Blame view
kernel/sysctl.c
68.7 KB
1da177e4c
|
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 |
/* * sysctl.c: General linux system control interface * * Begun 24 March 1995, Stephen Tweedie * Added /proc support, Dec 1995 * Added bdflush entry and intvec min/max checking, 2/23/96, Tom Dyas. * Added hooks for /proc/sys/net (minor, minor patch), 96/4/1, Mike Shaver. * Added kernel/java-{interpreter,appletviewer}, 96/5/10, Mike Shaver. * Dynamic registration fixes, Stephen Tweedie. * Added kswapd-interval, ctrl-alt-del, printk stuff, 1/8/97, Chris Horn. * Made sysctl support optional via CONFIG_SYSCTL, 1/10/97, Chris * Horn. * Added proc_doulongvec_ms_jiffies_minmax, 09/08/99, Carlos H. Bauer. * Added proc_doulongvec_minmax, 09/08/99, Carlos H. Bauer. * Changed linked lists to use list.h instead of lists.h, 02/24/00, Bill * Wendling. * The list_for_each() macro wasn't appropriate for the sysctl loop. * Removed it and replaced it with older style, 03/23/00, Bill Wendling */ |
1da177e4c
|
20 21 22 23 24 |
#include <linux/module.h> #include <linux/mm.h> #include <linux/swap.h> #include <linux/slab.h> #include <linux/sysctl.h> |
d33ed52d5
|
25 |
#include <linux/signal.h> |
455cd5ab3
|
26 |
#include <linux/printk.h> |
1da177e4c
|
27 |
#include <linux/proc_fs.h> |
72c2d5823
|
28 |
#include <linux/security.h> |
1da177e4c
|
29 |
#include <linux/ctype.h> |
dfec072ec
|
30 |
#include <linux/kmemcheck.h> |
62239ac2b
|
31 |
#include <linux/fs.h> |
1da177e4c
|
32 33 |
#include <linux/init.h> #include <linux/kernel.h> |
0296b2281
|
34 |
#include <linux/kobject.h> |
20380731b
|
35 |
#include <linux/net.h> |
1da177e4c
|
36 37 38 |
#include <linux/sysrq.h> #include <linux/highuid.h> #include <linux/writeback.h> |
3fff4c42b
|
39 |
#include <linux/ratelimit.h> |
76ab0f530
|
40 |
#include <linux/compaction.h> |
1da177e4c
|
41 |
#include <linux/hugetlb.h> |
1da177e4c
|
42 |
#include <linux/initrd.h> |
0b77f5bfb
|
43 |
#include <linux/key.h> |
1da177e4c
|
44 45 46 |
#include <linux/times.h> #include <linux/limits.h> #include <linux/dcache.h> |
6e006701c
|
47 |
#include <linux/dnotify.h> |
1da177e4c
|
48 |
#include <linux/syscalls.h> |
c748e1340
|
49 |
#include <linux/vmstat.h> |
c255d844d
|
50 51 |
#include <linux/nfs_fs.h> #include <linux/acpi.h> |
10a0a8d4e
|
52 |
#include <linux/reboot.h> |
b0fc494fa
|
53 |
#include <linux/ftrace.h> |
cdd6c482c
|
54 |
#include <linux/perf_event.h> |
b2be84df9
|
55 |
#include <linux/kprobes.h> |
b492e95be
|
56 |
#include <linux/pipe_fs_i.h> |
8e4228e1e
|
57 |
#include <linux/oom.h> |
1da177e4c
|
58 59 60 |
#include <asm/uaccess.h> #include <asm/processor.h> |
29cbc78b9
|
61 62 |
#ifdef CONFIG_X86 #include <asm/nmi.h> |
0741f4d20
|
63 |
#include <asm/stacktrace.h> |
6e7c40259
|
64 |
#include <asm/io.h> |
29cbc78b9
|
65 |
#endif |
c55b7c3e8
|
66 67 68 |
#ifdef CONFIG_BSD_PROCESS_ACCT #include <linux/acct.h> #endif |
4f0e056fd
|
69 70 71 |
#ifdef CONFIG_RT_MUTEXES #include <linux/rtmutex.h> #endif |
2edf5e498
|
72 73 74 |
#if defined(CONFIG_PROVE_LOCKING) || defined(CONFIG_LOCK_STAT) #include <linux/lockdep.h> #endif |
15485a468
|
75 76 77 |
#ifdef CONFIG_CHR_DEV_SG #include <scsi/sg.h> #endif |
29cbc78b9
|
78 |
|
58687acba
|
79 |
#ifdef CONFIG_LOCKUP_DETECTOR |
504d7cf10
|
80 81 |
#include <linux/nmi.h> #endif |
7058cb02d
|
82 |
|
1da177e4c
|
83 84 85 |
#if defined(CONFIG_SYSCTL) /* External variables not in a header file. */ |
1da177e4c
|
86 87 88 |
extern int sysctl_overcommit_memory; extern int sysctl_overcommit_ratio; extern int max_threads; |
1da177e4c
|
89 |
extern int core_uses_pid; |
d6e711448
|
90 |
extern int suid_dumpable; |
1da177e4c
|
91 |
extern char core_pattern[]; |
a293980c2
|
92 |
extern unsigned int core_pipe_limit; |
1da177e4c
|
93 94 |
extern int pid_max; extern int min_free_kbytes; |
1da177e4c
|
95 |
extern int pid_max_min, pid_max_max; |
9d0243bca
|
96 |
extern int sysctl_drop_caches; |
8ad4b1fb8
|
97 |
extern int percpu_pagelist_fraction; |
bebfa1013
|
98 |
extern int compat_log; |
9745512ce
|
99 |
extern int latencytop_enabled; |
eceea0b3d
|
100 |
extern int sysctl_nr_open_min, sysctl_nr_open_max; |
dd8632a12
|
101 102 103 |
#ifndef CONFIG_MMU extern int sysctl_nr_trim_pages; #endif |
cb684b5bc
|
104 |
#ifdef CONFIG_BLOCK |
5e605b64a
|
105 |
extern int blk_iopoll_enabled; |
cb684b5bc
|
106 |
#endif |
1da177e4c
|
107 |
|
c4f3b63fe
|
108 |
/* Constants used for minimum and maximum */ |
2508ce184
|
109 |
#ifdef CONFIG_LOCKUP_DETECTOR |
c4f3b63fe
|
110 |
static int sixty = 60; |
9383d9679
|
111 |
static int neg_one = -1; |
c4f3b63fe
|
112 |
#endif |
c4f3b63fe
|
113 |
static int zero; |
cd5f9a4c3
|
114 115 |
static int __maybe_unused one = 1; static int __maybe_unused two = 2; |
cb16e95fa
|
116 |
static int __maybe_unused three = 3; |
fc3501d41
|
117 |
static unsigned long one_ul = 1; |
c4f3b63fe
|
118 |
static int one_hundred = 100; |
af91322ef
|
119 120 121 |
#ifdef CONFIG_PRINTK static int ten_thousand = 10000; #endif |
c4f3b63fe
|
122 |
|
9e4a5bda8
|
123 124 |
/* this is needed for the proc_doulongvec_minmax of vm_dirty_bytes */ static unsigned long dirty_bytes_min = 2 * PAGE_SIZE; |
1da177e4c
|
125 126 127 |
/* this is needed for the proc_dointvec_minmax for [fs_]overflow UID and GID */ static int maxolduid = 65535; static int minolduid; |
8ad4b1fb8
|
128 |
static int min_percpu_pagelist_fract = 8; |
1da177e4c
|
129 130 |
static int ngroups_max = NGROUPS_MAX; |
d14f17294
|
131 132 133 |
#ifdef CONFIG_INOTIFY_USER #include <linux/inotify.h> #endif |
72c57ed50
|
134 |
#ifdef CONFIG_SPARC |
17f04fbb0
|
135 |
#include <asm/system.h> |
1da177e4c
|
136 |
#endif |
0871420fa
|
137 138 139 |
#ifdef CONFIG_SPARC64 extern int sysctl_tsb_ratio; #endif |
1da177e4c
|
140 141 142 143 |
#ifdef __hppa__ extern int pwrsw_enabled; extern int unaligned_enabled; #endif |
347a8dc3b
|
144 |
#ifdef CONFIG_S390 |
1da177e4c
|
145 146 147 148 |
#ifdef CONFIG_MATHEMU extern int sysctl_ieee_emulation_warnings; #endif extern int sysctl_userprocess_debug; |
951f22d5b
|
149 |
extern int spin_retry; |
1da177e4c
|
150 |
#endif |
d2b176ed8
|
151 152 |
#ifdef CONFIG_IA64 extern int no_unaligned_warning; |
88fc241f5
|
153 |
extern int unaligned_dump_stack; |
d2b176ed8
|
154 |
#endif |
d6f8ff738
|
155 |
#ifdef CONFIG_PROC_SYSCTL |
8d65af789
|
156 |
static int proc_do_cad_pid(struct ctl_table *table, int write, |
9ec52099e
|
157 |
void __user *buffer, size_t *lenp, loff_t *ppos); |
8d65af789
|
158 |
static int proc_taint(struct ctl_table *table, int write, |
34f5a3989
|
159 |
void __user *buffer, size_t *lenp, loff_t *ppos); |
d6f8ff738
|
160 |
#endif |
9ec52099e
|
161 |
|
bfdc0b497
|
162 163 164 165 |
#ifdef CONFIG_PRINTK static int proc_dmesg_restrict(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos); #endif |
97f5f0cd8
|
166 |
#ifdef CONFIG_MAGIC_SYSRQ |
8c6a98b22
|
167 168 |
/* Note: sysrq code uses it's own private copy */ static int __sysrq_enabled = SYSRQ_DEFAULT_ENABLE; |
97f5f0cd8
|
169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 |
static int sysrq_sysctl_handler(ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) { int error; error = proc_dointvec(table, write, buffer, lenp, ppos); if (error) return error; if (write) sysrq_toggle_support(__sysrq_enabled); return 0; } #endif |
d8217f076
|
187 |
static struct ctl_table root_table[]; |
e51b6ba07
|
188 189 |
static struct ctl_table_root sysctl_table_root; static struct ctl_table_header root_table_header = { |
dfef6dcd3
|
190 |
{{.count = 1, |
e51b6ba07
|
191 |
.ctl_table = root_table, |
dfef6dcd3
|
192 |
.ctl_entry = LIST_HEAD_INIT(sysctl_table_root.default_set.list),}}, |
e51b6ba07
|
193 |
.root = &sysctl_table_root, |
734550921
|
194 |
.set = &sysctl_table_root.default_set, |
e51b6ba07
|
195 196 197 |
}; static struct ctl_table_root sysctl_table_root = { .root_list = LIST_HEAD_INIT(sysctl_table_root.root_list), |
734550921
|
198 |
.default_set.list = LIST_HEAD_INIT(root_table_header.ctl_entry), |
e51b6ba07
|
199 |
}; |
1da177e4c
|
200 |
|
d8217f076
|
201 202 203 204 205 206 |
static struct ctl_table kern_table[]; static struct ctl_table vm_table[]; static struct ctl_table fs_table[]; static struct ctl_table debug_table[]; static struct ctl_table dev_table[]; extern struct ctl_table random_table[]; |
7ef9964e6
|
207 208 209 |
#ifdef CONFIG_EPOLL extern struct ctl_table epoll_table[]; #endif |
1da177e4c
|
210 211 212 213 |
#ifdef HAVE_ARCH_PICK_MMAP_LAYOUT int sysctl_legacy_va_layout; #endif |
1da177e4c
|
214 |
/* The default sysctl tables: */ |
d8217f076
|
215 |
static struct ctl_table root_table[] = { |
1da177e4c
|
216 |
{ |
1da177e4c
|
217 218 219 220 221 |
.procname = "kernel", .mode = 0555, .child = kern_table, }, { |
1da177e4c
|
222 223 224 225 |
.procname = "vm", .mode = 0555, .child = vm_table, }, |
1da177e4c
|
226 |
{ |
1da177e4c
|
227 228 229 230 231 |
.procname = "fs", .mode = 0555, .child = fs_table, }, { |
1da177e4c
|
232 233 234 235 236 |
.procname = "debug", .mode = 0555, .child = debug_table, }, { |
1da177e4c
|
237 238 239 240 |
.procname = "dev", .mode = 0555, .child = dev_table, }, |
6fce56ec9
|
241 |
{ } |
1da177e4c
|
242 |
}; |
77e54a1f8
|
243 |
#ifdef CONFIG_SCHED_DEBUG |
73c4efd2c
|
244 245 246 247 |
static int min_sched_granularity_ns = 100000; /* 100 usecs */ static int max_sched_granularity_ns = NSEC_PER_SEC; /* 1 second */ static int min_wakeup_granularity_ns; /* 0 usecs */ static int max_wakeup_granularity_ns = NSEC_PER_SEC; /* 1 second */ |
1983a922a
|
248 249 |
static int min_sched_tunable_scaling = SCHED_TUNABLESCALING_NONE; static int max_sched_tunable_scaling = SCHED_TUNABLESCALING_END-1; |
77e54a1f8
|
250 |
#endif |
5e7719058
|
251 252 253 254 |
#ifdef CONFIG_COMPACTION static int min_extfrag_threshold; static int max_extfrag_threshold = 1000; #endif |
d8217f076
|
255 |
static struct ctl_table kern_table[] = { |
2bba22c50
|
256 |
{ |
2bba22c50
|
257 258 259 260 |
.procname = "sched_child_runs_first", .data = &sysctl_sched_child_runs_first, .maxlen = sizeof(unsigned int), .mode = 0644, |
6d4561110
|
261 |
.proc_handler = proc_dointvec, |
2bba22c50
|
262 |
}, |
77e54a1f8
|
263 264 |
#ifdef CONFIG_SCHED_DEBUG { |
b2be5e96d
|
265 266 |
.procname = "sched_min_granularity_ns", .data = &sysctl_sched_min_granularity, |
77e54a1f8
|
267 268 |
.maxlen = sizeof(unsigned int), .mode = 0644, |
702a7c760
|
269 |
.proc_handler = sched_proc_update_handler, |
b2be5e96d
|
270 271 |
.extra1 = &min_sched_granularity_ns, .extra2 = &max_sched_granularity_ns, |
77e54a1f8
|
272 273 |
}, { |
218050855
|
274 275 276 277 |
.procname = "sched_latency_ns", .data = &sysctl_sched_latency, .maxlen = sizeof(unsigned int), .mode = 0644, |
702a7c760
|
278 |
.proc_handler = sched_proc_update_handler, |
218050855
|
279 280 281 282 |
.extra1 = &min_sched_granularity_ns, .extra2 = &max_sched_granularity_ns, }, { |
77e54a1f8
|
283 284 285 286 |
.procname = "sched_wakeup_granularity_ns", .data = &sysctl_sched_wakeup_granularity, .maxlen = sizeof(unsigned int), .mode = 0644, |
702a7c760
|
287 |
.proc_handler = sched_proc_update_handler, |
77e54a1f8
|
288 289 290 291 |
.extra1 = &min_wakeup_granularity_ns, .extra2 = &max_wakeup_granularity_ns, }, { |
1983a922a
|
292 293 294 295 |
.procname = "sched_tunable_scaling", .data = &sysctl_sched_tunable_scaling, .maxlen = sizeof(enum sched_tunable_scaling), .mode = 0644, |
702a7c760
|
296 |
.proc_handler = sched_proc_update_handler, |
1983a922a
|
297 298 |
.extra1 = &min_sched_tunable_scaling, .extra2 = &max_sched_tunable_scaling, |
2398f2c6d
|
299 300 |
}, { |
da84d9617
|
301 302 303 304 |
.procname = "sched_migration_cost", .data = &sysctl_sched_migration_cost, .maxlen = sizeof(unsigned int), .mode = 0644, |
6d4561110
|
305 |
.proc_handler = proc_dointvec, |
da84d9617
|
306 |
}, |
b82d9fdd8
|
307 |
{ |
b82d9fdd8
|
308 309 310 |
.procname = "sched_nr_migrate", .data = &sysctl_sched_nr_migrate, .maxlen = sizeof(unsigned int), |
fa85ae241
|
311 |
.mode = 0644, |
6d4561110
|
312 |
.proc_handler = proc_dointvec, |
