2005-04-17 02:20:36 +04:00
/*
* sysctl . c : General linux system control interface
*
* Begun 24 March 1995 , Stephen Tweedie
* Added / proc support , Dec 1995
* Added bdflush entry and intvec min / max checking , 2 / 23 / 96 , Tom Dyas .
* Added hooks for / proc / sys / net ( minor , minor patch ) , 96 / 4 / 1 , Mike Shaver .
* Added kernel / java - { interpreter , appletviewer } , 96 / 5 / 10 , Mike Shaver .
* Dynamic registration fixes , Stephen Tweedie .
* Added kswapd - interval , ctrl - alt - del , printk stuff , 1 / 8 / 97 , Chris Horn .
* Made sysctl support optional via CONFIG_SYSCTL , 1 / 10 / 97 , Chris
* Horn .
* Added proc_doulongvec_ms_jiffies_minmax , 09 / 08 / 99 , Carlos H . Bauer .
* Added proc_doulongvec_minmax , 09 / 08 / 99 , Carlos H . Bauer .
* Changed linked lists to use list . h instead of lists . h , 02 / 24 / 00 , Bill
* Wendling .
* The list_for_each ( ) macro wasn ' t appropriate for the sysctl loop .
* Removed it and replaced it with older style , 03 / 23 / 00 , Bill Wendling
*/
# include <linux/module.h>
# include <linux/mm.h>
# include <linux/swap.h>
# include <linux/slab.h>
# include <linux/sysctl.h>
# include <linux/proc_fs.h>
V3 file capabilities: alter behavior of cap_setpcap
The non-filesystem capability meaning of CAP_SETPCAP is that a process, p1,
can change the capabilities of another process, p2. This is not the
meaning that was intended for this capability at all, and this
implementation came about purely because, without filesystem capabilities,
there was no way to use capabilities without one process bestowing them on
another.
Since we now have a filesystem support for capabilities we can fix the
implementation of CAP_SETPCAP.
The most significant thing about this change is that, with it in effect, no
process can set the capabilities of another process.
The capabilities of a program are set via the capability convolution
rules:
pI(post-exec) = pI(pre-exec)
pP(post-exec) = (X(aka cap_bset) & fP) | (pI(post-exec) & fI)
pE(post-exec) = fE ? pP(post-exec) : 0
at exec() time. As such, the only influence the pre-exec() program can
have on the post-exec() program's capabilities are through the pI
capability set.
The correct implementation for CAP_SETPCAP (and that enabled by this patch)
is that it can be used to add extra pI capabilities to the current process
- to be picked up by subsequent exec()s when the above convolution rules
are applied.
Here is how it works:
Let's say we have a process, p. It has capability sets, pE, pP and pI.
Generally, p, can change the value of its own pI to pI' where
(pI' & ~pI) & ~pP = 0.
That is, the only new things in pI' that were not present in pI need to
be present in pP.
The role of CAP_SETPCAP is basically to permit changes to pI beyond
the above:
if (pE & CAP_SETPCAP) {
pI' = anything; /* ie., even (pI' & ~pI) & ~pP != 0 */
}
This capability is useful for things like login, which (say, via
pam_cap) might want to raise certain inheritable capabilities for use
by the children of the logged-in user's shell, but those capabilities
are not useful to or needed by the login program itself.
One such use might be to limit who can run ping. You set the
capabilities of the 'ping' program to be "= cap_net_raw+i", and then
only shells that have (pI & CAP_NET_RAW) will be able to run
it. Without CAP_SETPCAP implemented as described above, login(pam_cap)
would have to also have (pP & CAP_NET_RAW) in order to raise this
capability and pass it on through the inheritable set.
