]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - net/sctp/sysctl.c
x86/speculation/mmio: Enable CPU Fill buffer clearing on idle
[mirror_ubuntu-jammy-kernel.git] / net / sctp / sysctl.c
CommitLineData
47505b8b 1// SPDX-License-Identifier: GPL-2.0-or-later
60c778b2 2/* SCTP kernel implementation
1da177e4
LT
3 * (C) Copyright IBM Corp. 2002, 2004
4 * Copyright (c) 2002 Intel Corp.
5 *
60c778b2 6 * This file is part of the SCTP kernel implementation
1da177e4
LT
7 *
8 * Sysctl related interfaces for SCTP.
9 *
1da177e4
LT
10 * Please send any bug reports or fixes you make to the
11 * email address(es):
91705c61 12 * lksctp developers <linux-sctp@vger.kernel.org>
1da177e4 13 *
1da177e4
LT
14 * Written or modified by:
15 * Mingqin Liu <liuming@us.ibm.com>
16 * Jon Grimm <jgrimm@us.ibm.com>
17 * Ardelle Fan <ardelle.fan@intel.com>
18 * Ryan Layer <rmlayer@us.ibm.com>
19 * Sridhar Samudrala <sri@us.ibm.com>
1da177e4
LT
20 */
21
b58537a1
DB
22#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
23
1da177e4 24#include <net/sctp/structs.h>
8c5955d8 25#include <net/sctp/sctp.h>
1da177e4
LT
26#include <linux/sysctl.h>
27
3fd091e7 28static int timer_max = 86400000; /* ms in one day */
d48e074d
JMG
29static int sack_timer_min = 1;
30static int sack_timer_max = 500;
701ef3e6 31static int addr_scope_max = SCTP_SCOPE_POLICY_MAX;
90f2f531 32static int rwnd_scale_max = 16;
b58537a1
DB
33static int rto_alpha_min = 0;
34static int rto_beta_min = 0;
35static int rto_alpha_max = 1000;
36static int rto_beta_max = 1000;
aef587be 37static int pf_expose_max = SCTP_PF_EXPOSE_MAX;
34515e94 38static int ps_retrans_max = SCTP_PS_RETRANS_MAX;
e8a3001c 39static int udp_port_max = 65535;
b58537a1 40
2692ba61
XW
41static unsigned long max_autoclose_min = 0;
42static unsigned long max_autoclose_max =
43 (MAX_SCHEDULE_TIMEOUT / HZ > UINT_MAX)
44 ? UINT_MAX : MAX_SCHEDULE_TIMEOUT / HZ;
1da177e4 45
b486b228 46static int proc_sctp_do_hmac_alg(struct ctl_table *ctl, int write,
32927393 47 void *buffer, size_t *lenp, loff_t *ppos);
4f3fdf3b 48static int proc_sctp_do_rto_min(struct ctl_table *ctl, int write,
32927393
CH
49 void *buffer, size_t *lenp, loff_t *ppos);
50static int proc_sctp_do_rto_max(struct ctl_table *ctl, int write, void *buffer,
51 size_t *lenp, loff_t *ppos);
046c052b
XL
52static int proc_sctp_do_udp_port(struct ctl_table *ctl, int write, void *buffer,
53 size_t *lenp, loff_t *ppos);
b58537a1 54static int proc_sctp_do_alpha_beta(struct ctl_table *ctl, int write,
32927393 55 void *buffer, size_t *lenp, loff_t *ppos);
b14878cc 56static int proc_sctp_do_auth(struct ctl_table *ctl, int write,
32927393 57 void *buffer, size_t *lenp, loff_t *ppos);
d1e462a7
XL
58static int proc_sctp_do_probe_interval(struct ctl_table *ctl, int write,
