Blame view
kernel/sysctl.c
68.7 KB
1da177e4c
|
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 |
/* * sysctl.c: General linux system control interface * * Begun 24 March 1995, Stephen Tweedie * Added /proc support, Dec 1995 * Added bdflush entry and intvec min/max checking, 2/23/96, Tom Dyas. * Added hooks for /proc/sys/net (minor, minor patch), 96/4/1, Mike Shaver. * Added kernel/java-{interpreter,appletviewer}, 96/5/10, Mike Shaver. * Dynamic registration fixes, Stephen Tweedie. * Added kswapd-interval, ctrl-alt-del, printk stuff, 1/8/97, Chris Horn. * Made sysctl support optional via CONFIG_SYSCTL, 1/10/97, Chris * Horn. * Added proc_doulongvec_ms_jiffies_minmax, 09/08/99, Carlos H. Bauer. * Added proc_doulongvec_minmax, 09/08/99, Carlos H. Bauer. * Changed linked lists to use list.h instead of lists.h, 02/24/00, Bill * Wendling. * The list_for_each() macro wasn't appropriate for the sysctl loop. * Removed it and replaced it with older style, 03/23/00, Bill Wendling */ |
1da177e4c
|
20 21 22 23 24 |
#include <linux/module.h> #include <linux/mm.h> #include <linux/swap.h> #include <linux/slab.h> #include <linux/sysctl.h> |
d33ed52d5
|
25 |
#include <linux/signal.h> |
455cd5ab3
|
26 |
#include <linux/printk.h> |
1da177e4c
|
27 |
#include <linux/proc_fs.h> |
72c2d5823
|
28 |
#include <linux/security.h> |
1da177e4c
|
29 |
#include <linux/ctype.h> |
dfec072ec
|
30 |
#include <linux/kmemcheck.h> |
62239ac2b
|
31 |
#include <linux/fs.h> |
1da177e4c
|
32 33 |
#include <linux/init.h> #include <linux/kernel.h> |
0296b2281
|
34 |
#include <linux/kobject.h> |
20380731b
|
35 |
#include <linux/net.h> |
1da177e4c
|
36 37 38 |
#include <linux/sysrq.h> #include <linux/highuid.h> #include <linux/writeback.h> |
3fff4c42b
|
39 |
#include <linux/ratelimit.h> |
76ab0f530
|
40 |
#include <linux/compaction.h> |
1da177e4c
|
41 |
#include <linux/hugetlb.h> |
1da177e4c
|
42 |
#include <linux/initrd.h> |
0b77f5bfb
|
43 |
#include <linux/key.h> |
1da177e4c
|
44 45 46 |
#include <linux/times.h> #include <linux/limits.h> #include <linux/dcache.h> |
6e006701c
|
47 |
#include <linux/dnotify.h> |
1da177e4c
|
48 |
#include <linux/syscalls.h> |
c748e1340
|
49 |
#include <linux/vmstat.h> |
c255d844d
|
50 51 |
#include <linux/nfs_fs.h> #include <linux/acpi.h> |
10a0a8d4e
|
52 |
#include <linux/reboot.h> |
b0fc494fa
|
53 |
#include <linux/ftrace.h> |
cdd6c482c
|
54 |
#include <linux/perf_event.h> |
b2be84df9
|
55 |
#include <linux/kprobes.h> |
b492e95be
|
56 |
#include <linux/pipe_fs_i.h> |
8e4228e1e
|
57 |
#include <linux/oom.h> |
1da177e4c
|
58 59 60 |
#include <asm/uaccess.h> #include <asm/processor.h> |
29cbc78b9
|
61 62 |
#ifdef CONFIG_X86 #include <asm/nmi.h> |
0741f4d20
|
63 |
#include <asm/stacktrace.h> |
6e7c40259
|
64 |
#include <asm/io.h> |
29cbc78b9
|
65 |
#endif |
c55b7c3e8
|
66 67 68 |
#ifdef CONFIG_BSD_PROCESS_ACCT #include <linux/acct.h> #endif |
4f0e056fd
|
69 70 71 |
#ifdef CONFIG_RT_MUTEXES #include <linux/rtmutex.h> #endif |
2edf5e498
|
72 73 74 |
#if defined(CONFIG_PROVE_LOCKING) || defined(CONFIG_LOCK_STAT) #include <linux/lockdep.h> #endif |
15485a468
|
75 76 77 |
#ifdef CONFIG_CHR_DEV_SG #include <scsi/sg.h> #endif |
29cbc78b9
|
78 |
|
58687acba
|
79 |
#ifdef CONFIG_LOCKUP_DETECTOR |
504d7cf10
|
80 81 |
#include <linux/nmi.h> #endif |
7058cb02d
|
82 |
|
1da177e4c
|
83 84 85 |
#if defined(CONFIG_SYSCTL) /* External variables not in a header file. */ |
1da177e4c
|
86 87 88 |
extern int sysctl_overcommit_memory; extern int sysctl_overcommit_ratio; extern int max_threads; |
1da177e4c
|
89 |
extern int core_uses_pid; |
d6e711448
|
90 |
extern int suid_dumpable; |
1da177e4c
|
91 |
extern char core_pattern[]; |
a293980c2
|
92 |
extern unsigned int core_pipe_limit; |
1da177e4c
|
93 94 |
extern int pid_max; extern int min_free_kbytes; |
1da177e4c
|
95 |
extern int pid_max_min, pid_max_max; |
9d0243bca
|
96 |
extern int sysctl_drop_caches; |
8ad4b1fb8
|
97 |
extern int percpu_pagelist_fraction; |
bebfa1013
|
98 |
extern int compat_log; |
9745512ce
|
99 |
extern int latencytop_enabled; |
eceea0b3d
|
100 |
extern int sysctl_nr_open_min, sysctl_nr_open_max; |
dd8632a12
|
101 102 103 |
#ifndef CONFIG_MMU extern int sysctl_nr_trim_pages; #endif |
cb684b5bc
|
104 |
#ifdef CONFIG_BLOCK |
5e605b64a
|
105 |
extern int blk_iopoll_enabled; |
cb684b5bc
|
106 |
#endif |
1da177e4c
|
107 |
|
c4f3b63fe
|
108 |
/* Constants used for minimum and maximum */ |
2508ce184
|
109 |
#ifdef CONFIG_LOCKUP_DETECTOR |
c4f3b63fe
|
110 |
static int sixty = 60; |
9383d9679
|
111 |
static int neg_one = -1; |
c4f3b63fe
|
112 |
#endif |
c4f3b63fe
|
113 |
static int zero; |
cd5f9a4c3
|
114 115 |
static int __maybe_unused one = 1; static int __maybe_unused two = 2; |
cb16e95fa
|
116 |
static int __maybe_unused three = 3; |
fc3501d41
|
117 |
static unsigned long one_ul = 1; |
c4f3b63fe
|
118 |
static int one_hundred = 100; |
af91322ef
|
119 120 121 |
#ifdef CONFIG_PRINTK static int ten_thousand = 10000; #endif |
c4f3b63fe
|
122 |
|
9e4a5bda8
|
123 124 |
/* this is needed for the proc_doulongvec_minmax of vm_dirty_bytes */ static unsigned long dirty_bytes_min = 2 * PAGE_SIZE; |
1da177e4c
|
125 126 127 |
/* this is needed for the proc_dointvec_minmax for [fs_]overflow UID and GID */ static int maxolduid = 65535; static int minolduid; |
8ad4b1fb8
|
128 |
static int min_percpu_pagelist_fract = 8; |
1da177e4c
|
129 130 |
static int ngroups_max = NGROUPS_MAX; |
d14f17294
|
131 132 133 |
#ifdef CONFIG_INOTIFY_USER #include <linux/inotify.h> #endif |
72c57ed50
|
134 |
#ifdef CONFIG_SPARC |
17f04fbb0
|
135 |
#include <asm/system.h> |
1da177e4c
|
136 |
#endif |
0871420fa
|
137 138 139 |
#ifdef CONFIG_SPARC64 extern int sysctl_tsb_ratio; #endif |
1da177e4c
|
140 141 142 143 |
#ifdef __hppa__ extern int pwrsw_enabled; extern int unaligned_enabled; #endif |
347a8dc3b
|
144 |
#ifdef CONFIG_S390 |
1da177e4c
|
145 146 147 148 |
#ifdef CONFIG_MATHEMU extern int sysctl_ieee_emulation_warnings; #endif extern int sysctl_userprocess_debug; |
951f22d5b
|
149 |
extern int spin_retry; |
1da177e4c
|
150 |
#endif |
d2b176ed8
|
151 152 |
#ifdef CONFIG_IA64 extern int no_unaligned_warning; |
88fc241f5
|
153 |
extern int unaligned_dump_stack; |
d2b176ed8
|
154 |
#endif |
d6f8ff738
|
155 |
#ifdef CONFIG_PROC_SYSCTL |
8d65af789
|
156 |
static int proc_do_cad_pid(struct ctl_table *table, int write, |
9ec52099e
|
157 |
void __user *buffer, size_t *lenp, loff_t *ppos); |
8d65af789
|
158 |
static int proc_taint(struct ctl_table *table, int write, |
34f5a3989
|
159 |
void __user *buffer, size_t *lenp, loff_t *ppos); |
d6f8ff738
|
160 |
#endif |
9ec52099e
|
161 |
|
bfdc0b497
|
162 163 164 165 |
#ifdef CONFIG_PRINTK static int proc_dmesg_restrict(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos); #endif |
97f5f0cd8
|
166 |
#ifdef CONFIG_MAGIC_SYSRQ |
8c6a98b22
|
167 168 |
/* Note: sysrq code uses it's own private copy */ static int __sysrq_enabled = SYSRQ_DEFAULT_ENABLE; |
97f5f0cd8
|
169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 |
static int sysrq_sysctl_handler(ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) { int error; error = proc_dointvec(table, write, buffer, lenp, ppos); if (error) return error; if (write) sysrq_toggle_support(__sysrq_enabled); return 0; } #endif |
d8217f076
|
187 |
static struct ctl_table root_table[]; |
e51b6ba07
|
188 189 |
static struct ctl_table_root sysctl_table_root; static struct ctl_table_header root_table_header = { |
dfef6dcd3
|
190 |
{{.count = 1, |
e51b6ba07
|
191 |
.ctl_table = root_table, |
dfef6dcd3
|
192 |
.ctl_entry = LIST_HEAD_INIT(sysctl_table_root.default_set.list),}}, |
e51b6ba07
|
193 |
.root = &sysctl_table_root, |
734550921
|
194 |
.set = &sysctl_table_root.default_set, |
e51b6ba07
|
195 196 197 |
}; static struct ctl_table_root sysctl_table_root = { .root_list = LIST_HEAD_INIT(sysctl_table_root.root_list), |
734550921
|
198 |
.default_set.list = LIST_HEAD_INIT(root_table_header.ctl_entry), |
e51b6ba07
|
199 |
}; |
1da177e4c
|
200 |
|
d8217f076
|
201 202 203 204 205 206 |
static struct ctl_table kern_table[]; static struct ctl_table vm_table[]; static struct ctl_table fs_table[]; static struct ctl_table debug_table[]; static struct ctl_table dev_table[]; extern struct ctl_table random_table[]; |
7ef9964e6
|
207 208 209 |
#ifdef CONFIG_EPOLL extern struct ctl_table epoll_table[]; #endif |
1da177e4c
|
210 211 212 213 |
#ifdef HAVE_ARCH_PICK_MMAP_LAYOUT int sysctl_legacy_va_layout; #endif |
1da177e4c
|
214 |
/* The default sysctl tables: */ |
d8217f076
|
215 |
static struct ctl_table root_table[] = { |
1da177e4c
|
216 |
{ |
1da177e4c
|
217 218 219 220 221 |
.procname = "kernel", .mode = 0555, .child = kern_table, }, { |
1da177e4c
|
222 223 224 225 |
.procname = "vm", .mode = 0555, .child = vm_table, }, |
1da177e4c
|
226 |
{ |
1da177e4c
|
227 228 229 230 231 |
.procname = "fs", .mode = 0555, .child = fs_table, }, { |
1da177e4c
|
232 233 234 235 236 |
.procname = "debug", .mode = 0555, .child = debug_table, }, { |
1da177e4c
|
237 238 239 240 |
.procname = "dev", .mode = 0555, .child = dev_table, }, |
6fce56ec9
|
241 |
{ } |
1da177e4c
|
242 |
}; |
77e54a1f8
|
243 |
#ifdef CONFIG_SCHED_DEBUG |
73c4efd2c
|
244 245 246 247 |
static int min_sched_granularity_ns = 100000; /* 100 usecs */ static int max_sched_granularity_ns = NSEC_PER_SEC; /* 1 second */ static int min_wakeup_granularity_ns; /* 0 usecs */ static int max_wakeup_granularity_ns = NSEC_PER_SEC; /* 1 second */ |
1983a922a
|
248 249 |
static int min_sched_tunable_scaling = SCHED_TUNABLESCALING_NONE; static int max_sched_tunable_scaling = SCHED_TUNABLESCALING_END-1; |
77e54a1f8
|
250 |
#endif |
5e7719058
|
251 252 253 254 |
#ifdef CONFIG_COMPACTION static int min_extfrag_threshold; static int max_extfrag_threshold = 1000; #endif |
d8217f076
|
255 |
static struct ctl_table kern_table[] = { |
2bba22c50
|
256 |
{ |
2bba22c50
|
257 258 259 260 |
.procname = "sched_child_runs_first", .data = &sysctl_sched_child_runs_first, .maxlen = sizeof(unsigned int), .mode = 0644, |
6d4561110
|
261 |
.proc_handler = proc_dointvec, |
2bba22c50
|
262 |
}, |
77e54a1f8
|
263 264 |
#ifdef CONFIG_SCHED_DEBUG { |
b2be5e96d
|
265 266 |
.procname = "sched_min_granularity_ns", .data = &sysctl_sched_min_granularity, |
77e54a1f8
|
267 268 |
.maxlen = sizeof(unsigned int), .mode = 0644, |
702a7c760
|
269 |
.proc_handler = sched_proc_update_handler, |
b2be5e96d
|
270 271 |
.extra1 = &min_sched_granularity_ns, .extra2 = &max_sched_granularity_ns, |
77e54a1f8
|
272 273 |
}, { |
218050855
|
274 275 276 277 |
.procname = "sched_latency_ns", .data = &sysctl_sched_latency, .maxlen = sizeof(unsigned int), .mode = 0644, |
702a7c760
|
278 |
.proc_handler = sched_proc_update_handler, |
218050855
|
279 280 281 282 |
.extra1 = &min_sched_granularity_ns, .extra2 = &max_sched_granularity_ns, }, { |
77e54a1f8
|
283 284 285 286 |
.procname = "sched_wakeup_granularity_ns", .data = &sysctl_sched_wakeup_granularity, .maxlen = sizeof(unsigned int), .mode = 0644, |
702a7c760
|
287 |
.proc_handler = sched_proc_update_handler, |
77e54a1f8
|
288 289 290 291 |
.extra1 = &min_wakeup_granularity_ns, .extra2 = &max_wakeup_granularity_ns, }, { |
1983a922a
|
292 293 294 295 |
.procname = "sched_tunable_scaling", .data = &sysctl_sched_tunable_scaling, .maxlen = sizeof(enum sched_tunable_scaling), .mode = 0644, |
702a7c760
|
296 |
.proc_handler = sched_proc_update_handler, |
1983a922a
|
297 298 |
.extra1 = &min_sched_tunable_scaling, .extra2 = &max_sched_tunable_scaling, |
2398f2c6d
|
299 300 |
}, { |
da84d9617
|
301 302 303 304 |
.procname = "sched_migration_cost", .data = &sysctl_sched_migration_cost, .maxlen = sizeof(unsigned int), .mode = 0644, |
6d4561110
|
305 |
.proc_handler = proc_dointvec, |
da84d9617
|
306 |
}, |
b82d9fdd8
|
307 |
{ |
b82d9fdd8
|
308 309 310 |
.procname = "sched_nr_migrate", .data = &sysctl_sched_nr_migrate, .maxlen = sizeof(unsigned int), |
fa85ae241
|
311 |
.mode = 0644, |
6d4561110
|
312 |
.proc_handler = proc_dointvec, |
fa85ae241
|