Signed-off-by: Andrew Morgan <morgan@kernel.org>
Signed-off-by: Serge E. Hallyn <serue@us.ibm.com>
Cc: Stephen Smalley <sds@tycho.nsa.gov>
Cc: James Morris <jmorris@namei.org>
Cc: Casey Schaufler <casey@schaufler-ca.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-10-18 14:05:59 +04:00
# include <linux/security.h>
2005-04-17 02:20:36 +04:00
# include <linux/ctype.h>
# include <linux/utsname.h>
# include <linux/smp_lock.h>
2007-07-17 15:03:45 +04:00
# include <linux/fs.h>
2005-04-17 02:20:36 +04:00
# include <linux/init.h>
# include <linux/kernel.h>
2005-11-11 07:33:52 +03:00
# include <linux/kobject.h>
2005-08-16 09:18:02 +04:00
# include <linux/net.h>
2005-04-17 02:20:36 +04:00
# include <linux/sysrq.h>
# include <linux/highuid.h>
# include <linux/writeback.h>
# include <linux/hugetlb.h>
# include <linux/initrd.h>
2008-04-29 12:01:32 +04:00
# include <linux/key.h>
2005-04-17 02:20:36 +04:00
# include <linux/times.h>
# include <linux/limits.h>
# include <linux/dcache.h>
# include <linux/syscalls.h>
2008-07-24 08:27:03 +04:00
# include <linux/vmstat.h>
2006-02-21 05:27:58 +03:00
# include <linux/nfs_fs.h>
# include <linux/acpi.h>
2007-07-18 05:37:02 +04:00
# include <linux/reboot.h>
2008-05-12 23:20:43 +04:00
# include <linux/ftrace.h>
2009-04-03 19:42:35 +04:00
# include <linux/slow-work.h>
2005-04-17 02:20:36 +04:00
# include <asm/uaccess.h>
# include <asm/processor.h>
2006-09-30 03:47:55 +04:00
# ifdef CONFIG_X86
# include <asm/nmi.h>
2006-12-07 04:14:11 +03:00
# include <asm/stacktrace.h>
2008-01-30 15:30:05 +03:00
# include <asm/io.h>
2006-09-30 03:47:55 +04:00
# endif
2007-10-18 14:05:58 +04:00
static int deprecated_sysctl_warning ( struct __sysctl_args * args ) ;
2005-04-17 02:20:36 +04:00
# if defined(CONFIG_SYSCTL)
/* External variables not in a header file. */
extern int C_A_D ;
2007-07-16 10:40:10 +04:00
extern int print_fatal_signals ;
2005-04-17 02:20:36 +04:00
extern int sysctl_overcommit_memory ;
extern int sysctl_overcommit_ratio ;
2006-06-23 13:03:13 +04:00
extern int sysctl_panic_on_oom ;
2007-10-17 10:25:56 +04:00
extern int sysctl_oom_kill_allocating_task ;
oom: add sysctl to enable task memory dump
Adds a new sysctl, 'oom_dump_tasks', that enables the kernel to produce a
dump of all system tasks (excluding kernel threads) when performing an
OOM-killing. Information includes pid, uid, tgid, vm size, rss, cpu,
oom_adj score, and name.
This is helpful for determining why there was an OOM condition and which
rogue task caused it.
It is configurable so that large systems, such as those with several
thousand tasks, do not incur a performance penalty associated with dumping
data they may not desire.
If an OOM was triggered as a result of a memory controller, the tasklist
shall be filtered to exclude tasks that are not a member of the same
cgroup.
Cc: Andrea Arcangeli <andrea@suse.de>
Cc: Christoph Lameter <clameter@sgi.com>
Cc: Balbir Singh <balbir@linux.vnet.ibm.com>
Signed-off-by: David Rientjes <rientjes@google.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2008-02-07 11:14:07 +03:00
extern int sysctl_oom_dump_tasks ;
2005-04-17 02:20:36 +04:00
extern int max_threads ;
extern int core_uses_pid ;
2005-06-23 11:09:43 +04:00
extern int suid_dumpable ;
2005-04-17 02:20:36 +04:00
extern char core_pattern [ ] ;
extern int pid_max ;
extern int min_free_kbytes ;
extern int pid_max_min , pid_max_max ;
2006-01-08 12:00:39 +03:00
extern int sysctl_drop_caches ;
2006-01-08 12:00:40 +03:00
extern int percpu_pagelist_fraction ;
2006-06-26 15:56:52 +04:00
extern int compat_log ;
2008-01-25 23:08:34 +03:00
extern int latencytop_enabled ;
2008-05-10 18:08:32 +04:00
extern int sysctl_nr_open_min , sysctl_nr_open_max ;
2009-01-08 15:04:47 +03:00
# ifndef CONFIG_MMU
extern int sysctl_nr_trim_pages ;
# endif
2008-06-18 20:26:49 +04:00
# ifdef CONFIG_RCU_TORTURE_TEST
extern int rcutorture_runnable ;
# endif /* #ifdef CONFIG_RCU_TORTURE_TEST */
2005-04-17 02:20:36 +04:00
2007-10-17 10:26:09 +04:00
/* Constants used for minimum and maximum */
2008-02-05 09:29:20 +03:00
# ifdef CONFIG_DETECT_SOFTLOCKUP
2007-10-17 10:26:09 +04:00
static int sixty = 60 ;
2008-05-12 23:21:14 +04:00
static int neg_one = - 1 ;
2007-10-17 10:26:09 +04:00
# endif
static int zero ;
2009-04-07 00:38:46 +04:00
static int __maybe_unused one = 1 ;
static int __maybe_unused two = 2 ;