fa85ae241
|
313 |
}, |
cd1bb94b4
|
314 |
{ |
e9e9250bc
|
315 316 317 318 |
.procname = "sched_time_avg", .data = &sysctl_sched_time_avg, .maxlen = sizeof(unsigned int), .mode = 0644, |
6d4561110
|
319 |
.proc_handler = proc_dointvec, |
e9e9250bc
|
320 321 |
}, { |
a7a4f8a75
|
322 323 324 325 326 327 328 |
.procname = "sched_shares_window", .data = &sysctl_sched_shares_window, .maxlen = sizeof(unsigned int), .mode = 0644, .proc_handler = proc_dointvec, }, { |
cd1bb94b4
|
329 330 331 332 |
.procname = "timer_migration", .data = &sysctl_timer_migration, .maxlen = sizeof(unsigned int), .mode = 0644, |
6d4561110
|
333 |
.proc_handler = proc_dointvec_minmax, |
bfdb4d9f0
|
334 335 |
.extra1 = &zero, .extra2 = &one, |
fa85ae241
|
336 |
}, |
1fc84aaae
|
337 |
#endif |
1799e35d5
|
338 |
{ |
9f0c1e560
|
339 340 341 342 |
.procname = "sched_rt_period_us", .data = &sysctl_sched_rt_period, .maxlen = sizeof(unsigned int), .mode = 0644, |
6d4561110
|
343 |
.proc_handler = sched_rt_handler, |
9f0c1e560
|
344 345 |
}, { |
9f0c1e560
|
346 347 348 349 |
.procname = "sched_rt_runtime_us", .data = &sysctl_sched_rt_runtime, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
350 |
.proc_handler = sched_rt_handler, |
9f0c1e560
|
351 |
}, |
5091faa44
|
352 353 354 355 356 357 |
#ifdef CONFIG_SCHED_AUTOGROUP { .procname = "sched_autogroup_enabled", .data = &sysctl_sched_autogroup_enabled, .maxlen = sizeof(unsigned int), .mode = 0644, |
1747b21fe
|
358 |
.proc_handler = proc_dointvec_minmax, |
5091faa44
|
359 360 361 362 |
.extra1 = &zero, .extra2 = &one, }, #endif |
f20786ff4
|
363 364 |
#ifdef CONFIG_PROVE_LOCKING { |
f20786ff4
|
365 366 367 368 |
.procname = "prove_locking", .data = &prove_locking, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
369 |
.proc_handler = proc_dointvec, |
f20786ff4
|
370 371 372 373 |
}, #endif #ifdef CONFIG_LOCK_STAT { |
f20786ff4
|
374 375 376 377 |
.procname = "lock_stat", .data = &lock_stat, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
378 |
.proc_handler = proc_dointvec, |
f20786ff4
|
379 380 |
}, #endif |
77e54a1f8
|
381 |
{ |
1da177e4c
|
382 383 384 385 |
.procname = "panic", .data = &panic_timeout, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
386 |
.proc_handler = proc_dointvec, |
1da177e4c
|
387 388 |
}, { |
1da177e4c
|
389 390 391 392 |
.procname = "core_uses_pid", .data = &core_uses_pid, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
393 |
.proc_handler = proc_dointvec, |
1da177e4c
|
394 395 |
}, { |
1da177e4c
|
396 397 |
.procname = "core_pattern", .data = core_pattern, |
71ce92f3f
|
398 |
.maxlen = CORENAME_MAX_SIZE, |
1da177e4c
|
399 |
.mode = 0644, |
6d4561110
|
400 |
.proc_handler = proc_dostring, |
1da177e4c
|
401 |
}, |
a293980c2
|
402 |
{ |
a293980c2
|
403 404 405 406 |
.procname = "core_pipe_limit", .data = &core_pipe_limit, .maxlen = sizeof(unsigned int), .mode = 0644, |
6d4561110
|
407 |
.proc_handler = proc_dointvec, |
a293980c2
|
408 |
}, |
34f5a3989
|
409 |
#ifdef CONFIG_PROC_SYSCTL |
1da177e4c
|
410 |
{ |
1da177e4c
|
411 |
.procname = "tainted", |
25ddbb18a
|
412 |
.maxlen = sizeof(long), |
34f5a3989
|
413 |
.mode = 0644, |
6d4561110
|
414 |
.proc_handler = proc_taint, |
1da177e4c
|
415 |
}, |
34f5a3989
|
416 |
#endif |
9745512ce
|
417 418 419 420 421 422 |
#ifdef CONFIG_LATENCYTOP { .procname = "latencytop", .data = &latencytop_enabled, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
423 |
.proc_handler = proc_dointvec, |
9745512ce
|
424 425 |
}, #endif |
1da177e4c
|
426 427 |
#ifdef CONFIG_BLK_DEV_INITRD { |
1da177e4c
|
428 429 430 431 |
.procname = "real-root-dev", .data = &real_root_dev, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
432 |
.proc_handler = proc_dointvec, |
1da177e4c
|
433 434 |
}, #endif |
45807a1df
|
435 |
{ |
45807a1df
|
436 437 438 439 |
.procname = "print-fatal-signals", .data = &print_fatal_signals, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
440 |
.proc_handler = proc_dointvec, |
45807a1df
|
441 |
}, |
72c57ed50
|
442 |
#ifdef CONFIG_SPARC |
1da177e4c
|
443 |
{ |
1da177e4c
|
444 445 446 447 |
.procname = "reboot-cmd", .data = reboot_command, .maxlen = 256, .mode = 0644, |
6d4561110
|
448 |
.proc_handler = proc_dostring, |
1da177e4c
|
449 450 |
}, { |
1da177e4c
|
451 452 453 454 |
.procname = "stop-a", .data = &stop_a_enabled, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
455 |
.proc_handler = proc_dointvec, |
1da177e4c
|
456 457 |
}, { |
1da177e4c
|
458 459 460 461 |
.procname = "scons-poweroff", .data = &scons_pwroff, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
462 |
.proc_handler = proc_dointvec, |
1da177e4c
|
463 464 |
}, #endif |
0871420fa
|
465 466 |
#ifdef CONFIG_SPARC64 { |
0871420fa
|
467 468 469 470 |
.procname = "tsb-ratio", .data = &sysctl_tsb_ratio, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
471 |
.proc_handler = proc_dointvec, |
0871420fa
|
472 473 |
}, #endif |
1da177e4c
|
474 475 |
#ifdef __hppa__ { |
1da177e4c
|
476 477 478 479 |
.procname = "soft-power", .data = &pwrsw_enabled, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
480 |
.proc_handler = proc_dointvec, |
1da177e4c
|
481 482 |
}, { |
1da177e4c
|
483 484 485 486 |
.procname = "unaligned-trap", .data = &unaligned_enabled, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
487 |
.proc_handler = proc_dointvec, |
1da177e4c
|
488 489 490 |
}, #endif { |
1da177e4c
|
491 492 493 494 |
.procname = "ctrl-alt-del", .data = &C_A_D, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
495 |
.proc_handler = proc_dointvec, |
1da177e4c
|
496 |
}, |
606576ce8
|
497 |
#ifdef CONFIG_FUNCTION_TRACER |
b0fc494fa
|
498 |
{ |
b0fc494fa
|
499 500 501 502 |
.procname = "ftrace_enabled", .data = &ftrace_enabled, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
503 |
.proc_handler = ftrace_enable_sysctl, |
b0fc494fa
|
504 505 |
}, #endif |
f38f1d2aa
|
506 507 |
#ifdef CONFIG_STACK_TRACER { |
f38f1d2aa
|
508 509 510 511 |
.procname = "stack_tracer_enabled", .data = &stack_tracer_enabled, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
512 |
.proc_handler = stack_trace_sysctl, |
f38f1d2aa
|
513 514 |
}, #endif |
944ac4259
|
515 516 |
#ifdef CONFIG_TRACING { |
3299b4dd1
|
517 |
.procname = "ftrace_dump_on_oops", |
944ac4259
|
518 519 520 |
.data = &ftrace_dump_on_oops, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
521 |
.proc_handler = proc_dointvec, |
944ac4259
|
522 523 |
}, #endif |
a1ef5adb4
|
524 |
#ifdef CONFIG_MODULES |
1da177e4c
|
525 |
{ |
1da177e4c
|
526 527 528 529 |
.procname = "modprobe", .data = &modprobe_path, .maxlen = KMOD_PATH_LEN, .mode = 0644, |
6d4561110
|
530 |
.proc_handler = proc_dostring, |
1da177e4c
|
531 |
}, |
3d43321b7
|
532 |
{ |
3d43321b7
|
533 534 535 536 537 |
.procname = "modules_disabled", .data = &modules_disabled, .maxlen = sizeof(int), .mode = 0644, /* only handle a transition from default "0" to "1" */ |
6d4561110
|
538 |
.proc_handler = proc_dointvec_minmax, |
3d43321b7
|
539 540 541 |
.extra1 = &one, .extra2 = &one, }, |
1da177e4c
|
542 |
#endif |
94f17cd78
|
543 |
#ifdef CONFIG_HOTPLUG |
1da177e4c
|
544 |
{ |
1da177e4c
|
545 |
.procname = "hotplug", |
312c004d3
|
546 547 |
.data = &uevent_helper, .maxlen = UEVENT_HELPER_PATH_LEN, |
1da177e4c
|
548 |
.mode = 0644, |
6d4561110
|
549 |
.proc_handler = proc_dostring, |
1da177e4c
|
550 551 552 553 |
}, #endif #ifdef CONFIG_CHR_DEV_SG { |
1da177e4c
|
554 555 556 557 |
.procname = "sg-big-buff", .data = &sg_big_buff, .maxlen = sizeof (int), .mode = 0444, |
6d4561110
|
558 |
.proc_handler = proc_dointvec, |
1da177e4c
|
559 560 561 562 |
}, #endif #ifdef CONFIG_BSD_PROCESS_ACCT { |
1da177e4c
|
563 564 565 566 |
.procname = "acct", .data = &acct_parm, .maxlen = 3*sizeof(int), .mode = 0644, |
6d4561110
|
567 |
.proc_handler = proc_dointvec, |
1da177e4c
|
568 569 |
}, #endif |
1da177e4c
|
570 571 |
#ifdef CONFIG_MAGIC_SYSRQ { |
1da177e4c
|
572 |
.procname = "sysrq", |
5d6f647fc
|
573 |
.data = &__sysrq_enabled, |
1da177e4c
|
574 575 |
.maxlen = sizeof (int), .mode = 0644, |
97f5f0cd8
|
576 |
.proc_handler = sysrq_sysctl_handler, |
1da177e4c
|
577 578 |
}, #endif |
d6f8ff738
|
579 |
#ifdef CONFIG_PROC_SYSCTL |
1da177e4c
|
580 |
{ |
1da177e4c
|
581 |
.procname = "cad_pid", |
9ec52099e
|
582 |
.data = NULL, |
1da177e4c
|
583 584 |
.maxlen = sizeof (int), .mode = 0600, |
6d4561110
|
585 |
.proc_handler = proc_do_cad_pid, |
1da177e4c
|
586 |
}, |
d6f8ff738
|
587 |
#endif |
1da177e4c
|
588 |
{ |
1da177e4c
|
589 590 591 592 |
.procname = "threads-max", .data = &max_threads, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
593 |
.proc_handler = proc_dointvec, |
1da177e4c
|
594 595 |
}, { |
1da177e4c
|
596 597 598 599 |
.procname = "random", .mode = 0555, .child = random_table, }, |
1da177e4c
|
600 |
{ |
1da177e4c
|
601 602 603 604 |
.procname = "overflowuid", .data = &overflowuid, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
605 |
.proc_handler = proc_dointvec_minmax, |
1da177e4c
|
606 607 608 609 |
.extra1 = &minolduid, .extra2 = &maxolduid, }, { |
1da177e4c
|
610 611 612 613 |
.procname = "overflowgid", .data = &overflowgid, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
614 |
.proc_handler = proc_dointvec_minmax, |
1da177e4c
|
615 616 617 |
.extra1 = &minolduid, .extra2 = &maxolduid, }, |
347a8dc3b
|
618 |
#ifdef CONFIG_S390 |
1da177e4c
|
619 620 |
#ifdef CONFIG_MATHEMU { |
1da177e4c
|
621 622 623 624 |
.procname = "ieee_emulation_warnings", .data = &sysctl_ieee_emulation_warnings, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
625 |
.proc_handler = proc_dointvec, |
1da177e4c
|
626 627 |
}, #endif |
1da177e4c
|
628 |
{ |
1da177e4c
|
629 |
.procname = "userprocess_debug", |
ab3c68ee5
|
630 |
.data = &show_unhandled_signals, |
1da177e4c
|
631 632 |
.maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
633 |
.proc_handler = proc_dointvec, |
1da177e4c
|
634 635 636 |
}, #endif { |
1da177e4c
|
637 638 639 640 |
.procname = "pid_max", .data = &pid_max, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
641 |
.proc_handler = proc_dointvec_minmax, |
1da177e4c
|
642 643 644 645 |
.extra1 = &pid_max_min, .extra2 = &pid_max_max, }, { |
1da177e4c
|
646 647 648 649 |
.procname = "panic_on_oops", .data = &panic_on_oops, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
650 |
.proc_handler = proc_dointvec, |
1da177e4c
|
651 |
}, |
7ef3d2fd1
|
652 653 |
#if defined CONFIG_PRINTK { |
7ef3d2fd1
|
654 655 656 657 |
.procname = "printk", .data = &console_loglevel, .maxlen = 4*sizeof(int), .mode = 0644, |
6d4561110
|
658 |
.proc_handler = proc_dointvec, |
7ef3d2fd1
|
659 |
}, |
1da177e4c
|
660 |
{ |
1da177e4c
|
661 |
.procname = "printk_ratelimit", |
717115e1a
|
662 |
.data = &printk_ratelimit_state.interval, |
1da177e4c
|
663 664 |
.maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
665 |
.proc_handler = proc_dointvec_jiffies, |
1da177e4c
|
666 667 |
}, { |
1da177e4c
|
668 |
.procname = "printk_ratelimit_burst", |
717115e1a
|
669 |
.data = &printk_ratelimit_state.burst, |
1da177e4c
|
670 671 |
.maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
672 |
.proc_handler = proc_dointvec, |
1da177e4c
|
673 |
}, |
af91322ef
|
674 |
{ |
af91322ef
|
675 676 677 678 |
.procname = "printk_delay", .data = &printk_delay_msec, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
679 |
.proc_handler = proc_dointvec_minmax, |
af91322ef
|
680 681 682 |
.extra1 = &zero, .extra2 = &ten_thousand, }, |
1da177e4c
|
683 |
{ |
eaf06b241
|
684 685 686 687 688 689 690 691 |
.procname = "dmesg_restrict", .data = &dmesg_restrict, .maxlen = sizeof(int), .mode = 0644, .proc_handler = proc_dointvec_minmax, .extra1 = &zero, .extra2 = &one, }, |
455cd5ab3
|
692 693 694 695 696 |
{ .procname = "kptr_restrict", .data = &kptr_restrict, .maxlen = sizeof(int), .mode = 0644, |
bfdc0b497
|
697 |
.proc_handler = proc_dmesg_restrict, |
455cd5ab3
|
698 699 700 |
.extra1 = &zero, .extra2 = &two, }, |
df6e61d4c
|
701 |
#endif |
eaf06b241
|
702 |
{ |
1da177e4c