313 |
}, |
cd1bb94b4
|
314 |
{ |
e9e9250bc
|
315 316 317 318 |
.procname = "sched_time_avg", .data = &sysctl_sched_time_avg, .maxlen = sizeof(unsigned int), .mode = 0644, |
6d4561110
|
319 |
.proc_handler = proc_dointvec, |
e9e9250bc
|
320 321 |
}, { |
a7a4f8a75
|
322 323 324 325 326 327 328 |
.procname = "sched_shares_window", .data = &sysctl_sched_shares_window, .maxlen = sizeof(unsigned int), .mode = 0644, .proc_handler = proc_dointvec, }, { |
cd1bb94b4
|
329 330 331 332 |
.procname = "timer_migration", .data = &sysctl_timer_migration, .maxlen = sizeof(unsigned int), .mode = 0644, |
6d4561110
|
333 |
.proc_handler = proc_dointvec_minmax, |
bfdb4d9f0
|
334 335 |
.extra1 = &zero, .extra2 = &one, |
fa85ae241
|
336 |
}, |
1fc84aaae
|
337 |
#endif |
1799e35d5
|
338 |
{ |
9f0c1e560
|
339 340 341 342 |
.procname = "sched_rt_period_us", .data = &sysctl_sched_rt_period, .maxlen = sizeof(unsigned int), .mode = 0644, |
6d4561110
|
343 |
.proc_handler = sched_rt_handler, |
9f0c1e560
|
344 345 |
}, { |
9f0c1e560
|
346 347 348 349 |
.procname = "sched_rt_runtime_us", .data = &sysctl_sched_rt_runtime, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
350 |
.proc_handler = sched_rt_handler, |
9f0c1e560
|
351 |
}, |
5091faa44
|
352 353 354 355 356 357 |
#ifdef CONFIG_SCHED_AUTOGROUP { .procname = "sched_autogroup_enabled", .data = &sysctl_sched_autogroup_enabled, .maxlen = sizeof(unsigned int), .mode = 0644, |
1747b21fe
|
358 |
.proc_handler = proc_dointvec_minmax, |
5091faa44
|
359 360 361 362 |
.extra1 = &zero, .extra2 = &one, }, #endif |
f20786ff4
|
363 364 |
#ifdef CONFIG_PROVE_LOCKING { |
f20786ff4
|
365 366 367 368 |
.procname = "prove_locking", .data = &prove_locking, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
369 |
.proc_handler = proc_dointvec, |
f20786ff4
|
370 371 372 373 |
}, #endif #ifdef CONFIG_LOCK_STAT { |
f20786ff4
|
374 375 376 377 |
.procname = "lock_stat", .data = &lock_stat, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
378 |
.proc_handler = proc_dointvec, |
f20786ff4
|
379 380 |
}, #endif |
77e54a1f8
|
381 |
{ |
1da177e4c
|
382 383 384 385 |
.procname = "panic", .data = &panic_timeout, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
386 |
.proc_handler = proc_dointvec, |
1da177e4c
|
387 388 |
}, { |
1da177e4c
|
389 390 391 392 |
.procname = "core_uses_pid", .data = &core_uses_pid, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
393 |
.proc_handler = proc_dointvec, |
1da177e4c
|
394 395 |
}, { |
1da177e4c
|
396 397 |
.procname = "core_pattern", .data = core_pattern, |
71ce92f3f
|
398 |
.maxlen = CORENAME_MAX_SIZE, |
1da177e4c
|
399 |
.mode = 0644, |
6d4561110
|
400 |
.proc_handler = proc_dostring, |
1da177e4c
|
401 |
}, |
a293980c2
|
402 |
{ |
a293980c2
|
403 404 405 406 |
.procname = "core_pipe_limit", .data = &core_pipe_limit, .maxlen = sizeof(unsigned int), .mode = 0644, |
6d4561110
|
407 |
.proc_handler = proc_dointvec, |
a293980c2
|
408 |
}, |
34f5a3989
|
409 |
#ifdef CONFIG_PROC_SYSCTL |
1da177e4c
|
410 |
{ |
1da177e4c
|
411 |
.procname = "tainted", |
25ddbb18a
|
412 |
.maxlen = sizeof(long), |
34f5a3989
|
413 |
.mode = 0644, |
6d4561110
|
414 |
.proc_handler = proc_taint, |
1da177e4c
|
415 |
}, |
34f5a3989
|
416 |
#endif |
9745512ce
|
417 418 419 420 421 422 |
#ifdef CONFIG_LATENCYTOP { .procname = "latencytop", .data = &latencytop_enabled, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
423 |
.proc_handler = proc_dointvec, |
9745512ce
|
424 425 |
}, #endif |
1da177e4c
|
426 427 |
#ifdef CONFIG_BLK_DEV_INITRD { |
1da177e4c
|
428 429 430 431 |
.procname = "real-root-dev", .data = &real_root_dev, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
432 |
.proc_handler = proc_dointvec, |
1da177e4c
|
433 434 |
}, #endif |
45807a1df
|
435 |
{ |
45807a1df
|
436 437 438 439 |
.procname = "print-fatal-signals", .data = &print_fatal_signals, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
440 |
.proc_handler = proc_dointvec, |
45807a1df
|
441 |
}, |
72c57ed50
|
442 |
#ifdef CONFIG_SPARC |
1da177e4c
|
443 |
{ |
1da177e4c
|
444 445 446 447 |
.procname = "reboot-cmd", .data = reboot_command, .maxlen = 256, .mode = 0644, |
6d4561110
|
448 |
.proc_handler = proc_dostring, |
1da177e4c
|
449 450 |
}, { |
1da177e4c
|
451 452 453 454 |
.procname = "stop-a", .data = &stop_a_enabled, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
455 |
.proc_handler = proc_dointvec, |
1da177e4c
|
456 457 |
}, { |
1da177e4c
|
458 459 460 461 |
.procname = "scons-poweroff", .data = &scons_pwroff, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
462 |
.proc_handler = proc_dointvec, |
1da177e4c
|
463 464 |
}, #endif |
0871420fa
|
465 466 |
#ifdef CONFIG_SPARC64 { |
0871420fa
|
467 468 469 470 |
.procname = "tsb-ratio", .data = &sysctl_tsb_ratio, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
471 |
.proc_handler = proc_dointvec, |
0871420fa
|
472 473 |
}, #endif |
1da177e4c
|
474 475 |
#ifdef __hppa__ { |
1da177e4c
|
476 477 478 479 |
.procname = "soft-power", .data = &pwrsw_enabled, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
480 |
.proc_handler = proc_dointvec, |
1da177e4c
|
481 482 |
}, { |
1da177e4c
|
483 484 485 486 |
.procname = "unaligned-trap", .data = &unaligned_enabled, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
487 |
.proc_handler = proc_dointvec, |
1da177e4c
|
488 489 490 |
}, #endif { |
1da177e4c
|
491 492 493 494 |
.procname = "ctrl-alt-del", .data = &C_A_D, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
495 |
.proc_handler = proc_dointvec, |
1da177e4c
|
496 |
}, |
606576ce8
|
497 |
#ifdef CONFIG_FUNCTION_TRACER |
b0fc494fa
|
498 |
{ |
b0fc494fa
|
499 500 501 502 |
.procname = "ftrace_enabled", .data = &ftrace_enabled, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
503 |
.proc_handler = ftrace_enable_sysctl, |
b0fc494fa
|
504 505 |
}, #endif |
f38f1d2aa
|
506 507 |
#ifdef CONFIG_STACK_TRACER { |
f38f1d2aa
|
508 509 510 511 |
.procname = "stack_tracer_enabled", .data = &stack_tracer_enabled, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
512 |
.proc_handler = stack_trace_sysctl, |
f38f1d2aa
|
513 514 |
}, #endif |
944ac4259
|
515 516 |
#ifdef CONFIG_TRACING { |
3299b4dd1
|
517 |
.procname = "ftrace_dump_on_oops", |
944ac4259
|
518 519 520 |
.data = &ftrace_dump_on_oops, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
521 |
.proc_handler = proc_dointvec, |
944ac4259
|
522 523 |
}, #endif |
a1ef5adb4
|
524 |
#ifdef CONFIG_MODULES |
1da177e4c
|
525 |
{ |
1da177e4c
|
526 527 528 529 |
.procname = "modprobe", .data = &modprobe_path, .maxlen = KMOD_PATH_LEN, .mode = 0644, |
6d4561110
|
530 |
.proc_handler = proc_dostring, |
1da177e4c
|
531 |
}, |
3d43321b7
|
532 |
{ |
3d43321b7
|
533 534 535 536 537 |
.procname = "modules_disabled", .data = &modules_disabled, .maxlen = sizeof(int), .mode = 0644, /* only handle a transition from default "0" to "1" */ |
6d4561110
|
538 |
.proc_handler = proc_dointvec_minmax, |
3d43321b7
|
539 540 541 |
.extra1 = &one, .extra2 = &one, }, |
1da177e4c
|
542 |
#endif |
94f17cd78
|
543 |
#ifdef CONFIG_HOTPLUG |
1da177e4c
|
544 |
{ |
1da177e4c
|
545 |
.procname = "hotplug", |
312c004d3
|
546 547 |
.data = &uevent_helper, .maxlen = UEVENT_HELPER_PATH_LEN, |
1da177e4c
|
548 |
.mode = 0644, |
6d4561110
|
549 |
.proc_handler = proc_dostring, |
1da177e4c
|
550 551 552 553 |
}, #endif #ifdef CONFIG_CHR_DEV_SG { |
1da177e4c
|
554 555 556 557 |
.procname = "sg-big-buff", .data = &sg_big_buff, .maxlen = sizeof (int), .mode = 0444, |
6d4561110
|
558 |
.proc_handler = proc_dointvec, |
1da177e4c
|
559 560 561 562 |
}, #endif #ifdef CONFIG_BSD_PROCESS_ACCT { |
1da177e4c
|
563 564 565 566 |
.procname = "acct", .data = &acct_parm, .maxlen = 3*sizeof(int), .mode = 0644, |
6d4561110
|
567 |
.proc_handler = proc_dointvec, |
1da177e4c
|
568 569 |
}, #endif |
1da177e4c
|
570 571 |
#ifdef CONFIG_MAGIC_SYSRQ { |
1da177e4c
|
572 |
.procname = "sysrq", |
5d6f647fc
|
573 |
.data = &__sysrq_enabled, |
1da177e4c
|
574 575 |
.maxlen = sizeof (int), .mode = 0644, |
97f5f0cd8
|
576 |
.proc_handler = sysrq_sysctl_handler, |
1da177e4c
|
577 578 |
}, #endif |
d6f8ff738
|
579 |
#ifdef CONFIG_PROC_SYSCTL |
1da177e4c
|
580 |
{ |
1da177e4c
|
581 |
.procname = "cad_pid", |
9ec52099e
|
582 |
.data = NULL, |
1da177e4c
|
583 584 |
.maxlen = sizeof (int), .mode = 0600, |
6d4561110
|
585 |
.proc_handler = proc_do_cad_pid, |
1da177e4c
|
586 |
}, |
d6f8ff738
|
587 |
#endif |
1da177e4c
|
588 |
{ |
1da177e4c
|
589 590 591 592 |
.procname = "threads-max", .data = &max_threads, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
593 |
.proc_handler = proc_dointvec, |
1da177e4c
|
594 595 |
}, { |
1da177e4c
|
596 597 598 599 |
.procname = "random", .mode = 0555, .child = random_table, }, |
1da177e4c
|
600 |
{ |
1da177e4c
|
601 602 603 604 |
.procname = "overflowuid", .data = &overflowuid, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
605 |
.proc_handler = proc_dointvec_minmax, |
1da177e4c
|
606 607 608 609 |
.extra1 = &minolduid, .extra2 = &maxolduid, }, { |
1da177e4c
|
610 611 612 613 |
.procname = "overflowgid", .data = &overflowgid, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
614 |
.proc_handler = proc_dointvec_minmax, |
1da177e4c
|
615 616 617 |
.extra1 = &minolduid, .extra2 = &maxolduid, }, |
347a8dc3b
|
618 |
#ifdef CONFIG_S390 |
1da177e4c
|
619 620 |
#ifdef CONFIG_MATHEMU { |
1da177e4c
|
621 622 623 624 |
.procname = "ieee_emulation_warnings", .data = &sysctl_ieee_emulation_warnings, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
625 |
.proc_handler = proc_dointvec, |
1da177e4c
|
626 627 |
}, #endif |
1da177e4c
|
628 |
{ |
1da177e4c
|
629 |
.procname = "userprocess_debug", |
ab3c68ee5
|
630 |
.data = &show_unhandled_signals, |
1da177e4c
|
631 632 |
.maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
633 |
.proc_handler = proc_dointvec, |
1da177e4c
|
634 635 636 |
}, #endif { |
1da177e4c
|
637 638 639 640 |
.procname = "pid_max", .data = &pid_max, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
641 |
.proc_handler = proc_dointvec_minmax, |
1da177e4c
|
642 643 644 645 |
.extra1 = &pid_max_min, .extra2 = &pid_max_max, }, { |
1da177e4c
|
646 647 648 649 |
.procname = "panic_on_oops", .data = &panic_on_oops, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
650 |
.proc_handler = proc_dointvec, |
1da177e4c
|
651 |
}, |
7ef3d2fd1
|
652 653 |
#if defined CONFIG_PRINTK { |
7ef3d2fd1
|
654 655 656 657 |
.procname = "printk", .data = &console_loglevel, .maxlen = 4*sizeof(int), .mode = 0644, |
6d4561110
|
658 |
.proc_handler = proc_dointvec, |
7ef3d2fd1
|
659 |
}, |
1da177e4c
|
660 |
{ |
1da177e4c
|
661 |
.procname = "printk_ratelimit", |
717115e1a
|
662 |
.data = &printk_ratelimit_state.interval, |
1da177e4c
|
663 664 |
.maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
665 |
.proc_handler = proc_dointvec_jiffies, |
1da177e4c
|
666 667 |
}, { |
1da177e4c
|
668 |
.procname = "printk_ratelimit_burst", |
717115e1a
|
669 |
.data = &printk_ratelimit_state.burst, |
1da177e4c
|
670 671 |
.maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
672 |
.proc_handler = proc_dointvec, |
1da177e4c
|
673 |
}, |
af91322ef
|
674 |
{ |
af91322ef
|
675 676 677 678 |
.procname = "printk_delay", .data = &printk_delay_msec, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
679 |
.proc_handler = proc_dointvec_minmax, |
af91322ef
|
680 681 682 |
.extra1 = &zero, .extra2 = &ten_thousand, }, |
1da177e4c
|
683 |
{ |
eaf06b241
|
684 685 686 687 688 689 690 691 |
.procname = "dmesg_restrict", .data = &dmesg_restrict, .maxlen = sizeof(int), .mode = 0644, .proc_handler = proc_dointvec_minmax, .extra1 = &zero, .extra2 = &one, }, |
455cd5ab3
|
692 693 694 695 696 |
{ .procname = "kptr_restrict", .data = &kptr_restrict, .maxlen = sizeof(int), .mode = 0644, |
bfdc0b497
|
697 |
.proc_handler = proc_dmesg_restrict, |
455cd5ab3
|
698 699 700 |
.extra1 = &zero, .extra2 = &two, }, |
df6e61d4c
|
701 |
#endif |
eaf06b241
|
702 |
{ |
1da177e4c
|
703 704 705 706 |