2009-02-12 00:04:23 +03:00
static unsigned long one_ul = 1 ;
2007-10-17 10:26:09 +04:00
static int one_hundred = 100 ;
2009-04-07 06:00:29 +04:00
static int one_thousand = 1000 ;
2007-10-17 10:26:09 +04:00
2005-04-17 02:20:36 +04:00
/* this is needed for the proc_dointvec_minmax for [fs_]overflow UID and GID */
static int maxolduid = 65535 ;
static int minolduid ;
2006-01-08 12:00:40 +03:00
static int min_percpu_pagelist_fract = 8 ;
2005-04-17 02:20:36 +04:00
static int ngroups_max = NGROUPS_MAX ;
2008-07-08 21:00:17 +04:00
# ifdef CONFIG_MODULES
2005-04-17 02:20:36 +04:00
extern char modprobe_path [ ] ;
# endif
# ifdef CONFIG_CHR_DEV_SG
extern int sg_big_buff ;
# endif
2008-09-12 10:29:54 +04:00
# ifdef CONFIG_SPARC
2008-09-12 10:33:53 +04:00
# include <asm/system.h>
2005-04-17 02:20:36 +04:00
# endif
2008-11-17 10:49:24 +03:00
# ifdef CONFIG_SPARC64
extern int sysctl_tsb_ratio ;
# endif
2005-04-17 02:20:36 +04:00
# ifdef __hppa__
extern int pwrsw_enabled ;
extern int unaligned_enabled ;
# endif
2006-01-06 11:19:28 +03:00
# ifdef CONFIG_S390
2005-04-17 02:20:36 +04:00
# ifdef CONFIG_MATHEMU
extern int sysctl_ieee_emulation_warnings ;
# endif
extern int sysctl_userprocess_debug ;
2005-07-27 22:44:57 +04:00
extern int spin_retry ;
2005-04-17 02:20:36 +04:00
# endif
# ifdef CONFIG_BSD_PROCESS_ACCT
extern int acct_parm [ ] ;
# endif
2006-02-28 20:42:23 +03:00
# ifdef CONFIG_IA64
extern int no_unaligned_warning ;
2009-01-15 21:38:56 +03:00
extern int unaligned_dump_stack ;
2006-02-28 20:42:23 +03:00
# endif
2006-06-27 13:54:53 +04:00
# ifdef CONFIG_RT_MUTEXES
extern int max_lock_depth ;
# endif
2006-10-20 10:28:34 +04:00
# ifdef CONFIG_PROC_SYSCTL
2007-10-18 14:05:22 +04:00
static int proc_do_cad_pid ( struct ctl_table * table , int write , struct file * filp ,
2006-10-02 13:19:00 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos ) ;
2008-10-16 09:01:41 +04:00
static int proc_taint ( struct ctl_table * table , int write , struct file * filp ,
2007-02-10 12:45:24 +03:00
void __user * buffer , size_t * lenp , loff_t * ppos ) ;
2006-10-20 10:28:34 +04:00
# endif
2006-10-02 13:19:00 +04:00
2007-10-18 14:05:22 +04:00
static struct ctl_table root_table [ ] ;
2007-11-30 15:54:00 +03:00
static struct ctl_table_root sysctl_table_root ;
static struct ctl_table_header root_table_header = {
2008-09-04 20:05:57 +04:00
. count = 1 ,
2007-11-30 15:54:00 +03:00
. ctl_table = root_table ,
2008-07-15 05:22:20 +04:00
. ctl_entry = LIST_HEAD_INIT ( sysctl_table_root . default_set . list ) ,
2007-11-30 15:54:00 +03:00
. root = & sysctl_table_root ,
2008-07-15 05:22:20 +04:00
. set = & sysctl_table_root . default_set ,
2007-11-30 15:54:00 +03:00
} ;
static struct ctl_table_root sysctl_table_root = {
. root_list = LIST_HEAD_INIT ( sysctl_table_root . root_list ) ,
2008-07-15 05:22:20 +04:00
. default_set . list = LIST_HEAD_INIT ( root_table_header . ctl_entry ) ,
2007-11-30 15:54:00 +03:00
} ;
2005-04-17 02:20:36 +04:00
2007-10-18 14:05:22 +04:00
static struct ctl_table kern_table [ ] ;
static struct ctl_table vm_table [ ] ;
static struct ctl_table fs_table [ ] ;
static struct ctl_table debug_table [ ] ;
static struct ctl_table dev_table [ ] ;
extern struct ctl_table random_table [ ] ;
2006-06-02 00:10:59 +04:00
# ifdef CONFIG_INOTIFY_USER
2007-10-18 14:05:22 +04:00
extern struct ctl_table inotify_table [ ] ;
2005-07-13 20:38:18 +04:00
# endif
epoll: introduce resource usage limits
It has been thought that the per-user file descriptors limit would also
limit the resources that a normal user can request via the epoll
interface. Vegard Nossum reported a very simple program (a modified
version attached) that can make a normal user to request a pretty large
amount of kernel memory, well within the its maximum number of fds. To
solve such problem, default limits are now imposed, and /proc based
configuration has been introduced. A new directory has been created,
named /proc/sys/fs/epoll/ and inside there, there are two configuration
points:
max_user_instances = Maximum number of devices - per user
max_user_watches = Maximum number of "watched" fds - per user
The current default for "max_user_watches" limits the memory used by epoll
to store "watches", to 1/32 of the amount of the low RAM. As example, a
256MB 32bit machine, will have "max_user_watches" set to roughly 90000.