|
703 704 705 706 |
.procname = "ngroups_max", .data = &ngroups_max, .maxlen = sizeof (int), .mode = 0444, |
6d4561110
|
707 |
.proc_handler = proc_dointvec, |
1da177e4c
|
708 |
}, |
58687acba
|
709 |
#if defined(CONFIG_LOCKUP_DETECTOR) |
504d7cf10
|
710 |
{ |
58687acba
|
711 712 |
.procname = "watchdog", .data = &watchdog_enabled, |
504d7cf10
|
713 714 |
.maxlen = sizeof (int), .mode = 0644, |
58687acba
|
715 716 717 718 719 720 721 722 723 724 |
.proc_handler = proc_dowatchdog_enabled, }, { .procname = "watchdog_thresh", .data = &softlockup_thresh, .maxlen = sizeof(int), .mode = 0644, .proc_handler = proc_dowatchdog_thresh, .extra1 = &neg_one, .extra2 = &sixty, |
504d7cf10
|
725 |
}, |
2508ce184
|
726 727 728 729 730 731 732 733 734 |
{ .procname = "softlockup_panic", .data = &softlockup_panic, .maxlen = sizeof(int), .mode = 0644, .proc_handler = proc_dointvec_minmax, .extra1 = &zero, .extra2 = &one, }, |
5dc305587
|
735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 |
{ .procname = "nmi_watchdog", .data = &watchdog_enabled, .maxlen = sizeof (int), .mode = 0644, .proc_handler = proc_dowatchdog_enabled, }, #endif #if defined(CONFIG_X86_LOCAL_APIC) && defined(CONFIG_X86) { .procname = "unknown_nmi_panic", .data = &unknown_nmi_panic, .maxlen = sizeof (int), .mode = 0644, .proc_handler = proc_dointvec, }, |
504d7cf10
|
751 |
#endif |
1da177e4c
|
752 753 |
#if defined(CONFIG_X86) { |
8da5adda9
|
754 755 756 757 |
.procname = "panic_on_unrecovered_nmi", .data = &panic_on_unrecovered_nmi, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
758 |
.proc_handler = proc_dointvec, |
8da5adda9
|
759 760 |
}, { |
5211a242d
|
761 762 763 764 |
.procname = "panic_on_io_nmi", .data = &panic_on_io_nmi, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
765 |
.proc_handler = proc_dointvec, |
5211a242d
|
766 767 |
}, { |
1da177e4c
|
768 769 770 771 |
.procname = "bootloader_type", .data = &bootloader_type, .maxlen = sizeof (int), .mode = 0444, |
6d4561110
|
772 |
.proc_handler = proc_dointvec, |
1da177e4c
|
773 |
}, |
0741f4d20
|
774 |
{ |
5031296c5
|
775 776 777 778 |
.procname = "bootloader_version", .data = &bootloader_version, .maxlen = sizeof (int), .mode = 0444, |
6d4561110
|
779 |
.proc_handler = proc_dointvec, |
5031296c5
|
780 781 |
}, { |
0741f4d20
|
782 783 784 785 |
.procname = "kstack_depth_to_print", .data = &kstack_depth_to_print, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
786 |
.proc_handler = proc_dointvec, |
0741f4d20
|
787 |
}, |
6e7c40259
|
788 |
{ |
6e7c40259
|
789 790 791 792 |
.procname = "io_delay_type", .data = &io_delay_type, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
793 |
.proc_handler = proc_dointvec, |
6e7c40259
|
794 |
}, |
1da177e4c
|
795 |
#endif |
7a9166e3b
|
796 |
#if defined(CONFIG_MMU) |
1da177e4c
|
797 |
{ |
1da177e4c
|
798 799 800 801 |
.procname = "randomize_va_space", .data = &randomize_va_space, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
802 |
.proc_handler = proc_dointvec, |
1da177e4c
|
803 |
}, |
7a9166e3b
|
804 |
#endif |
0152fb376
|
805 |
#if defined(CONFIG_S390) && defined(CONFIG_SMP) |
951f22d5b
|
806 |
{ |
951f22d5b
|
807 808 809 810 |
.procname = "spin_retry", .data = &spin_retry, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
811 |
.proc_handler = proc_dointvec, |
951f22d5b
|
812 813 |
}, #endif |
673d5b43d
|
814 |
#if defined(CONFIG_ACPI_SLEEP) && defined(CONFIG_X86) |
c255d844d
|
815 |
{ |
c255d844d
|
816 |
.procname = "acpi_video_flags", |
77afcf78a
|
817 |
.data = &acpi_realmode_flags, |
c255d844d
|
818 819 |
.maxlen = sizeof (unsigned long), .mode = 0644, |
6d4561110
|
820 |
.proc_handler = proc_doulongvec_minmax, |
c255d844d
|
821 822 |
}, #endif |
d2b176ed8
|
823 824 |
#ifdef CONFIG_IA64 { |
d2b176ed8
|
825 826 827 828 |
.procname = "ignore-unaligned-usertrap", .data = &no_unaligned_warning, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
829 |
.proc_handler = proc_dointvec, |
d2b176ed8
|
830 |
}, |
88fc241f5
|
831 |
{ |
88fc241f5
|
832 833 834 835 |
.procname = "unaligned-dump-stack", .data = &unaligned_dump_stack, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
836 |
.proc_handler = proc_dointvec, |
88fc241f5
|
837 |
}, |
d2b176ed8
|
838 |
#endif |
e162b39a3
|
839 840 |
#ifdef CONFIG_DETECT_HUNG_TASK { |
e162b39a3
|
841 842 843 844 |
.procname = "hung_task_panic", .data = &sysctl_hung_task_panic, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
845 |
.proc_handler = proc_dointvec_minmax, |
e162b39a3
|
846 847 848 |
.extra1 = &zero, .extra2 = &one, }, |
82a1fcb90
|
849 |
{ |
82a1fcb90
|
850 851 |
.procname = "hung_task_check_count", .data = &sysctl_hung_task_check_count, |
90739081e
|
852 |
.maxlen = sizeof(unsigned long), |
82a1fcb90
|
853 |
.mode = 0644, |
6d4561110
|
854 |
.proc_handler = proc_doulongvec_minmax, |
82a1fcb90
|
855 856 |
}, { |
82a1fcb90
|
857 858 |
.procname = "hung_task_timeout_secs", .data = &sysctl_hung_task_timeout_secs, |
90739081e
|
859 |
.maxlen = sizeof(unsigned long), |
82a1fcb90
|
860 |
.mode = 0644, |
6d4561110
|
861 |
.proc_handler = proc_dohung_task_timeout_secs, |
82a1fcb90
|
862 863 |
}, { |
82a1fcb90
|
864 865 |
.procname = "hung_task_warnings", .data = &sysctl_hung_task_warnings, |
90739081e
|
866 |
.maxlen = sizeof(unsigned long), |
82a1fcb90
|
867 |
.mode = 0644, |
6d4561110
|
868 |
.proc_handler = proc_doulongvec_minmax, |
82a1fcb90
|
869 |
}, |
c4f3b63fe
|
870 |
#endif |
bebfa1013
|
871 872 |
#ifdef CONFIG_COMPAT { |
bebfa1013
|
873 874 875 876 |
.procname = "compat-log", .data = &compat_log, .maxlen = sizeof (int), .mode = 0644, |
6d4561110
|
877 |
.proc_handler = proc_dointvec, |
bebfa1013
|
878 879 |
}, #endif |
23f78d4a0
|
880 881 |
#ifdef CONFIG_RT_MUTEXES { |
23f78d4a0
|
882 883 884 885 |
.procname = "max_lock_depth", .data = &max_lock_depth, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
886 |
.proc_handler = proc_dointvec, |
23f78d4a0
|
887 888 |
}, #endif |
10a0a8d4e
|
889 |
{ |
10a0a8d4e
|
890 891 892 893 |
.procname = "poweroff_cmd", .data = &poweroff_cmd, .maxlen = POWEROFF_CMD_PATH_LEN, .mode = 0644, |
6d4561110
|
894 |
.proc_handler = proc_dostring, |
10a0a8d4e
|
895 |
}, |
0b77f5bfb
|
896 897 |
#ifdef CONFIG_KEYS { |
0b77f5bfb
|
898 899 900 901 902 |
.procname = "keys", .mode = 0555, .child = key_sysctls, }, #endif |
31a72bce0
|
903 904 |
#ifdef CONFIG_RCU_TORTURE_TEST { |
31a72bce0
|
905 906 907 908 |
.procname = "rcutorture_runnable", .data = &rcutorture_runnable, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
909 |
.proc_handler = proc_dointvec, |
31a72bce0
|
910 911 |
}, #endif |
cdd6c482c
|
912 |
#ifdef CONFIG_PERF_EVENTS |
1ccd15497
|
913 |
{ |
cdd6c482c
|
914 915 916 |
.procname = "perf_event_paranoid", .data = &sysctl_perf_event_paranoid, .maxlen = sizeof(sysctl_perf_event_paranoid), |
1ccd15497
|
917 |
.mode = 0644, |
6d4561110
|
918 |
.proc_handler = proc_dointvec, |
1ccd15497
|
919 |
}, |
c5078f78b
|
920 |
{ |
cdd6c482c
|
921 922 923 |
.procname = "perf_event_mlock_kb", .data = &sysctl_perf_event_mlock, .maxlen = sizeof(sysctl_perf_event_mlock), |
c5078f78b
|
924 |
.mode = 0644, |
6d4561110
|
925 |
.proc_handler = proc_dointvec, |
c5078f78b
|
926 |
}, |
a78ac3258
|
927 |
{ |
cdd6c482c
|
928 929 930 |
.procname = "perf_event_max_sample_rate", .data = &sysctl_perf_event_sample_rate, .maxlen = sizeof(sysctl_perf_event_sample_rate), |
a78ac3258
|
931 |
.mode = 0644, |
163ec4354
|
932 |
.proc_handler = perf_proc_update_handler, |
a78ac3258
|
933 |
}, |
1ccd15497
|
934 |
#endif |
dfec072ec
|
935 936 |
#ifdef CONFIG_KMEMCHECK { |
dfec072ec
|
937 938 939 940 |
.procname = "kmemcheck", .data = &kmemcheck_enabled, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
941 |
.proc_handler = proc_dointvec, |
dfec072ec
|
942 943 |
}, #endif |
cb684b5bc
|
944 |
#ifdef CONFIG_BLOCK |
5e605b64a
|
945 |
{ |
5e605b64a
|
946 947 948 949 |
.procname = "blk_iopoll", .data = &blk_iopoll_enabled, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
950 |
.proc_handler = proc_dointvec, |
5e605b64a
|
951 |
}, |
cb684b5bc
|
952 |
#endif |
6fce56ec9
|
953 |
{ } |
1da177e4c
|
954 |
}; |
d8217f076
|
955 |
static struct ctl_table vm_table[] = { |
1da177e4c
|
956 |
{ |
1da177e4c
|
957 958 959 960 |
.procname = "overcommit_memory", .data = &sysctl_overcommit_memory, .maxlen = sizeof(sysctl_overcommit_memory), .mode = 0644, |
cb16e95fa
|
961 962 963 |
.proc_handler = proc_dointvec_minmax, .extra1 = &zero, .extra2 = &two, |
1da177e4c
|
964 965 |
}, { |
fadd8fbd1
|
966 967 968 969 |
.procname = "panic_on_oom", .data = &sysctl_panic_on_oom, .maxlen = sizeof(sysctl_panic_on_oom), .mode = 0644, |
cb16e95fa
|
970 971 972 |
.proc_handler = proc_dointvec_minmax, .extra1 = &zero, .extra2 = &two, |
fadd8fbd1
|
973 974 |
}, { |
fe071d7e8
|
975 976 977 978 |
.procname = "oom_kill_allocating_task", .data = &sysctl_oom_kill_allocating_task, .maxlen = sizeof(sysctl_oom_kill_allocating_task), .mode = 0644, |
6d4561110
|
979 |
.proc_handler = proc_dointvec, |
fe071d7e8
|
980 981 |
}, { |
fef1bdd68
|
982 983 984 985 |
.procname = "oom_dump_tasks", .data = &sysctl_oom_dump_tasks, .maxlen = sizeof(sysctl_oom_dump_tasks), .mode = 0644, |
6d4561110
|
986 |
.proc_handler = proc_dointvec, |
fef1bdd68
|
987 988 |
}, { |
1da177e4c
|
989 990 991 992 |
.procname = "overcommit_ratio", .data = &sysctl_overcommit_ratio, .maxlen = sizeof(sysctl_overcommit_ratio), .mode = 0644, |
6d4561110
|
993 |
.proc_handler = proc_dointvec, |
1da177e4c
|
994 995 |
}, { |
1da177e4c
|
996 997 998 999 |
.procname = "page-cluster", .data = &page_cluster, .maxlen = sizeof(int), .mode = 0644, |
cb16e95fa
|
1000 1001 |
.proc_handler = proc_dointvec_minmax, .extra1 = &zero, |
1da177e4c
|
1002 1003 |
}, { |
1da177e4c
|
1004 1005 1006 1007 |
.procname = "dirty_background_ratio", .data = &dirty_background_ratio, .maxlen = sizeof(dirty_background_ratio), .mode = 0644, |
6d4561110
|
1008 |
.proc_handler = dirty_background_ratio_handler, |
1da177e4c
|
1009 1010 1011 1012 |
.extra1 = &zero, .extra2 = &one_hundred, }, { |
2da02997e
|
1013 1014 1015 1016 |
.procname = "dirty_background_bytes", .data = &dirty_background_bytes, .maxlen = sizeof(dirty_background_bytes), .mode = 0644, |
6d4561110
|
1017 |
.proc_handler = dirty_background_bytes_handler, |
fc3501d41
|
1018 |
.extra1 = &one_ul, |
2da02997e
|
1019 1020 |
}, { |
1da177e4c
|
1021 1022 1023 1024 |
.procname = "dirty_ratio", .data = &vm_dirty_ratio, .maxlen = sizeof(vm_dirty_ratio), .mode = 0644, |
6d4561110
|
1025 |
.proc_handler = dirty_ratio_handler, |
1da177e4c
|
1026 1027 1028 1029 |
.extra1 = &zero, .extra2 = &one_hundred, }, { |
2da02997e
|
1030 1031 1032 1033 |
.procname = "dirty_bytes", .data = &vm_dirty_bytes, .maxlen = sizeof(vm_dirty_bytes), .mode = 0644, |
6d4561110
|
1034 |
.proc_handler = dirty_bytes_handler, |
9e4a5bda8
|
1035 |
.extra1 = &dirty_bytes_min, |
2da02997e
|
1036 1037 |
}, { |
1da177e4c
|
1038 |
.procname = "dirty_writeback_centisecs", |
f6ef94381
|
1039 1040 |
.data = &dirty_writeback_interval, .maxlen = sizeof(dirty_writeback_interval), |
1da177e4c
|
1041 |
.mode = 0644, |
6d4561110
|
1042 |
.proc_handler = dirty_writeback_centisecs_handler, |
1da177e4c
|
1043 1044 |
}, { |
1da177e4c
|
1045 |
.procname = "dirty_expire_centisecs", |
f6ef94381
|
1046 1047 |
.data = &dirty_expire_interval, .maxlen = sizeof(dirty_expire_interval), |
1da177e4c
|
1048 |
.mode = 0644, |
cb16e95fa
|
1049 1050 |
.proc_handler = proc_dointvec_minmax, .extra1 = &zero, |
1da177e4c
|
1051 1052 |
}, { |
1da177e4c
|
1053 1054 1055 1056 |
.procname = "nr_pdflush_threads", .data = &nr_pdflush_threads, .maxlen = sizeof nr_pdflush_threads, .mode = 0444 /* read-only*/, |
6d4561110
|
1057 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1058 1059 |
}, { |
1da177e4c
|
1060 1061 1062 1063 |
.procname = "swappiness", .data = &vm_swappiness, .maxlen = sizeof(vm_swappiness), .mode = 0644, |
6d4561110
|
1064 |
.proc_handler = proc_dointvec_minmax, |
1da177e4c
|
1065 1066 1067 1068 |
