INT(_kern, KERN_MAXPROCPERUID, maxprocperuid, CTLFLAG_RW, 11146381Sbillf &maxprocperuid, 0, "Maximum processes allowed per userid"); 11215103Sphk 11386189SrwatsonSYSCTL_INT(_kern, OID_AUTO, maxusers, CTLFLAG_RD, 11480418Speter &maxusers, 0, "Hint for kernel tuning"); 11580418Speter 11686189SrwatsonSYSCTL_INT(_kern, KERN_ARGMAX, argmax, CTLFLAG_RD, 11746381Sbillf 0, ARG_MAX, "Maximum bytes of argument to execve(2)"); 11815103Sphk 11986189SrwatsonSYSCTL_INT(_kern, KERN_POSIX1, posix1version, CTLFLAG_RD, 120105046Smike 0, _POSIX_VERSION, "Version of POSIX attempting to comply to"); 12115103Sphk 12286189SrwatsonSYSCTL_INT(_kern, KERN_NGROUPS, ngroups, CTLFLAG_RD, 12346381Sbillf 0, NGROUPS_MAX, "Maximum number of groups a user can belong to"); 12415103Sphk 12586189SrwatsonSYSCTL_INT(_kern, KERN_JOB_CONTROL, job_control, CTLFLAG_RD, 12646381Sbillf 0, 1, "Whether job control is available"); 12715103Sphk 12815103Sphk#ifdef _POSIX_SAVED_IDS 12986189SrwatsonSYSCTL_INT(_kern, KERN_SAVED_IDS, saved_ids, CTLFLAG_RD, 13046381Sbillf 0, 1, "Whether saved set-group/user ID is available"); 13115103Sphk#else 13286189SrwatsonSYSCTL_INT(_kern, KERN_SAVED_IDS, saved_ids, CTLFLAG_RD, 13346381Sbillf 0, 0, "Whether saved set-group/user ID is available"); 13415103Sphk#endif 13515103Sphk 13615103Sphkchar kernelname[MAXPATHLEN] = "/kernel"; /* XXX bloat */ 13715103Sphk 13886189SrwatsonSYSCTL_STRING(_kern, KERN_BOOTFILE, bootfile, CTLFLAG_RW, 13946381Sbillf kernelname, sizeof kernelname, "Name of kernel file booted"); 14015103Sphk 14131990Sgpalmer#ifdef SMP 14286189SrwatsonSYSCTL_INT(_hw, HW_NCPU, ncpu, CTLFLAG_RD, 14346381Sbillf &mp_ncpus, 0, "Number of active CPUs"); 14431990Sgpalmer#else 14586189SrwatsonSYSCTL_INT(_hw, HW_NCPU, ncpu, CTLFLAG_RD, 14646381Sbillf 0, 1, "Number of active CPUs"); 14731990Sgpalmer#endif 14815103Sphk 14986189SrwatsonSYSCTL_INT(_hw, HW_BYTEORDER, byteorder, CTLFLAG_RD, 15046381Sbillf 0, BYTE_ORDER, "System byte order"); 15115103Sphk 15286189SrwatsonSYSCTL_INT(_hw, HW_PAGESIZE, pagesize, CTLFLAG_RD, 15346381Sbillf 0, PAGE_SIZE, "System memory page size"); 15415103Sphk 155106605Stmmstatic int 156106605Stmmsysctl_hw_physmem(SYSCTL_HANDLER_ARGS) 157106605Stmm{ 158106605Stmm u_long val; 159106605Stmm 160106605Stmm val = ctob(physmem); 161106605Stmm return (sysctl_handle_long(oidp, &val, 0, req)); 162106605Stmm} 163106605Stmm 164106605StmmSYSCTL_PROC(_hw, HW_PHYSMEM, physmem, CTLTYPE_ULONG | CTLFLAG_RD, 165106605Stmm 0, 0, sysctl_hw_physmem, "LU", ""); 166106605Stmm 167106605Stmmstatic int 168106605Stmmsysctl_hw_usermem(SYSCTL_HANDLER_ARGS) 169106605Stmm{ 170106605Stmm u_long val; 171106605Stmm 172106605Stmm val = ctob(physmem - cnt.v_wire_count); 173106605Stmm return (sysctl_handle_long(oidp, &val, 0, req)); 174106605Stmm} 175106605Stmm 176106605StmmSYSCTL_PROC(_hw, HW_USERMEM, usermem, CTLTYPE_ULONG | CTLFLAG_RD, 177106605Stmm 0, 0, sysctl_hw_usermem, "LU", ""); 178106605Stmm 179106605StmmSYSCTL_ULONG(_hw, OID_AUTO, availpages, CTLFLAG_RD, &physmem, 0, ""); 180106605Stmm 18128885Skatostatic char machine_arch[] = MACHINE_ARCH; 18228885SkatoSYSCTL_STRING(_hw, HW_MACHINE_ARCH, machine_arch, CTLFLAG_RD, 