That should be enough to not break existing heavy epoll users. The
default value for "max_user_instances" is set to 128, that should be
enough too.
This also changes the userspace, because a new error code can now come out
from EPOLL_CTL_ADD (-ENOSPC). The EMFILE from epoll_create() was already
listed, so that should be ok.
[akpm@linux-foundation.org: use get_current_user()]
Signed-off-by: Davide Libenzi <davidel@xmailserver.org>
Cc: Michael Kerrisk <mtk.manpages@gmail.com>
Cc: <stable@kernel.org>
Cc: Cyrill Gorcunov <gorcunov@gmail.com>
Reported-by: Vegard Nossum <vegardno@ifi.uio.no>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2008-12-02 00:13:55 +03:00
# ifdef CONFIG_EPOLL
extern struct ctl_table epoll_table [ ] ;
# endif
2005-04-17 02:20:36 +04:00
# ifdef HAVE_ARCH_PICK_MMAP_LAYOUT
int sysctl_legacy_va_layout ;
# endif
2007-07-19 12:48:56 +04:00
extern int prove_locking ;
extern int lock_stat ;
2006-12-08 13:39:56 +03:00
2005-04-17 02:20:36 +04:00
/* The default sysctl tables: */
2007-10-18 14:05:22 +04:00
static struct ctl_table root_table [ ] = {
2005-04-17 02:20:36 +04:00
{
. ctl_name = CTL_KERN ,
. procname = " kernel " ,
. mode = 0555 ,
. child = kern_table ,
} ,
{
. ctl_name = CTL_VM ,
. procname = " vm " ,
. mode = 0555 ,
. child = vm_table ,
} ,
{
. ctl_name = CTL_FS ,
. procname = " fs " ,
. mode = 0555 ,
. child = fs_table ,
} ,
{
. ctl_name = CTL_DEBUG ,
. procname = " debug " ,
. mode = 0555 ,
. child = debug_table ,
} ,
{
. ctl_name = CTL_DEV ,
. procname = " dev " ,
. mode = 0555 ,
. child = dev_table ,
} ,
2007-07-16 10:41:21 +04:00
/*
* NOTE : do not add new entries to this table unless you have read
* Documentation / sysctl / ctl_unnumbered . txt
*/
2005-04-17 02:20:36 +04:00
{ . ctl_name = 0 }
} ;
2007-07-09 20:52:00 +04:00
# ifdef CONFIG_SCHED_DEBUG
2007-12-18 17:21:13 +03:00
static int min_sched_granularity_ns = 100000 ; /* 100 usecs */
static int max_sched_granularity_ns = NSEC_PER_SEC ; /* 1 second */
static int min_wakeup_granularity_ns ; /* 0 usecs */
static int max_wakeup_granularity_ns = NSEC_PER_SEC ; /* 1 second */
2007-07-09 20:52:00 +04:00
# endif
2007-10-18 14:05:22 +04:00
static struct ctl_table kern_table [ ] = {
2007-07-09 20:52:00 +04:00
# ifdef CONFIG_SCHED_DEBUG
{
. ctl_name = CTL_UNNUMBERED ,
2007-11-10 00:39:37 +03:00
. procname = " sched_min_granularity_ns " ,
. data = & sysctl_sched_min_granularity ,
2007-07-09 20:52:00 +04:00
. maxlen = sizeof ( unsigned int ) ,
. mode = 0644 ,
2007-11-10 00:39:37 +03:00
. proc_handler = & sched_nr_latency_handler ,
. strategy = & sysctl_intvec ,
. extra1 = & min_sched_granularity_ns ,
. extra2 = & max_sched_granularity_ns ,
2007-07-09 20:52:00 +04:00
} ,
2007-08-25 20:41:53 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " sched_latency_ns " ,
. data = & sysctl_sched_latency ,
. maxlen = sizeof ( unsigned int ) ,
. mode = 0644 ,
2007-11-10 00:39:37 +03:00
. proc_handler = & sched_nr_latency_handler ,
2007-08-25 20:41:53 +04:00
. strategy = & sysctl_intvec ,
. extra1 = & min_sched_granularity_ns ,
. extra2 = & max_sched_granularity_ns ,
} ,
2007-07-09 20:52:00 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " sched_wakeup_granularity_ns " ,
. data = & sysctl_sched_wakeup_granularity ,
. maxlen = sizeof ( unsigned int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec_minmax ,
. strategy = & sysctl_intvec ,
. extra1 = & min_wakeup_granularity_ns ,
. extra2 = & max_wakeup_granularity_ns ,
} ,
2008-06-27 15:41:35 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " sched_shares_ratelimit " ,
. data = & sysctl_sched_shares_ratelimit ,
. maxlen = sizeof ( unsigned int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2008-10-17 21:27:02 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " sched_shares_thresh " ,
. data = & sysctl_sched_shares_thresh ,
. maxlen = sizeof ( unsigned int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec_minmax ,
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
} ,
2007-07-09 20:52:00 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " sched_child_runs_first " ,