.extra1 = &zero, .extra2 = &one_hundred, }, #ifdef CONFIG_HUGETLB_PAGE |
06808b082
|
1069 |
{ |
1da177e4c
|
1070 |
.procname = "nr_hugepages", |
e5ff21594
|
1071 |
.data = NULL, |
1da177e4c
|
1072 1073 |
.maxlen = sizeof(unsigned long), .mode = 0644, |
6d4561110
|
1074 |
.proc_handler = hugetlb_sysctl_handler, |
1da177e4c
|
1075 1076 |
.extra1 = (void *)&hugetlb_zero, .extra2 = (void *)&hugetlb_infinity, |
06808b082
|
1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 |
}, #ifdef CONFIG_NUMA { .procname = "nr_hugepages_mempolicy", .data = NULL, .maxlen = sizeof(unsigned long), .mode = 0644, .proc_handler = &hugetlb_mempolicy_sysctl_handler, .extra1 = (void *)&hugetlb_zero, .extra2 = (void *)&hugetlb_infinity, }, #endif |
1da177e4c
|
1089 |
{ |
1da177e4c
|
1090 1091 1092 1093 |
.procname = "hugetlb_shm_group", .data = &sysctl_hugetlb_shm_group, .maxlen = sizeof(gid_t), .mode = 0644, |
6d4561110
|
1094 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1095 |
}, |
396faf030
|
1096 |
{ |
396faf030
|
1097 1098 1099 1100 |
.procname = "hugepages_treat_as_movable", .data = &hugepages_treat_as_movable, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1101 |
.proc_handler = hugetlb_treat_movable_handler, |
396faf030
|
1102 |
}, |
54f9f80d6
|
1103 |
{ |
d1c3fb1f8
|
1104 |
.procname = "nr_overcommit_hugepages", |
e5ff21594
|
1105 1106 |
.data = NULL, .maxlen = sizeof(unsigned long), |
d1c3fb1f8
|
1107 |
.mode = 0644, |
6d4561110
|
1108 |
.proc_handler = hugetlb_overcommit_handler, |
e5ff21594
|
1109 1110 |
.extra1 = (void *)&hugetlb_zero, .extra2 = (void *)&hugetlb_infinity, |
d1c3fb1f8
|
1111 |
}, |
1da177e4c
|
1112 1113 |
#endif { |
1da177e4c
|
1114 1115 1116 1117 |
.procname = "lowmem_reserve_ratio", .data = &sysctl_lowmem_reserve_ratio, .maxlen = sizeof(sysctl_lowmem_reserve_ratio), .mode = 0644, |
6d4561110
|
1118 |
.proc_handler = lowmem_reserve_ratio_sysctl_handler, |
1da177e4c
|
1119 1120 |
}, { |
9d0243bca
|
1121 1122 1123 1124 1125 |
.procname = "drop_caches", .data = &sysctl_drop_caches, .maxlen = sizeof(int), .mode = 0644, .proc_handler = drop_caches_sysctl_handler, |
cb16e95fa
|
1126 1127 |
.extra1 = &one, .extra2 = &three, |
9d0243bca
|
1128 |
}, |
76ab0f530
|
1129 1130 1131 1132 1133 1134 1135 1136 |
#ifdef CONFIG_COMPACTION { .procname = "compact_memory", .data = &sysctl_compact_memory, .maxlen = sizeof(int), .mode = 0200, .proc_handler = sysctl_compaction_handler, }, |
5e7719058
|
1137 1138 1139 1140 1141 1142 1143 1144 1145 |
{ .procname = "extfrag_threshold", .data = &sysctl_extfrag_threshold, .maxlen = sizeof(int), .mode = 0644, .proc_handler = sysctl_extfrag_handler, .extra1 = &min_extfrag_threshold, .extra2 = &max_extfrag_threshold, }, |
76ab0f530
|
1146 |
#endif /* CONFIG_COMPACTION */ |
9d0243bca
|
1147 |
{ |
1da177e4c
|
1148 1149 1150 1151 |
.procname = "min_free_kbytes", .data = &min_free_kbytes, .maxlen = sizeof(min_free_kbytes), .mode = 0644, |
6d4561110
|
1152 |
.proc_handler = min_free_kbytes_sysctl_handler, |
1da177e4c
|
1153 1154 |
.extra1 = &zero, }, |
8ad4b1fb8
|
1155 |
{ |
8ad4b1fb8
|
1156 1157 1158 1159 |
.procname = "percpu_pagelist_fraction", .data = &percpu_pagelist_fraction, .maxlen = sizeof(percpu_pagelist_fraction), .mode = 0644, |
6d4561110
|
1160 |
.proc_handler = percpu_pagelist_fraction_sysctl_handler, |
8ad4b1fb8
|
1161 1162 |
.extra1 = &min_percpu_pagelist_fract, }, |
1da177e4c
|
1163 1164 |
#ifdef CONFIG_MMU { |
1da177e4c
|
1165 1166 1167 1168 |
.procname = "max_map_count", .data = &sysctl_max_map_count, .maxlen = sizeof(sysctl_max_map_count), .mode = 0644, |
3e26120cc
|
1169 |
.proc_handler = proc_dointvec_minmax, |
70da2340f
|
1170 |
.extra1 = &zero, |
1da177e4c
|
1171 |
}, |
dd8632a12
|
1172 1173 |
#else { |
dd8632a12
|
1174 1175 1176 1177 |
.procname = "nr_trim_pages", .data = &sysctl_nr_trim_pages, .maxlen = sizeof(sysctl_nr_trim_pages), .mode = 0644, |
6d4561110
|
1178 |
.proc_handler = proc_dointvec_minmax, |
dd8632a12
|
1179 1180 |
.extra1 = &zero, }, |
1da177e4c
|
1181 1182 |
#endif { |
1da177e4c
|
1183 1184 1185 1186 |
.procname = "laptop_mode", .data = &laptop_mode, .maxlen = sizeof(laptop_mode), .mode = 0644, |
6d4561110
|
1187 |
.proc_handler = proc_dointvec_jiffies, |
1da177e4c
|
1188 1189 |
}, { |
1da177e4c
|
1190 1191 1192 1193 |
.procname = "block_dump", .data = &block_dump, .maxlen = sizeof(block_dump), .mode = 0644, |
6d4561110
|
1194 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1195 1196 1197 |
.extra1 = &zero, }, { |
1da177e4c
|
1198 1199 1200 1201 |
.procname = "vfs_cache_pressure", .data = &sysctl_vfs_cache_pressure, .maxlen = sizeof(sysctl_vfs_cache_pressure), .mode = 0644, |
6d4561110
|
1202 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1203 1204 1205 1206 |
.extra1 = &zero, }, #ifdef HAVE_ARCH_PICK_MMAP_LAYOUT { |
1da177e4c
|
1207 1208 1209 1210 |
.procname = "legacy_va_layout", .data = &sysctl_legacy_va_layout, .maxlen = sizeof(sysctl_legacy_va_layout), .mode = 0644, |
6d4561110
|
1211 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1212 1213 1214 |
.extra1 = &zero, }, #endif |
1743660b9
|
1215 1216 |
#ifdef CONFIG_NUMA { |
1743660b9
|
1217 1218 1219 1220 |
.procname = "zone_reclaim_mode", .data = &zone_reclaim_mode, .maxlen = sizeof(zone_reclaim_mode), .mode = 0644, |
6d4561110
|
1221 |
.proc_handler = proc_dointvec, |
c84db23c6
|
1222 |
.extra1 = &zero, |
1743660b9
|
1223 |
}, |
9614634fe
|
1224 |
{ |
9614634fe
|
1225 1226 1227 1228 |
.procname = "min_unmapped_ratio", .data = &sysctl_min_unmapped_ratio, .maxlen = sizeof(sysctl_min_unmapped_ratio), .mode = 0644, |
6d4561110
|
1229 |
.proc_handler = sysctl_min_unmapped_ratio_sysctl_handler, |
9614634fe
|
1230 1231 1232 |
.extra1 = &zero, .extra2 = &one_hundred, }, |
0ff38490c
|
1233 |
{ |
0ff38490c
|
1234 1235 1236 1237 |
.procname = "min_slab_ratio", .data = &sysctl_min_slab_ratio, .maxlen = sizeof(sysctl_min_slab_ratio), .mode = 0644, |
6d4561110
|
1238 |
.proc_handler = sysctl_min_slab_ratio_sysctl_handler, |
0ff38490c
|
1239 1240 1241 |
.extra1 = &zero, .extra2 = &one_hundred, }, |
1743660b9
|
1242 |
#endif |
77461ab33
|
1243 1244 |
#ifdef CONFIG_SMP { |
77461ab33
|
1245 1246 1247 1248 |
.procname = "stat_interval", .data = &sysctl_stat_interval, .maxlen = sizeof(sysctl_stat_interval), .mode = 0644, |
6d4561110
|
1249 |
.proc_handler = proc_dointvec_jiffies, |
77461ab33
|
1250 1251 |
}, #endif |
6e1415467
|
1252 |
#ifdef CONFIG_MMU |
ed0321895
|
1253 |
{ |
ed0321895
|
1254 |
.procname = "mmap_min_addr", |
788084aba
|
1255 1256 |
.data = &dac_mmap_min_addr, .maxlen = sizeof(unsigned long), |
ed0321895
|
1257 |
.mode = 0644, |
6d4561110
|
1258 |
.proc_handler = mmap_min_addr_handler, |
ed0321895
|
1259 |
}, |
6e1415467
|
1260 |
#endif |
f0c0b2b80
|
1261 1262 |
#ifdef CONFIG_NUMA { |
f0c0b2b80
|
1263 1264 1265 1266 |
.procname = "numa_zonelist_order", .data = &numa_zonelist_order, .maxlen = NUMA_ZONELIST_ORDER_LEN, .mode = 0644, |
6d4561110
|
1267 |
.proc_handler = numa_zonelist_order_handler, |
f0c0b2b80
|
1268 1269 |
}, #endif |
2b8232ce5
|
1270 |
#if (defined(CONFIG_X86_32) && !defined(CONFIG_UML))|| \ |
5c36e6578
|
1271 |
(defined(CONFIG_SUPERH) && defined(CONFIG_VSYSCALL)) |
e6e5494cb
|
1272 |
{ |
e6e5494cb
|
1273 1274 1275 1276 |
.procname = "vdso_enabled", .data = &vdso_enabled, .maxlen = sizeof(vdso_enabled), .mode = 0644, |
6d4561110
|
1277 |
.proc_handler = proc_dointvec, |
e6e5494cb
|
1278 1279 1280 |
.extra1 = &zero, }, #endif |
195cf453d
|
1281 1282 |
#ifdef CONFIG_HIGHMEM { |
195cf453d
|
1283 1284 1285 1286 |
.procname = "highmem_is_dirtyable", .data = &vm_highmem_is_dirtyable, .maxlen = sizeof(vm_highmem_is_dirtyable), .mode = 0644, |
6d4561110
|
1287 |
.proc_handler = proc_dointvec_minmax, |
195cf453d
|
1288 1289 1290 1291 |
.extra1 = &zero, .extra2 = &one, }, #endif |
4be6f6bb6
|
1292 |
{ |
4be6f6bb6
|
1293 1294 1295 1296 |
.procname = "scan_unevictable_pages", .data = &scan_unevictable_pages, .maxlen = sizeof(scan_unevictable_pages), .mode = 0644, |
6d4561110
|
1297 |
.proc_handler = scan_unevictable_handler, |
4be6f6bb6
|
1298 |
}, |
6a46079cf
|
1299 1300 |
#ifdef CONFIG_MEMORY_FAILURE { |
6a46079cf
|
1301 1302 1303 1304 |
.procname = "memory_failure_early_kill", .data = &sysctl_memory_failure_early_kill, .maxlen = sizeof(sysctl_memory_failure_early_kill), .mode = 0644, |
6d4561110
|
1305 |
.proc_handler = proc_dointvec_minmax, |
6a46079cf
|
1306 1307 1308 1309 |
.extra1 = &zero, .extra2 = &one, }, { |
6a46079cf
|
1310 1311 1312 1313 |
.procname = "memory_failure_recovery", .data = &sysctl_memory_failure_recovery, .maxlen = sizeof(sysctl_memory_failure_recovery), .mode = 0644, |
6d4561110
|
1314 |
.proc_handler = proc_dointvec_minmax, |
6a46079cf
|
1315 1316 1317 1318 |
.extra1 = &zero, .extra2 = &one, }, #endif |
6fce56ec9
|
1319 |
{ } |
1da177e4c
|
1320 |
}; |
2abc26fc6
|
1321 |
#if defined(CONFIG_BINFMT_MISC) || defined(CONFIG_BINFMT_MISC_MODULE) |
d8217f076
|
1322 |
static struct ctl_table binfmt_misc_table[] = { |
6fce56ec9
|
1323 |
{ } |
2abc26fc6
|
1324 1325 |
}; #endif |
d8217f076
|
1326 |
static struct ctl_table fs_table[] = { |
1da177e4c
|
1327 |
{ |
1da177e4c
|
1328 1329 1330 1331 |
.procname = "inode-nr", .data = &inodes_stat, .maxlen = 2*sizeof(int), .mode = 0444, |
cffbc8aa3
|
1332 |
.proc_handler = proc_nr_inodes, |
1da177e4c
|
1333 1334 |
}, { |
1da177e4c
|
1335 1336 1337 1338 |
.procname = "inode-state", .data = &inodes_stat, .maxlen = 7*sizeof(int), .mode = 0444, |
cffbc8aa3
|
1339 |
.proc_handler = proc_nr_inodes, |
1da177e4c
|
1340 1341 |
}, { |
1da177e4c
|
1342 1343 |
.procname = "file-nr", .data = &files_stat, |
518de9b39
|
1344 |
.maxlen = sizeof(files_stat), |
1da177e4c
|
1345 |
.mode = 0444, |
6d4561110
|
1346 |
.proc_handler = proc_nr_files, |
1da177e4c
|
1347 1348 |
}, { |
1da177e4c
|
1349 1350 |
.procname = "file-max", .data = &files_stat.max_files, |
518de9b39
|
1351 |
.maxlen = sizeof(files_stat.max_files), |
1da177e4c
|
1352 |
.mode = 0644, |
518de9b39
|
1353 |
.proc_handler = proc_doulongvec_minmax, |
1da177e4c
|
1354 1355 |
}, { |
9cfe015aa
|
1356 1357 1358 1359 |
.procname = "nr_open", .data = &sysctl_nr_open, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1360 |
.proc_handler = proc_dointvec_minmax, |
eceea0b3d
|
1361 1362 |
.extra1 = &sysctl_nr_open_min, .extra2 = &sysctl_nr_open_max, |
9cfe015aa
|
1363 1364 |
}, { |
1da177e4c
|
1365 1366 1367 1368 |
.procname = "dentry-state", .data = &dentry_stat, .maxlen = 6*sizeof(int), .mode = 0444, |
312d3ca85
|
1369 |
.proc_handler = proc_nr_dentry, |
1da177e4c
|
1370 1371 |
}, { |
1da177e4c
|
1372 1373 1374 1375 |
.procname = "overflowuid", .data = &fs_overflowuid, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1376 |
.proc_handler = proc_dointvec_minmax, |
1da177e4c
|
1377 1378 1379 1380 |
.extra1 = &minolduid, .extra2 = &maxolduid, }, { |
1da177e4c
|
1381 1382 1383 1384 |
.procname = "overflowgid", .data = &fs_overflowgid, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1385 |
.proc_handler = proc_dointvec_minmax, |
1da177e4c
|
1386 1387 1388 |
.extra1 = &minolduid, .extra2 = &maxolduid, }, |
bfcd17a6c
|
1389 |
#ifdef CONFIG_FILE_LOCKING |
1da177e4c
|
1390 |
{ |
1da177e4c
|
1391 1392 1393 1394 |
.procname = "leases-enable", .data = &leases_enable, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1395 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1396 |
}, |
bfcd17a6c
|
1397 |
#endif |
1da177e4c
|
1398 1399 |
#ifdef CONFIG_DNOTIFY { |
1da177e4c
|
1400 1401 1402 1403 |
.procname = "dir-notify-enable", .data = &dir_notify_enable, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1404 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1405 1406 1407 |
}, #endif #ifdef CONFIG_MMU |
bfcd17a6c
|
1408 |
#ifdef CONFIG_FILE_LOCKING |
1da177e4c
|
1409 |
{ |
1da177e4c
|
1410 1411 1412 1413 |
.procname = "lease-break-time", .data = &lease_break_time, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1414 |
.proc_handler = proc_dointvec, |
1da177e4c
|