.procname = "ngroups_max", .data = &ngroups_max, .maxlen = sizeof (int), .mode = 0444, |
6d4561110
|
707 |
.proc_handler = proc_dointvec, |
1da177e4c
|
708 |
}, |
58687acba
|
709 |
#if defined(CONFIG_LOCKUP_DETECTOR) |
504d7cf10
|
710 |
{ |
58687acba
|
711 712 |
.procname = "watchdog", .data = &watchdog_enabled, |
504d7cf10
|
713 714 |
.maxlen = sizeof (int), .mode = 0644, |
586692a5a
|
715 716 717 |
.proc_handler = proc_dowatchdog, .extra1 = &zero, .extra2 = &one, |
58687acba
|
718 719 720 |
}, { .procname = "watchdog_thresh", |
586692a5a
|
721 |
.data = &watchdog_thresh, |
58687acba
|
722 723 |
.maxlen = sizeof(int), .mode = 0644, |
586692a5a
|
724 |
.proc_handler = proc_dowatchdog, |
58687acba
|
725 726 |
.extra1 = &neg_one, .extra2 = &sixty, |
504d7cf10
|
727 |
}, |
2508ce184
|
728 729 730 731 732 733 734 735 736 |
{ .procname = "softlockup_panic", .data = &softlockup_panic, .maxlen = sizeof(int), .mode = 0644, .proc_handler = proc_dointvec_minmax, .extra1 = &zero, .extra2 = &one, }, |
5dc305587
|
737 738 739 740 741 |
{ .procname = "nmi_watchdog", .data = &watchdog_enabled, .maxlen = sizeof (int), .mode = 0644, |
586692a5a
|
742 743 744 |
.proc_handler = proc_dowatchdog, .extra1 = &zero, .extra2 = &one, |
5dc305587
|
745 746 747 748 749 750 751 752 753 754 |
}, #endif #if defined(CONFIG_X86_LOCAL_APIC) && defined(CONFIG_X86) { .procname = "unknown_nmi_panic", .data = &unknown_nmi_panic, .maxlen = sizeof (int), .mode = 0644, .proc_handler = proc_dointvec, }, |
504d7cf10
|
755 |
#endif |
1da177e4c
|
756 757 |
#if defined(CONFIG_X86) { |
8da5adda9
|
758 759 760 761 |
.procname = "panic_on_unrecovered_nmi", .data = &panic_on_unrecovered_nmi, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
762 |
.proc_handler = proc_dointvec, |
8da5adda9
|
763 764 |
}, { |
5211a242d
|
765 766 767 768 |
.procname = "panic_on_io_nmi", .data = &panic_on_io_nmi, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
769 |
.proc_handler = proc_dointvec, |
5211a242d
|
770 771 |
}, { |
1da177e4c
|
772 773 774 775 |
.procname = "bootloader_type", .data = &bootloader_type, .maxlen = sizeof (int), .mode = 0444, |
6d4561110
|
776 |
.proc_handler = proc_dointvec, |
1da177e4c
|
777 |
}, |
0741f4d20
|
778 |
{ |
5031296c5
|
779 780 781 782 |
.procname = "bootloader_version", .data = &bootloader_version, .maxlen = sizeof (int), .mode = 0444, |
6d4561110
|
783 |
.proc_handler = proc_dointvec, |
5031296c5
|
784 785 |
}, { |
0741f4d20
|
786 787 788 789 |
.procname = "kstack_depth_to_print", .data = &kstack_depth_to_print, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
790 |
.proc_handler = proc_dointvec, |
0741f4d20
|
791 |
}, |
6e7c40259
|
792 |
{ |
6e7c40259
|
793 794 795 796 |
.procname = "io_delay_type", .data = &io_delay_type, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
797 |
.proc_handler = proc_dointvec, |
6e7c40259
|
798 |
}, |
1da177e4c
|
799 |
#endif |
7a9166e3b
|
800 |
#if defined(CONFIG_MMU) |
1da177e4c
|
801 |
{ |
1da177e4c
|
802 803 804 805 |
.procname = "randomize_va_space", .data = &randomize_va_space, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
806 |
.proc_handler = proc_dointvec, |
1da177e4c
|
807 |
}, |
7a9166e3b
|
808 |
#endif |
0152fb376
|
809 |
#if defined(CONFIG_S390) && defined(CONFIG_SMP) |
951f22d5b
|
810 |
{ |
951f22d5b
|
811 812 813 814 |
.procname = "spin_retry", .data = &spin_retry, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
815 |
.proc_handler = proc_dointvec, |
951f22d5b
|
816 817 |
}, #endif |
673d5b43d
|
818 |
#if defined(CONFIG_ACPI_SLEEP) && defined(CONFIG_X86) |
c255d844d
|
819 |
{ |
c255d844d
|
820 |
.procname = "acpi_video_flags", |
77afcf78a
|
821 |
.data = &acpi_realmode_flags, |
c255d844d
|
822 823 |
.maxlen = sizeof (unsigned long), .mode = 0644, |
6d4561110
|
824 |
.proc_handler = proc_doulongvec_minmax, |
c255d844d
|
825 826 |
}, #endif |
d2b176ed8
|
827 828 |
#ifdef CONFIG_IA64 { |
d2b176ed8
|
829 830 831 832 |
.procname = "ignore-unaligned-usertrap", .data = &no_unaligned_warning, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
833 |
.proc_handler = proc_dointvec, |
d2b176ed8
|
834 |
}, |
88fc241f5
|
835 |
{ |
88fc241f5
|
836 837 838 839 |
.procname = "unaligned-dump-stack", .data = &unaligned_dump_stack, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
840 |
.proc_handler = proc_dointvec, |
88fc241f5
|
841 |
}, |
d2b176ed8
|
842 |
#endif |
e162b39a3
|
843 844 |
#ifdef CONFIG_DETECT_HUNG_TASK { |
e162b39a3
|
845 846 847 848 |
.procname = "hung_task_panic", .data = &sysctl_hung_task_panic, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
849 |
.proc_handler = proc_dointvec_minmax, |
e162b39a3
|
850 851 852 |
.extra1 = &zero, .extra2 = &one, }, |
82a1fcb90
|
853 |
{ |
82a1fcb90
|
854 855 |
.procname = "hung_task_check_count", .data = &sysctl_hung_task_check_count, |
90739081e
|
856 |
.maxlen = sizeof(unsigned long), |
82a1fcb90
|
857 |
.mode = 0644, |
6d4561110
|
858 |
.proc_handler = proc_doulongvec_minmax, |
82a1fcb90
|
859 860 |
}, { |
82a1fcb90
|
861 862 |
.procname = "hung_task_timeout_secs", .data = &sysctl_hung_task_timeout_secs, |
90739081e
|
863 |
.maxlen = sizeof(unsigned long), |
82a1fcb90
|
864 |
.mode = 0644, |
6d4561110
|
865 |
.proc_handler = proc_dohung_task_timeout_secs, |
82a1fcb90
|
866 867 |
}, { |
82a1fcb90
|
868 869 |
.procname = "hung_task_warnings", .data = &sysctl_hung_task_warnings, |
90739081e
|
870 |
.maxlen = sizeof(unsigned long), |
82a1fcb90
|
871 |
.mode = 0644, |
6d4561110
|
872 |
.proc_handler = proc_doulongvec_minmax, |
82a1fcb90
|
873 |
}, |
c4f3b63fe
|
874 |
#endif |
bebfa1013
|
875 876 |
#ifdef CONFIG_COMPAT { |
bebfa1013
|
877 878 879 880 |
.procname = "compat-log", .data = &compat_log, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
881 |
.proc_handler = proc_dointvec, |
bebfa1013
|
882 883 |
}, #endif |
23f78d4a0
|
884 885 |
#ifdef CONFIG_RT_MUTEXES { |
23f78d4a0
|
886 887 888 889 |
.procname = "max_lock_depth", .data = &max_lock_depth, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
890 |
.proc_handler = proc_dointvec, |
23f78d4a0
|
891 892 |
}, #endif |
10a0a8d4e
|
893 |
{ |
10a0a8d4e
|
894 895 896 897 |
.procname = "poweroff_cmd", .data = &poweroff_cmd, .maxlen = POWEROFF_CMD_PATH_LEN, .mode = 0644, |
6d4561110
|
898 |
.proc_handler = proc_dostring, |
10a0a8d4e
|
899 |
}, |
0b77f5bfb
|
900 901 |
#ifdef CONFIG_KEYS { |
0b77f5bfb
|
902 903 904 905 906 |
.procname = "keys", .mode = 0555, .child = key_sysctls, }, #endif |
31a72bce0
|
907 908 |
#ifdef CONFIG_RCU_TORTURE_TEST { |
31a72bce0
|
909 910 911 912 |
.procname = "rcutorture_runnable", .data = &rcutorture_runnable, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
913 |
.proc_handler = proc_dointvec, |
31a72bce0
|
914 915 |
}, #endif |
cdd6c482c
|
916 |
#ifdef CONFIG_PERF_EVENTS |
1ccd15497
|
917 |
{ |
cdd6c482c
|
918 919 920 |
.procname = "perf_event_paranoid", .data = &sysctl_perf_event_paranoid, .maxlen = sizeof(sysctl_perf_event_paranoid), |
1ccd15497
|
921 |
.mode = 0644, |
6d4561110
|
922 |
.proc_handler = proc_dointvec, |
1ccd15497
|
923 |
}, |
c5078f78b
|
924 |
{ |
cdd6c482c
|
925 926 927 |
.procname = "perf_event_mlock_kb", .data = &sysctl_perf_event_mlock, .maxlen = sizeof(sysctl_perf_event_mlock), |
c5078f78b
|
928 |
.mode = 0644, |
6d4561110
|
929 |
.proc_handler = proc_dointvec, |
c5078f78b
|
930 |
}, |
a78ac3258
|
931 |
{ |
cdd6c482c
|
932 933 934 |
.procname = "perf_event_max_sample_rate", .data = &sysctl_perf_event_sample_rate, .maxlen = sizeof(sysctl_perf_event_sample_rate), |
a78ac3258
|
935 |
.mode = 0644, |
163ec4354
|
936 |
.proc_handler = perf_proc_update_handler, |
a78ac3258
|
937 |
}, |
1ccd15497
|
938 |
#endif |
dfec072ec
|
939 940 |
#ifdef CONFIG_KMEMCHECK { |
dfec072ec
|
941 942 943 944 |
.procname = "kmemcheck", .data = &kmemcheck_enabled, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
945 |
.proc_handler = proc_dointvec, |
dfec072ec
|
946 947 |
}, #endif |
cb684b5bc
|
948 |
#ifdef CONFIG_BLOCK |
5e605b64a
|
949 |
{ |
5e605b64a
|
950 951 952 953 |
.procname = "blk_iopoll", .data = &blk_iopoll_enabled, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
954 |
.proc_handler = proc_dointvec, |
5e605b64a
|
955 |
}, |
cb684b5bc
|
956 |
#endif |
6fce56ec9
|
957 |
{ } |
1da177e4c
|
958 |
}; |
d8217f076
|
959 |
static struct ctl_table vm_table[] = { |
1da177e4c
|
960 |
{ |
1da177e4c
|
961 962 963 964 |
.procname = "overcommit_memory", .data = &sysctl_overcommit_memory, .maxlen = sizeof(sysctl_overcommit_memory), .mode = 0644, |
cb16e95fa
|
965 966 967 |
.proc_handler = proc_dointvec_minmax, .extra1 = &zero, .extra2 = &two, |
1da177e4c
|
968 969 |
}, { |
fadd8fbd1
|
970 971 972 973 |
.procname = "panic_on_oom", .data = &sysctl_panic_on_oom, .maxlen = sizeof(sysctl_panic_on_oom), .mode = 0644, |
cb16e95fa
|
974 975 976 |
.proc_handler = proc_dointvec_minmax, .extra1 = &zero, .extra2 = &two, |
fadd8fbd1
|
977 978 |
}, { |
fe071d7e8
|
979 980 981 982 |
.procname = "oom_kill_allocating_task", .data = &sysctl_oom_kill_allocating_task, .maxlen = sizeof(sysctl_oom_kill_allocating_task), .mode = 0644, |
6d4561110
|
983 |
.proc_handler = proc_dointvec, |
fe071d7e8
|
984 985 |
}, { |
fef1bdd68
|
986 987 988 989 |
.procname = "oom_dump_tasks", .data = &sysctl_oom_dump_tasks, .maxlen = sizeof(sysctl_oom_dump_tasks), .mode = 0644, |
6d4561110
|
990 |
.proc_handler = proc_dointvec, |
fef1bdd68
|
991 992 |
}, { |
1da177e4c
|
993 994 995 996 |
.procname = "overcommit_ratio", .data = &sysctl_overcommit_ratio, .maxlen = sizeof(sysctl_overcommit_ratio), .mode = 0644, |
6d4561110
|
997 |
.proc_handler = proc_dointvec, |
1da177e4c
|
998 999 |
}, { |
1da177e4c
|
1000 1001 1002 1003 |
.procname = "page-cluster", .data = &page_cluster, .maxlen = sizeof(int), .mode = 0644, |
cb16e95fa
|
1004 1005 |
.proc_handler = proc_dointvec_minmax, .extra1 = &zero, |
1da177e4c
|
1006 1007 |
}, { |
1da177e4c
|
1008 1009 1010 1011 |
.procname = "dirty_background_ratio", .data = &dirty_background_ratio, .maxlen = sizeof(dirty_background_ratio), .mode = 0644, |
6d4561110
|
1012 |
.proc_handler = dirty_background_ratio_handler, |
1da177e4c
|
1013 1014 1015 1016 |
.extra1 = &zero, .extra2 = &one_hundred, }, { |
2da02997e
|
1017 1018 1019 1020 |
.procname = "dirty_background_bytes", .data = &dirty_background_bytes, .maxlen = sizeof(dirty_background_bytes), .mode = 0644, |
6d4561110
|
1021 |
.proc_handler = dirty_background_bytes_handler, |
fc3501d41
|
1022 |
.extra1 = &one_ul, |
2da02997e
|
1023 1024 |
}, { |
1da177e4c
|
1025 1026 1027 1028 |
.procname = "dirty_ratio", .data = &vm_dirty_ratio, .maxlen = sizeof(vm_dirty_ratio), .mode = 0644, |
6d4561110
|
1029 |
.proc_handler = dirty_ratio_handler, |
1da177e4c
|
1030 1031 1032 1033 |
.extra1 = &zero, .extra2 = &one_hundred, }, { |
2da02997e
|
1034 1035 1036 1037 |
.procname = "dirty_bytes", .data = &vm_dirty_bytes, .maxlen = sizeof(vm_dirty_bytes), .mode = 0644, |
6d4561110
|
1038 |
.proc_handler = dirty_bytes_handler, |
9e4a5bda8
|
1039 |
.extra1 = &dirty_bytes_min, |
2da02997e
|
1040 1041 |
}, { |
1da177e4c
|
1042 |
.procname = "dirty_writeback_centisecs", |
f6ef94381
|
1043 1044 |
.data = &dirty_writeback_interval, .maxlen = sizeof(dirty_writeback_interval), |
1da177e4c
|
1045 |
.mode = 0644, |
6d4561110
|
1046 |
.proc_handler = dirty_writeback_centisecs_handler, |
1da177e4c
|
1047 1048 |
}, { |
1da177e4c
|
1049 |
.procname = "dirty_expire_centisecs", |
f6ef94381
|
1050 1051 |
.data = &dirty_expire_interval, .maxlen = sizeof(dirty_expire_interval), |
1da177e4c
|
1052 |
.mode = 0644, |
cb16e95fa
|
1053 1054 |
.proc_handler = proc_dointvec_minmax, .extra1 = &zero, |
1da177e4c
|
1055 1056 |
}, { |
1da177e4c
|
1057 1058 1059 1060 |
.procname = "nr_pdflush_threads", .data = &nr_pdflush_threads, .maxlen = sizeof nr_pdflush_threads, .mode = 0444 /* read-only*/, |
6d4561110
|
1061 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1062 1063 |
}, { |
1da177e4c
|
1064 1065 1066 1067 |
.procname = "swappiness", .data = &vm_swappiness, .maxlen = sizeof(vm_swappiness), .mode = 0644, |