. data = & sysctl_sched_child_runs_first ,
. maxlen = sizeof ( unsigned int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2007-08-25 20:41:52 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " sched_features " ,
. data = & sysctl_sched_features ,
. maxlen = sizeof ( unsigned int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2007-10-15 19:00:18 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " sched_migration_cost " ,
. data = & sysctl_sched_migration_cost ,
. maxlen = sizeof ( unsigned int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2007-11-10 00:39:39 +03:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " sched_nr_migrate " ,
. data = & sysctl_sched_nr_migrate ,
. maxlen = sizeof ( unsigned int ) ,
2008-01-25 23:08:29 +03:00
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2007-08-25 20:41:52 +04:00
# endif
2008-02-13 17:45:39 +03:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " sched_rt_period_us " ,
. data = & sysctl_sched_rt_period ,
. maxlen = sizeof ( unsigned int ) ,
. mode = 0644 ,
2008-04-19 21:44:57 +04:00
. proc_handler = & sched_rt_handler ,
2008-02-13 17:45:39 +03:00
} ,
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " sched_rt_runtime_us " ,
. data = & sysctl_sched_rt_runtime ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2008-04-19 21:44:57 +04:00
. proc_handler = & sched_rt_handler ,
2008-02-13 17:45:39 +03:00
} ,
2007-09-20 01:34:46 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " sched_compat_yield " ,
. data = & sysctl_sched_compat_yield ,
. maxlen = sizeof ( unsigned int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2007-07-19 12:48:56 +04:00
# ifdef CONFIG_PROVE_LOCKING
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " prove_locking " ,
. data = & prove_locking ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
# endif
# ifdef CONFIG_LOCK_STAT
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " lock_stat " ,
. data = & lock_stat ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2007-07-09 20:52:00 +04:00
# endif
2005-04-17 02:20:36 +04:00
{
. ctl_name = KERN_PANIC ,
. procname = " panic " ,
. data = & panic_timeout ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
{
. ctl_name = KERN_CORE_USES_PID ,
. procname = " core_uses_pid " ,
. data = & core_uses_pid ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
{
. ctl_name = KERN_CORE_PATTERN ,
. procname = " core_pattern " ,
. data = core_pattern ,
2007-05-17 09:11:16 +04:00
. maxlen = CORENAME_MAX_SIZE ,
2005-04-17 02:20:36 +04:00
. mode = 0644 ,
. proc_handler = & proc_dostring ,
. strategy = & sysctl_string ,
} ,
2007-02-10 12:45:24 +03:00
# ifdef CONFIG_PROC_SYSCTL
2005-04-17 02:20:36 +04:00
{
. procname = " tainted " ,
2008-10-16 09:01:41 +04:00
. maxlen = sizeof ( long ) ,
2007-02-10 12:45:24 +03:00
. mode = 0644 ,
2008-10-16 09:01:41 +04:00
. proc_handler = & proc_taint ,
2005-04-17 02:20:36 +04:00
} ,
2007-02-10 12:45:24 +03:00
# endif
2008-01-25 23:08:34 +03:00
# ifdef CONFIG_LATENCYTOP
{
. procname = " latencytop " ,
. data = & latencytop_enabled ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
# endif
2005-04-17 02:20:36 +04:00
# ifdef CONFIG_BLK_DEV_INITRD
{
. ctl_name = KERN_REALROOTDEV ,
. procname = " real-root-dev " ,
. data = & real_root_dev ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
# endif
2007-07-16 10:40:10 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " print-fatal-signals " ,
. data = & print_fatal_signals ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2008-09-12 10:29:54 +04:00
# ifdef CONFIG_SPARC
2005-04-17 02:20:36 +04:00
{
. ctl_name = KERN_SPARC_REBOOT ,
. procname = " reboot-cmd " ,
. data = reboot_command ,
. maxlen = 256 ,
. mode = 0644 ,
. proc_handler = & proc_dostring ,
. strategy = & sysctl_string ,
} ,
{
. ctl_name = KERN_SPARC_STOP_A ,
. procname = " stop-a " ,
. data = & stop_a_enabled ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
{
. ctl_name = KERN_SPARC_SCONS_PWROFF ,
. procname = " scons-poweroff " ,