1415 |
}, |
bfcd17a6c
|
1416 |
#endif |
ebf3f09c6
|
1417 |
#ifdef CONFIG_AIO |
1da177e4c
|
1418 |
{ |
1da177e4c
|
1419 1420 1421 1422 |
.procname = "aio-nr", .data = &aio_nr, .maxlen = sizeof(aio_nr), .mode = 0444, |
6d4561110
|
1423 |
.proc_handler = proc_doulongvec_minmax, |
1da177e4c
|
1424 1425 |
}, { |
1da177e4c
|
1426 1427 1428 1429 |
.procname = "aio-max-nr", .data = &aio_max_nr, .maxlen = sizeof(aio_max_nr), .mode = 0644, |
6d4561110
|
1430 |
.proc_handler = proc_doulongvec_minmax, |
1da177e4c
|
1431 |
}, |
ebf3f09c6
|
1432 |
#endif /* CONFIG_AIO */ |
2d9048e20
|
1433 |
#ifdef CONFIG_INOTIFY_USER |
0399cb08c
|
1434 |
{ |
0399cb08c
|
1435 1436 1437 1438 1439 |
.procname = "inotify", .mode = 0555, .child = inotify_table, }, #endif |
7ef9964e6
|
1440 1441 1442 1443 1444 1445 1446 |
#ifdef CONFIG_EPOLL { .procname = "epoll", .mode = 0555, .child = epoll_table, }, #endif |
1da177e4c
|
1447 |
#endif |
d6e711448
|
1448 |
{ |
d6e711448
|
1449 1450 1451 1452 |
.procname = "suid_dumpable", .data = &suid_dumpable, .maxlen = sizeof(int), .mode = 0644, |
6d4561110
|
1453 |
.proc_handler = proc_dointvec_minmax, |
8e654fba4
|
1454 1455 |
.extra1 = &zero, .extra2 = &two, |
d6e711448
|
1456 |
}, |
2abc26fc6
|
1457 1458 |
#if defined(CONFIG_BINFMT_MISC) || defined(CONFIG_BINFMT_MISC_MODULE) { |
2abc26fc6
|
1459 1460 1461 1462 1463 |
.procname = "binfmt_misc", .mode = 0555, .child = binfmt_misc_table, }, #endif |
b492e95be
|
1464 |
{ |
ff9da691c
|
1465 1466 |
.procname = "pipe-max-size", .data = &pipe_max_size, |
b492e95be
|
1467 1468 |
.maxlen = sizeof(int), .mode = 0644, |
ff9da691c
|
1469 1470 |
.proc_handler = &pipe_proc_fn, .extra1 = &pipe_min_size, |
b492e95be
|
1471 |
}, |
6fce56ec9
|
1472 |
{ } |
1da177e4c
|
1473 |
}; |
d8217f076
|
1474 |
static struct ctl_table debug_table[] = { |
ab3c68ee5
|
1475 1476 |
#if defined(CONFIG_X86) || defined(CONFIG_PPC) || defined(CONFIG_SPARC) || \ defined(CONFIG_S390) |
abd4f7505
|
1477 |
{ |
abd4f7505
|
1478 1479 1480 1481 1482 1483 1484 |
.procname = "exception-trace", .data = &show_unhandled_signals, .maxlen = sizeof(int), .mode = 0644, .proc_handler = proc_dointvec }, #endif |
b2be84df9
|
1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 |
#if defined(CONFIG_OPTPROBES) { .procname = "kprobes-optimization", .data = &sysctl_kprobes_optimization, .maxlen = sizeof(int), .mode = 0644, .proc_handler = proc_kprobes_optimization_handler, .extra1 = &zero, .extra2 = &one, }, #endif |
6fce56ec9
|
1496 |
{ } |
1da177e4c
|
1497 |
}; |
d8217f076
|
1498 |
static struct ctl_table dev_table[] = { |
6fce56ec9
|
1499 |
{ } |
0eeca2830
|
1500 |
}; |
1da177e4c
|
1501 |
|
330d57fb9
|
1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 |
static DEFINE_SPINLOCK(sysctl_lock); /* called under sysctl_lock */ static int use_table(struct ctl_table_header *p) { if (unlikely(p->unregistering)) return 0; p->used++; return 1; } /* called under sysctl_lock */ static void unuse_table(struct ctl_table_header *p) { if (!--p->used) if (unlikely(p->unregistering)) complete(p->unregistering); } /* called under sysctl_lock, will reacquire if has to wait */ static void start_unregistering(struct ctl_table_header *p) { /* * if p->used is 0, nobody will ever touch that entry again; * we'll eliminate all paths to it before dropping sysctl_lock */ if (unlikely(p->used)) { struct completion wait; init_completion(&wait); p->unregistering = &wait; spin_unlock(&sysctl_lock); wait_for_completion(&wait); spin_lock(&sysctl_lock); |
f7e6ced40
|
1535 1536 1537 |
} else { /* anything non-NULL; we'll never dereference it */ p->unregistering = ERR_PTR(-EINVAL); |
330d57fb9
|
1538 1539 1540 1541 1542 1543 1544 |
} /* * do not remove from the list until nobody holds it; walking the * list in do_sysctl() relies on that. */ list_del_init(&p->ctl_entry); } |
f7e6ced40
|
1545 1546 1547 1548 1549 1550 |
void sysctl_head_get(struct ctl_table_header *head) { spin_lock(&sysctl_lock); head->count++; spin_unlock(&sysctl_lock); } |
dfef6dcd3
|
1551 1552 1553 1554 |
static void free_head(struct rcu_head *rcu) { kfree(container_of(rcu, struct ctl_table_header, rcu)); } |
f7e6ced40
|
1555 1556 1557 1558 |
void sysctl_head_put(struct ctl_table_header *head) { spin_lock(&sysctl_lock); if (!--head->count) |
dfef6dcd3
|
1559 |
call_rcu(&head->rcu, free_head); |
f7e6ced40
|
1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 |
spin_unlock(&sysctl_lock); } struct ctl_table_header *sysctl_head_grab(struct ctl_table_header *head) { if (!head) BUG(); spin_lock(&sysctl_lock); if (!use_table(head)) head = ERR_PTR(-ENOENT); spin_unlock(&sysctl_lock); return head; } |
805b5d5e0
|
1573 1574 1575 1576 1577 1578 1579 1580 |
void sysctl_head_finish(struct ctl_table_header *head) { if (!head) return; spin_lock(&sysctl_lock); unuse_table(head); spin_unlock(&sysctl_lock); } |
734550921
|
1581 1582 1583 1584 1585 1586 1587 1588 |
static struct ctl_table_set * lookup_header_set(struct ctl_table_root *root, struct nsproxy *namespaces) { struct ctl_table_set *set = &root->default_set; if (root->lookup) set = root->lookup(root, namespaces); return set; } |
e51b6ba07
|
1589 1590 |
static struct list_head * lookup_header_list(struct ctl_table_root *root, struct nsproxy *namespaces) |
805b5d5e0
|
1591 |
{ |
734550921
|
1592 1593 |
struct ctl_table_set *set = lookup_header_set(root, namespaces); return &set->list; |
e51b6ba07
|
1594 1595 1596 1597 1598 1599 1600 |
} struct ctl_table_header *__sysctl_head_next(struct nsproxy *namespaces, struct ctl_table_header *prev) { struct ctl_table_root *root; struct list_head *header_list; |
805b5d5e0
|
1601 1602 |
struct ctl_table_header *head; struct list_head *tmp; |
e51b6ba07
|
1603 |
|
805b5d5e0
|
1604 1605 |
spin_lock(&sysctl_lock); if (prev) { |
e51b6ba07
|
1606 |
head = prev; |
805b5d5e0
|
1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 |
tmp = &prev->ctl_entry; unuse_table(prev); goto next; } tmp = &root_table_header.ctl_entry; for (;;) { head = list_entry(tmp, struct ctl_table_header, ctl_entry); if (!use_table(head)) goto next; spin_unlock(&sysctl_lock); return head; next: |
e51b6ba07
|
1620 |
root = head->root; |
805b5d5e0
|
1621 |
tmp = tmp->next; |
e51b6ba07
|
1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 |
header_list = lookup_header_list(root, namespaces); if (tmp != header_list) continue; do { root = list_entry(root->root_list.next, struct ctl_table_root, root_list); if (root == &sysctl_table_root) goto out; header_list = lookup_header_list(root, namespaces); } while (list_empty(header_list)); tmp = header_list->next; |
805b5d5e0
|
1634 |
} |
e51b6ba07
|
1635 |
out: |
805b5d5e0
|
1636 1637 1638 |
spin_unlock(&sysctl_lock); return NULL; } |
e51b6ba07
|
1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 |
struct ctl_table_header *sysctl_head_next(struct ctl_table_header *prev) { return __sysctl_head_next(current->nsproxy, prev); } void register_sysctl_root(struct ctl_table_root *root) { spin_lock(&sysctl_lock); list_add_tail(&root->root_list, &sysctl_table_root.root_list); spin_unlock(&sysctl_lock); } |
1da177e4c
|
1650 |
/* |
1ff007eb8
|
1651 |
* sysctl_perm does NOT grant the superuser all rights automatically, because |
1da177e4c
|
1652 1653 1654 1655 1656 |
* some sysctl variables are readonly even to root. */ static int test_perm(int mode, int op) { |
76aac0e9a
|
1657 |
if (!current_euid()) |
1da177e4c
|
1658 1659 1660 |
mode >>= 6; else if (in_egroup_p(0)) mode >>= 3; |
e6305c43e
|
1661 |
if ((op & ~mode & (MAY_READ|MAY_WRITE|MAY_EXEC)) == 0) |
1da177e4c
|
1662 1663 1664 |
return 0; return -EACCES; } |
d7321cd62
|
1665 |
int sysctl_perm(struct ctl_table_root *root, struct ctl_table *table, int op) |
1da177e4c
|
1666 |
{ |
d7321cd62
|
1667 |
int mode; |
d7321cd62
|
1668 1669 1670 1671 1672 1673 |
if (root->permissions) mode = root->permissions(root, current->nsproxy, table); else mode = table->mode; return test_perm(mode, op); |
1da177e4c
|
1674 |
} |
d912b0cc1
|
1675 1676 |
static void sysctl_set_parent(struct ctl_table *parent, struct ctl_table *table) { |
2315ffa0a
|
1677 |
for (; table->procname; table++) { |
d912b0cc1
|
1678 1679 1680 1681 1682 1683 1684 1685 1686 |
table->parent = parent; if (table->child) sysctl_set_parent(table, table->child); } } static __init int sysctl_init(void) { sysctl_set_parent(NULL, root_table); |
88f458e4b
|
1687 |
#ifdef CONFIG_SYSCTL_SYSCALL_CHECK |
b3bd3de66
|
1688 |
sysctl_check_table(current->nsproxy, root_table); |
88f458e4b
|
1689 |
#endif |
d912b0cc1
|
1690 1691 1692 1693 |
return 0; } core_initcall(sysctl_init); |
bfbcf0347
|
1694 1695 |
static struct ctl_table *is_branch_in(struct ctl_table *branch, struct ctl_table *table) |
ae7edecc9
|
1696 1697 1698 1699 1700 1701 |
{ struct ctl_table *p; const char *s = branch->procname; /* branch should have named subdirectory as its first element */ if (!s || !branch->child) |
bfbcf0347
|
1702 |
return NULL; |
ae7edecc9
|
1703 1704 |
/* ... and nothing else */ |
2315ffa0a
|
1705 |
if (branch[1].procname) |
bfbcf0347
|
1706 |
return NULL; |
ae7edecc9
|
1707 1708 |
/* table should contain subdirectory with the same name */ |
2315ffa0a
|
1709 |
for (p = table; p->procname; p++) { |
ae7edecc9
|
1710 1711 1712 |
if (!p->child) continue; if (p->procname && strcmp(p->procname, s) == 0) |
bfbcf0347
|
1713 |
return p; |
ae7edecc9
|
1714 |
} |
bfbcf0347
|
1715 |
return NULL; |
ae7edecc9
|
1716 1717 1718 1719 1720 1721 |
} /* see if attaching q to p would be an improvement */ static void try_attach(struct ctl_table_header *p, struct ctl_table_header *q) { struct ctl_table *to = p->ctl_table, *by = q->ctl_table; |
bfbcf0347
|
1722 |
struct ctl_table *next; |
ae7edecc9
|
1723 1724 |
int is_better = 0; int not_in_parent = !p->attached_by; |
bfbcf0347
|
1725 |
while ((next = is_branch_in(by, to)) != NULL) { |
ae7edecc9
|
1726 1727 1728 1729 1730 |
if (by == q->attached_by) is_better = 1; if (to == p->attached_by) not_in_parent = 1; by = by->child; |
bfbcf0347
|
1731 |
to = next->child; |
ae7edecc9
|
1732 1733 1734 1735 1736 1737 1738 1739 |
} if (is_better && not_in_parent) { q->attached_by = by; q->attached_to = to; q->parent = p; } } |
1da177e4c
|
1740 |
/** |
e51b6ba07
|
1741 1742 1743 |
* __register_sysctl_paths - register a sysctl hierarchy * @root: List of sysctl headers to register on * @namespaces: Data to compute which lists of sysctl entries are visible |
29e796fd4
|
1744 |
* @path: The path to the directory the sysctl table is in. |
1da177e4c
|
1745 |
* @table: the top-level table structure |
1da177e4c
|
1746 1747 |
* * Register a sysctl table hierarchy. @table should be a filled in ctl_table |
29e796fd4
|
1748 |
* array. A completely 0 filled entry terminates the table. |
1da177e4c
|
1749 |
* |
d8217f076
|
1750 |
* The members of the &struct ctl_table structure are used as follows: |
1da177e4c
|
1751 |
* |
1da177e4c
|
1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 |
* procname - the name of the sysctl file under /proc/sys. Set to %NULL to not * enter a sysctl file * * data - a pointer to data for use by proc_handler * * maxlen - the maximum size in bytes of the data * * mode - the file permissions for the /proc/sys file, and for sysctl(2) * * child - a pointer to the child sysctl table if this entry is a directory, or * %NULL. * * proc_handler - the text handler routine (described below) * |
1da177e4c
|
1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 |
* de - for internal use by the sysctl routines * * extra1, extra2 - extra pointers usable by the proc handler routines * * Leaf nodes in the sysctl tree will be represented by a single file * under /proc; non-leaf nodes will be represented by directories. * * sysctl(2) can automatically manage read and write requests through * the sysctl table. The data and maxlen fields of the ctl_table * struct enable minimal validation of the values being written to be * performed, and the mode field allows minimal authentication. * |
1da177e4c
|
