blob: daf8554fd42a5e537bb58572823b2028f74be930 [file] [log] [blame]
Vlad Yasevich60c778b2008-01-11 09:57:09 -05001/* SCTP kernel implementation
Linus Torvalds1da177e2005-04-16 15:20:36 -07002 * (C) Copyright IBM Corp. 2002, 2004
3 * Copyright (c) 2002 Intel Corp.
4 *
Vlad Yasevich60c778b2008-01-11 09:57:09 -05005 * This file is part of the SCTP kernel implementation
Linus Torvalds1da177e2005-04-16 15:20:36 -07006 *
7 * Sysctl related interfaces for SCTP.
8 *
Vlad Yasevich60c778b2008-01-11 09:57:09 -05009 * This SCTP implementation is free software;
Linus Torvalds1da177e2005-04-16 15:20:36 -070010 * you can redistribute it and/or modify it under the terms of
11 * the GNU General Public License as published by
12 * the Free Software Foundation; either version 2, or (at your option)
13 * any later version.
14 *
Vlad Yasevich60c778b2008-01-11 09:57:09 -050015 * This SCTP implementation is distributed in the hope that it
Linus Torvalds1da177e2005-04-16 15:20:36 -070016 * will be useful, but WITHOUT ANY WARRANTY; without even the implied
17 * ************************
18 * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
19 * See the GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License
Jeff Kirsher4b2f13a2013-12-06 06:28:48 -080022 * along with GNU CC; see the file COPYING. If not, see
23 * <http://www.gnu.org/licenses/>.
Linus Torvalds1da177e2005-04-16 15:20:36 -070024 *
25 * Please send any bug reports or fixes you make to the
26 * email address(es):
Daniel Borkmann91705c62013-07-23 14:51:47 +020027 * lksctp developers <linux-sctp@vger.kernel.org>
Linus Torvalds1da177e2005-04-16 15:20:36 -070028 *
Linus Torvalds1da177e2005-04-16 15:20:36 -070029 * Written or modified by:
30 * Mingqin Liu <liuming@us.ibm.com>
31 * Jon Grimm <jgrimm@us.ibm.com>
32 * Ardelle Fan <ardelle.fan@intel.com>
33 * Ryan Layer <rmlayer@us.ibm.com>
34 * Sridhar Samudrala <sri@us.ibm.com>
Linus Torvalds1da177e2005-04-16 15:20:36 -070035 */
36
Daniel Borkmannb58537a2014-06-15 00:59:14 +020037#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
38
Linus Torvalds1da177e2005-04-16 15:20:36 -070039#include <net/sctp/structs.h>
Adrian Bunk8c5955d2005-09-05 18:07:42 -070040#include <net/sctp/sctp.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070041#include <linux/sysctl.h>
42
Vladislav Yasevich3fd091e2006-08-22 13:29:17 -070043static int zero = 0;
44static int one = 1;
45static int timer_max = 86400000; /* ms in one day */
46static int int_max = INT_MAX;
Jean-Mickael Guerind48e0742009-05-13 00:03:20 +020047static int sack_timer_min = 1;
48static int sack_timer_max = 500;
Bhaskar Dutta72388432009-09-03 17:25:47 +053049static int addr_scope_max = 3; /* check sctp_scope_policy_t in include/net/sctp/constants.h for max entries */
Vlad Yasevich90f2f532009-11-23 15:53:57 -050050static int rwnd_scale_max = 16;
Daniel Borkmannb58537a2014-06-15 00:59:14 +020051static int rto_alpha_min = 0;
52static int rto_beta_min = 0;
53static int rto_alpha_max = 1000;
54static int rto_beta_max = 1000;
55
Xi Wang2692ba62011-12-16 12:44:15 +000056static unsigned long max_autoclose_min = 0;
57static unsigned long max_autoclose_max =
58 (MAX_SCHEDULE_TIMEOUT / HZ > UINT_MAX)
59 ? UINT_MAX : MAX_SCHEDULE_TIMEOUT / HZ;
Linus Torvalds1da177e2005-04-16 15:20:36 -070060
wangweidongb486b222013-12-11 09:50:40 +080061static int proc_sctp_do_hmac_alg(struct ctl_table *ctl, int write,
Neil Horman3c681982012-10-24 09:20:03 +000062 void __user *buffer, size_t *lenp,