18346381Sbillf machine_arch, 0, "System architecture"); 18428885Skato 18515103Sphkchar hostname[MAXHOSTNAMELEN]; 18615103Sphk 18746155Sphkstatic int 18862573Sphksysctl_hostname(SYSCTL_HANDLER_ARGS) 18946155Sphk{ 19087072Srwatson struct prison *pr; 19187275Srwatson char tmphostname[MAXHOSTNAMELEN]; 19246155Sphk int error; 19315103Sphk 19491406Sjhb pr = req->td->td_ucred->cr_prison; 19587072Srwatson if (pr != NULL) { 19657163Srwatson if (!jail_set_hostname_allowed && req->newptr) 19786190Srwatson return (EPERM); 19887275Srwatson /* 19987275Srwatson * Process is in jail, so make a local copy of jail 20087275Srwatson * hostname to get/set so we don't have to hold the jail 20187275Srwatson * mutex during the sysctl copyin/copyout activities. 20287275Srwatson */ 20387275Srwatson mtx_lock(&pr->pr_mtx); 20487275Srwatson bcopy(pr->pr_host, tmphostname, MAXHOSTNAMELEN); 20587275Srwatson mtx_unlock(&pr->pr_mtx); 20687275Srwatson 20787275Srwatson error = sysctl_handle_string(oidp, tmphostname, 20887072Srwatson sizeof pr->pr_host, req); 20987275Srwatson 21087275Srwatson if (req->newptr != NULL && error == 0) { 21187275Srwatson /* 21287275Srwatson * Copy the locally set hostname to the jail, if 21387275Srwatson * appropriate. 21487275Srwatson */ 21587275Srwatson mtx_lock(&pr->pr_mtx); 21687275Srwatson bcopy(tmphostname, pr->pr_host, MAXHOSTNAMELEN); 21787275Srwatson mtx_unlock(&pr->pr_mtx); 21887275Srwatson } 21957111Srwatson } else 22086189Srwatson error = sysctl_handle_string(oidp, 22146155Sphk hostname, sizeof hostname, req); 22246155Sphk return (error); 22346155Sphk} 22446155Sphk 22586189SrwatsonSYSCTL_PROC(_kern, KERN_HOSTNAME, hostname, 22646155Sphk CTLTYPE_STRING|CTLFLAG_RW|CTLFLAG_PRISON, 22746381Sbillf 0, 0, sysctl_hostname, "A", "Hostname"); 22846155Sphk 22986190Srwatsonstatic int regression_securelevel_nonmonotonic = 0; 23084611Srwatson 23187072Srwatson#ifdef REGRESSION 23284611SrwatsonSYSCTL_INT(_regression, OID_AUTO, securelevel_nonmonotonic, CTLFLAG_RW, 23384611Srwatson ®ression_securelevel_nonmonotonic, 0, "securelevel may be lowered"); 23486190Srwatson#endif 23584611Srwatson 23615103Sphkint securelevel = -1; 237114293Smarkmstatic struct mtx securelevel_mtx; 23815103Sphk 23993686SarrMTX_SYSINIT(securelevel_lock, &securelevel_mtx, "securelevel mutex lock", 24093686Sarr MTX_DEF); 24193686Sarr 24215103Sphkstatic int 24362573Sphksysctl_kern_securelvl(SYSCTL_HANDLER_ARGS) 24415103Sphk{ 24586145Srwatson struct prison *pr; 24686140Srwatson int error, level; 24715103Sphk 24891406Sjhb pr = req->td->td_ucred->cr_prison; 24986145Srwatson 25086140Srwatson /* 25186140Srwatson * If the process is in jail, return the maximum of the global and 25286140Srwatson * local levels; otherwise, return the global level. 