1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 |
* There must be a proc_handler routine for any terminal nodes * mirrored under /proc/sys (non-terminals are handled by a built-in * directory handler). Several default handlers are available to * cover common cases - * * proc_dostring(), proc_dointvec(), proc_dointvec_jiffies(), * proc_dointvec_userhz_jiffies(), proc_dointvec_minmax(), * proc_doulongvec_ms_jiffies_minmax(), proc_doulongvec_minmax() * * It is the handler's job to read the input buffer from user memory * and process it. The handler should return 0 on success. * * This routine returns %NULL on a failure to register, and a pointer * to the table header on success. */ |
e51b6ba07
|
1793 1794 1795 1796 |
struct ctl_table_header *__register_sysctl_paths( struct ctl_table_root *root, struct nsproxy *namespaces, const struct ctl_path *path, struct ctl_table *table) |
1da177e4c
|
1797 |
{ |
29e796fd4
|
1798 1799 1800 |
struct ctl_table_header *header; struct ctl_table *new, **prevp; unsigned int n, npath; |
ae7edecc9
|
1801 |
struct ctl_table_set *set; |
29e796fd4
|
1802 1803 |
/* Count the path components */ |
2315ffa0a
|
1804 |
for (npath = 0; path[npath].procname; ++npath) |
29e796fd4
|
1805 1806 1807 1808 1809 |
; /* * For each path component, allocate a 2-element ctl_table array. * The first array element will be filled with the sysctl entry |
2315ffa0a
|
1810 |
* for this, the second will be the sentinel (procname == 0). |
29e796fd4
|
1811 1812 1813 1814 1815 1816 1817 |
* * We allocate everything in one go so that we don't have to * worry about freeing additional memory in unregister_sysctl_table. */ header = kzalloc(sizeof(struct ctl_table_header) + (2 * npath * sizeof(struct ctl_table)), GFP_KERNEL); if (!header) |
1da177e4c
|
1818 |
return NULL; |
29e796fd4
|
1819 1820 1821 1822 1823 1824 1825 1826 |
new = (struct ctl_table *) (header + 1); /* Now connect the dots */ prevp = &header->ctl_table; for (n = 0; n < npath; ++n, ++path) { /* Copy the procname */ new->procname = path->procname; |
29e796fd4
|
1827 1828 1829 1830 1831 1832 1833 1834 |
new->mode = 0555; *prevp = new; prevp = &new->child; new += 2; } *prevp = table; |
23eb06de7
|
1835 |
header->ctl_table_arg = table; |
29e796fd4
|
1836 1837 1838 1839 |
INIT_LIST_HEAD(&header->ctl_entry); header->used = 0; header->unregistering = NULL; |
e51b6ba07
|
1840 |
header->root = root; |
29e796fd4
|
1841 |
sysctl_set_parent(NULL, header->ctl_table); |
f7e6ced40
|
1842 |
header->count = 1; |
88f458e4b
|
1843 |
#ifdef CONFIG_SYSCTL_SYSCALL_CHECK |
e51b6ba07
|
1844 |
if (sysctl_check_table(namespaces, header->ctl_table)) { |
29e796fd4
|
1845 |
kfree(header); |
fc6cd25b7
|
1846 1847 |
return NULL; } |
88f458e4b
|
1848 |
#endif |
330d57fb9
|
1849 |
spin_lock(&sysctl_lock); |
734550921
|
1850 |
header->set = lookup_header_set(root, namespaces); |
ae7edecc9
|
1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 |
header->attached_by = header->ctl_table; header->attached_to = root_table; header->parent = &root_table_header; for (set = header->set; set; set = set->parent) { struct ctl_table_header *p; list_for_each_entry(p, &set->list, ctl_entry) { if (p->unregistering) continue; try_attach(p, header); } } header->parent->count++; |
734550921
|
1863 |
list_add_tail(&header->ctl_entry, &header->set->list); |
330d57fb9
|
1864 |
spin_unlock(&sysctl_lock); |
29e796fd4
|
1865 1866 1867 1868 1869 |
return header; } /** |
e51b6ba07
|
1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 |
* register_sysctl_table_path - register a sysctl table hierarchy * @path: The path to the directory the sysctl table is in. * @table: the top-level table structure * * Register a sysctl table hierarchy. @table should be a filled in ctl_table * array. A completely 0 filled entry terminates the table. * * See __register_sysctl_paths for more details. */ struct ctl_table_header *register_sysctl_paths(const struct ctl_path *path, struct ctl_table *table) { return __register_sysctl_paths(&sysctl_table_root, current->nsproxy, path, table); } /** |
29e796fd4
|
1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 |
* register_sysctl_table - register a sysctl table hierarchy * @table: the top-level table structure * * Register a sysctl table hierarchy. @table should be a filled in ctl_table * array. A completely 0 filled entry terminates the table. * * See register_sysctl_paths for more details. */ struct ctl_table_header *register_sysctl_table(struct ctl_table *table) { static const struct ctl_path null_path[] = { {} }; return register_sysctl_paths(null_path, table); |
1da177e4c
|
1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 |
} /** * unregister_sysctl_table - unregister a sysctl table hierarchy * @header: the header returned from register_sysctl_table * * Unregisters the sysctl table and all children. proc entries may not * actually be removed until they are no longer used by anyone. */ void unregister_sysctl_table(struct ctl_table_header * header) { |
330d57fb9
|
1911 |
might_sleep(); |
f1dad166e
|
1912 1913 1914 |
if (header == NULL) return; |
330d57fb9
|
1915 1916 |
spin_lock(&sysctl_lock); start_unregistering(header); |
ae7edecc9
|
1917 1918 |
if (!--header->parent->count) { WARN_ON(1); |
dfef6dcd3
|
1919 |
call_rcu(&header->parent->rcu, free_head); |
ae7edecc9
|
1920 |
} |
f7e6ced40
|
1921 |
if (!--header->count) |
dfef6dcd3
|
1922 |
call_rcu(&header->rcu, free_head); |
330d57fb9
|
1923 |
spin_unlock(&sysctl_lock); |
1da177e4c
|
1924 |
} |
9043476f7
|
1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 |
int sysctl_is_seen(struct ctl_table_header *p) { struct ctl_table_set *set = p->set; int res; spin_lock(&sysctl_lock); if (p->unregistering) res = 0; else if (!set->is_seen) res = 1; else res = set->is_seen(set); spin_unlock(&sysctl_lock); return res; } |
734550921
|
1939 1940 1941 1942 1943 1944 1945 1946 |
void setup_sysctl_set(struct ctl_table_set *p, struct ctl_table_set *parent, int (*is_seen)(struct ctl_table_set *)) { INIT_LIST_HEAD(&p->list); p->parent = parent ? parent : &sysctl_table_root.default_set; p->is_seen = is_seen; } |
b89a81712
|
1947 |
#else /* !CONFIG_SYSCTL */ |
d8217f076
|
1948 |
struct ctl_table_header *register_sysctl_table(struct ctl_table * table) |
b89a81712
|
1949 1950 1951 |
{ return NULL; } |
29e796fd4
|
1952 1953 1954 1955 1956 |
struct ctl_table_header *register_sysctl_paths(const struct ctl_path *path, struct ctl_table *table) { return NULL; } |
b89a81712
|
1957 1958 1959 |
void unregister_sysctl_table(struct ctl_table_header * table) { } |
734550921
|
1960 1961 1962 1963 1964 |
void setup_sysctl_set(struct ctl_table_set *p, struct ctl_table_set *parent, int (*is_seen)(struct ctl_table_set *)) { } |
f7e6ced40
|
1965 1966 1967 |
void sysctl_head_put(struct ctl_table_header *head) { } |
b89a81712
|
1968 |
#endif /* CONFIG_SYSCTL */ |
1da177e4c
|
1969 1970 1971 |
/* * /proc/sys support */ |
b89a81712
|
1972 |
#ifdef CONFIG_PROC_SYSCTL |
1da177e4c
|
1973 |
|
b1ba4ddde
|
1974 |
static int _proc_do_string(void* data, int maxlen, int write, |
8d65af789
|
1975 |
void __user *buffer, |
b1ba4ddde
|
1976 |
size_t *lenp, loff_t *ppos) |
1da177e4c
|
1977 1978 1979 1980 |
{ size_t len; char __user *p; char c; |
8d0608771
|
1981 1982 |
if (!data || !maxlen || !*lenp) { |
1da177e4c
|
1983 1984 1985 |
*lenp = 0; return 0; } |
8d0608771
|
1986 |
|
1da177e4c
|
1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 |
if (write) { len = 0; p = buffer; while (len < *lenp) { if (get_user(c, p++)) return -EFAULT; if (c == 0 || c == ' ') break; len++; } |
f5dd3d6fa
|
1998 1999 2000 |
if (len >= maxlen) len = maxlen-1; if(copy_from_user(data, buffer, len)) |
1da177e4c
|
2001 |
return -EFAULT; |
f5dd3d6fa
|
2002 |
((char *) data)[len] = 0; |
1da177e4c
|
2003 2004 |
*ppos += *lenp; } else { |
f5dd3d6fa
|
2005 2006 2007 |
len = strlen(data); if (len > maxlen) len = maxlen; |
8d0608771
|
2008 2009 2010 2011 2012 2013 2014 2015 |
if (*ppos > len) { *lenp = 0; return 0; } data += *ppos; len -= *ppos; |
1da177e4c
|
2016 2017 2018 |
if (len > *lenp) len = *lenp; if (len) |
f5dd3d6fa
|
2019 |
if(copy_to_user(buffer, data, len)) |
1da177e4c
|
2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 |
return -EFAULT; if (len < *lenp) { if(put_user(' ', ((char __user *) buffer) + len)) return -EFAULT; len++; } *lenp = len; *ppos += len; } return 0; } |
f5dd3d6fa
|
2032 2033 2034 2035 |
/** * proc_dostring - read a string sysctl * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
f5dd3d6fa
|
2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 |
* @buffer: the user buffer * @lenp: the size of the user buffer * @ppos: file position * * Reads/writes a string from/to the user buffer. If the kernel * buffer provided is not large enough to hold the string, the * string is truncated. The copied string is %NULL-terminated. * If the string is being read by the user process, it is copied * and a newline ' ' is added. It is truncated if the buffer is * not large enough. * * Returns 0 on success. */ |
8d65af789
|
2050 |
int proc_dostring(struct ctl_table *table, int write, |
f5dd3d6fa
|
2051 2052 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
8d65af789
|
2053 |
return _proc_do_string(table->data, table->maxlen, write, |
f5dd3d6fa
|
2054 2055 |
buffer, lenp, ppos); } |
00b7c3395
|
2056 2057 2058 2059 2060 2061 2062 2063 |
static size_t proc_skip_spaces(char **buf) { size_t ret; char *tmp = skip_spaces(*buf); ret = tmp - *buf; *buf = tmp; return ret; } |
9f977fb7a
|
2064 2065 2066 2067 2068 2069 2070 2071 2072 |
static void proc_skip_char(char **buf, size_t *size, const char v) { while (*size) { if (**buf != v) break; (*size)--; (*buf)++; } } |
00b7c3395
|
2073 2074 |
#define TMPBUFLEN 22 /** |
0fc377bd6
|
2075 |
* proc_get_long - reads an ASCII formatted integer from a user buffer |
00b7c3395
|
2076 |
* |
0fc377bd6
|
2077 2078 2079 2080 2081 2082 2083 |
* @buf: a kernel buffer * @size: size of the kernel buffer * @val: this is where the number will be stored * @neg: set to %TRUE if number is negative * @perm_tr: a vector which contains the allowed trailers * @perm_tr_len: size of the perm_tr vector * @tr: pointer to store the trailer character |
00b7c3395
|
2084 |
* |
0fc377bd6
|
2085 2086 2087 2088 |
* In case of success %0 is returned and @buf and @size are updated with * the amount of bytes read. If @tr is non-NULL and a trailing * character exists (size is non-zero after returning from this * function), @tr is updated with the trailing character. |
00b7c3395
|
2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127 |
*/ static int proc_get_long(char **buf, size_t *size, unsigned long *val, bool *neg, const char *perm_tr, unsigned perm_tr_len, char *tr) { int len; char *p, tmp[TMPBUFLEN]; if (!*size) return -EINVAL; len = *size; if (len > TMPBUFLEN - 1) len = TMPBUFLEN - 1; memcpy(tmp, *buf, len); tmp[len] = 0; p = tmp; if (*p == '-' && *size > 1) { *neg = true; p++; } else *neg = false; if (!isdigit(*p)) return -EINVAL; *val = simple_strtoul(p, &p, 0); len = p - tmp; /* We don't know if the next char is whitespace thus we may accept * invalid integers (e.g. 1234...a) or two integers instead of one * (e.g. 123...1). So lets not allow such large numbers. */ if (len == TMPBUFLEN - 1) return -EINVAL; if (len < *size && perm_tr_len && !memchr(perm_tr, *p, perm_tr_len)) return -EINVAL; |
1da177e4c
|
2128 |
|
00b7c3395
|
2129 2130 2131 2132 2133 2134 2135 2136 2137 2138 |
if (tr && (len < *size)) *tr = *p; *buf += len; *size -= len; return 0; } /** |
0fc377bd6
|
2139 |
* proc_put_long - converts an integer to a decimal ASCII formatted string |
00b7c3395
|
2140 |
* |
0fc377bd6
|
2141 2142 2143 2144 |
* @buf: the user buffer * @size: the size of the user buffer * @val: the integer to be converted * @neg: sign of the number, %TRUE for negative |
00b7c3395
|
2145 |
* |
0fc377bd6
|
2146 2147 |
* In case of success %0 is returned and @buf and @size are updated with * the amount of bytes written. |