Neil Horman3c681982012-10-24 09:20:03 +000063 loff_t *ppos);
wangweidong4f3fdf32013-12-11 09:50:39 +080064static int proc_sctp_do_rto_min(struct ctl_table *ctl, int write,
65 void __user *buffer, size_t *lenp,
66 loff_t *ppos);
67static int proc_sctp_do_rto_max(struct ctl_table *ctl, int write,
68 void __user *buffer, size_t *lenp,
69 loff_t *ppos);
Daniel Borkmannb58537a2014-06-15 00:59:14 +020070static int proc_sctp_do_alpha_beta(struct ctl_table *ctl, int write,
71 void __user *buffer, size_t *lenp,
72 loff_t *ppos);
Vlad Yasevichb14878c2014-04-17 17:26:50 +020073static int proc_sctp_do_auth(struct ctl_table *ctl, int write,
74 void __user *buffer, size_t *lenp,
75 loff_t *ppos);
wangweidong4f3fdf32013-12-11 09:50:39 +080076
Joe Perchesfe2c6332013-06-11 23:04:25 -070077static struct ctl_table sctp_table[] = {
Linus Torvalds1da177e2005-04-16 15:20:36 -070078 {
Neil Horman4d93df02007-08-15 16:07:44 -070079 .procname = "sctp_mem",
80 .data = &sysctl_sctp_mem,
81 .maxlen = sizeof(sysctl_sctp_mem),
82 .mode = 0644,
Eric Dumazet8d987e52010-11-09 23:24:26 +000083 .proc_handler = proc_doulongvec_minmax
Neil Horman4d93df02007-08-15 16:07:44 -070084 },
85 {
Neil Horman4d93df02007-08-15 16:07:44 -070086 .procname = "sctp_rmem",
87 .data = &sysctl_sctp_rmem,
88 .maxlen = sizeof(sysctl_sctp_rmem),
89 .mode = 0644,
Alexey Dobriyan6d9f2392008-11-03 18:21:05 -080090 .proc_handler = proc_dointvec,
Neil Horman4d93df02007-08-15 16:07:44 -070091 },
92 {
Neil Horman4d93df02007-08-15 16:07:44 -070093 .procname = "sctp_wmem",
94 .data = &sysctl_sctp_wmem,
95 .maxlen = sizeof(sysctl_sctp_wmem),
96 .mode = 0644,
Alexey Dobriyan6d9f2392008-11-03 18:21:05 -080097 .proc_handler = proc_dointvec,
Neil Horman4d93df02007-08-15 16:07:44 -070098 },
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +000099
100 { /* sentinel */ }
101};
102
Joe Perchesfe2c6332013-06-11 23:04:25 -0700103static struct ctl_table sctp_net_table[] = {
Vlad Yasevicha29a5bd2007-09-16 19:31:35 -0700104 {
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000105 .procname = "rto_initial",
106 .data = &init_net.sctp.rto_initial,
107 .maxlen = sizeof(unsigned int),
108 .mode = 0644,
109 .proc_handler = proc_dointvec_minmax,
110 .extra1 = &one,
111 .extra2 = &timer_max
112 },
113 {
114 .procname = "rto_min",
115 .data = &init_net.sctp.rto_min,
116 .maxlen = sizeof(unsigned int),
117 .mode = 0644,
wangweidong4f3fdf32013-12-11 09:50:39 +0800118 .proc_handler = proc_sctp_do_rto_min,
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000119 .extra1 = &one,
wangweidong4f3fdf32013-12-11 09:50:39 +0800120 .extra2 = &init_net.sctp.rto_max
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000121 },
122 {
123 .procname = "rto_max",
124 .data = &init_net.sctp.rto_max,
125 .maxlen = sizeof(unsigned int),
126 .mode = 0644,
wangweidong4f3fdf32013-12-11 09:50:39 +0800127 .proc_handler = proc_sctp_do_rto_max,
128 .extra1 = &init_net.sctp.rto_min,
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000129 .extra2 = &timer_max
130 },
131 {
132 .procname = "rto_alpha_exp_divisor",
133 .data = &init_net.sctp.rto_alpha,
134 .maxlen = sizeof(int),
Daniel Borkmannb58537a2014-06-15 00:59:14 +0200135 .mode = 0644,
136 .proc_handler = proc_sctp_do_alpha_beta,
137 .extra1 = &rto_alpha_min,
138 .extra2 = &rto_alpha_max,
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000139 },
140 {
141 .procname = "rto_beta_exp_divisor",
142 .data = &init_net.sctp.rto_beta,
143 .maxlen = sizeof(int),