59 void *buffer, size_t *lenp, loff_t *ppos);
4f3fdf3b 60
fe2c6338 61static struct ctl_table sctp_table[] = {
e1fc3b14
EB
62 {
63 .procname = "sctp_mem",
64 .data = &sysctl_sctp_mem,
65 .maxlen = sizeof(sysctl_sctp_mem),
66 .mode = 0644,
67 .proc_handler = proc_doulongvec_minmax
68 },
69 {
70 .procname = "sctp_rmem",
71 .data = &sysctl_sctp_rmem,
72 .maxlen = sizeof(sysctl_sctp_rmem),
73 .mode = 0644,
74 .proc_handler = proc_dointvec,
75 },
76 {
77 .procname = "sctp_wmem",
78 .data = &sysctl_sctp_wmem,
79 .maxlen = sizeof(sysctl_sctp_wmem),
80 .mode = 0644,
81 .proc_handler = proc_dointvec,
82 },
83
84 { /* sentinel */ }
85};
86
fe2c6338 87static struct ctl_table sctp_net_table[] = {
1da177e4 88 {
1da177e4 89 .procname = "rto_initial",
e1fc3b14 90 .data = &init_net.sctp.rto_initial,
3fd091e7 91 .maxlen = sizeof(unsigned int),
1da177e4 92 .mode = 0644,
6d9f239a 93 .proc_handler = proc_dointvec_minmax,
eec4844f 94 .extra1 = SYSCTL_ONE,
3fd091e7 95 .extra2 = &timer_max
1da177e4
LT
96 },
97 {
1da177e4 98 .procname = "rto_min",
e1fc3b14 99 .data = &init_net.sctp.rto_min,
3fd091e7 100 .maxlen = sizeof(unsigned int),
1da177e4 101 .mode = 0644,
4f3fdf3b 102 .proc_handler = proc_sctp_do_rto_min,
eec4844f 103 .extra1 = SYSCTL_ONE,
4f3fdf3b 104 .extra2 = &init_net.sctp.rto_max
1da177e4
LT
105 },
106 {
1da177e4 107 .procname = "rto_max",
e1fc3b14 108 .data = &init_net.sctp.rto_max,
3fd091e7 109 .maxlen = sizeof(unsigned int),
1da177e4 110 .mode = 0644,
4f3fdf3b 111 .proc_handler = proc_sctp_do_rto_max,
112 .extra1 = &init_net.sctp.rto_min,
3fd091e7 113 .extra2 = &timer_max
1da177e4
LT
114 },
115 {
e1fc3b14
EB
116 .procname = "rto_alpha_exp_divisor",
117 .data = &init_net.sctp.rto_alpha,
118 .maxlen = sizeof(int),
b58537a1
DB
119 .mode = 0644,
120 .proc_handler = proc_sctp_do_alpha_beta,
121 .extra1 = &rto_alpha_min,
122 .extra2 = &rto_alpha_max,
e1fc3b14
EB
123 },
124 {
125 .procname = "rto_beta_exp_divisor",
126 .data = &init_net.sctp.rto_beta,
127 .maxlen = sizeof(int),
b58537a1
DB
128 .mode = 0644,
129 .proc_handler = proc_sctp_do_alpha_beta,
130 .extra1 = &rto_beta_min,
131 .extra2 = &rto_beta_max,
1da177e4
LT
132 },
133 {
1da177e4 134 .procname = "max_burst",
e1fc3b14 135 .data = &init_net.sctp.max_burst,
1da177e4
LT
136 .maxlen = sizeof(int),
137 .mode = 0644,
6d9f239a 138 .proc_handler = proc_dointvec_minmax,
eec4844f
MC
139 .extra1 = SYSCTL_ZERO,
140 .extra2 = SYSCTL_INT_MAX,
1da177e4
LT
141 },
142 {
e1fc3b14
EB
143 .procname = "cookie_preserve_enable",
144 .data = &init_net.sctp.cookie_preserve_enable,
1da177e4
LT
145 .maxlen = sizeof(int),
146 .mode = 0644,
e1fc3b14
EB
147 .proc_handler = proc_dointvec,
148 },
3c68198e
NH
149 {
150 .procname = "cookie_hmac_alg",