00b7c3395
|
2148 2149 2150 2151 2152 2153 2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170 2171 2172 2173 2174 2175 2176 2177 |
*/ static int proc_put_long(void __user **buf, size_t *size, unsigned long val, bool neg) { int len; char tmp[TMPBUFLEN], *p = tmp; sprintf(p, "%s%lu", neg ? "-" : "", val); len = strlen(tmp); if (len > *size) len = *size; if (copy_to_user(*buf, tmp, len)) return -EFAULT; *size -= len; *buf += len; return 0; } #undef TMPBUFLEN static int proc_put_char(void __user **buf, size_t *size, char c) { if (*size) { char __user **buffer = (char __user **)buf; if (put_user(c, *buffer)) return -EFAULT; (*size)--, (*buffer)++; *buf = *buffer; } return 0; } |
1da177e4c
|
2178 |
|
00b7c3395
|
2179 |
static int do_proc_dointvec_conv(bool *negp, unsigned long *lvalp, |
1da177e4c
|
2180 2181 2182 2183 2184 2185 2186 2187 |
int *valp, int write, void *data) { if (write) { *valp = *negp ? -*lvalp : *lvalp; } else { int val = *valp; if (val < 0) { |
00b7c3395
|
2188 |
*negp = true; |
1da177e4c
|
2189 2190 |
*lvalp = (unsigned long)-val; } else { |
00b7c3395
|
2191 |
*negp = false; |
1da177e4c
|
2192 2193 2194 2195 2196 |
*lvalp = (unsigned long)val; } } return 0; } |
00b7c3395
|
2197 2198 |
static const char proc_wspace_sep[] = { ' ', '\t', ' ' }; |
d8217f076
|
2199 |
static int __do_proc_dointvec(void *tbl_data, struct ctl_table *table, |
8d65af789
|
2200 |
int write, void __user *buffer, |
fcfbd547b
|
2201 |
size_t *lenp, loff_t *ppos, |
00b7c3395
|
2202 |
int (*conv)(bool *negp, unsigned long *lvalp, int *valp, |
1da177e4c
|
2203 2204 2205 |
int write, void *data), void *data) { |
00b7c3395
|
2206 2207 2208 2209 |
int *i, vleft, first = 1, err = 0; unsigned long page = 0; size_t left; char *kbuf; |
1da177e4c
|
2210 |
|
00b7c3395
|
2211 |
if (!tbl_data || !table->maxlen || !*lenp || (*ppos && !write)) { |
1da177e4c
|
2212 2213 2214 2215 |
*lenp = 0; return 0; } |
fcfbd547b
|
2216 |
i = (int *) tbl_data; |
1da177e4c
|
2217 2218 2219 2220 2221 |
vleft = table->maxlen / sizeof(*i); left = *lenp; if (!conv) conv = do_proc_dointvec_conv; |
00b7c3395
|
2222 2223 2224 2225 2226 2227 2228 2229 2230 2231 2232 2233 2234 |
if (write) { if (left > PAGE_SIZE - 1) left = PAGE_SIZE - 1; page = __get_free_page(GFP_TEMPORARY); kbuf = (char *) page; if (!kbuf) return -ENOMEM; if (copy_from_user(kbuf, buffer, left)) { err = -EFAULT; goto free; } kbuf[left] = 0; } |
1da177e4c
|
2235 |
for (; left && vleft--; i++, first=0) { |
00b7c3395
|
2236 2237 |
unsigned long lval; bool neg; |
1da177e4c
|
2238 |
|
00b7c3395
|
2239 2240 |
if (write) { left -= proc_skip_spaces(&kbuf); |
1da177e4c
|
2241 |
|
563b04671
|
2242 2243 |
if (!left) break; |
00b7c3395
|
2244 2245 2246 2247 |
err = proc_get_long(&kbuf, &left, &lval, &neg, proc_wspace_sep, sizeof(proc_wspace_sep), NULL); if (err) |
1da177e4c
|
2248 |
break; |
00b7c3395
|
2249 2250 |
if (conv(&neg, &lval, i, 1, data)) { err = -EINVAL; |
1da177e4c
|
2251 |
break; |
00b7c3395
|
2252 |
} |
1da177e4c
|
2253 |
} else { |
00b7c3395
|
2254 2255 2256 2257 |
if (conv(&neg, &lval, i, 0, data)) { err = -EINVAL; break; } |
1da177e4c
|
2258 |
if (!first) |
00b7c3395
|
2259 2260 2261 2262 2263 |
err = proc_put_char(&buffer, &left, '\t'); if (err) break; err = proc_put_long(&buffer, &left, lval, neg); if (err) |
1da177e4c
|
2264 |
break; |
1da177e4c
|
2265 2266 |
} } |
00b7c3395
|
2267 2268 2269 |
if (!write && !first && left && !err) err = proc_put_char(&buffer, &left, ' '); |
563b04671
|
2270 |
if (write && !err && left) |
00b7c3395
|
2271 2272 |
left -= proc_skip_spaces(&kbuf); free: |
1da177e4c
|
2273 |
if (write) { |
00b7c3395
|
2274 2275 2276 |
free_page(page); if (first) return err ? : -EINVAL; |
1da177e4c
|
2277 |
} |
1da177e4c
|
2278 2279 |
*lenp -= left; *ppos += *lenp; |
00b7c3395
|
2280 |
return err; |
1da177e4c
|
2281 |
} |
8d65af789
|
2282 |
static int do_proc_dointvec(struct ctl_table *table, int write, |
fcfbd547b
|
2283 |
void __user *buffer, size_t *lenp, loff_t *ppos, |
00b7c3395
|
2284 |
int (*conv)(bool *negp, unsigned long *lvalp, int *valp, |
fcfbd547b
|
2285 2286 2287 |
int write, void *data), void *data) { |
8d65af789
|
2288 |
return __do_proc_dointvec(table->data, table, write, |
fcfbd547b
|
2289 2290 |
buffer, lenp, ppos, conv, data); } |
1da177e4c
|
2291 2292 2293 2294 |
/** * proc_dointvec - read a vector of integers * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
1da177e4c
|
2295 2296 2297 2298 2299 2300 2301 2302 2303 |
* @buffer: the user buffer * @lenp: the size of the user buffer * @ppos: file position * * Reads/writes up to table->maxlen/sizeof(unsigned int) integer * values from/to the user buffer, treated as an ASCII string. * * Returns 0 on success. */ |
8d65af789
|
2304 |
int proc_dointvec(struct ctl_table *table, int write, |
1da177e4c
|
2305 2306 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
8d65af789
|
2307 |
return do_proc_dointvec(table,write,buffer,lenp,ppos, |
1da177e4c
|
2308 2309 |
NULL,NULL); } |
34f5a3989
|
2310 |
/* |
25ddbb18a
|
2311 2312 |
* Taint values can only be increased * This means we can safely use a temporary. |
34f5a3989
|
2313 |
*/ |
8d65af789
|
2314 |
static int proc_taint(struct ctl_table *table, int write, |
34f5a3989
|
2315 2316 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
25ddbb18a
|
2317 2318 2319 |
struct ctl_table t; unsigned long tmptaint = get_taint(); int err; |
34f5a3989
|
2320 |
|
91fcd412e
|
2321 |
if (write && !capable(CAP_SYS_ADMIN)) |
34f5a3989
|
2322 |
return -EPERM; |
25ddbb18a
|
2323 2324 |
t = *table; t.data = &tmptaint; |
8d65af789
|
2325 |
err = proc_doulongvec_minmax(&t, write, buffer, lenp, ppos); |
25ddbb18a
|
2326 2327 2328 2329 2330 2331 2332 2333 2334 2335 2336 2337 2338 2339 2340 2341 |
if (err < 0) return err; if (write) { /* * Poor man's atomic or. Not worth adding a primitive * to everyone's atomic.h for this */ int i; for (i = 0; i < BITS_PER_LONG && tmptaint >> i; i++) { if ((tmptaint >> i) & 1) add_taint(i); } } return err; |
34f5a3989
|
2342 |
} |
bfdc0b497
|
2343 2344 2345 2346 2347 2348 2349 2350 2351 2352 |
#ifdef CONFIG_PRINTK static int proc_dmesg_restrict(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) { if (write && !capable(CAP_SYS_ADMIN)) return -EPERM; return proc_dointvec_minmax(table, write, buffer, lenp, ppos); } #endif |
1da177e4c
|
2353 2354 2355 2356 |
struct do_proc_dointvec_minmax_conv_param { int *min; int *max; }; |
00b7c3395
|
2357 2358 |
static int do_proc_dointvec_minmax_conv(bool *negp, unsigned long *lvalp, int *valp, |
1da177e4c
|
2359 2360 2361 2362 2363 2364 2365 2366 2367 2368 2369 2370 |
int write, void *data) { struct do_proc_dointvec_minmax_conv_param *param = data; if (write) { int val = *negp ? -*lvalp : *lvalp; if ((param->min && *param->min > val) || (param->max && *param->max < val)) return -EINVAL; *valp = val; } else { int val = *valp; if (val < 0) { |
00b7c3395
|
2371 |
*negp = true; |
1da177e4c
|
2372 2373 |
*lvalp = (unsigned long)-val; } else { |
00b7c3395
|
2374 |
*negp = false; |
1da177e4c
|
2375 2376 2377 2378 2379 2380 2381 2382 2383 2384 |
*lvalp = (unsigned long)val; } } return 0; } /** * proc_dointvec_minmax - read a vector of integers with min/max values * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
1da177e4c
|
2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 |
* @buffer: the user buffer * @lenp: the size of the user buffer * @ppos: file position * * Reads/writes up to table->maxlen/sizeof(unsigned int) integer * values from/to the user buffer, treated as an ASCII string. * * This routine will ensure the values are within the range specified by * table->extra1 (min) and table->extra2 (max). * * Returns 0 on success. */ |
8d65af789
|
2397 |
int proc_dointvec_minmax(struct ctl_table *table, int write, |
1da177e4c
|
2398 2399 2400 2401 2402 2403 |
void __user *buffer, size_t *lenp, loff_t *ppos) { struct do_proc_dointvec_minmax_conv_param param = { .min = (int *) table->extra1, .max = (int *) table->extra2, }; |
8d65af789
|
2404 |
return do_proc_dointvec(table, write, buffer, lenp, ppos, |
1da177e4c
|
2405 2406 |
do_proc_dointvec_minmax_conv, ¶m); } |
d8217f076
|
2407 |
static int __do_proc_doulongvec_minmax(void *data, struct ctl_table *table, int write, |
1da177e4c
|
2408 2409 2410 2411 2412 |
void __user *buffer, size_t *lenp, loff_t *ppos, unsigned long convmul, unsigned long convdiv) { |
00b7c3395
|
2413 2414 2415 2416 2417 2418 2419 |
unsigned long *i, *min, *max; int vleft, first = 1, err = 0; unsigned long page = 0; size_t left; char *kbuf; if (!data || !table->maxlen || !*lenp || (*ppos && !write)) { |
1da177e4c
|
2420 2421 2422 |
*lenp = 0; return 0; } |
00b7c3395
|
2423 |
|
fcfbd547b
|
2424 |
i = (unsigned long *) data; |
1da177e4c
|
2425 2426 2427 2428 |
min = (unsigned long *) table->extra1; max = (unsigned long *) table->extra2; vleft = table->maxlen / sizeof(unsigned long); left = *lenp; |
00b7c3395
|
2429 2430 2431 2432 2433 2434 2435 2436 2437 2438 2439 2440 2441 2442 |
if (write) { if (left > PAGE_SIZE - 1) left = PAGE_SIZE - 1; page = __get_free_page(GFP_TEMPORARY); kbuf = (char *) page; if (!kbuf) return -ENOMEM; if (copy_from_user(kbuf, buffer, left)) { err = -EFAULT; goto free; } kbuf[left] = 0; } |
27b3d80a7
|
2443 |
for (; left && vleft--; i++, first = 0) { |
00b7c3395
|
2444 |
unsigned long val; |
1da177e4c
|
2445 |
if (write) { |
00b7c3395
|
2446 2447 2448 2449 2450 2451 2452 2453 |
bool neg; left -= proc_skip_spaces(&kbuf); err = proc_get_long(&kbuf, &left, &val, &neg, proc_wspace_sep, sizeof(proc_wspace_sep), NULL); if (err) |
1da177e4c
|
2454 2455 |
break; if (neg) |
1da177e4c
|
2456 2457 2458 2459 2460 |
continue; if ((min && val < *min) || (max && val > *max)) continue; *i = val; } else { |
00b7c3395
|
2461 |
val = convdiv * (*i) / convmul; |
1da177e4c
|
2462 |
if (!first) |
00b7c3395
|
2463 2464 2465 2466 |
err = proc_put_char(&buffer, &left, '\t'); err = proc_put_long(&buffer, &left, val, false); if (err) break; |
1da177e4c
|
2467 2468 |
} } |
00b7c3395
|
2469 2470 2471 2472 2473 2474 |
if (!write && !first && left && !err) err = proc_put_char(&buffer, &left, ' '); if (write && !err) left -= proc_skip_spaces(&kbuf); free: |
1da177e4c
|
2475 |
if (write) { |
00b7c3395
|
2476 2477 2478 |
free_page(page); if (first) return err ? : -EINVAL; |
1da177e4c
|
2479 |
} |
1da177e4c
|
2480 2481 |
*lenp -= left; *ppos += *lenp; |
00b7c3395
|
2482 |
return err; |
1da177e4c
|
2483 |
} |
d8217f076
|
2484 |
static int do_proc_doulongvec_minmax(struct ctl_table *table, int write, |
fcfbd547b
|
2485 2486 2487 2488 2489 2490 |
void __user *buffer, size_t *lenp, loff_t *ppos, unsigned long convmul, unsigned long convdiv) { return __do_proc_doulongvec_minmax(table->data, table, write, |
8d65af789
|
2491 |
buffer, lenp, ppos, convmul, convdiv); |
fcfbd547b
|
2492 |
} |
1da177e4c
|
2493 2494 2495 2496 |
/** * proc_doulongvec_minmax - read a vector of long integers with min/max values * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
1da177e4c
|
2497 2498 2499 2500 2501 2502 2503 2504 2505 2506 2507 2508 |
* @buffer: the user buffer * @lenp: the size of the user buffer * @ppos: file position * * Reads/writes up to table->maxlen/sizeof(unsigned long) unsigned long * values from/to the user buffer, treated as an ASCII string. * * This routine will ensure the values are within the range specified by * table->extra1 (min) and table->extra2 (max). * * Returns 0 on success. */ |
8d65af789
|
2509 |
int proc_doulongvec_minmax(struct ctl_table *table, int write, |
1da177e4c
|
2510 2511 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
8d65af789
|
2512 |
return do_proc_doulongvec_minmax(table, write, buffer, lenp, ppos, 1l, 1l); |
1da177e4c
|
2513 2514 2515 2516 2517 2518 |
} /** * proc_doulongvec_ms_jiffies_minmax - read a vector of millisecond values with min/max values * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
1da177e4c
|
2519 2520 2521 2522 2523 2524 2525 2526 2527 2528 2529 2530 2531 |