Daniel Borkmannb58537a2014-06-15 00:59:14 +0200144 .mode = 0644,
145 .proc_handler = proc_sctp_do_alpha_beta,
146 .extra1 = &rto_beta_min,
147 .extra2 = &rto_beta_max,
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000148 },
149 {
150 .procname = "max_burst",
151 .data = &init_net.sctp.max_burst,
152 .maxlen = sizeof(int),
153 .mode = 0644,
154 .proc_handler = proc_dointvec_minmax,
155 .extra1 = &zero,
156 .extra2 = &int_max
157 },
158 {
159 .procname = "cookie_preserve_enable",
160 .data = &init_net.sctp.cookie_preserve_enable,
161 .maxlen = sizeof(int),
162 .mode = 0644,
163 .proc_handler = proc_dointvec,
164 },
165 {
Neil Horman3c681982012-10-24 09:20:03 +0000166 .procname = "cookie_hmac_alg",
wangweidong22a1f5142014-02-12 09:44:43 +0800167 .data = &init_net.sctp.sctp_hmac_alg,
Neil Horman3c681982012-10-24 09:20:03 +0000168 .maxlen = 8,
169 .mode = 0644,
170 .proc_handler = proc_sctp_do_hmac_alg,
171 },
172 {
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000173 .procname = "valid_cookie_life",
174 .data = &init_net.sctp.valid_cookie_life,
175 .maxlen = sizeof(unsigned int),
176 .mode = 0644,
177 .proc_handler = proc_dointvec_minmax,
178 .extra1 = &one,
179 .extra2 = &timer_max
180 },
181 {
182 .procname = "sack_timeout",
183 .data = &init_net.sctp.sack_timeout,
184 .maxlen = sizeof(int),
185 .mode = 0644,
186 .proc_handler = proc_dointvec_minmax,
187 .extra1 = &sack_timer_min,
188 .extra2 = &sack_timer_max,
189 },
190 {
191 .procname = "hb_interval",
192 .data = &init_net.sctp.hb_interval,
193 .maxlen = sizeof(unsigned int),
194 .mode = 0644,
195 .proc_handler = proc_dointvec_minmax,
196 .extra1 = &one,
197 .extra2 = &timer_max
198 },
199 {
200 .procname = "association_max_retrans",
201 .data = &init_net.sctp.max_retrans_association,
202 .maxlen = sizeof(int),
203 .mode = 0644,
204 .proc_handler = proc_dointvec_minmax,
205 .extra1 = &one,
206 .extra2 = &int_max
207 },
208 {
209 .procname = "path_max_retrans",
210 .data = &init_net.sctp.max_retrans_path,
211 .maxlen = sizeof(int),
212 .mode = 0644,
213 .proc_handler = proc_dointvec_minmax,
214 .extra1 = &one,
215 .extra2 = &int_max
216 },
217 {
218 .procname = "max_init_retransmits",
219 .data = &init_net.sctp.max_retrans_init,
220 .maxlen = sizeof(int),
221 .mode = 0644,
222 .proc_handler = proc_dointvec_minmax,
223 .extra1 = &one,
224 .extra2 = &int_max
225 },
226 {
227 .procname = "pf_retrans",
228 .data = &init_net.sctp.pf_retrans,
229 .maxlen = sizeof(int),
230 .mode = 0644,
231 .proc_handler = proc_dointvec_minmax,
232 .extra1 = &zero,
233 .extra2 = &int_max
234 },
235 {
236 .procname = "sndbuf_policy",
237 .data = &init_net.sctp.sndbuf_policy,
238 .maxlen = sizeof(int),
239 .mode = 0644,
240 .proc_handler = proc_dointvec,
241 },
242 {
243 .procname = "rcvbuf_policy",
244 .data = &init_net.sctp.rcvbuf_policy,
245 .maxlen = sizeof(int),
246 .mode = 0644,
247 .proc_handler = proc_dointvec,
248 },
249 {
250 .procname = "default_auto_asconf",
251 .data = &init_net.sctp.default_auto_asconf,
252 .maxlen = sizeof(int),
253 .mode = 0644,
254 .proc_handler = proc_dointvec,
255 },
256 {
257 .procname = "addip_enable",
258 .data = &init_net.sctp.addip_enable,
Vlad Yasevicha29a5bd2007-09-16 19:31:35 -0700259 .maxlen = sizeof(int),
260 .mode = 0644,
Alexey Dobriyan6d9f2392008-11-03 18:21:05 -0800261 .proc_handler = proc_dointvec,
Vlad Yasevicha29a5bd2007-09-16 19:31:35 -0700262 },
Vlad Yasevich73d9c4f2007-10-24 17:24:26 -0400263 {
Vlad Yasevich73d9c4f2007-10-24 17:24:26 -0400264 .procname = "addip_noauth_enable",