22a1f514 151 .data = &init_net.sctp.sctp_hmac_alg,
3c68198e
NH
152 .maxlen = 8,
153 .mode = 0644,
154 .proc_handler = proc_sctp_do_hmac_alg,
155 },
e1fc3b14
EB
156 {
157 .procname = "valid_cookie_life",
158 .data = &init_net.sctp.valid_cookie_life,
159 .maxlen = sizeof(unsigned int),
160 .mode = 0644,
6d9f239a 161 .proc_handler = proc_dointvec_minmax,
eec4844f 162 .extra1 = SYSCTL_ONE,
e1fc3b14 163 .extra2 = &timer_max
1da177e4 164 },
4eb701df 165 {
e1fc3b14
EB
166 .procname = "sack_timeout",
167 .data = &init_net.sctp.sack_timeout,
4eb701df
NH
168 .maxlen = sizeof(int),
169 .mode = 0644,
e1fc3b14
EB
170 .proc_handler = proc_dointvec_minmax,
171 .extra1 = &sack_timer_min,
172 .extra2 = &sack_timer_max,
4eb701df 173 },
049b3ff5 174 {
e1fc3b14
EB
175 .procname = "hb_interval",
176 .data = &init_net.sctp.hb_interval,
177 .maxlen = sizeof(unsigned int),
049b3ff5 178 .mode = 0644,
e1fc3b14 179 .proc_handler = proc_dointvec_minmax,
eec4844f 180 .extra1 = SYSCTL_ONE,
e1fc3b14 181 .extra2 = &timer_max
049b3ff5 182 },
1da177e4 183 {
e1fc3b14
EB
184 .procname = "association_max_retrans",
185 .data = &init_net.sctp.max_retrans_association,
1da177e4
LT
186 .maxlen = sizeof(int),
187 .mode = 0644,
6d9f239a 188 .proc_handler = proc_dointvec_minmax,
eec4844f
MC
189 .extra1 = SYSCTL_ONE,
190 .extra2 = SYSCTL_INT_MAX,
1da177e4 191 },
5aa93bcf 192 {
e1fc3b14
EB
193 .procname = "path_max_retrans",
194 .data = &init_net.sctp.max_retrans_path,
5aa93bcf
NH
195 .maxlen = sizeof(int),
196 .mode = 0644,
197 .proc_handler = proc_dointvec_minmax,
eec4844f
MC
198 .extra1 = SYSCTL_ONE,
199 .extra2 = SYSCTL_INT_MAX,
5aa93bcf 200 },
1da177e4 201 {
1da177e4 202 .procname = "max_init_retransmits",
e1fc3b14 203 .data = &init_net.sctp.max_retrans_init,
1da177e4
LT
204 .maxlen = sizeof(int),
205 .mode = 0644,
6d9f239a 206 .proc_handler = proc_dointvec_minmax,
eec4844f
MC
207 .extra1 = SYSCTL_ONE,
208 .extra2 = SYSCTL_INT_MAX,
1da177e4
LT
209 },
210 {
e1fc3b14
EB
211 .procname = "pf_retrans",
212 .data = &init_net.sctp.pf_retrans,
213 .maxlen = sizeof(int),
1da177e4 214 .mode = 0644,
6d9f239a 215 .proc_handler = proc_dointvec_minmax,
eec4844f 216 .extra1 = SYSCTL_ZERO,
34515e94
XL
217 .extra2 = &init_net.sctp.ps_retrans,
218 },
219 {
220 .procname = "ps_retrans",
221 .data = &init_net.sctp.ps_retrans,
222 .maxlen = sizeof(int),
223 .mode = 0644,
224 .proc_handler = proc_dointvec_minmax,
225 .extra1 = &init_net.sctp.pf_retrans,
226 .extra2 = &ps_retrans_max,
1da177e4
LT
227 },
228 {
e1fc3b14
EB
229 .procname = "sndbuf_policy",
230 .data = &init_net.sctp.sndbuf_policy,
8116ffad 231 .maxlen = sizeof(int),
1da177e4 232 .mode = 0644,
6d9f239a 233 .proc_handler = proc_dointvec,
1da177e4
LT
234 },
235 {
e1fc3b14
EB
236 .procname = "rcvbuf_policy",