25386140Srwatson */ 25487275Srwatson if (pr != NULL) { 25587275Srwatson mtx_lock(&pr->pr_mtx); 25686145Srwatson level = imax(securelevel, pr->pr_securelevel); 25787275Srwatson mtx_unlock(&pr->pr_mtx); 25887275Srwatson } else 25986140Srwatson level = securelevel; 26086140Srwatson error = sysctl_handle_int(oidp, &level, 0, req); 26186140Srwatson if (error || !req->newptr) 26286140Srwatson return (error); 26386140Srwatson /* 26486140Srwatson * Permit update only if the new securelevel exceeds the 26586140Srwatson * global level, and local level if any. 26686140Srwatson */ 26786145Srwatson if (pr != NULL) { 26887275Srwatson mtx_lock(&pr->pr_mtx); 26987072Srwatson if (!regression_securelevel_nonmonotonic && 27087275Srwatson (level < imax(securelevel, pr->pr_securelevel))) { 27187275Srwatson mtx_unlock(&pr->pr_mtx); 27286140Srwatson return (EPERM); 27387275Srwatson } 27486145Srwatson pr->pr_securelevel = level; 27587275Srwatson mtx_unlock(&pr->pr_mtx); 27686140Srwatson } else { 27793686Sarr mtx_lock(&securelevel_mtx); 27887072Srwatson if (!regression_securelevel_nonmonotonic && 27993686Sarr (level < securelevel)) { 28093686Sarr mtx_unlock(&securelevel_mtx); 28186140Srwatson return (EPERM); 28293686Sarr } 28386140Srwatson securelevel = level; 28493686Sarr mtx_unlock(&securelevel_mtx); 28586140Srwatson } 28686140Srwatson return (error); 28715103Sphk} 28815103Sphk 28983990SrwatsonSYSCTL_PROC(_kern, KERN_SECURELVL, securelevel, 29083990Srwatson CTLTYPE_INT|CTLFLAG_RW|CTLFLAG_PRISON, 0, 0, sysctl_kern_securelvl, 29183990Srwatson "I", "Current secure level"); 29261370Srwatson 29315103Sphkchar domainname[MAXHOSTNAMELEN]; 29417281SwollmanSYSCTL_STRING(_kern, KERN_NISDOMAINNAME, domainname, CTLFLAG_RW, 29546381Sbillf &domainname, sizeof(domainname), "Name of the current YP/NIS domain"); 29615103Sphk 29786190Srwatsonu_long hostid; 29878609SpirzykSYSCTL_ULONG(_kern, KERN_HOSTID, hostid, CTLFLAG_RW, &hostid, 0, "Host ID"); 29915103Sphk 30015103Sphk/* 30115103Sphk * This is really cheating. These actually live in the libc, something 30286189Srwatson * which I'm not quite sure is a good idea anyway, but in order for 30315103Sphk * getnext and friends to actually work, we define dummies here. 30415103Sphk */ 30586189SrwatsonSYSCTL_STRING(_user, USER_CS_PATH, cs_path, CTLFLAG_RD, 30646381Sbillf "", 0, "PATH that finds all the standard utilities"); 30786189SrwatsonSYSCTL_INT(_user, USER_BC_BASE_MAX, bc_base_max, CTLFLAG_RD, 30846381Sbillf 0, 0, "Max ibase/obase values in bc(1)"); 30986189SrwatsonSYSCTL_INT(_user, USER_BC_DIM_MAX, bc_dim_max, CTLFLAG_RD, 31046381Sbillf 0, 0, "Max array size in bc(1)"); 31186189SrwatsonSYSCTL_INT(_user, USER_BC_SCALE_MAX, bc_scale_max, CTLFLAG_RD, 31246381Sbillf 0, 0, "Max scale value in bc(1)"); 31386189SrwatsonSYSCTL_INT(_user, USER_BC_STRING_MAX, bc_string_max, CTLFLAG_RD, 31446381Sbillf 0, 0, "Max string length in bc(1)"); 31586189SrwatsonSYSCTL_INT(_user, USER_COLL_WEIGHTS_MAX, coll_weights_max, CTLFLAG_RD, 31646381Sbillf 0, 0, "Maximum number of weights assigned to an LC_COLLATE locale entry"); 31718540SbdeSYSCTL_INT(_user, USER_EXPR_NEST_MAX, expr_nest_max, CTLFLAG_RD, 0, 0, ""); 31886189SrwatsonSYSCTL_INT(_user, USER_LINE_MAX, line_max, CTLFLAG_RD, 31946381Sbillf 0, 0, "Max length (bytes) of a text-processing utility's input line"); 32086189SrwatsonSYSCTL_INT(_user, USER_RE_DUP_MAX, re_dup_max, CTLFLAG_RD, 32146381Sbillf 0, 0, "Maximum number of repeats of a regexp permitted"); 