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000265 .data = &init_net.sctp.addip_noauth,
266 .maxlen = sizeof(int),
267 .mode = 0644,
268 .proc_handler = proc_dointvec,
269 },
270 {
271 .procname = "prsctp_enable",
272 .data = &init_net.sctp.prsctp_enable,
273 .maxlen = sizeof(int),
274 .mode = 0644,
275 .proc_handler = proc_dointvec,
276 },
277 {
278 .procname = "auth_enable",
279 .data = &init_net.sctp.auth_enable,
Vlad Yasevich73d9c4f2007-10-24 17:24:26 -0400280 .maxlen = sizeof(int),
281 .mode = 0644,
Vlad Yasevichb14878c2014-04-17 17:26:50 +0200282 .proc_handler = proc_sctp_do_auth,
Vlad Yasevich73d9c4f2007-10-24 17:24:26 -0400283 },
Bhaskar Dutta72388432009-09-03 17:25:47 +0530284 {
Bhaskar Dutta72388432009-09-03 17:25:47 +0530285 .procname = "addr_scope_policy",
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000286 .data = &init_net.sctp.scope_policy,
Bhaskar Dutta72388432009-09-03 17:25:47 +0530287 .maxlen = sizeof(int),
288 .mode = 0644,
Eric W. Biederman6d456112009-11-16 03:11:48 -0800289 .proc_handler = proc_dointvec_minmax,
Bhaskar Dutta72388432009-09-03 17:25:47 +0530290 .extra1 = &zero,
291 .extra2 = &addr_scope_max,
292 },
Vlad Yasevich90f2f532009-11-23 15:53:57 -0500293 {
Vlad Yasevich90f2f532009-11-23 15:53:57 -0500294 .procname = "rwnd_update_shift",
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000295 .data = &init_net.sctp.rwnd_upd_shift,
Vlad Yasevich90f2f532009-11-23 15:53:57 -0500296 .maxlen = sizeof(int),
297 .mode = 0644,
298 .proc_handler = &proc_dointvec_minmax,
Vlad Yasevich90f2f532009-11-23 15:53:57 -0500299 .extra1 = &one,
300 .extra2 = &rwnd_scale_max,
301 },
Xi Wang2692ba62011-12-16 12:44:15 +0000302 {
303 .procname = "max_autoclose",
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000304 .data = &init_net.sctp.max_autoclose,
Xi Wang2692ba62011-12-16 12:44:15 +0000305 .maxlen = sizeof(unsigned long),
306 .mode = 0644,
307 .proc_handler = &proc_doulongvec_minmax,
308 .extra1 = &max_autoclose_min,
309 .extra2 = &max_autoclose_max,
310 },
Zhu Yanjun566178f2015-12-16 13:55:04 +0800311 {
312 .procname = "pf_enable",
313 .data = &init_net.sctp.pf_enable,
314 .maxlen = sizeof(int),
315 .mode = 0644,
316 .proc_handler = proc_dointvec,
317 },
David S. Miller71acc0d2013-08-09 13:09:41 -0700318
Linus Torvaldsd7fc02c2009-12-08 07:55:01 -0800319 { /* sentinel */ }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700320};
321
wangweidongb486b222013-12-11 09:50:40 +0800322static int proc_sctp_do_hmac_alg(struct ctl_table *ctl, int write,
Neil Horman3c681982012-10-24 09:20:03 +0000323 void __user *buffer, size_t *lenp,
324 loff_t *ppos)
325{
326 struct net *net = current->nsproxy->net_ns;
Joe Perchesfe2c6332013-06-11 23:04:25 -0700327 struct ctl_table tbl;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200328 bool changed = false;
Neil Horman3c681982012-10-24 09:20:03 +0000329 char *none = "none";
Sasha Levin320f1a42016-01-07 14:52:43 -0500330 char tmp[8] = {0};
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200331 int ret;
Neil Horman3c681982012-10-24 09:20:03 +0000332
333 memset(&tbl, 0, sizeof(struct ctl_table));
334
335 if (write) {
336 tbl.data = tmp;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200337 tbl.maxlen = sizeof(tmp);
Neil Horman3c681982012-10-24 09:20:03 +0000338 } else {
339 tbl.data = net->sctp.sctp_hmac_alg ? : none;
340 tbl.maxlen = strlen(tbl.data);
341 }
Neil Horman3c681982012-10-24 09:20:03 +0000342