237 .data = &init_net.sctp.rcvbuf_policy,
dd51be0f
MH
238 .maxlen = sizeof(int),
239 .mode = 0644,
240 .proc_handler = proc_dointvec,
241 },
242 {
243 .procname = "default_auto_asconf",
e1fc3b14 244 .data = &init_net.sctp.default_auto_asconf,
1da177e4
LT
245 .maxlen = sizeof(int),
246 .mode = 0644,
6d9f239a 247 .proc_handler = proc_dointvec,
1da177e4
LT
248 },
249 {
e1fc3b14
EB
250 .procname = "addip_enable",
251 .data = &init_net.sctp.addip_enable,
1da177e4
LT
252 .maxlen = sizeof(int),
253 .mode = 0644,
6d9f239a 254 .proc_handler = proc_dointvec,
1da177e4 255 },
2f85a429 256 {
e1fc3b14
EB
257 .procname = "addip_noauth_enable",
258 .data = &init_net.sctp.addip_noauth,
d48e074d 259 .maxlen = sizeof(int),
2f85a429 260 .mode = 0644,
6d9f239a 261 .proc_handler = proc_dointvec,
4d93df0a
NH
262 },
263 {
e1fc3b14
EB
264 .procname = "prsctp_enable",
265 .data = &init_net.sctp.prsctp_enable,
a29a5bd4
VY
266 .maxlen = sizeof(int),
267 .mode = 0644,
6d9f239a 268 .proc_handler = proc_dointvec,
a29a5bd4 269 },
c0d8bab6
XL
270 {
271 .procname = "reconf_enable",
272 .data = &init_net.sctp.reconf_enable,
273 .maxlen = sizeof(int),
274 .mode = 0644,
275 .proc_handler = proc_dointvec,
276 },
73d9c4fd 277 {
e1fc3b14
EB
278 .procname = "auth_enable",
279 .data = &init_net.sctp.auth_enable,
73d9c4fd
VY
280 .maxlen = sizeof(int),
281 .mode = 0644,
b14878cc 282 .proc_handler = proc_sctp_do_auth,
73d9c4fd 283 },
463118c3
XL
284 {
285 .procname = "intl_enable",
286 .data = &init_net.sctp.intl_enable,
287 .maxlen = sizeof(int),
288 .mode = 0644,
289 .proc_handler = proc_dointvec,
290 },
2f5268a9
XL
291 {
292 .procname = "ecn_enable",
293 .data = &init_net.sctp.ecn_enable,
294 .maxlen = sizeof(int),
295 .mode = 0644,
296 .proc_handler = proc_dointvec,
297 },
d1e462a7
XL
298 {
299 .procname = "plpmtud_probe_interval",
300 .data = &init_net.sctp.probe_interval,
301 .maxlen = sizeof(int),
302 .mode = 0644,
303 .proc_handler = proc_sctp_do_probe_interval,
304 },
046c052b
XL
305 {
306 .procname = "udp_port",
307 .data = &init_net.sctp.udp_port,
308 .maxlen = sizeof(int),
309 .mode = 0644,
310 .proc_handler = proc_sctp_do_udp_port,
311 .extra1 = SYSCTL_ZERO,
312 .extra2 = &udp_port_max,
313 },
e8a3001c
XL
314 {
315 .procname = "encap_port",
316 .data = &init_net.sctp.encap_port,
317 .maxlen = sizeof(int),
318 .mode = 0644,
b2540cdc 319 .proc_handler = proc_dointvec_minmax,
e8a3001c
XL
320 .extra1 = SYSCTL_ZERO,
321 .extra2 = &udp_port_max,
322 },
72388433 323 {
72388433 324 .procname = "addr_scope_policy",
e1fc3b14 325 .data = &init_net.sctp.scope_policy,
72388433
BD
326 .maxlen = sizeof(int),
327 .mode = 0644,
6d456111 328 .proc_handler = proc_dointvec_minmax,
eec4844f 329 .extra1 = SYSCTL_ZERO,
72388433
BD
330 .extra2 = &addr_scope_max,
331 },