. data = & scons_pwroff ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
# endif
2008-11-17 10:49:24 +03:00
# ifdef CONFIG_SPARC64
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " tsb-ratio " ,
. data = & sysctl_tsb_ratio ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
# endif
2005-04-17 02:20:36 +04:00
# ifdef __hppa__
{
. ctl_name = KERN_HPPA_PWRSW ,
. procname = " soft-power " ,
. data = & pwrsw_enabled ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
{
. ctl_name = KERN_HPPA_UNALIGNED ,
. procname = " unaligned-trap " ,
. data = & unaligned_enabled ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
# endif
{
. ctl_name = KERN_CTLALTDEL ,
. procname = " ctrl-alt-del " ,
. data = & C_A_D ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2008-10-07 03:06:12 +04:00
# ifdef CONFIG_FUNCTION_TRACER
2008-05-12 23:20:43 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " ftrace_enabled " ,
. data = & ftrace_enabled ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & ftrace_enable_sysctl ,
} ,
# endif
2008-12-17 07:06:40 +03:00
# ifdef CONFIG_STACK_TRACER
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " stack_tracer_enabled " ,
. data = & stack_tracer_enabled ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & stack_trace_sysctl ,
} ,
# endif
2008-10-24 03:26:08 +04:00
# ifdef CONFIG_TRACING
{
. ctl_name = CTL_UNNUMBERED ,
2008-11-04 13:58:21 +03:00
. procname = " ftrace_dump_on_oops " ,
2008-10-24 03:26:08 +04:00
. data = & ftrace_dump_on_oops ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
# endif
2008-07-08 21:00:17 +04:00
# ifdef CONFIG_MODULES
2005-04-17 02:20:36 +04:00
{
. ctl_name = KERN_MODPROBE ,
. procname = " modprobe " ,
. data = & modprobe_path ,
. maxlen = KMOD_PATH_LEN ,
. mode = 0644 ,
. proc_handler = & proc_dostring ,
. strategy = & sysctl_string ,
} ,
# endif
2006-06-23 13:05:47 +04:00
# if defined(CONFIG_HOTPLUG) && defined(CONFIG_NET)
2005-04-17 02:20:36 +04:00
{
. ctl_name = KERN_HOTPLUG ,
. procname = " hotplug " ,
2005-11-16 11:00:00 +03:00
. data = & uevent_helper ,
. maxlen = UEVENT_HELPER_PATH_LEN ,
2005-04-17 02:20:36 +04:00
. mode = 0644 ,
. proc_handler = & proc_dostring ,
. strategy = & sysctl_string ,
} ,
# endif
# ifdef CONFIG_CHR_DEV_SG
{
. ctl_name = KERN_SG_BIG_BUFF ,
. procname = " sg-big-buff " ,
. data = & sg_big_buff ,
. maxlen = sizeof ( int ) ,
. mode = 0444 ,
. proc_handler = & proc_dointvec ,
} ,
# endif
# ifdef CONFIG_BSD_PROCESS_ACCT
{
. ctl_name = KERN_ACCT ,
. procname = " acct " ,
. data = & acct_parm ,
. maxlen = 3 * sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
# endif
# ifdef CONFIG_MAGIC_SYSRQ
{
. ctl_name = KERN_SYSRQ ,
. procname = " sysrq " ,
2006-12-13 11:34:36 +03:00
. data = & __sysrq_enabled ,
2005-04-17 02:20:36 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
# endif
2006-10-20 10:28:34 +04:00
# ifdef CONFIG_PROC_SYSCTL
2005-04-17 02:20:36 +04:00
{
. procname = " cad_pid " ,
2006-10-02 13:19:00 +04:00
. data = NULL ,
2005-04-17 02:20:36 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0600 ,
2006-10-02 13:19:00 +04:00
. proc_handler = & proc_do_cad_pid ,
2005-04-17 02:20:36 +04:00
} ,
2006-10-20 10:28:34 +04:00
# endif
2005-04-17 02:20:36 +04:00
{
. ctl_name = KERN_MAX_THREADS ,
. procname = " threads-max " ,
. data = & max_threads ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
{
. ctl_name = KERN_RANDOM ,
. procname = " random " ,
. mode = 0555 ,
. child = random_table ,
} ,
{
. ctl_name = KERN_OVERFLOWUID ,
. procname = " overflowuid " ,
. data = & overflowuid ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec_minmax ,
. strategy = & sysctl_intvec ,
. extra1 = & minolduid ,
. extra2 = & maxolduid ,
} ,
{
. ctl_name = KERN_OVERFLOWGID ,
. procname = " overflowgid " ,
. data = & overflowgid ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec_minmax ,
. strategy = & sysctl_intvec ,
. extra1 = & minolduid ,
. extra2 = & maxolduid ,
} ,
2006-01-06 11:19:28 +03:00
# ifdef CONFIG_S390
2005-04-17 02:20:36 +04:00
# ifdef CONFIG_MATHEMU
{
. ctl_name = KERN_IEEE_EMULATION_WARNINGS ,