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200343 ret = proc_dostring(&tbl, write, buffer, lenp, ppos);
344 if (write && ret == 0) {
Neil Horman3c681982012-10-24 09:20:03 +0000345#ifdef CONFIG_CRYPTO_MD5
346 if (!strncmp(tmp, "md5", 3)) {
347 net->sctp.sctp_hmac_alg = "md5";
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200348 changed = true;
Neil Horman3c681982012-10-24 09:20:03 +0000349 }
350#endif
351#ifdef CONFIG_CRYPTO_SHA1
352 if (!strncmp(tmp, "sha1", 4)) {
353 net->sctp.sctp_hmac_alg = "sha1";
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200354 changed = true;
Neil Horman3c681982012-10-24 09:20:03 +0000355 }
356#endif
357 if (!strncmp(tmp, "none", 4)) {
358 net->sctp.sctp_hmac_alg = NULL;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200359 changed = true;
Neil Horman3c681982012-10-24 09:20:03 +0000360 }
Neil Horman3c681982012-10-24 09:20:03 +0000361 if (!changed)
362 ret = -EINVAL;
363 }
364
365 return ret;
366}
367
wangweidong4f3fdf32013-12-11 09:50:39 +0800368static int proc_sctp_do_rto_min(struct ctl_table *ctl, int write,
369 void __user *buffer, size_t *lenp,
370 loff_t *ppos)
371{
372 struct net *net = current->nsproxy->net_ns;
wangweidong4f3fdf32013-12-11 09:50:39 +0800373 unsigned int min = *(unsigned int *) ctl->extra1;
374 unsigned int max = *(unsigned int *) ctl->extra2;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200375 struct ctl_table tbl;
376 int ret, new_value;
wangweidong4f3fdf32013-12-11 09:50:39 +0800377
378 memset(&tbl, 0, sizeof(struct ctl_table));
379 tbl.maxlen = sizeof(unsigned int);
380
381 if (write)
382 tbl.data = &new_value;
383 else
384 tbl.data = &net->sctp.rto_min;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200385
wangweidong4f3fdf32013-12-11 09:50:39 +0800386 ret = proc_dointvec(&tbl, write, buffer, lenp, ppos);
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200387 if (write && ret == 0) {
388 if (new_value > max || new_value < min)
wangweidong4f3fdf32013-12-11 09:50:39 +0800389 return -EINVAL;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200390
wangweidong4f3fdf32013-12-11 09:50:39 +0800391 net->sctp.rto_min = new_value;
392 }
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200393
wangweidong4f3fdf32013-12-11 09:50:39 +0800394 return ret;
395}
396
397static int proc_sctp_do_rto_max(struct ctl_table *ctl, int write,
398 void __user *buffer, size_t *lenp,
399 loff_t *ppos)
400{
401 struct net *net = current->nsproxy->net_ns;
wangweidong4f3fdf32013-12-11 09:50:39 +0800402 unsigned int min = *(unsigned int *) ctl->extra1;
403 unsigned int max = *(unsigned int *) ctl->extra2;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200404 struct ctl_table tbl;
405 int ret, new_value;
wangweidong4f3fdf32013-12-11 09:50:39 +0800406
407 memset(&tbl, 0, sizeof(struct ctl_table));
408 tbl.maxlen = sizeof(unsigned int);
409
410 if (write)
411 tbl.data = &new_value;
412 else
413 tbl.data = &net->sctp.rto_max;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200414
wangweidong4f3fdf32013-12-11 09:50:39 +0800415 ret = proc_dointvec(&tbl, write, buffer, lenp, ppos);
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200416 if (write && ret == 0) {
417 if (new_value > max || new_value < min)
wangweidong4f3fdf32013-12-11 09:50:39 +0800418 return -EINVAL;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200419
wangweidong4f3fdf32013-12-11 09:50:39 +0800420 net->sctp.rto_max = new_value;
421 }
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200422