6d4561110
|
1068 |
.proc_handler = proc_dointvec_minmax, |
1da177e4c
|
1069 1070 1071 1072 |
.extra1 = &zero, .extra2 = &one_hundred, }, #ifdef CONFIG_HUGETLB_PAGE |
06808b082
|
1073 |
{ |
1da177e4c
|
1074 |
.procname = "nr_hugepages", |
e5ff21594
|
1075 |
.data = NULL, |
1da177e4c
|
1076 1077 |
.maxlen = sizeof(unsigned long), .mode = 0644, |
6d4561110
|
1078 |
.proc_handler = hugetlb_sysctl_handler, |
1da177e4c
|
1079 1080 |
.extra1 = (void *)&hugetlb_zero, .extra2 = (void *)&hugetlb_infinity, |
06808b082
|
1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 |
}, #ifdef CONFIG_NUMA { .procname = "nr_hugepages_mempolicy", .data = NULL, .maxlen = sizeof(unsigned long), .mode = 0644, .proc_handler = &hugetlb_mempolicy_sysctl_handler, .extra1 = (void *)&hugetlb_zero, .extra2 = (void *)&hugetlb_infinity, }, #endif |
1da177e4c
|
1093 |
{ |
1da177e4c
|
1094 1095 1096 1097 |
.procname = "hugetlb_shm_group", .data = &sysctl_hugetlb_shm_group, .maxlen = sizeof(gid_t), .mode = 0644, |
6d4561110
|
1098 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1099 |
}, |
396faf030
|
1100 |
{ |
396faf030
|
1101 1102 1103 1104 |
.procname = "hugepages_treat_as_movable", .data = &hugepages_treat_as_movable, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1105 |
.proc_handler = hugetlb_treat_movable_handler, |
396faf030
|
1106 |
}, |
54f9f80d6
|
1107 |
{ |
d1c3fb1f8
|
1108 |
.procname = "nr_overcommit_hugepages", |
e5ff21594
|
1109 1110 |
.data = NULL, .maxlen = sizeof(unsigned long), |
d1c3fb1f8
|
1111 |
.mode = 0644, |
6d4561110
|
1112 |
.proc_handler = hugetlb_overcommit_handler, |
e5ff21594
|
1113 1114 |
.extra1 = (void *)&hugetlb_zero, .extra2 = (void *)&hugetlb_infinity, |
d1c3fb1f8
|
1115 |
}, |
1da177e4c
|
1116 1117 |
#endif { |
1da177e4c
|
1118 1119 1120 1121 |
.procname = "lowmem_reserve_ratio", .data = &sysctl_lowmem_reserve_ratio, .maxlen = sizeof(sysctl_lowmem_reserve_ratio), .mode = 0644, |
6d4561110
|
1122 |
.proc_handler = lowmem_reserve_ratio_sysctl_handler, |
1da177e4c
|
1123 1124 |
}, { |
9d0243bca
|
1125 1126 1127 1128 1129 |
.procname = "drop_caches", .data = &sysctl_drop_caches, .maxlen = sizeof(int), .mode = 0644, .proc_handler = drop_caches_sysctl_handler, |
cb16e95fa
|
1130 1131 |
.extra1 = &one, .extra2 = &three, |
9d0243bca
|
1132 |
}, |
76ab0f530
|
1133 1134 1135 1136 1137 1138 1139 1140 |
#ifdef CONFIG_COMPACTION { .procname = "compact_memory", .data = &sysctl_compact_memory, .maxlen = sizeof(int), .mode = 0200, .proc_handler = sysctl_compaction_handler, }, |
5e7719058
|
1141 1142 1143 1144 1145 1146 1147 1148 1149 |
{ .procname = "extfrag_threshold", .data = &sysctl_extfrag_threshold, .maxlen = sizeof(int), .mode = 0644, .proc_handler = sysctl_extfrag_handler, .extra1 = &min_extfrag_threshold, .extra2 = &max_extfrag_threshold, }, |
76ab0f530
|
1150 |
#endif /* CONFIG_COMPACTION */ |
9d0243bca
|
1151 |
{ |
1da177e4c
|
1152 1153 1154 1155 |
.procname = "min_free_kbytes", .data = &min_free_kbytes, .maxlen = sizeof(min_free_kbytes), .mode = 0644, |
6d4561110
|
1156 |
.proc_handler = min_free_kbytes_sysctl_handler, |
1da177e4c
|
1157 1158 |
.extra1 = &zero, }, |
8ad4b1fb8
|
1159 |
{ |
8ad4b1fb8
|
1160 1161 1162 1163 |
.procname = "percpu_pagelist_fraction", .data = &percpu_pagelist_fraction, .maxlen = sizeof(percpu_pagelist_fraction), .mode = 0644, |
6d4561110
|
1164 |
.proc_handler = percpu_pagelist_fraction_sysctl_handler, |
8ad4b1fb8
|
1165 1166 |
.extra1 = &min_percpu_pagelist_fract, }, |
1da177e4c
|
1167 1168 |
#ifdef CONFIG_MMU { |
1da177e4c
|
1169 1170 1171 1172 |
.procname = "max_map_count", .data = &sysctl_max_map_count, .maxlen = sizeof(sysctl_max_map_count), .mode = 0644, |
3e26120cc
|
1173 |
.proc_handler = proc_dointvec_minmax, |
70da2340f
|
1174 |
.extra1 = &zero, |
1da177e4c
|
1175 |
}, |
dd8632a12
|
1176 1177 |
#else { |
dd8632a12
|
1178 1179 1180 1181 |
.procname = "nr_trim_pages", .data = &sysctl_nr_trim_pages, .maxlen = sizeof(sysctl_nr_trim_pages), .mode = 0644, |
6d4561110
|
1182 |
.proc_handler = proc_dointvec_minmax, |
dd8632a12
|
1183 1184 |
.extra1 = &zero, }, |
1da177e4c
|
1185 1186 |
#endif { |
1da177e4c
|
1187 1188 1189 1190 |
.procname = "laptop_mode", .data = &laptop_mode, .maxlen = sizeof(laptop_mode), .mode = 0644, |
6d4561110
|
1191 |
.proc_handler = proc_dointvec_jiffies, |
1da177e4c
|
1192 1193 |
}, { |
1da177e4c
|
1194 1195 1196 1197 |
.procname = "block_dump", .data = &block_dump, .maxlen = sizeof(block_dump), .mode = 0644, |
6d4561110
|
1198 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1199 1200 1201 |
.extra1 = &zero, }, { |
1da177e4c
|
1202 1203 1204 1205 |
.procname = "vfs_cache_pressure", .data = &sysctl_vfs_cache_pressure, .maxlen = sizeof(sysctl_vfs_cache_pressure), .mode = 0644, |
6d4561110
|
1206 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1207 1208 1209 1210 |
.extra1 = &zero, }, #ifdef HAVE_ARCH_PICK_MMAP_LAYOUT { |
1da177e4c
|
1211 1212 1213 1214 |
.procname = "legacy_va_layout", .data = &sysctl_legacy_va_layout, .maxlen = sizeof(sysctl_legacy_va_layout), .mode = 0644, |
6d4561110
|
1215 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1216 1217 1218 |
.extra1 = &zero, }, #endif |
1743660b9
|
1219 1220 |
#ifdef CONFIG_NUMA { |
1743660b9
|
1221 1222 1223 1224 |
.procname = "zone_reclaim_mode", .data = &zone_reclaim_mode, .maxlen = sizeof(zone_reclaim_mode), .mode = 0644, |
6d4561110
|
1225 |
.proc_handler = proc_dointvec, |
c84db23c6
|
1226 |
.extra1 = &zero, |
1743660b9
|
1227 |
}, |
9614634fe
|
1228 |
{ |
9614634fe
|
1229 1230 1231 1232 |
.procname = "min_unmapped_ratio", .data = &sysctl_min_unmapped_ratio, .maxlen = sizeof(sysctl_min_unmapped_ratio), .mode = 0644, |
6d4561110
|
1233 |
.proc_handler = sysctl_min_unmapped_ratio_sysctl_handler, |
9614634fe
|
1234 1235 1236 |
.extra1 = &zero, .extra2 = &one_hundred, }, |
0ff38490c
|
1237 |
{ |
0ff38490c
|
1238 1239 1240 1241 |
.procname = "min_slab_ratio", .data = &sysctl_min_slab_ratio, .maxlen = sizeof(sysctl_min_slab_ratio), .mode = 0644, |
6d4561110
|
1242 |
.proc_handler = sysctl_min_slab_ratio_sysctl_handler, |
0ff38490c
|
1243 1244 1245 |
.extra1 = &zero, .extra2 = &one_hundred, }, |
1743660b9
|
1246 |
#endif |
77461ab33
|
1247 1248 |
#ifdef CONFIG_SMP { |
77461ab33
|
1249 1250 1251 1252 |
.procname = "stat_interval", .data = &sysctl_stat_interval, .maxlen = sizeof(sysctl_stat_interval), .mode = 0644, |
6d4561110
|
1253 |
.proc_handler = proc_dointvec_jiffies, |
77461ab33
|
1254 1255 |
}, #endif |
6e1415467
|
1256 |
#ifdef CONFIG_MMU |
ed0321895
|
1257 |
{ |
ed0321895
|
1258 |
.procname = "mmap_min_addr", |
788084aba
|
1259 1260 |
.data = &dac_mmap_min_addr, .maxlen = sizeof(unsigned long), |
ed0321895
|
1261 |
.mode = 0644, |
6d4561110
|
1262 |
.proc_handler = mmap_min_addr_handler, |
ed0321895
|
1263 |
}, |
6e1415467
|
1264 |
#endif |
f0c0b2b80
|
1265 1266 |
#ifdef CONFIG_NUMA { |
f0c0b2b80
|
1267 1268 1269 1270 |
.procname = "numa_zonelist_order", .data = &numa_zonelist_order, .maxlen = NUMA_ZONELIST_ORDER_LEN, .mode = 0644, |
6d4561110
|
1271 |
.proc_handler = numa_zonelist_order_handler, |
f0c0b2b80
|
1272 1273 |
}, #endif |
2b8232ce5
|
1274 |
#if (defined(CONFIG_X86_32) && !defined(CONFIG_UML))|| \ |
5c36e6578
|
1275 |
(defined(CONFIG_SUPERH) && defined(CONFIG_VSYSCALL)) |
e6e5494cb
|
1276 |
{ |
e6e5494cb
|
1277 1278 1279 1280 |
.procname = "vdso_enabled", .data = &vdso_enabled, .maxlen = sizeof(vdso_enabled), .mode = 0644, |
6d4561110
|
1281 |
.proc_handler = proc_dointvec, |
e6e5494cb
|
1282 1283 1284 |
.extra1 = &zero, }, #endif |
195cf453d
|
1285 1286 |
#ifdef CONFIG_HIGHMEM { |
195cf453d
|
1287 1288 1289 1290 |
.procname = "highmem_is_dirtyable", .data = &vm_highmem_is_dirtyable, .maxlen = sizeof(vm_highmem_is_dirtyable), .mode = 0644, |
6d4561110
|
1291 |
.proc_handler = proc_dointvec_minmax, |
195cf453d
|
1292 1293 1294 1295 |
.extra1 = &zero, .extra2 = &one, }, #endif |
4be6f6bb6
|
1296 |
{ |
4be6f6bb6
|
1297 1298 1299 1300 |
.procname = "scan_unevictable_pages", .data = &scan_unevictable_pages, .maxlen = sizeof(scan_unevictable_pages), .mode = 0644, |
6d4561110
|
1301 |
.proc_handler = scan_unevictable_handler, |
4be6f6bb6
|
1302 |
}, |
6a46079cf
|
1303 1304 |
#ifdef CONFIG_MEMORY_FAILURE { |
6a46079cf
|
1305 1306 1307 1308 |
.procname = "memory_failure_early_kill", .data = &sysctl_memory_failure_early_kill, .maxlen = sizeof(sysctl_memory_failure_early_kill), .mode = 0644, |
6d4561110
|
1309 |
.proc_handler = proc_dointvec_minmax, |
6a46079cf
|
1310 1311 1312 1313 |
.extra1 = &zero, .extra2 = &one, }, { |
6a46079cf
|
1314 1315 1316 1317 |
.procname = "memory_failure_recovery", .data = &sysctl_memory_failure_recovery, .maxlen = sizeof(sysctl_memory_failure_recovery), .mode = 0644, |
6d4561110
|
1318 |
.proc_handler = proc_dointvec_minmax, |
6a46079cf
|
1319 1320 1321 1322 |
.extra1 = &zero, .extra2 = &one, }, #endif |
6fce56ec9
|
1323 |
{ } |
1da177e4c
|
1324 |
}; |
2abc26fc6
|
1325 |
#if defined(CONFIG_BINFMT_MISC) || defined(CONFIG_BINFMT_MISC_MODULE) |
d8217f076
|
1326 |
static struct ctl_table binfmt_misc_table[] = { |
6fce56ec9
|
1327 |
{ } |
2abc26fc6
|
1328 1329 |
}; #endif |
d8217f076
|
1330 |
static struct ctl_table fs_table[] = { |
1da177e4c
|
1331 |
{ |
1da177e4c
|
1332 1333 1334 1335 |
.procname = "inode-nr", .data = &inodes_stat, .maxlen = 2*sizeof(int), .mode = 0444, |
cffbc8aa3
|
1336 |
.proc_handler = proc_nr_inodes, |
1da177e4c
|
1337 1338 |
}, { |
1da177e4c
|
1339 1340 1341 1342 |
.procname = "inode-state", .data = &inodes_stat, .maxlen = 7*sizeof(int), .mode = 0444, |
cffbc8aa3
|
1343 |
.proc_handler = proc_nr_inodes, |
1da177e4c
|
1344 1345 |
}, { |
1da177e4c
|
1346 1347 |
.procname = "file-nr", .data = &files_stat, |
518de9b39
|
1348 |
.maxlen = sizeof(files_stat), |
1da177e4c
|
1349 |
.mode = 0444, |
6d4561110
|
1350 |
.proc_handler = proc_nr_files, |
1da177e4c
|
1351 1352 |
}, { |
1da177e4c
|
1353 1354 |
.procname = "file-max", .data = &files_stat.max_files, |
518de9b39
|
1355 |
.maxlen = sizeof(files_stat.max_files), |
1da177e4c
|
1356 |
.mode = 0644, |
518de9b39
|
1357 |
.proc_handler = proc_doulongvec_minmax, |
1da177e4c
|
1358 1359 |
}, { |
9cfe015aa
|
1360 1361 1362 1363 |
.procname = "nr_open", .data = &sysctl_nr_open, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1364 |
.proc_handler = proc_dointvec_minmax, |
eceea0b3d
|
1365 1366 |
.extra1 = &sysctl_nr_open_min, .extra2 = &sysctl_nr_open_max, |
9cfe015aa
|
1367 1368 |
}, { |
1da177e4c
|
1369 1370 1371 1372 |
.procname = "dentry-state", .data = &dentry_stat, .maxlen = 6*sizeof(int), .mode = 0444, |
312d3ca85
|
1373 |
.proc_handler = proc_nr_dentry, |
1da177e4c
|
1374 1375 |
}, { |
1da177e4c
|
1376 1377 1378 1379 |
.procname = "overflowuid", .data = &fs_overflowuid, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1380 |
.proc_handler = proc_dointvec_minmax, |
1da177e4c
|
1381 1382 1383 1384 |
.extra1 = &minolduid, .extra2 = &maxolduid, }, { |
1da177e4c
|
1385 1386 1387 1388 |
.procname = "overflowgid", .data = &fs_overflowgid, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1389 |
.proc_handler = proc_dointvec_minmax, |
1da177e4c
|
1390 1391 1392 |
.extra1 = &minolduid, .extra2 = &maxolduid, }, |
bfcd17a6c
|
1393 |
#ifdef CONFIG_FILE_LOCKING |
1da177e4c
|
1394 |
{ |
1da177e4c
|
1395 1396 1397 1398 |
.procname = "leases-enable", .data = &leases_enable, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1399 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1400 |
}, |
bfcd17a6c
|
1401 |
#endif |
1da177e4c
|
1402 1403 |
#ifdef CONFIG_DNOTIFY { |
1da177e4c
|
1404 1405 1406 1407 |
.procname = "dir-notify-enable", .data = &dir_notify_enable, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1408 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1409 1410 1411 |
}, #endif #ifdef CONFIG_MMU |
bfcd17a6c
|
1412 |
#ifdef CONFIG_FILE_LOCKING |
1da177e4c
|
1413 |
{ |
1da177e4c
|
1414 1415 1416 1417 |