32286189SrwatsonSYSCTL_INT(_user, USER_POSIX2_VERSION, posix2_version, CTLFLAG_RD, 32386189Srwatson 0, 0, 32446381Sbillf "The version of POSIX 1003.2 with which the system attempts to comply"); 32586189SrwatsonSYSCTL_INT(_user, USER_POSIX2_C_BIND, posix2_c_bind, CTLFLAG_RD, 32646381Sbillf 0, 0, "Whether C development supports the C bindings option"); 32786189SrwatsonSYSCTL_INT(_user, USER_POSIX2_C_DEV, posix2_c_dev, CTLFLAG_RD, 32846381Sbillf 0, 0, "Whether system supports the C development utilities option"); 32986189SrwatsonSYSCTL_INT(_user, USER_POSIX2_CHAR_TERM, posix2_char_term, CTLFLAG_RD, 33046381Sbillf 0, 0, ""); 33186189SrwatsonSYSCTL_INT(_user, USER_POSIX2_FORT_DEV, posix2_fort_dev, CTLFLAG_RD, 33246381Sbillf 0, 0, "Whether system supports FORTRAN development utilities"); 33386189SrwatsonSYSCTL_INT(_user, USER_POSIX2_FORT_RUN, posix2_fort_run, CTLFLAG_RD, 33446381Sbillf 0, 0, "Whether system supports FORTRAN runtime utilities"); 33586189SrwatsonSYSCTL_INT(_user, USER_POSIX2_LOCALEDEF, posix2_localedef, CTLFLAG_RD, 33646381Sbillf 0, 0, "Whether system supports creation of locales"); 33786189SrwatsonSYSCTL_INT(_user, USER_POSIX2_SW_DEV, posix2_sw_dev, CTLFLAG_RD, 33846381Sbillf 0, 0, "Whether system supports software development utilities"); 33986189SrwatsonSYSCTL_INT(_user, USER_POSIX2_UPE, posix2_upe, CTLFLAG_RD, 34046381Sbillf 0, 0, "Whether system supports the user portability utilities"); 34186189SrwatsonSYSCTL_INT(_user, USER_STREAM_MAX, stream_max, CTLFLAG_RD, 34246381Sbillf 0, 0, "Min Maximum number of streams a process may have open at one time"); 34386189SrwatsonSYSCTL_INT(_user, USER_TZNAME_MAX, tzname_max, CTLFLAG_RD, 34446381Sbillf 0, 0, "Min Maximum number of types supported for timezone names"); 34548891Sphk 34648891Sphk#include <sys/vnode.h> 34786189SrwatsonSYSCTL_INT(_debug_sizeof, OID_AUTO, vnode, CTLFLAG_RD, 34848891Sphk 0, sizeof(struct vnode), "sizeof(struct vnode)"); 34948891Sphk 35086189SrwatsonSYSCTL_INT(_debug_sizeof, OID_AUTO, proc, CTLFLAG_RD, 35148891Sphk 0, sizeof(struct proc), "sizeof(struct proc)"); 35248927Sphk 35349535Sphk#include <sys/conf.h> 354104043SphkSYSCTL_INT(_debug_sizeof, OID_AUTO, cdev, CTLFLAG_RD, 355104043Sphk 0, sizeof(struct cdev), "sizeof(struct cdev)"); 35658926Sphk 35760041Sphk#include <sys/bio.h> 35858926Sphk#include <sys/buf.h> 35958926SphkSYSCTL_INT(_debug_sizeof, OID_AUTO, bio, CTLFLAG_RD, 36058926Sphk 0, sizeof(struct bio), "sizeof(struct bio)"); 36158926SphkSYSCTL_INT(_debug_sizeof, OID_AUTO, buf, CTLFLAG_RD, 36258926Sphk 0, sizeof(struct buf), "sizeof(struct buf)"); 36372376Sjake 36472376Sjake#include <sys/user.h> 36572376SjakeSYSCTL_INT(_debug_sizeof, OID_AUTO, kinfo_proc, CTLFLAG_RD, 36672376Sjake 0, sizeof(struct kinfo_proc), "sizeof(struct kinfo_proc)"); 367108685Sjake 368108696Sjake/* XXX compatibility, remove for 6.0 */ 369108696Sjake#include <sys/imgact.h> 370108696Sjake#include <sys/imgact_elf.h> 371108696SjakeSYSCTL_INT(_kern, OID_AUTO, fallback_elf_brand, CTLFLAG_RW, 372108696Sjake &__elfN(fallback_brand), sizeof(__elfN(fallback_brand)), 373108696Sjake "compatibility for kern.fallback_elf_brand"); 374