wangweidong4f3fdf32013-12-11 09:50:39 +0800423 return ret;
424}
425
Daniel Borkmannb58537a2014-06-15 00:59:14 +0200426static int proc_sctp_do_alpha_beta(struct ctl_table *ctl, int write,
427 void __user *buffer, size_t *lenp,
428 loff_t *ppos)
429{
Daniel Borkmanneaea2da2014-06-30 13:52:09 +0200430 if (write)
431 pr_warn_once("Changing rto_alpha or rto_beta may lead to "
432 "suboptimal rtt/srtt estimations!\n");
Daniel Borkmannb58537a2014-06-15 00:59:14 +0200433
434 return proc_dointvec_minmax(ctl, write, buffer, lenp, ppos);
435}
436
Vlad Yasevichb14878c2014-04-17 17:26:50 +0200437static int proc_sctp_do_auth(struct ctl_table *ctl, int write,
438 void __user *buffer, size_t *lenp,
439 loff_t *ppos)
440{
441 struct net *net = current->nsproxy->net_ns;
442 struct ctl_table tbl;
443 int new_value, ret;
444
445 memset(&tbl, 0, sizeof(struct ctl_table));
446 tbl.maxlen = sizeof(unsigned int);
447
448 if (write)
449 tbl.data = &new_value;
450 else
451 tbl.data = &net->sctp.auth_enable;
452
453 ret = proc_dointvec(&tbl, write, buffer, lenp, ppos);
Daniel Borkmann24599e62014-06-18 23:46:31 +0200454 if (write && ret == 0) {
Vlad Yasevichb14878c2014-04-17 17:26:50 +0200455 struct sock *sk = net->sctp.ctl_sock;
456
457 net->sctp.auth_enable = new_value;
458 /* Update the value in the control socket */
459 lock_sock(sk);
460 sctp_sk(sk)->ep->auth_enable = new_value;
461 release_sock(sk);
462 }
463
464 return ret;
465}
466
Eric W. Biedermanebb7e952012-08-07 07:23:59 +0000467int sctp_sysctl_net_register(struct net *net)
468{
wangweidongeb9f3702014-05-08 20:55:01 +0800469 struct ctl_table *table;
470 int i;
Eric W. Biedermanebb7e952012-08-07 07:23:59 +0000471
wangweidongeb9f3702014-05-08 20:55:01 +0800472 table = kmemdup(sctp_net_table, sizeof(sctp_net_table), GFP_KERNEL);
473 if (!table)
474 return -ENOMEM;
Eric W. Biedermanebb7e952012-08-07 07:23:59 +0000475
wangweidongeb9f3702014-05-08 20:55:01 +0800476 for (i = 0; table[i].data; i++)
477 table[i].data += (char *)(&net->sctp) - (char *)&init_net.sctp;
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000478
Eric W. Biedermanebb7e952012-08-07 07:23:59 +0000479 net->sctp.sysctl_header = register_net_sysctl(net, "net/sctp", table);
wangweidongf66138c2014-05-08 20:55:02 +0800480 if (net->sctp.sysctl_header == NULL) {
481 kfree(table);
482 return -ENOMEM;
483 }
Eric W. Biedermanebb7e952012-08-07 07:23:59 +0000484 return 0;
485}
486
487void sctp_sysctl_net_unregister(struct net *net)
488{
Vlad Yasevich5f19d122013-01-24 11:02:47 -0500489 struct ctl_table *table;
490
491 table = net->sctp.sysctl_header->ctl_table_arg;
Eric W. Biedermanebb7e952012-08-07 07:23:59 +0000492 unregister_net_sysctl_table(net->sctp.sysctl_header);
Vlad Yasevich5f19d122013-01-24 11:02:47 -0500493 kfree(table);
Eric W. Biedermanebb7e952012-08-07 07:23:59 +0000494}
495
wangweidong26ac8e52013-12-23 12:16:51 +0800496static struct ctl_table_header *sctp_sysctl_header;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700497
498/* Sysctl registration. */
499void sctp_sysctl_register(void)
500{
Eric W. Biedermanec8f23c2012-04-19 13:44:49 +0000501 sctp_sysctl_header = register_net_sysctl(&init_net, "net/sctp", sctp_table);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700502}
503
504/* Sysctl deregistration. */
505void sctp_sysctl_unregister(void)
506{
Eric W. Biederman5dd3df12012-04-19 13:24:33 +0000507 unregister_net_sysctl_table(sctp_sysctl_header);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700508}