90f2f531 332 {
90f2f531 333 .procname = "rwnd_update_shift",
e1fc3b14 334 .data = &init_net.sctp.rwnd_upd_shift,
90f2f531
VY
335 .maxlen = sizeof(int),
336 .mode = 0644,
337 .proc_handler = &proc_dointvec_minmax,
eec4844f 338 .extra1 = SYSCTL_ONE,
90f2f531
VY
339 .extra2 = &rwnd_scale_max,
340 },
2692ba61
XW
341 {
342 .procname = "max_autoclose",
e1fc3b14 343 .data = &init_net.sctp.max_autoclose,
2692ba61
XW
344 .maxlen = sizeof(unsigned long),
345 .mode = 0644,
346 .proc_handler = &proc_doulongvec_minmax,
347 .extra1 = &max_autoclose_min,
348 .extra2 = &max_autoclose_max,
349 },
566178f8
ZY
350 {
351 .procname = "pf_enable",
352 .data = &init_net.sctp.pf_enable,
353 .maxlen = sizeof(int),
354 .mode = 0644,
355 .proc_handler = proc_dointvec,
356 },
aef587be
XL
357 {
358 .procname = "pf_expose",
359 .data = &init_net.sctp.pf_expose,
360 .maxlen = sizeof(int),
361 .mode = 0644,
362 .proc_handler = proc_dointvec_minmax,
363 .extra1 = SYSCTL_ZERO,
364 .extra2 = &pf_expose_max,
365 },
71acc0dd 366
d7fc02c7 367 { /* sentinel */ }
1da177e4
LT
368};
369
b486b228 370static int proc_sctp_do_hmac_alg(struct ctl_table *ctl, int write,
32927393 371 void *buffer, size_t *lenp, loff_t *ppos)
3c68198e
NH
372{
373 struct net *net = current->nsproxy->net_ns;
fe2c6338 374 struct ctl_table tbl;
ff5e92c1 375 bool changed = false;
3c68198e 376 char *none = "none";
320f1a4a 377 char tmp[8] = {0};
ff5e92c1 378 int ret;
3c68198e
NH
379
380 memset(&tbl, 0, sizeof(struct ctl_table));
381
382 if (write) {
383 tbl.data = tmp;
ff5e92c1 384 tbl.maxlen = sizeof(tmp);
3c68198e
NH
385 } else {
386 tbl.data = net->sctp.sctp_hmac_alg ? : none;
387 tbl.maxlen = strlen(tbl.data);
388 }
3c68198e 389
ff5e92c1
DB
390 ret = proc_dostring(&tbl, write, buffer, lenp, ppos);
391 if (write && ret == 0) {
3c68198e
NH
392#ifdef CONFIG_CRYPTO_MD5
393 if (!strncmp(tmp, "md5", 3)) {
394 net->sctp.sctp_hmac_alg = "md5";
ff5e92c1 395 changed = true;
3c68198e
NH
396 }
397#endif
398#ifdef CONFIG_CRYPTO_SHA1
399 if (!strncmp(tmp, "sha1", 4)) {
400 net->sctp.sctp_hmac_alg = "sha1";
ff5e92c1 401 changed = true;
3c68198e
NH
402 }
403#endif
404 if (!strncmp(tmp, "none", 4)) {
405 net->sctp.sctp_hmac_alg = NULL;
ff5e92c1 406 changed = true;
3c68198e 407 }
3c68198e
NH
408 if (!changed)
409 ret = -EINVAL;
410 }
411
412 return ret;
413}
414
4f3fdf3b 415static int proc_sctp_do_rto_min(struct ctl_table *ctl, int write,
32927393 416 void *buffer, size_t *lenp, loff_t *ppos)
4f3fdf3b 417{
418 struct net *net = current->nsproxy->net_ns;
4f3fdf3b 419 unsigned int min = *(unsigned int *) ctl->extra1;
420 unsigned int max = *(unsigned int *) ctl->extra2;
ff5e92c1
DB
421 struct ctl_table tbl;
422 int ret, new_value;
4f3fdf3b 423
424 memset(&tbl, 0, sizeof(struct ctl_table));