* @buffer: the user buffer * @lenp: the size of the user buffer * @ppos: file position * * Reads/writes up to table->maxlen/sizeof(unsigned long) unsigned long * values from/to the user buffer, treated as an ASCII string. The values * are treated as milliseconds, and converted to jiffies when they are stored. * * This routine will ensure the values are within the range specified by * table->extra1 (min) and table->extra2 (max). * * Returns 0 on success. */ |
d8217f076
|
2532 |
int proc_doulongvec_ms_jiffies_minmax(struct ctl_table *table, int write, |
1da177e4c
|
2533 2534 2535 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
8d65af789
|
2536 |
return do_proc_doulongvec_minmax(table, write, buffer, |
1da177e4c
|
2537 2538 |
lenp, ppos, HZ, 1000l); } |
00b7c3395
|
2539 |
static int do_proc_dointvec_jiffies_conv(bool *negp, unsigned long *lvalp, |
1da177e4c
|
2540 2541 2542 2543 |
int *valp, int write, void *data) { if (write) { |
cba9f33d1
|
2544 2545 |
if (*lvalp > LONG_MAX / HZ) return 1; |
1da177e4c
|
2546 2547 2548 2549 2550 |
*valp = *negp ? -(*lvalp*HZ) : (*lvalp*HZ); } else { int val = *valp; unsigned long lval; if (val < 0) { |
00b7c3395
|
2551 |
*negp = true; |
1da177e4c
|
2552 2553 |
lval = (unsigned long)-val; } else { |
00b7c3395
|
2554 |
*negp = false; |
1da177e4c
|
2555 2556 2557 2558 2559 2560 |
lval = (unsigned long)val; } *lvalp = lval / HZ; } return 0; } |
00b7c3395
|
2561 |
static int do_proc_dointvec_userhz_jiffies_conv(bool *negp, unsigned long *lvalp, |
1da177e4c
|
2562 2563 2564 2565 |
int *valp, int write, void *data) { if (write) { |
cba9f33d1
|
2566 2567 |
if (USER_HZ < HZ && *lvalp > (LONG_MAX / HZ) * USER_HZ) return 1; |
1da177e4c
|
2568 2569 2570 2571 2572 |
*valp = clock_t_to_jiffies(*negp ? -*lvalp : *lvalp); } else { int val = *valp; unsigned long lval; if (val < 0) { |
00b7c3395
|
2573 |
*negp = true; |
1da177e4c
|
2574 2575 |
lval = (unsigned long)-val; } else { |
00b7c3395
|
2576 |
*negp = false; |
1da177e4c
|
2577 2578 2579 2580 2581 2582 |
lval = (unsigned long)val; } *lvalp = jiffies_to_clock_t(lval); } return 0; } |
00b7c3395
|
2583 |
static int do_proc_dointvec_ms_jiffies_conv(bool *negp, unsigned long *lvalp, |
1da177e4c
|
2584 2585 2586 2587 2588 2589 2590 2591 2592 |
int *valp, int write, void *data) { if (write) { *valp = msecs_to_jiffies(*negp ? -*lvalp : *lvalp); } else { int val = *valp; unsigned long lval; if (val < 0) { |
00b7c3395
|
2593 |
*negp = true; |
1da177e4c
|
2594 2595 |
lval = (unsigned long)-val; } else { |
00b7c3395
|
2596 |
*negp = false; |
1da177e4c
|
2597 2598 2599 2600 2601 2602 2603 2604 2605 2606 2607 |
lval = (unsigned long)val; } *lvalp = jiffies_to_msecs(lval); } return 0; } /** * proc_dointvec_jiffies - read a vector of integers as seconds * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
1da177e4c
|
2608 2609 2610 2611 2612 2613 2614 2615 2616 2617 2618 |
* @buffer: the user buffer * @lenp: the size of the user buffer * @ppos: file position * * Reads/writes up to table->maxlen/sizeof(unsigned int) integer * values from/to the user buffer, treated as an ASCII string. * The values read are assumed to be in seconds, and are converted into * jiffies. * * Returns 0 on success. */ |
8d65af789
|
2619 |
int proc_dointvec_jiffies(struct ctl_table *table, int write, |
1da177e4c
|
2620 2621 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
8d65af789
|
2622 |
return do_proc_dointvec(table,write,buffer,lenp,ppos, |
1da177e4c
|
2623 2624 2625 2626 2627 2628 2629 |
do_proc_dointvec_jiffies_conv,NULL); } /** * proc_dointvec_userhz_jiffies - read a vector of integers as 1/USER_HZ seconds * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
1da177e4c
|
2630 2631 |
* @buffer: the user buffer * @lenp: the size of the user buffer |
1e5d53314
|
2632 |
* @ppos: pointer to the file position |
1da177e4c
|
2633 2634 2635 2636 2637 2638 2639 2640 |
* * Reads/writes up to table->maxlen/sizeof(unsigned int) integer * values from/to the user buffer, treated as an ASCII string. * The values read are assumed to be in 1/USER_HZ seconds, and * are converted into jiffies. * * Returns 0 on success. */ |
8d65af789
|
2641 |
int proc_dointvec_userhz_jiffies(struct ctl_table *table, int write, |
1da177e4c
|
2642 2643 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
8d65af789
|
2644 |
return do_proc_dointvec(table,write,buffer,lenp,ppos, |
1da177e4c
|
2645 2646 2647 2648 2649 2650 2651 |
do_proc_dointvec_userhz_jiffies_conv,NULL); } /** * proc_dointvec_ms_jiffies - read a vector of integers as 1 milliseconds * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file |
1da177e4c
|
2652 2653 |
* @buffer: the user buffer * @lenp: the size of the user buffer |
67be2dd1b
|
2654 2655 |
* @ppos: file position * @ppos: the current position in the file |
1da177e4c
|
2656 2657 2658 2659 2660 2661 2662 2663 |
* * Reads/writes up to table->maxlen/sizeof(unsigned int) integer * values from/to the user buffer, treated as an ASCII string. * The values read are assumed to be in 1/1000 seconds, and * are converted into jiffies. * * Returns 0 on success. */ |
8d65af789
|
2664 |
int proc_dointvec_ms_jiffies(struct ctl_table *table, int write, |
1da177e4c
|
2665 2666 |
void __user *buffer, size_t *lenp, loff_t *ppos) { |
8d65af789
|
2667 |
return do_proc_dointvec(table, write, buffer, lenp, ppos, |
1da177e4c
|
2668 2669 |
do_proc_dointvec_ms_jiffies_conv, NULL); } |
8d65af789
|
2670 |
static int proc_do_cad_pid(struct ctl_table *table, int write, |
9ec52099e
|
2671 2672 2673 2674 2675 |
void __user *buffer, size_t *lenp, loff_t *ppos) { struct pid *new_pid; pid_t tmp; int r; |
6c5f3e7b4
|
2676 |
tmp = pid_vnr(cad_pid); |
9ec52099e
|
2677 |
|
8d65af789
|
2678 |
r = __do_proc_dointvec(&tmp, table, write, buffer, |
9ec52099e
|
2679 2680 2681 2682 2683 2684 2685 2686 2687 2688 2689 |
lenp, ppos, NULL, NULL); if (r || !write) return r; new_pid = find_get_pid(tmp); if (!new_pid) return -ESRCH; put_pid(xchg(&cad_pid, new_pid)); return 0; } |
9f977fb7a
|
2690 2691 2692 2693 2694 2695 2696 2697 2698 2699 2700 2701 2702 2703 2704 2705 2706 2707 2708 2709 2710 2711 2712 2713 2714 2715 2716 2717 2718 2719 2720 2721 2722 2723 2724 2725 2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737 2738 2739 2740 2741 2742 2743 2744 2745 2746 2747 2748 2749 2750 2751 2752 2753 2754 2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767 2768 2769 2770 2771 2772 2773 2774 2775 2776 2777 2778 2779 2780 2781 2782 2783 2784 2785 2786 2787 2788 2789 2790 2791 2792 2793 2794 2795 2796 2797 2798 2799 2800 2801 2802 2803 2804 2805 2806 2807 2808 2809 2810 2811 2812 2813 2814 2815 2816 2817 2818 2819 2820 2821 2822 2823 2824 2825 2826 2827 2828 2829 2830 2831 2832 2833 2834 2835 2836 2837 2838 2839 2840 2841 2842 2843 2844 |
/** * proc_do_large_bitmap - read/write from/to a large bitmap * @table: the sysctl table * @write: %TRUE if this is a write to the sysctl file * @buffer: the user buffer * @lenp: the size of the user buffer * @ppos: file position * * The bitmap is stored at table->data and the bitmap length (in bits) * in table->maxlen. * * We use a range comma separated format (e.g. 1,3-4,10-10) so that * large bitmaps may be represented in a compact manner. Writing into * the file will clear the bitmap then update it with the given input. * * Returns 0 on success. */ int proc_do_large_bitmap(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) { int err = 0; bool first = 1; size_t left = *lenp; unsigned long bitmap_len = table->maxlen; unsigned long *bitmap = (unsigned long *) table->data; unsigned long *tmp_bitmap = NULL; char tr_a[] = { '-', ',', ' ' }, tr_b[] = { ',', ' ', 0 }, c; if (!bitmap_len || !left || (*ppos && !write)) { *lenp = 0; return 0; } if (write) { unsigned long page = 0; char *kbuf; if (left > PAGE_SIZE - 1) left = PAGE_SIZE - 1; page = __get_free_page(GFP_TEMPORARY); kbuf = (char *) page; if (!kbuf) return -ENOMEM; if (copy_from_user(kbuf, buffer, left)) { free_page(page); return -EFAULT; } kbuf[left] = 0; tmp_bitmap = kzalloc(BITS_TO_LONGS(bitmap_len) * sizeof(unsigned long), GFP_KERNEL); if (!tmp_bitmap) { free_page(page); return -ENOMEM; } proc_skip_char(&kbuf, &left, ' '); while (!err && left) { unsigned long val_a, val_b; bool neg; err = proc_get_long(&kbuf, &left, &val_a, &neg, tr_a, sizeof(tr_a), &c); if (err) break; if (val_a >= bitmap_len || neg) { err = -EINVAL; break; } val_b = val_a; if (left) { kbuf++; left--; } if (c == '-') { err = proc_get_long(&kbuf, &left, &val_b, &neg, tr_b, sizeof(tr_b), &c); if (err) break; if (val_b >= bitmap_len || neg || val_a > val_b) { err = -EINVAL; break; } if (left) { kbuf++; left--; } } while (val_a <= val_b) set_bit(val_a++, tmp_bitmap); first = 0; proc_skip_char(&kbuf, &left, ' '); } free_page(page); } else { unsigned long bit_a, bit_b = 0; while (left) { bit_a = find_next_bit(bitmap, bitmap_len, bit_b); if (bit_a >= bitmap_len) break; bit_b = find_next_zero_bit(bitmap, bitmap_len, bit_a + 1) - 1; if (!first) { err = proc_put_char(&buffer, &left, ','); if (err) break; } err = proc_put_long(&buffer, &left, bit_a, false); if (err) break; if (bit_a != bit_b) { err = proc_put_char(&buffer, &left, '-'); if (err) break; err = proc_put_long(&buffer, &left, bit_b, false); if (err) break; } first = 0; bit_b++; } if (!err) err = proc_put_char(&buffer, &left, ' '); } if (!err) { if (write) { if (*ppos) bitmap_or(bitmap, bitmap, tmp_bitmap, bitmap_len); else memcpy(bitmap, tmp_bitmap, BITS_TO_LONGS(bitmap_len) * sizeof(unsigned long)); } kfree(tmp_bitmap); *lenp -= left; *ppos += *lenp; return 0; } else { kfree(tmp_bitmap); return err; } } |
556105000
|
2845 |
#else /* CONFIG_PROC_SYSCTL */ |
1da177e4c
|
2846 |
|
8d65af789
|
2847 |
int proc_dostring(struct ctl_table *table, int write, |
1da177e4c
|
2848 2849 2850 2851 |
void __user *buffer, size_t *lenp, loff_t *ppos) { return -ENOSYS; } |
8d65af789
|
2852 |
int proc_dointvec(struct ctl_table *table, int write, |
1da177e4c
|
2853 |
void __user *buffer, size_t *lenp, loff_t *ppos) |
1da177e4c
|
2854 2855 2856 |
{ return -ENOSYS; } |
8d65af789
|
2857 |
int proc_dointvec_minmax(struct ctl_table *table, int write, |
1da177e4c
|
2858 2859 2860 2861 |
void __user *buffer, size_t *lenp, loff_t *ppos) { return -ENOSYS; } |
8d65af789
|
2862 |
int proc_dointvec_jiffies(struct ctl_table *table, int write, |
1da177e4c
|
2863 2864 2865 2866 |
void __user *buffer, size_t *lenp, loff_t *ppos) { return -ENOSYS; } |
8d65af789
|
2867 |
int proc_dointvec_userhz_jiffies(struct ctl_table *table, int write, |
1da177e4c
|
2868 2869 2870 2871 |
void __user *buffer, size_t *lenp, loff_t *ppos) { return -ENOSYS; } |
8d65af789
|
2872 |
int proc_dointvec_ms_jiffies(struct ctl_table *table, int write, |
1da177e4c
|
2873 2874 2875 2876 |
void __user *buffer, size_t *lenp, loff_t *ppos) { return -ENOSYS; } |
8d65af789
|
2877 |
int proc_doulongvec_minmax(struct ctl_table *table, int write, |
1da177e4c
|
2878 2879 2880 2881 |
void __user *buffer, size_t *lenp, loff_t *ppos) { return -ENOSYS; } |
d8217f076
|
2882 |
int proc_doulongvec_ms_jiffies_minmax(struct ctl_table *table, int write, |
1da177e4c
|
2883 2884 2885 2886 2887 |
void __user *buffer, size_t *lenp, loff_t *ppos) { return -ENOSYS; } |
556105000
|
2888 |
#endif /* CONFIG_PROC_SYSCTL */ |
1da177e4c
|
2889 |
|
1da177e4c
|
2890 2891 2892 2893 2894 2895 2896 2897 2898 2899 2900 2901 2902 |
/* * No sense putting this after each symbol definition, twice, * exception granted :-) */ EXPORT_SYMBOL(proc_dointvec); EXPORT_SYMBOL(proc_dointvec_jiffies); EXPORT_SYMBOL(proc_dointvec_minmax); EXPORT_SYMBOL(proc_dointvec_userhz_jiffies); EXPORT_SYMBOL(proc_dointvec_ms_jiffies); EXPORT_SYMBOL(proc_dostring); EXPORT_SYMBOL(proc_doulongvec_minmax); EXPORT_SYMBOL(proc_doulongvec_ms_jiffies_minmax); EXPORT_SYMBOL(register_sysctl_table); |
29e796fd4
|
2903 |
EXPORT_SYMBOL(register_sysctl_paths); |
1da177e4c
|
2904 |
EXPORT_SYMBOL(unregister_sysctl_table); |