.procname = "lease-break-time", .data = &lease_break_time, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1418 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1419 |
}, |
bfcd17a6c
|
1420 |
#endif |
ebf3f09c6
|
1421 |
#ifdef CONFIG_AIO |
1da177e4c
|
1422 |
{ |
1da177e4c
|
1423 1424 1425 1426 |
.procname = "aio-nr", .data = &aio_nr, .maxlen = sizeof(aio_nr), .mode = 0444, |
6d4561110
|
1427 |
.proc_handler = proc_doulongvec_minmax, |
1da177e4c
|
1428 1429 |
}, { |
1da177e4c
|
1430 1431 1432 1433 |
.procname = "aio-max-nr", .data = &aio_max_nr, .maxlen = sizeof(aio_max_nr), .mode = 0644, |
6d4561110
|
1434 |
.proc_handler = proc_doulongvec_minmax, |
1da177e4c
|
1435 |
}, |
ebf3f09c6
|
1436 |
#endif /* CONFIG_AIO */ |
2d9048e20
|
1437 |
#ifdef CONFIG_INOTIFY_USER |
0399cb08c
|
1438 |
{ |
0399cb08c
|
1439 1440 1441 1442 1443 |
.procname = "inotify", .mode = 0555, .child = inotify_table, }, #endif |
7ef9964e6
|
1444 1445 1446 1447 1448 1449 1450 |
#ifdef CONFIG_EPOLL { .procname = "epoll", .mode = 0555, .child = epoll_table, }, #endif |
1da177e4c
|
1451 |
#endif |
d6e711448
|
1452 |
{ |
d6e711448
|
1453 1454 1455 1456 |
.procname = "suid_dumpable", .data = &suid_dumpable, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1457 |
.proc_handler = proc_dointvec_minmax, |
8e654fba4
|
1458 1459 |
.extra1 = &zero, .extra2 = &two, |
d6e711448
|
1460 |
}, |
2abc26fc6
|
1461 1462 |
#if defined(CONFIG_BINFMT_MISC) || defined(CONFIG_BINFMT_MISC_MODULE) { |
2abc26fc6
|
1463 1464 1465 1466 1467 |
.procname = "binfmt_misc", .mode = 0555, .child = binfmt_misc_table, }, #endif |
b492e95be
|
1468 |
{ |
ff9da691c
|
1469 1470 |
.procname = "pipe-max-size", .data = &pipe_max_size, |
b492e95be
|
1471 1472 |
.maxlen = sizeof(int), .mode = 0644, |
ff9da691c
|
1473 1474 |
.proc_handler = &pipe_proc_fn, .extra1 = &pipe_min_size, |
b492e95be
|
1475 |
}, |
6fce56ec9
|
1476 |
{ } |
1da177e4c
|
1477 |
}; |
d8217f076
|
1478 |
static struct ctl_table debug_table[] = { |
ab3c68ee5
|
1479 1480 |
#if defined(CONFIG_X86) || defined(CONFIG_PPC) || defined(CONFIG_SPARC) || \ defined(CONFIG_S390) |
abd4f7505
|
1481 |
{ |
abd4f7505
|
1482 1483 1484 1485 1486 1487 1488 |
.procname = "exception-trace", .data = &show_unhandled_signals, .maxlen = sizeof(int), .mode = 0644, .proc_handler = proc_dointvec }, #endif |
b2be84df9
|
1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 |
#if defined(CONFIG_OPTPROBES) { .procname = "kprobes-optimization", .data = &sysctl_kprobes_optimization, .maxlen = sizeof(int), .mode = 0644, .proc_handler = proc_kprobes_optimization_handler, .extra1 = &zero, .extra2 = &one, }, #endif |
6fce56ec9
|
1500 |
{ } |
1da177e4c
|
1501 |
}; |
d8217f076
|
1502 |
static struct ctl_table dev_table[] = { |
6fce56ec9
|
1503 |
{ } |
0eeca2830
|
1504 |
}; |
1da177e4c
|
1505 |
|
330d57fb9
|
1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 |
static DEFINE_SPINLOCK(sysctl_lock); /* called under sysctl_lock */ static int use_table(struct ctl_table_header *p) { if (unlikely(p->unregistering)) return 0; p->used++; return 1; } /* called under sysctl_lock */ static void unuse_table(struct ctl_table_header *p) { if (!--p->used) if (unlikely(p->unregistering)) complete(p->unregistering); } /* called under sysctl_lock, will reacquire if has to wait */ static void start_unregistering(struct ctl_table_header *p) { /* * if p->used is 0, nobody will ever touch that entry again; * we'll eliminate all paths to it before dropping sysctl_lock */ if (unlikely(p->used)) { struct completion wait; init_completion(&wait); p->unregistering = &wait; spin_unlock(&sysctl_lock); wait_for_completion(&wait); spin_lock(&sysctl_lock); |
f7e6ced40
|
1539 1540 1541 |
} else { /* anything non-NULL; we'll never dereference it */ p->unregistering = ERR_PTR(-EINVAL); |
330d57fb9
|
1542 1543 1544 1545 1546 1547 1548 |
} /* * do not remove from the list until nobody holds it; walking the * list in do_sysctl() relies on that. */ list_del_init(&p->ctl_entry); } |
f7e6ced40
|
1549 1550 1551 1552 1553 1554 |
void sysctl_head_get(struct ctl_table_header *head) { spin_lock(&sysctl_lock); head->count++; spin_unlock(&sysctl_lock); } |
dfef6dcd3
|
1555 1556 1557 1558 |
static void free_head(struct rcu_head *rcu) { kfree(container_of(rcu, struct ctl_table_header, rcu)); } |
f7e6ced40
|
1559 1560 1561 1562 |
void sysctl_head_put(struct ctl_table_header *head) { spin_lock(&sysctl_lock); if (!--head->count) |
dfef6dcd3
|
1563 |
call_rcu(&head->rcu, free_head); |
f7e6ced40
|
1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 |
spin_unlock(&sysctl_lock); } struct ctl_table_header *sysctl_head_grab(struct ctl_table_header *head) { if (!head) BUG(); spin_lock(&sysctl_lock); if (!use_table(head)) head = ERR_PTR(-ENOENT); spin_unlock(&sysctl_lock); return head; } |
805b5d5e0
|
1577 1578 1579 1580 1581 1582 1583 1584 |
void sysctl_head_finish(struct ctl_table_header *head) { if (!head) return; spin_lock(&sysctl_lock); unuse_table(head); spin_unlock(&sysctl_lock); } |
734550921
|
1585 1586 1587 1588 1589 1590 1591 1592 |
static struct ctl_table_set * lookup_header_set(struct ctl_table_root *root, struct nsproxy *namespaces) { struct ctl_table_set *set = &root->default_set; if (root->lookup) set = root->lookup(root, namespaces); return set; } |
e51b6ba07
|
1593 1594 |
static struct list_head * lookup_header_list(struct ctl_table_root *root, struct nsproxy *namespaces) |
805b5d5e0
|
1595 |
{ |
734550921
|
1596 1597 |
struct ctl_table_set *set = lookup_header_set(root, namespaces); return &set->list; |
e51b6ba07
|
1598 1599 1600 1601 1602 1603 1604 |
} struct ctl_table_header *__sysctl_head_next(struct nsproxy *namespaces, struct ctl_table_header *prev) { struct ctl_table_root *root; struct list_head *header_list; |
805b5d5e0
|
1605 1606 |
struct ctl_table_header *head; struct list_head *tmp; |
e51b6ba07
|
1607 |
|
805b5d5e0
|
1608 1609 |
spin_lock(&sysctl_lock); if (prev) { |
e51b6ba07
|
1610 |
head = prev; |
805b5d5e0
|
1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 |
tmp = &prev->ctl_entry; unuse_table(prev); goto next; } tmp = &root_table_header.ctl_entry; for (;;) { head = list_entry(tmp, struct ctl_table_header, ctl_entry); if (!use_table(head)) goto next; spin_unlock(&sysctl_lock); return head; next: |
e51b6ba07
|
1624 |
root = head->root; |
805b5d5e0
|
1625 |
tmp = tmp->next; |
e51b6ba07
|
1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 |
header_list = lookup_header_list(root, namespaces); if (tmp != header_list) continue; do { root = list_entry(root->root_list.next, struct ctl_table_root, root_list); if (root == &sysctl_table_root) goto out; header_list = lookup_header_list(root, namespaces); } while (list_empty(header_list)); tmp = header_list->next; |
805b5d5e0
|
1638 |
} |
e51b6ba07
|
1639 |
out: |
805b5d5e0
|
1640 1641 1642 |
spin_unlock(&sysctl_lock); return NULL; } |
e51b6ba07
|
1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 |
struct ctl_table_header *sysctl_head_next(struct ctl_table_header *prev) { return __sysctl_head_next(current->nsproxy, prev); } void register_sysctl_root(struct ctl_table_root *root) { spin_lock(&sysctl_lock); list_add_tail(&root->root_list, &sysctl_table_root.root_list); spin_unlock(&sysctl_lock); } |
1da177e4c
|
1654 |
/* |
1ff007eb8
|
1655 |
* sysctl_perm does NOT grant the superuser all rights automatically, because |
1da177e4c
|
1656 1657 1658 1659 1660 |
* some sysctl variables are readonly even to root. */ static int test_perm(int mode, int op) { |
76aac0e9a
|
1661 |
if (!current_euid()) |
1da177e4c
|
1662 1663 1664 |
mode >>= 6; else if (in_egroup_p(0)) mode >>= 3; |
e6305c43e
|
1665 |
if ((op & ~mode & (MAY_READ|MAY_WRITE|MAY_EXEC)) == 0) |
1da177e4c
|
1666 1667 1668 |
return 0; return -EACCES; } |
d7321cd62
|
1669 |
int sysctl_perm(struct ctl_table_root *root, struct ctl_table *table, int op) |
1da177e4c
|
1670 |
{ |
d7321cd62
|
1671 |
int mode; |
d7321cd62
|
1672 1673 1674 1675 1676 1677 |
if (root->permissions) mode = root->permissions(root, current->nsproxy, table); else mode = table->mode; return test_perm(mode, op); |
1da177e4c
|
1678 |
} |
d912b0cc1
|
1679 1680 |
static void sysctl_set_parent(struct ctl_table *parent, struct ctl_table *table) { |
2315ffa0a
|
1681 |
for (; table->procname; table++) { |
d912b0cc1
|
1682 1683 1684 1685 1686 1687 1688 1689 1690 |
table->parent = parent; if (table->child) sysctl_set_parent(table, table->child); } } static __init int sysctl_init(void) { sysctl_set_parent(NULL, root_table); |
88f458e4b
|
1691 |
#ifdef CONFIG_SYSCTL_SYSCALL_CHECK |
b3bd3de66
|
1692 |
sysctl_check_table(current->nsproxy, root_table); |
88f458e4b
|
1693 |
#endif |
d912b0cc1
|
1694 1695 1696 1697 |
return 0; } core_initcall(sysctl_init); |
bfbcf0347
|
1698 1699 |
static struct ctl_table *is_branch_in(struct ctl_table *branch, struct ctl_table *table) |
ae7edecc9
|
1700 1701 1702 1703 1704 1705 |
{ struct ctl_table *p; const char *s = branch->procname; /* branch should have named subdirectory as its first element */ if (!s || !branch->child) |
bfbcf0347
|
1706 |
return NULL; |
ae7edecc9
|
1707 1708 |
/* ... and nothing else */ |
2315ffa0a
|
1709 |
if (branch[1].procname) |
bfbcf0347
|
1710 |
return NULL; |
ae7edecc9
|
1711 1712 |
/* table should contain subdirectory with the same name */ |
2315ffa0a
|
1713 |
for (p = table; p->procname; p++) { |
ae7edecc9
|
1714 1715 1716 |
if (!p->child) continue; if (p->procname && strcmp(p->procname, s) == 0) |
bfbcf0347
|
1717 |
return p; |
ae7edecc9
|
1718 |
} |
bfbcf0347
|
1719 |
return NULL; |
ae7edecc9
|
1720 1721 1722 1723 1724 1725 |
} /* see if attaching q to p would be an improvement */ static void try_attach(struct ctl_table_header *p, struct ctl_table_header *q) { struct ctl_table *to = p->ctl_table, *by = q->ctl_table; |
bfbcf0347
|
1726 |
struct ctl_table *next; |
ae7edecc9
|
1727 1728 |
int is_better = 0; int not_in_parent = !p->attached_by; |
bfbcf0347
|
1729 |
while ((next = is_branch_in(by, to)) != NULL) { |
ae7edecc9
|
1730 1731 1732 1733 1734 |
if (by == q->attached_by) is_better = 1; if (to == p->attached_by) not_in_parent = 1; by = by->child; |
bfbcf0347
|
1735 |
to = next->child; |
ae7edecc9
|
1736 1737 1738 1739 1740 1741 1742 1743 |
} if (is_better && not_in_parent) { q->attached_by = by; q->attached_to = to; q->parent = p; } } |
1da177e4c
|
1744 |
/** |
e51b6ba07
|
1745 1746 1747 |
* __register_sysctl_paths - register a sysctl hierarchy * @root: List of sysctl headers to register on * @namespaces: Data to compute which lists of sysctl entries are visible |
29e796fd4
|
1748 |
* @path: The path to the directory the sysctl table is in. |
1da177e4c
|
1749 |
* @table: the top-level table structure |
1da177e4c
|
1750 1751 |
* * Register a sysctl table hierarchy. @table should be a filled in ctl_table |
29e796fd4
|
1752 |
* array. A completely 0 filled entry terminates the table. |
1da177e4c
|
1753 |
* |
d8217f076
|
1754 |
* The members of the &struct ctl_table structure are used as follows: |
1da177e4c
|
1755 |
* |
1da177e4c
|
1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 |
* procname - the name of the sysctl file under /proc/sys. Set to %NULL to not * enter a sysctl file * * data - a pointer to data for use by proc_handler * * maxlen - the maximum size in bytes of the data * * mode - the file permissions for the /proc/sys file, and for sysctl(2) * * child - a pointer to the child sysctl table if this entry is a directory, or * %NULL. * * proc_handler - the text handler routine (described below) * |
1da177e4c
|
1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 |
* de - for internal use by the sysctl routines * * extra1, extra2 - extra pointers usable by the proc handler routines * * Leaf nodes in the sysctl tree will be represented by a single file * under /proc; non-leaf nodes will be represented by directories. * * sysctl(2) can automatically manage read and write requests through * the sysctl table. The data and maxlen fields of the ctl_table * struct enable minimal validation of the values being written to be * performed, and the mode field allows minimal authentication. * |