425 tbl.maxlen = sizeof(unsigned int);
426
427 if (write)
428 tbl.data = &new_value;
429 else
430 tbl.data = &net->sctp.rto_min;
ff5e92c1 431
4f3fdf3b 432 ret = proc_dointvec(&tbl, write, buffer, lenp, ppos);
ff5e92c1
DB
433 if (write && ret == 0) {
434 if (new_value > max || new_value < min)
4f3fdf3b 435 return -EINVAL;
ff5e92c1 436
4f3fdf3b 437 net->sctp.rto_min = new_value;
438 }
ff5e92c1 439
4f3fdf3b 440 return ret;
441}
442
443static int proc_sctp_do_rto_max(struct ctl_table *ctl, int write,
32927393 444 void *buffer, size_t *lenp, loff_t *ppos)
4f3fdf3b 445{
446 struct net *net = current->nsproxy->net_ns;
4f3fdf3b 447 unsigned int min = *(unsigned int *) ctl->extra1;
448 unsigned int max = *(unsigned int *) ctl->extra2;
ff5e92c1
DB
449 struct ctl_table tbl;
450 int ret, new_value;
4f3fdf3b 451
452 memset(&tbl, 0, sizeof(struct ctl_table));
453 tbl.maxlen = sizeof(unsigned int);
454
455 if (write)
456 tbl.data = &new_value;
457 else
458 tbl.data = &net->sctp.rto_max;
ff5e92c1 459
4f3fdf3b 460 ret = proc_dointvec(&tbl, write, buffer, lenp, ppos);
ff5e92c1
DB
461 if (write && ret == 0) {
462 if (new_value > max || new_value < min)
4f3fdf3b 463 return -EINVAL;
ff5e92c1 464
4f3fdf3b 465 net->sctp.rto_max = new_value;
466 }
ff5e92c1 467
4f3fdf3b 468 return ret;
469}
470
b58537a1 471static int proc_sctp_do_alpha_beta(struct ctl_table *ctl, int write,
32927393 472 void *buffer, size_t *lenp, loff_t *ppos)
b58537a1 473{
eaea2da7
DB
474 if (write)
475 pr_warn_once("Changing rto_alpha or rto_beta may lead to "
476 "suboptimal rtt/srtt estimations!\n");
b58537a1
DB
477
478 return proc_dointvec_minmax(ctl, write, buffer, lenp, ppos);
479}
480
b14878cc 481static int proc_sctp_do_auth(struct ctl_table *ctl, int write,
32927393 482 void *buffer, size_t *lenp, loff_t *ppos)
b14878cc
VY
483{
484 struct net *net = current->nsproxy->net_ns;
485 struct ctl_table tbl;
486 int new_value, ret;
487
488 memset(&tbl, 0, sizeof(struct ctl_table));
489 tbl.maxlen = sizeof(unsigned int);
490
491 if (write)
492 tbl.data = &new_value;
493 else
494 tbl.data = &net->sctp.auth_enable;
495
496 ret = proc_dointvec(&tbl, write, buffer, lenp, ppos);
24599e61 497 if (write && ret == 0) {
b14878cc
VY
498 struct sock *sk = net->sctp.ctl_sock;
499
500 net->sctp.auth_enable = new_value;
501 /* Update the value in the control socket */
502 lock_sock(sk);
503 sctp_sk(sk)->ep->auth_enable = new_value;
504 release_sock(sk);
505 }
506
507 return ret;
508}
509
046c052b
XL
510static int proc_sctp_do_udp_port(struct ctl_table *ctl, int write,
511 void *buffer, size_t *lenp, loff_t *ppos)
512{
513 struct net *net = current->nsproxy->net_ns;
514 unsigned int min = *(unsigned int *)ctl->extra1;
515 unsigned int max = *(unsigned int *)ctl->extra2;