. procname = " ieee_emulation_warnings " ,
. data = & sysctl_ieee_emulation_warnings ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
# endif
{
. ctl_name = KERN_S390_USER_DEBUG_LOGGING ,
. procname = " userprocess_debug " ,
. data = & sysctl_userprocess_debug ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
# endif
{
. ctl_name = KERN_PIDMAX ,
. procname = " pid_max " ,
. data = & pid_max ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec_minmax ,
. strategy = sysctl_intvec ,
. extra1 = & pid_max_min ,
. extra2 = & pid_max_max ,
} ,
{
. ctl_name = KERN_PANIC_ON_OOPS ,
. procname = " panic_on_oops " ,
. data = & panic_on_oops ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2008-02-08 15:21:25 +03:00
# if defined CONFIG_PRINTK
{
. ctl_name = KERN_PRINTK ,
. procname = " printk " ,
. data = & console_loglevel ,
. maxlen = 4 * sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2005-04-17 02:20:36 +04:00
{
. ctl_name = KERN_PRINTK_RATELIMIT ,
. procname = " printk_ratelimit " ,
2008-07-25 12:45:58 +04:00
. data = & printk_ratelimit_state . interval ,
2005-04-17 02:20:36 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec_jiffies ,
. strategy = & sysctl_jiffies ,
} ,
{
. ctl_name = KERN_PRINTK_RATELIMIT_BURST ,
. procname = " printk_ratelimit_burst " ,
2008-07-25 12:45:58 +04:00
. data = & printk_ratelimit_state . burst ,
2005-04-17 02:20:36 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2008-02-08 15:21:25 +03:00
# endif
2005-04-17 02:20:36 +04:00
{
. ctl_name = KERN_NGROUPS_MAX ,
. procname = " ngroups_max " ,
. data = & ngroups_max ,
. maxlen = sizeof ( int ) ,
. mode = 0444 ,
. proc_handler = & proc_dointvec ,
} ,
# if defined(CONFIG_X86_LOCAL_APIC) && defined(CONFIG_X86)
{
. ctl_name = KERN_UNKNOWN_NMI_PANIC ,
. procname = " unknown_nmi_panic " ,
. data = & unknown_nmi_panic ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2006-09-26 12:52:27 +04:00
. proc_handler = & proc_dointvec ,
2005-04-17 02:20:36 +04:00
} ,
2006-09-26 12:52:27 +04:00
{
. procname = " nmi_watchdog " ,
. data = & nmi_watchdog_enabled ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_nmi_enabled ,
2005-04-17 02:20:36 +04:00
} ,
# endif
# if defined(CONFIG_X86)
2006-09-26 12:52:27 +04:00
{
. ctl_name = KERN_PANIC_ON_NMI ,
. procname = " panic_on_unrecovered_nmi " ,
. data = & panic_on_unrecovered_nmi ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2005-04-17 02:20:36 +04:00
{
. ctl_name = KERN_BOOTLOADER_TYPE ,
. procname = " bootloader_type " ,
. data = & bootloader_type ,
. maxlen = sizeof ( int ) ,
. mode = 0444 ,
. proc_handler = & proc_dointvec ,
} ,
2006-12-07 04:14:11 +03:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " kstack_depth_to_print " ,
. data = & kstack_depth_to_print ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2008-01-30 15:30:05 +03:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " io_delay_type " ,
. data = & io_delay_type ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2005-04-17 02:20:36 +04:00
# endif
2006-02-21 05:28:07 +03:00
# if defined(CONFIG_MMU)
2005-04-17 02:20:36 +04:00
{
. ctl_name = KERN_RANDOMIZE ,
. procname = " randomize_va_space " ,
. data = & randomize_va_space ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2006-02-21 05:28:07 +03:00
# endif
2006-01-15 00:21:00 +03:00
# if defined(CONFIG_S390) && defined(CONFIG_SMP)
2005-07-27 22:44:57 +04:00
{
. ctl_name = KERN_SPIN_RETRY ,
. procname = " spin_retry " ,
. data = & spin_retry ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2006-02-21 05:27:58 +03:00
# endif
2007-07-28 11:33:16 +04:00
# if defined(CONFIG_ACPI_SLEEP) && defined(CONFIG_X86)
2006-02-21 05:27:58 +03:00
{
. procname = " acpi_video_flags " ,
2007-07-19 12:47:41 +04:00
. data = & acpi_realmode_flags ,
2006-02-21 05:27:58 +03:00
. maxlen = sizeof ( unsigned long ) ,
. mode = 0644 ,
2006-03-02 13:54:34 +03:00
. proc_handler = & proc_doulongvec_minmax ,
2006-02-21 05:27:58 +03:00
} ,
2006-02-28 20:42:23 +03:00
# endif
# ifdef CONFIG_IA64
{
. ctl_name = KERN_IA64_UNALIGNED ,