1da177e4c
|
1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 |
* There must be a proc_handler routine for any terminal nodes * mirrored under /proc/sys (non-terminals are handled by a built-in * directory handler). Several default handlers are available to * cover common cases - * * proc_dostring(), proc_dointvec(), proc_dointvec_jiffies(), * proc_dointvec_userhz_jiffies(), proc_dointvec_minmax(), * proc_doulongvec_ms_jiffies_minmax(), proc_doulongvec_minmax() * * It is the handler's job to read the input buffer from user memory * and process it. The handler should return 0 on success. * * This routine returns %NULL on a failure to register, and a pointer * to the table header on success. */ |
e51b6ba07
|
1797 1798 1799 1800 |
struct ctl_table_header *__register_sysctl_paths( struct ctl_table_root *root, struct nsproxy *namespaces, const struct ctl_path *path, struct ctl_table *table) |
1da177e4c
|
1801 |
{ |
29e796fd4
|
1802 1803 1804 |
struct ctl_table_header *header; struct ctl_table *new, **prevp; unsigned int n, npath; |
ae7edecc9
|
1805 |
struct ctl_table_set *set; |
29e796fd4
|
1806 1807 |
/* Count the path components */ |
2315ffa0a
|
1808 |
for (npath = 0; path[npath].procname; ++npath) |
29e796fd4
|
1809 1810 1811 1812 1813 |
; /* * For each path component, allocate a 2-element ctl_table array. * The first array element will be filled with the sysctl entry |
2315ffa0a
|
1814 |
* for this, the second will be the sentinel (procname == 0). |
29e796fd4
|
1815 1816 1817 1818 1819 1820 1821 |
* * We allocate everything in one go so that we don't have to * worry about freeing additional memory in unregister_sysctl_table. */ header = kzalloc(sizeof(struct ctl_table_header) + (2 * npath * sizeof(struct ctl_table)), GFP_KERNEL); if (!header) |
1da177e4c
|
1822 |
return NULL; |
29e796fd4
|
1823 1824 1825 1826 1827 1828 1829 1830 |
new = (struct ctl_table *) (header + 1); /* Now connect the dots */ prevp = &header->ctl_table; for (n = 0; n < npath; ++n, ++path) { /* Copy the procname */ new->procname = path->procname; |
29e796fd4
|
1831 1832 1833 1834 1835 1836 1837 1838 |
new->mode = 0555; *prevp = new; prevp = &new->child; new += 2; } *prevp = table; |
23eb06de7
|
1839 |
header->ctl_table_arg = table; |
29e796fd4
|
1840 1841 1842 1843 |
INIT_LIST_HEAD(&header->ctl_entry); header->used = 0; header->unregistering = NULL; |
e51b6ba07
|
1844 |
header->root = root; |
29e796fd4
|
1845 |
sysctl_set_parent(NULL, header->ctl_table); |
f7e6ced40
|
1846 |
header->count = 1; |
88f458e4b
|
1847 |
#ifdef CONFIG_SYSCTL_SYSCALL_CHECK |
e51b6ba07
|
1848 |
if (sysctl_check_table(namespaces, header->ctl_table)) { |
29e796fd4
|
1849 |
kfree(header); |
fc6cd25b7
|
1850 1851 |
return NULL; } |
88f458e4b
|
1852 |
#endif |
330d57fb9
|
1853 |
spin_lock(&sysctl_lock); |
734550921
|
1854 |
header->set = lookup_header_set(root, namespaces); |
ae7edecc9
|
1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 |
header->attached_by = header->ctl_table; header->attached_to = root_table; header->parent = &root_table_header; for (set = header->set; set; set = set->parent) { struct ctl_table_header *p; list_for_each_entry(p, &set->list, ctl_entry) { if (p->unregistering) continue; try_attach(p, header); } } header->parent->count++; |
734550921
|
1867 |
list_add_tail(&header->ctl_entry, &header->set->list); |
330d57fb9
|
1868 |
spin_unlock(&sysctl_lock); |
29e796fd4
|
1869 1870 1871 1872 1873 |
return header; } /** |
e51b6ba07
|
1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 |
* register_sysctl_table_path - register a sysctl table hierarchy * @path: The path to the directory the sysctl table is in. * @table: the top-level table structure * * Register a sysctl table hierarchy. @table should be a filled in ctl_table * array. A completely 0 filled entry terminates the table. * * See __register_sysctl_paths for more details. */ struct ctl_table_header *register_sysctl_paths(const struct ctl_path *path, struct ctl_table *table) { return __register_sysctl_paths(&sysctl_table_root, current->nsproxy, path, table); } /** |
29e796fd4
|
1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 |
* register_sysctl_table - register a sysctl table hierarchy * @table: the top-level table structure * * Register a sysctl table hierarchy. @table should be a filled in ctl_table * array. A completely 0 filled entry terminates the table. * * See register_sysctl_paths for more details. */ struct ctl_table_header *register_sysctl_table(struct ctl_table *table) { static const struct ctl_path null_path[] = { {} }; return register_sysctl_paths(null_path, table); |
1da177e4c
|
1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 |
} /** * unregister_sysctl_table - unregister a sysctl table hierarchy * @header: the header returned from register_sysctl_table * * Unregisters the sysctl table and all children. proc entries may not * actually be removed until they are no longer used by anyone. */ void unregister_sysctl_table(struct ctl_table_header * header) { |
330d57fb9
|
1915 |
might_sleep(); |
f1dad166e
|
1916 1917 1918 |
if (header == NULL) return; |
330d57fb9
|
1919 1920 |
spin_lock(&sysctl_lock); start_unregistering(header); |
ae7edecc9
|
1921 1922 |
if (!--header->parent->count) { WARN_ON(1); |
dfef6dcd3
|
1923 |
call_rcu(&header->parent->rcu, free_head); |
ae7edecc9
|
1924 |
} |
f7e6ced40
|
1925 |
if (!--header->count) |
dfef6dcd3
|
1926 |
call_rcu(&header->rcu, free_head); |
330d57fb9
|
1927 |
spin_unlock(&sysctl_lock); |
1da177e4c
|
1928 |
} |
9043476f7
|
1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 |
int sysctl_is_seen(struct ctl_table_header *p) { struct ctl_table_set *set = p->set; int res; spin_lock(&sysctl_lock); if (p->unregistering) res = 0; else if (!set->is_seen) res = 1; else res = set->is_seen(set); spin_unlock(&sysctl_lock); return res; } |
734550921
|
1943 1944 1945 1946 1947 1948 1949 1950 |
void setup_sysctl_set(struct ctl_table_set *p, struct ctl_table_set *parent, int (*is_seen)(struct ctl_table_set *)) { INIT_LIST_HEAD(&p->list); p->parent = parent ? parent : &sysctl_table_root.default_set; p->is_seen = is_seen; } |
b89a81712
|
1951 |
#else /* !CONFIG_SYSCTL */ |
d8217f076
|
1952 |
struct ctl_table_header *register_sysctl_table(struct ctl_table * table) |
b89a81712
|
1953 1954 1955 |
{ return NULL; } |
29e796fd4
|
1956 1957 1958 1959 1960 |
struct ctl_table_header *register_sysctl_paths(const struct ctl_path *path, struct ctl_table *table) { return NULL; } |
b89a81712
|
1961 1962 1963 |
void unregister_sysctl_table(struct ctl_table_header * table) { } |
734550921
|
1964 1965 1966 1967 1968 |
void setup_sysctl_set(struct ctl_table_set *p, struct ctl_table_set *parent, int (*is_seen)(struct ctl_table_set *)) { } |
f7e6ced40
|
1969 1970 1971 |
void sysctl_head_put(struct ctl_table_header *head) { } |
b89a81712
|
1972 |
#endif /* CONFIG_SYSCTL */ |
1da177e4c
|
1973 1974 1975 |
/* * /proc/sys support */ |
b89a81712
|
1976 |
#ifdef CONFIG_PROC_SYSCTL |
1da177e4c
|
1977 |
|
b1ba4ddde
|
1978 |
static int _proc_do_string(void* data, int maxlen, int write, |
8d65af789
|
1979 |
void __user *buffer, |
b1ba4ddde
|
1980 |
size_t *lenp, loff_t *ppos) |
1da177e4c
|
1981 1982 1983 1984 |
{ size_t len; char __user *p; char c; |
8d0608771
|
1985 1986 |
if (!data || !maxlen || !*lenp) { |
1da177e4c
|
1987 1988 1989 |
*lenp = 0; return 0; } |
8d0608771
|
1990 |
|
1da177e4c
|
1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 |
if (write) { len = 0; p = buffer; while (len < *lenp) { if (get_user(c, p++)) return -EFAULT; if (c == 0 || c == ' ') break; len++; } |
f5dd3d6fa
|
2002 2003 2004 |
if (len >= maxlen) len = maxlen-1; if(copy_from_user(data, buffer, len)) |
1da177e4c
|
2005 |
return -EFAULT; |
f5dd3d6fa
|
2006 |
((char *) data)[len] = 0; |
1da177e4c
|
2007 2008 |
*ppos += *lenp; } else { |
f5dd3d6fa
|
2009 2010 2011 |
len = strlen(data); if (len > maxlen) len = maxlen; |
8d0608771
|
2012 2013 2014 2015 2016 2017 2018 2019 |
if (*ppos > len) { *lenp = 0; return 0; } data += *ppos; len -= *ppos; |
1da177e4c
|
2020 2021 2022 |
if (len > *lenp) len = *lenp; if (len) |
f5dd3d6fa
|
2023 |
if(copy_to_user(buffer, data, len)) |
1da177e4c
|
2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 |
return -EFAULT; if (len < *lenp) { if(put_user(' ', ((char __user *) buffer) + len)) return -EFAULT; len++; } *lenp = len; *ppos += len; } return 0; } |
f5dd3d6fa
|
2036 2037 2038 2039 |
/** * proc_dostring - read a string sysctl * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
f5dd3d6fa
|
2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 |
* @buffer: the user buffer * @lenp: the size of the user buffer * @ppos: file position * * Reads/writes a string from/to the user buffer. If the kernel * buffer provided is not large enough to hold the string, the * string is truncated. The copied string is %NULL-terminated. * If the string is being read by the user process, it is copied * and a newline ' ' is added. It is truncated if the buffer is * not large enough. * * Returns 0 on success. */ |
8d65af789
|
2054 |
int proc_dostring(struct ctl_table *table, int write, |
f5dd3d6fa
|
2055 2056 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
8d65af789
|
2057 |
return _proc_do_string(table->data, table->maxlen, write, |
f5dd3d6fa
|
2058 2059 |
buffer, lenp, ppos); } |
00b7c3395
|
2060 2061 2062 2063 2064 2065 2066 2067 |
static size_t proc_skip_spaces(char **buf) { size_t ret; char *tmp = skip_spaces(*buf); ret = tmp - *buf; *buf = tmp; return ret; } |
9f977fb7a
|
2068 2069 2070 2071 2072 2073 2074 2075 2076 |
static void proc_skip_char(char **buf, size_t *size, const char v) { while (*size) { if (**buf != v) break; (*size)--; (*buf)++; } } |
00b7c3395
|
2077 2078 |
#define TMPBUFLEN 22 /** |
0fc377bd6
|
2079 |
* proc_get_long - reads an ASCII formatted integer from a user buffer |
00b7c3395
|
2080 |
* |
0fc377bd6
|
2081 2082 2083 2084 2085 2086 2087 |
* @buf: a kernel buffer * @size: size of the kernel buffer * @val: this is where the number will be stored * @neg: set to %TRUE if number is negative * @perm_tr: a vector which contains the allowed trailers * @perm_tr_len: size of the perm_tr vector * @tr: pointer to store the trailer character |
00b7c3395
|
2088 |
* |
0fc377bd6
|
2089 2090 2091 2092 |
* In case of success %0 is returned and @buf and @size are updated with * the amount of bytes read. If @tr is non-NULL and a trailing * character exists (size is non-zero after returning from this * function), @tr is updated with the trailing character. |
00b7c3395
|
2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127 2128 2129 2130 2131 |
*/ static int proc_get_long(char **buf, size_t *size, unsigned long *val, bool *neg, const char *perm_tr, unsigned perm_tr_len, char *tr) { int len; char *p, tmp[TMPBUFLEN]; if (!*size) return -EINVAL; len = *size; if (len > TMPBUFLEN - 1) len = TMPBUFLEN - 1; memcpy(tmp, *buf, len); tmp[len] = 0; p = tmp; if (*p == '-' && *size > 1) { *neg = true; p++; } else *neg = false; if (!isdigit(*p)) return -EINVAL; *val = simple_strtoul(p, &p, 0); len = p - tmp; /* We don't know if the next char is whitespace thus we may accept * invalid integers (e.g. 1234...a) or two integers instead of one * (e.g. 123...1). So lets not allow such large numbers. */ if (len == TMPBUFLEN - 1) return -EINVAL; if (len < *size && perm_tr_len && !memchr(perm_tr, *p, perm_tr_len)) return -EINVAL; |
1da177e4c
|
2132 |
|
00b7c3395
|
2133 2134 2135 2136 2137 2138 2139 2140 2141 2142 |
if (tr && (len < *size)) *tr = *p; *buf += len; *size -= len; return 0; } /** |
0fc377bd6
|
2143 |
* proc_put_long - converts an integer to a decimal ASCII formatted string |
00b7c3395
|
2144 |
* |
0fc377bd6
|
2145 2146 2147 2148 |
* @buf: the user buffer * @size: the size of the user buffer * @val: the integer to be converted * @neg: sign of the number, %TRUE for negative |
00b7c3395
|
2149 |
* |
0fc377bd6
|
2150 2151 |