516 struct ctl_table tbl;
517 int ret, new_value;
518
519 memset(&tbl, 0, sizeof(struct ctl_table));
520 tbl.maxlen = sizeof(unsigned int);
521
522 if (write)
523 tbl.data = &new_value;
524 else
525 tbl.data = &net->sctp.udp_port;
526
527 ret = proc_dointvec(&tbl, write, buffer, lenp, ppos);
528 if (write && ret == 0) {
529 struct sock *sk = net->sctp.ctl_sock;
530
531 if (new_value > max || new_value < min)
532 return -EINVAL;
533
534 net->sctp.udp_port = new_value;
535 sctp_udp_sock_stop(net);
536 if (new_value) {
537 ret = sctp_udp_sock_start(net);
538 if (ret)
539 net->sctp.udp_port = 0;
540 }
541
542 /* Update the value in the control socket */
543 lock_sock(sk);
544 sctp_sk(sk)->udp_port = htons(net->sctp.udp_port);
545 release_sock(sk);
546 }
547
548 return ret;
549}
550
d1e462a7
XL
551static int proc_sctp_do_probe_interval(struct ctl_table *ctl, int write,
552 void *buffer, size_t *lenp, loff_t *ppos)
553{
554 struct net *net = current->nsproxy->net_ns;
555 struct ctl_table tbl;
556 int ret, new_value;
557
558 memset(&tbl, 0, sizeof(struct ctl_table));
559 tbl.maxlen = sizeof(unsigned int);
560
561 if (write)
562 tbl.data = &new_value;
563 else
564 tbl.data = &net->sctp.probe_interval;
565
566 ret = proc_dointvec(&tbl, write, buffer, lenp, ppos);
567 if (write && ret == 0) {
568 if (new_value && new_value < SCTP_PROBE_TIMER_MIN)
569 return -EINVAL;
570
571 net->sctp.probe_interval = new_value;
572 }
573
574 return ret;
575}
576
ebb7e95d
EB
577int sctp_sysctl_net_register(struct net *net)
578{
eb9f3705 579 struct ctl_table *table;
580 int i;
ebb7e95d 581
eb9f3705 582 table = kmemdup(sctp_net_table, sizeof(sctp_net_table), GFP_KERNEL);
583 if (!table)
584 return -ENOMEM;
ebb7e95d 585
eb9f3705 586 for (i = 0; table[i].data; i++)
587 table[i].data += (char *)(&net->sctp) - (char *)&init_net.sctp;
e1fc3b14 588
ebb7e95d 589 net->sctp.sysctl_header = register_net_sysctl(net, "net/sctp", table);
f66138c8 590 if (net->sctp.sysctl_header == NULL) {
591 kfree(table);
592 return -ENOMEM;
593 }
ebb7e95d
EB
594 return 0;
595}
596
597void sctp_sysctl_net_unregister(struct net *net)
598{
5f19d121
VY
599 struct ctl_table *table;
600
601 table = net->sctp.sysctl_header->ctl_table_arg;
ebb7e95d 602 unregister_net_sysctl_table(net->sctp.sysctl_header);
5f19d121 603 kfree(table);
ebb7e95d
EB
604}
605
26ac8e5f 606static struct ctl_table_header *sctp_sysctl_header;
1da177e4
LT
607
608/* Sysctl registration. */
609void sctp_sysctl_register(void)
610{
ec8f23ce 611 sctp_sysctl_header = register_net_sysctl(&init_net, "net/sctp", sctp_table);
1da177e4
LT
612}
613
614/* Sysctl deregistration. */
615void sctp_sysctl_unregister(void)
616{
5dd3df10 617 unregister_net_sysctl_table(sctp_sysctl_header);
1da177e4 618}