* In case of success %0 is returned and @buf and @size are updated with * the amount of bytes written. |
00b7c3395
|
2152 2153 2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170 2171 2172 2173 2174 2175 2176 2177 2178 2179 2180 2181 |
*/ static int proc_put_long(void __user **buf, size_t *size, unsigned long val, bool neg) { int len; char tmp[TMPBUFLEN], *p = tmp; sprintf(p, "%s%lu", neg ? "-" : "", val); len = strlen(tmp); if (len > *size) len = *size; if (copy_to_user(*buf, tmp, len)) return -EFAULT; *size -= len; *buf += len; return 0; } #undef TMPBUFLEN static int proc_put_char(void __user **buf, size_t *size, char c) { if (*size) { char __user **buffer = (char __user **)buf; if (put_user(c, *buffer)) return -EFAULT; (*size)--, (*buffer)++; *buf = *buffer; } return 0; } |
1da177e4c
|
2182 |
|
00b7c3395
|
2183 |
static int do_proc_dointvec_conv(bool *negp, unsigned long *lvalp, |
1da177e4c
|
2184 2185 2186 2187 2188 2189 2190 2191 |
int *valp, int write, void *data) { if (write) { *valp = *negp ? -*lvalp : *lvalp; } else { int val = *valp; if (val < 0) { |
00b7c3395
|
2192 |
*negp = true; |
1da177e4c
|
2193 2194 |
*lvalp = (unsigned long)-val; } else { |
00b7c3395
|
2195 |
*negp = false; |
1da177e4c
|
2196 2197 2198 2199 2200 |
*lvalp = (unsigned long)val; } } return 0; } |
00b7c3395
|
2201 2202 |
static const char proc_wspace_sep[] = { ' ', '\t', ' ' }; |
d8217f076
|
2203 |
static int __do_proc_dointvec(void *tbl_data, struct ctl_table *table, |
8d65af789
|
2204 |
int write, void __user *buffer, |
fcfbd547b
|
2205 |
size_t *lenp, loff_t *ppos, |
00b7c3395
|
2206 |
int (*conv)(bool *negp, unsigned long *lvalp, int *valp, |
1da177e4c
|
2207 2208 2209 |
int write, void *data), void *data) { |
00b7c3395
|
2210 2211 2212 2213 |
int *i, vleft, first = 1, err = 0; unsigned long page = 0; size_t left; char *kbuf; |
1da177e4c
|
2214 |
|
00b7c3395
|
2215 |
if (!tbl_data || !table->maxlen || !*lenp || (*ppos && !write)) { |
1da177e4c
|
2216 2217 2218 2219 |
*lenp = 0; return 0; } |
fcfbd547b
|
2220 |
i = (int *) tbl_data; |
1da177e4c
|
2221 2222 2223 2224 2225 |
vleft = table->maxlen / sizeof(*i); left = *lenp; if (!conv) conv = do_proc_dointvec_conv; |
00b7c3395
|
2226 2227 2228 2229 2230 2231 2232 2233 2234 2235 2236 2237 2238 |
if (write) { if (left > PAGE_SIZE - 1) left = PAGE_SIZE - 1; page = __get_free_page(GFP_TEMPORARY); kbuf = (char *) page; if (!kbuf) return -ENOMEM; if (copy_from_user(kbuf, buffer, left)) { err = -EFAULT; goto free; } kbuf[left] = 0; } |
1da177e4c
|
2239 |
for (; left && vleft--; i++, first=0) { |
00b7c3395
|
2240 2241 |
unsigned long lval; bool neg; |
1da177e4c
|
2242 |
|
00b7c3395
|
2243 2244 |
if (write) { left -= proc_skip_spaces(&kbuf); |
1da177e4c
|
2245 |
|
563b04671
|
2246 2247 |
if (!left) break; |
00b7c3395
|
2248 2249 2250 2251 |
err = proc_get_long(&kbuf, &left, &lval, &neg, proc_wspace_sep, sizeof(proc_wspace_sep), NULL); if (err) |
1da177e4c
|
2252 |
break; |
00b7c3395
|
2253 2254 |
if (conv(&neg, &lval, i, 1, data)) { err = -EINVAL; |
1da177e4c
|
2255 |
break; |
00b7c3395
|
2256 |
} |
1da177e4c
|
2257 |
} else { |
00b7c3395
|
2258 2259 2260 2261 |
if (conv(&neg, &lval, i, 0, data)) { err = -EINVAL; break; } |
1da177e4c
|
2262 |
if (!first) |
00b7c3395
|
2263 2264 2265 2266 2267 |
err = proc_put_char(&buffer, &left, '\t'); if (err) break; err = proc_put_long(&buffer, &left, lval, neg); if (err) |
1da177e4c
|
2268 |
break; |
1da177e4c
|
2269 2270 |
} } |
00b7c3395
|
2271 2272 2273 |
if (!write && !first && left && !err) err = proc_put_char(&buffer, &left, ' '); |
563b04671
|
2274 |
if (write && !err && left) |
00b7c3395
|
2275 2276 |
left -= proc_skip_spaces(&kbuf); free: |
1da177e4c
|
2277 |
if (write) { |
00b7c3395
|
2278 2279 2280 |
free_page(page); if (first) return err ? : -EINVAL; |
1da177e4c
|
2281 |
} |
1da177e4c
|
2282 2283 |
*lenp -= left; *ppos += *lenp; |
00b7c3395
|
2284 |
return err; |
1da177e4c
|
2285 |
} |
8d65af789
|
2286 |
static int do_proc_dointvec(struct ctl_table *table, int write, |
fcfbd547b
|
2287 |
void __user *buffer, size_t *lenp, loff_t *ppos, |
00b7c3395
|
2288 |
int (*conv)(bool *negp, unsigned long *lvalp, int *valp, |
fcfbd547b
|
2289 2290 2291 |
int write, void *data), void *data) { |
8d65af789
|
2292 |
return __do_proc_dointvec(table->data, table, write, |
fcfbd547b
|
2293 2294 |
buffer, lenp, ppos, conv, data); } |
1da177e4c
|
2295 2296 2297 2298 |
/** * proc_dointvec - read a vector of integers * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
1da177e4c
|
2299 2300 2301 2302 2303 2304 2305 2306 2307 |
* @buffer: the user buffer * @lenp: the size of the user buffer * @ppos: file position * * Reads/writes up to table->maxlen/sizeof(unsigned int) integer * values from/to the user buffer, treated as an ASCII string. * * Returns 0 on success. */ |
8d65af789
|
2308 |
int proc_dointvec(struct ctl_table *table, int write, |
1da177e4c
|
2309 2310 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
8d65af789
|
2311 |
return do_proc_dointvec(table,write,buffer,lenp,ppos, |
1da177e4c
|
2312 2313 |
NULL,NULL); } |
34f5a3989
|
2314 |
/* |
25ddbb18a
|
2315 2316 |
* Taint values can only be increased * This means we can safely use a temporary. |
34f5a3989
|
2317 |
*/ |
8d65af789
|
2318 |
static int proc_taint(struct ctl_table *table, int write, |
34f5a3989
|
2319 2320 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
25ddbb18a
|
2321 2322 2323 |
struct ctl_table t; unsigned long tmptaint = get_taint(); int err; |
34f5a3989
|
2324 |
|
91fcd412e
|
2325 |
if (write && !capable(CAP_SYS_ADMIN)) |
34f5a3989
|
2326 |
return -EPERM; |
25ddbb18a
|
2327 2328 |
t = *table; t.data = &tmptaint; |
8d65af789
|
2329 |
err = proc_doulongvec_minmax(&t, write, buffer, lenp, ppos); |
25ddbb18a
|
2330 2331 2332 2333 2334 2335 2336 2337 2338 2339 2340 2341 2342 2343 2344 2345 |
if (err < 0) return err; if (write) { /* * Poor man's atomic or. Not worth adding a primitive * to everyone's atomic.h for this */ int i; for (i = 0; i < BITS_PER_LONG && tmptaint >> i; i++) { if ((tmptaint >> i) & 1) add_taint(i); } } return err; |
34f5a3989
|
2346 |
} |
bfdc0b497
|
2347 2348 2349 2350 2351 2352 2353 2354 2355 2356 |
#ifdef CONFIG_PRINTK static int proc_dmesg_restrict(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) { if (write && !capable(CAP_SYS_ADMIN)) return -EPERM; return proc_dointvec_minmax(table, write, buffer, lenp, ppos); } #endif |
1da177e4c
|
2357 2358 2359 2360 |
struct do_proc_dointvec_minmax_conv_param { int *min; int *max; }; |
00b7c3395
|
2361 2362 |
static int do_proc_dointvec_minmax_conv(bool *negp, unsigned long *lvalp, int *valp, |
1da177e4c
|
2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 |
int write, void *data) { struct do_proc_dointvec_minmax_conv_param *param = data; if (write) { int val = *negp ? -*lvalp : *lvalp; if ((param->min && *param->min > val) || (param->max && *param->max < val)) return -EINVAL; *valp = val; } else { int val = *valp; if (val < 0) { |
00b7c3395
|
2375 |
*negp = true; |
1da177e4c
|
2376 2377 |
*lvalp = (unsigned long)-val; } else { |
00b7c3395
|
2378 |
*negp = false; |
1da177e4c
|
2379 2380 2381 2382 2383 2384 2385 2386 2387 2388 |
*lvalp = (unsigned long)val; } } return 0; } /** * proc_dointvec_minmax - read a vector of integers with min/max values * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
1da177e4c
|
2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400 |
* @buffer: the user buffer * @lenp: the size of the user buffer * @ppos: file position * * Reads/writes up to table->maxlen/sizeof(unsigned int) integer * values from/to the user buffer, treated as an ASCII string. * * This routine will ensure the values are within the range specified by * table->extra1 (min) and table->extra2 (max). * * Returns 0 on success. */ |
8d65af789
|
2401 |
int proc_dointvec_minmax(struct ctl_table *table, int write, |
1da177e4c
|
2402 2403 2404 2405 2406 2407 |
void __user *buffer, size_t *lenp, loff_t *ppos) { struct do_proc_dointvec_minmax_conv_param param = { .min = (int *) table->extra1, .max = (int *) table->extra2, }; |
8d65af789
|
2408 |
return do_proc_dointvec(table, write, buffer, lenp, ppos, |
1da177e4c
|
2409 2410 |
do_proc_dointvec_minmax_conv, ¶m); } |
d8217f076
|
2411 |
static int __do_proc_doulongvec_minmax(void *data, struct ctl_table *table, int write, |
1da177e4c
|
2412 2413 2414 2415 2416 |
void __user *buffer, size_t *lenp, loff_t *ppos, unsigned long convmul, unsigned long convdiv) { |
00b7c3395
|
2417 2418 2419 2420 2421 2422 2423 |
unsigned long *i, *min, *max; int vleft, first = 1, err = 0; unsigned long page = 0; size_t left; char *kbuf; if (!data || !table->maxlen || !*lenp || (*ppos && !write)) { |
1da177e4c
|
2424 2425 2426 |
*lenp = 0; return 0; } |
00b7c3395
|
2427 |
|
fcfbd547b
|
2428 |
i = (unsigned long *) data; |
1da177e4c
|
2429 2430 2431 2432 |
min = (unsigned long *) table->extra1; max = (unsigned long *) table->extra2; vleft = table->maxlen / sizeof(unsigned long); left = *lenp; |
00b7c3395
|
2433 2434 2435 2436 2437 2438 2439 2440 2441 2442 2443 2444 2445 2446 |
if (write) { if (left > PAGE_SIZE - 1) left = PAGE_SIZE - 1; page = __get_free_page(GFP_TEMPORARY); kbuf = (char *) page; if (!kbuf) return -ENOMEM; if (copy_from_user(kbuf, buffer, left)) { err = -EFAULT; goto free; } kbuf[left] = 0; } |
27b3d80a7
|
2447 |
for (; left && vleft--; i++, first = 0) { |
00b7c3395
|
2448 |
unsigned long val; |
1da177e4c
|
2449 |
if (write) { |
00b7c3395
|
2450 2451 2452 2453 2454 2455 2456 2457 |
bool neg; left -= proc_skip_spaces(&kbuf); err = proc_get_long(&kbuf, &left, &val, &neg, proc_wspace_sep, sizeof(proc_wspace_sep), NULL); if (err) |
1da177e4c
|
2458 2459 |
break; if (neg) |
1da177e4c
|
2460 2461 2462 2463 2464 |
continue; if ((min && val < *min) || (max && val > *max)) continue; *i = val; } else { |
00b7c3395
|
2465 |
val = convdiv * (*i) / convmul; |
1da177e4c
|
2466 |
if (!first) |
00b7c3395
|
2467 2468 2469 2470 |
err = proc_put_char(&buffer, &left, '\t'); err = proc_put_long(&buffer, &left, val, false); if (err) break; |
1da177e4c
|
2471 2472 |
} } |
00b7c3395
|
2473 2474 2475 2476 2477 2478 |
if (!write && !first && left && !err) err = proc_put_char(&buffer, &left, ' '); if (write && !err) left -= proc_skip_spaces(&kbuf); free: |
1da177e4c
|
2479 |
if (write) { |
00b7c3395
|
2480 2481 2482 |
free_page(page); if (first) return err ? : -EINVAL; |
1da177e4c
|
2483 |
} |
1da177e4c
|
2484 2485 |
*lenp -= left; *ppos += *lenp; |
00b7c3395
|
2486 |
return err; |
1da177e4c
|
2487 |
} |
d8217f076
|
2488 |
static int do_proc_doulongvec_minmax(struct ctl_table *table, int write, |
fcfbd547b
|
2489 2490 2491 2492 2493 2494 |
void __user *buffer, size_t *lenp, loff_t *ppos, unsigned long convmul, unsigned long convdiv) { return __do_proc_doulongvec_minmax(table->data, table, write, |
8d65af789
|
2495 |
buffer, lenp, ppos, convmul, convdiv); |
fcfbd547b
|
2496 |
} |
1da177e4c
|
2497 2498 2499 2500 |
/** * proc_doulongvec_minmax - read a vector of long integers with min/max values * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
1da177e4c
|
2501 2502 2503 2504 2505 2506 2507 2508 2509 2510 2511 2512 |
* @buffer: the user buffer * @lenp: the size of the user buffer * @ppos: file position * * Reads/writes up to table->maxlen/sizeof(unsigned long) unsigned long * values from/to the user buffer, treated as an ASCII string. * * This routine will ensure the values are within the range specified by * table->extra1 (min) and table->extra2 (max). * * Returns 0 on success. */ |
8d65af789
|
2513 |
int proc_doulongvec_minmax(struct ctl_table *table, int write, |
1da177e4c
|
2514 2515 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
8d65af789
|
2516 |
return do_proc_doulongvec_minmax(table, write, buffer, lenp, ppos, 1l, 1l); |
1da177e4c
|
2517 2518 2519 2520 2521 2522 |
} /** * proc_doulongvec_ms_jiffies_minmax - read a vector of millisecond values with min/max values * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
1da177e4c
|
2523 2524 2525 2526 2527 2528 2529 2530 2531 2532 2533 2534 2535 |
* @buffer: the user buffer * @lenp: the size of the user buffer * @ppos: file position * * Reads/writes up to table->maxlen/sizeof(unsigned long) unsigned long * values from/to the user buffer, treated as an ASCII string. The values * are treated as milliseconds, and converted to jiffies when they are stored. * * This routine will ensure the values are within the range specified by * table->extra1 (min) and table->extra2 (max). * * Returns 0 on success. */ |
d8217f076
|
2536 |
int proc_doulongvec_ms_jiffies_minmax(struct ctl_table *table, int write, |
1da177e4c
|
2537 2538 2539 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
8d65af789
|
2540 |
return do_proc_doulongvec_minmax(table, write, buffer, |
1da177e4c
|
2541 2542 |
lenp, ppos, HZ, 1000l); } |
00b7c3395
|
2543 |
static int do_proc_dointvec_jiffies_conv(bool *negp, unsigned long *lvalp, |
1da177e4c
|
2544 2545 2546 2547 |
int *valp, int write, void *data) { if (write) { |
cba9f33d1
|
2548 2549 |
if (*lvalp > LONG_MAX / HZ) return 1; |
1da177e4c
|
2550 2551 2552 2553 2554 |
*valp = *negp ? -(*lvalp*HZ) : (*lvalp*HZ); } else { int val = *valp; unsigned long lval; if (val < 0) { |
00b7c3395
|
2555 |
*negp = true; |
1da177e4c
|
2556 2557 |
lval = (unsigned long)-val; } else { |
00b7c3395
|
2558 |
*negp = false; |
1da177e4c
|
2559 2560 2561 2562 2563 2564 |
lval = (unsigned long)val; } *lvalp = lval / HZ; } return 0; } |
00b7c3395
|
2565 |
static int do_proc_dointvec_userhz_jiffies_conv(bool *negp, unsigned long *lvalp, |
1da177e4c
|
2566 2567 2568 2569 |
int *valp, int write, void *data) { if (write) { |
cba9f33d1
|
2570 2571 |
if (USER_HZ < HZ && *lvalp > (LONG_MAX / HZ) * USER_HZ) return 1; |
1da177e4c
|
2572 2573 2574 2575 2576 |
*valp = clock_t_to_jiffies(*negp ? -*lvalp : *lvalp); } else { int val = *valp; unsigned long lval; if (val < 0) { |
00b7c3395
|
2577 |
*negp = true; |
1da177e4c
|
2578 2579 |
lval = (unsigned long)-val; } else { |
00b7c3395
|
2580 |
*negp = false; |
1da177e4c
|
2581 2582 2583 2584 2585 2586 |
lval = (unsigned long)val; } *lvalp = jiffies_to_clock_t(lval); } return 0; } |
00b7c3395
|
2587 |
static int do_proc_dointvec_ms_jiffies_conv(bool *negp, unsigned long *lvalp, |
1da177e4c
|
2588 2589 2590 2591 2592 2593 2594 2595 2596 |
int *valp, int write, void *data) { if (write) { *valp = msecs_to_jiffies(*negp ? -*lvalp : *lvalp); } else { int val = *valp; unsigned long lval; if (val < 0) { |
00b7c3395
|
2597 |
*negp = true; |
1da177e4c
|
2598 2599 |
lval = (unsigned long)-val; } else { |
00b7c3395
|
2600 |
*negp = false; |
1da177e4c
|
2601 2602 2603 2604 2605 2606 2607 2608 2609 2610 2611 |
lval = (unsigned long)val; } *lvalp = jiffies_to_msecs(lval); } return 0; } /** * proc_dointvec_jiffies - read a vector of integers as seconds * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
1da177e4c
|
2612 2613 2614 2615 2616 2617 2618 2619 2620 2621 2622 |
* @buffer: the user buffer * @lenp: the size of the user buffer * @ppos: file position * * Reads/writes up to table->maxlen/sizeof(unsigned int) integer * values from/to the user buffer, treated as an ASCII string. * The values read are assumed to be in seconds, and are converted into * jiffies. * * Returns 0 on success. */ |
8d65af789
|
2623 |
int proc_dointvec_jiffies(struct ctl_table *table, int write, |
1da177e4c
|
2624 2625 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
8d65af789
|
2626 |
return do_proc_dointvec(table,write,buffer,lenp,ppos, |
1da177e4c
|
2627 2628 2629 2630 2631 2632 2633 |
do_proc_dointvec_jiffies_conv,NULL); } /** * proc_dointvec_userhz_jiffies - read a vector of integers as 1/USER_HZ seconds * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
1da177e4c
|
2634 2635 |
* @buffer: the user buffer * @lenp: the size of the user buffer |
1e5d53314
|
2636 |
* @ppos: pointer to the file position |
1da177e4c
|
2637 2638 2639 2640 2641 2642 2643 2644 |
* * Reads/writes up to table->maxlen/sizeof(unsigned int) integer * values from/to the user buffer, treated as an ASCII string. * The values read are assumed to be in 1/USER_HZ seconds, and * are converted into jiffies. * * Returns 0 on success. */ |
8d65af789
|
2645 |
int proc_dointvec_userhz_jiffies(struct ctl_table *table, int write, |
1da177e4c
|
2646 2647 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
8d65af789
|
2648 |
return do_proc_dointvec(table,write,buffer,lenp,ppos, |
1da177e4c
|
2649 2650 2651 2652 2653 2654 2655 |
do_proc_dointvec_userhz_jiffies_conv,NULL); } /** * proc_dointvec_ms_jiffies - read a vector of integers as 1 milliseconds * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
1da177e4c
|
2656 2657 |
* @buffer: the user buffer * @lenp: the size of the user buffer |
67be2dd1b
|
2658 2659 |
* @ppos: file position * @ppos: the current position in the file |
1da177e4c
|
2660 2661 2662 2663 2664 2665 2666 2667 |
* * Reads/writes up to table->maxlen/sizeof(unsigned int) integer * values from/to the user buffer, treated as an ASCII string. * The values read are assumed to be in 1/1000 seconds, and * are converted into jiffies. * * Returns 0 on success. */ |
8d65af789
|
2668 |
int proc_dointvec_ms_jiffies(struct ctl_table *table, int write, |
1da177e4c
|
2669 2670 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
8d65af789
|
2671 |
return do_proc_dointvec(table, write, buffer, lenp, ppos, |
1da177e4c
|
2672 2673 |
do_proc_dointvec_ms_jiffies_conv, NULL); } |
8d65af789
|
2674 |
static int proc_do_cad_pid(struct ctl_table *table, int write, |
9ec52099e
|
2675 2676 2677 2678 2679 |
void __user *buffer, size_t *lenp, loff_t *ppos) { struct pid *new_pid; pid_t tmp; int r; |
6c5f3e7b4
|
2680 |
tmp = pid_vnr(cad_pid); |
9ec52099e
|
2681 |
|
8d65af789
|
2682 |
r = __do_proc_dointvec(&tmp, table, write, buffer, |
9ec52099e
|
2683 2684 2685 2686 2687 2688 2689 2690 2691 2692 2693 |
lenp, ppos, NULL, NULL); if (r || !write) return r; new_pid = find_get_pid(tmp); if (!new_pid) return -ESRCH; put_pid(xchg(&cad_pid, new_pid)); return 0; } |
9f977fb7a
|
2694 2695 2696 2697 2698 2699 2700 2701 2702 2703 2704 2705 2706 2707 2708 2709 2710 2711 2712 2713 2714 2715 2716 2717 2718 2719 2720 2721 2722 2723 2724 2725 2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737 2738 2739 2740 2741 2742 2743 2744 2745 2746 2747 2748 2749 2750 2751 2752 2753 2754 2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767 2768 2769 2770 2771 2772 2773 2774 2775 2776 2777 2778 2779 2780 2781 2782 2783 2784 2785 2786 2787 2788 2789 2790 2791 2792 2793 2794 2795 2796 2797 2798 2799 2800 2801 2802 2803 2804 2805 2806 2807 2808 2809 2810 2811 2812 2813 2814 2815 2816 2817 2818 2819 2820 2821 2822 2823 2824 2825 2826 2827 2828 2829 2830 2831 2832 2833 2834 2835 2836 2837 2838 2839 2840 2841 2842 2843 2844 2845 2846 2847 2848 |
/** * proc_do_large_bitmap - read/write from/to a large bitmap * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file * @buffer: the user buffer * @lenp: the size of the user buffer * @ppos: file position * * The bitmap is stored at table->data and the bitmap length (in bits) * in table->maxlen. * * We use a range comma separated format (e.g. 1,3-4,10-10) so that * large bitmaps may be represented in a compact manner. Writing into * the file will clear the bitmap then update it with the given input. * * Returns 0 on success. */ int proc_do_large_bitmap(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) { int err = 0; bool first = 1; size_t left = *lenp; unsigned long bitmap_len = table->maxlen; unsigned long *bitmap = (unsigned long *) table->data; unsigned long *tmp_bitmap = NULL; char tr_a[] = { '-', ',', ' ' }, tr_b[] = { ',', ' ', 0 }, c; if (!bitmap_len || !left || (*ppos && !write)) { *lenp = 0; return 0; } if (write) { unsigned long page = 0; char *kbuf; if (left > PAGE_SIZE - 1) left = PAGE_SIZE - 1; page = __get_free_page(GFP_TEMPORARY); kbuf = (char *) page; if (!kbuf) return -ENOMEM; if (copy_from_user(kbuf, buffer, left)) { free_page(page); return -EFAULT; } kbuf[left] = 0; tmp_bitmap = kzalloc(BITS_TO_LONGS(bitmap_len) * sizeof(unsigned long), GFP_KERNEL); if (!tmp_bitmap) { free_page(page); return -ENOMEM; } proc_skip_char(&kbuf, &left, ' '); while (!err && left) { unsigned long val_a, val_b; bool neg; err = proc_get_long(&kbuf, &left, &val_a, &neg, tr_a, sizeof(tr_a), &c); if (err) break; if (val_a >= bitmap_len || neg) { err = -EINVAL; break; } val_b = val_a; if (left) { kbuf++; left--; } if (c == '-') { err = proc_get_long(&kbuf, &left, &val_b, &neg, tr_b, sizeof(tr_b), &c); if (err) break; if (val_b >= bitmap_len || neg || val_a > val_b) { err = -EINVAL; break; } if (left) { kbuf++; left--; } } while (val_a <= val_b) set_bit(val_a++, tmp_bitmap); first = 0; proc_skip_char(&kbuf, &left, ' '); } free_page(page); } else { unsigned long bit_a, bit_b = 0; while (left) { bit_a = find_next_bit(bitmap, bitmap_len, bit_b); if (bit_a >= bitmap_len) break; bit_b = find_next_zero_bit(bitmap, bitmap_len, bit_a + 1) - 1; if (!first) { err = proc_put_char(&buffer, &left, ','); if (err) break; } err = proc_put_long(&buffer, &left, bit_a, false); if (err) break; if (bit_a != bit_b) { err = proc_put_char(&buffer, &left, '-'); if (err) break; err = proc_put_long(&buffer, &left, bit_b, false); if (err) break; } first = 0; bit_b++; } if (!err) err = proc_put_char(&buffer, &left, ' '); } if (!err) { if (write) { if (*ppos) bitmap_or(bitmap, bitmap, tmp_bitmap, bitmap_len); else memcpy(bitmap, tmp_bitmap, BITS_TO_LONGS(bitmap_len) * sizeof(unsigned long)); } kfree(tmp_bitmap); *lenp -= left; *ppos += *lenp; return 0; } else { kfree(tmp_bitmap); return err; } } |
556105000
|
2849 |
#else /* CONFIG_PROC_SYSCTL */ |
1da177e4c
|
2850 |
|
8d65af789
|
2851 |
int proc_dostring(struct ctl_table *table, int write, |
1da177e4c
|
2852 2853 2854 2855 |
void __user *buffer, size_t *lenp, loff_t *ppos) { return -ENOSYS; } |
8d65af789
|
2856 |
int proc_dointvec(struct ctl_table *table, int write, |
1da177e4c
|
2857 |
void __user *buffer, size_t *lenp, loff_t *ppos) |
1da177e4c
|
2858 2859 2860 |
{ return -ENOSYS; } |
8d65af789
|
2861 |
int proc_dointvec_minmax(struct ctl_table *table, int write, |
1da177e4c
|
2862 2863 2864 2865 |
void __user *buffer, size_t *lenp, loff_t *ppos) { return -ENOSYS; } |
8d65af789
|
2866 |
int proc_dointvec_jiffies(struct ctl_table *table, int write, |
1da177e4c
|
2867 2868 2869 2870 |
void __user *buffer, size_t *lenp, loff_t *ppos) { return -ENOSYS; } |
8d65af789
|
2871 |
int proc_dointvec_userhz_jiffies(struct ctl_table *table, int write, |
1da177e4c
|
2872 2873 2874 2875 |
void __user *buffer, size_t *lenp, loff_t *ppos) { return -ENOSYS; } |
8d65af789
|
2876 |
int proc_dointvec_ms_jiffies(struct ctl_table *table, int write, |
1da177e4c
|
2877 2878 2879 2880 |
void __user *buffer, size_t *lenp, loff_t *ppos) { return -ENOSYS; } |
8d65af789
|
2881 |
int proc_doulongvec_minmax(struct ctl_table *table, int write, |
1da177e4c
|
2882 2883 2884 2885 |
void __user *buffer, size_t *lenp, loff_t *ppos) { return -ENOSYS; } |
d8217f076
|
2886 |
int proc_doulongvec_ms_jiffies_minmax(struct ctl_table *table, int write, |
1da177e4c
|
2887 2888 2889 2890 2891 |
void __user *buffer, size_t *lenp, loff_t *ppos) { return -ENOSYS; } |
556105000
|
2892 |
#endif /* CONFIG_PROC_SYSCTL */ |
1da177e4c
|
2893 |
|
1da177e4c
|
2894 2895 2896 2897 2898 2899 2900 2901 2902 2903 2904 2905 2906 |
/* * No sense putting this after each symbol definition, twice, * exception granted :-) */ EXPORT_SYMBOL(proc_dointvec); EXPORT_SYMBOL(proc_dointvec_jiffies); EXPORT_SYMBOL(proc_dointvec_minmax); EXPORT_SYMBOL(proc_dointvec_userhz_jiffies); EXPORT_SYMBOL(proc_dointvec_ms_jiffies); EXPORT_SYMBOL(proc_dostring); EXPORT_SYMBOL(proc_doulongvec_minmax); EXPORT_SYMBOL(proc_doulongvec_ms_jiffies_minmax); EXPORT_SYMBOL(register_sysctl_table); |
29e796fd4
|
2907 |
EXPORT_SYMBOL(register_sysctl_paths); |
1da177e4c
|
2908 |
EXPORT_SYMBOL(unregister_sysctl_table); |