. procname = " ignore-unaligned-usertrap " ,
. data = & no_unaligned_warning ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2009-01-15 21:38:56 +03:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " unaligned-dump-stack " ,
. data = & unaligned_dump_stack ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2006-06-26 15:56:52 +04:00
# endif
2007-10-17 10:26:09 +04:00
# ifdef CONFIG_DETECT_SOFTLOCKUP
2008-05-12 23:21:04 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " softlockup_panic " ,
. data = & softlockup_panic ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2008-07-08 05:37:04 +04:00
. proc_handler = & proc_dointvec_minmax ,
2008-05-12 23:21:04 +04:00
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
. extra2 = & one ,
} ,
2007-10-17 10:26:09 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " softlockup_thresh " ,
. data = & softlockup_thresh ,
2008-05-12 23:21:14 +04:00
. maxlen = sizeof ( int ) ,
2007-10-17 10:26:09 +04:00
. mode = 0644 ,
2009-01-13 08:15:17 +03:00
. proc_handler = & proc_dosoftlockup_thresh ,
2007-10-17 10:26:09 +04:00
. strategy = & sysctl_intvec ,
2008-05-12 23:21:14 +04:00
. extra1 = & neg_one ,
2007-10-17 10:26:09 +04:00
. extra2 = & sixty ,
} ,
2009-01-15 22:08:40 +03:00
# endif
# ifdef CONFIG_DETECT_HUNG_TASK
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " hung_task_panic " ,
. data = & sysctl_hung_task_panic ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec_minmax ,
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
. extra2 = & one ,
} ,
2008-01-25 23:08:02 +03:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " hung_task_check_count " ,
. data = & sysctl_hung_task_check_count ,
2008-01-25 23:08:34 +03:00
. maxlen = sizeof ( unsigned long ) ,
2008-01-25 23:08:02 +03:00
. mode = 0644 ,
2008-01-25 23:08:34 +03:00
. proc_handler = & proc_doulongvec_minmax ,
2008-01-25 23:08:02 +03:00
. strategy = & sysctl_intvec ,
} ,
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " hung_task_timeout_secs " ,
. data = & sysctl_hung_task_timeout_secs ,
2008-01-25 23:08:34 +03:00
. maxlen = sizeof ( unsigned long ) ,
2008-01-25 23:08:02 +03:00
. mode = 0644 ,
2009-01-15 22:08:40 +03:00
. proc_handler = & proc_dohung_task_timeout_secs ,
2008-01-25 23:08:02 +03:00
. strategy = & sysctl_intvec ,
} ,
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " hung_task_warnings " ,
. data = & sysctl_hung_task_warnings ,
2008-01-25 23:08:34 +03:00
. maxlen = sizeof ( unsigned long ) ,
2008-01-25 23:08:02 +03:00
. mode = 0644 ,
2008-01-25 23:08:34 +03:00
. proc_handler = & proc_doulongvec_minmax ,
2008-01-25 23:08:02 +03:00
. strategy = & sysctl_intvec ,
} ,
2007-10-17 10:26:09 +04:00
# endif
2006-06-26 15:56:52 +04:00
# ifdef CONFIG_COMPAT
{
. ctl_name = KERN_COMPAT_LOG ,
. procname = " compat-log " ,
. data = & compat_log ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2005-07-27 22:44:57 +04:00
# endif
2006-06-27 13:54:53 +04:00
# ifdef CONFIG_RT_MUTEXES
{
. ctl_name = KERN_MAX_LOCK_DEPTH ,
. procname = " max_lock_depth " ,
. data = & max_lock_depth ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2007-05-08 11:26:04 +04:00
# endif
2007-07-18 05:37:02 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " poweroff_cmd " ,
. data = & poweroff_cmd ,
. maxlen = POWEROFF_CMD_PATH_LEN ,
. mode = 0644 ,
. proc_handler = & proc_dostring ,
. strategy = & sysctl_string ,
} ,
2008-04-29 12:01:32 +04:00
# ifdef CONFIG_KEYS
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " keys " ,
. mode = 0555 ,
. child = key_sysctls ,
} ,
# endif
2008-06-18 20:26:49 +04:00
# ifdef CONFIG_RCU_TORTURE_TEST
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " rcutorture_runnable " ,
. data = & rcutorture_runnable ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
# endif
2008-10-19 07:26:53 +04:00
# ifdef CONFIG_UNEVICTABLE_LRU
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " scan_unevictable_pages " ,
. data = & scan_unevictable_pages ,
. maxlen = sizeof ( scan_unevictable_pages ) ,
. mode = 0644 ,
. proc_handler = & scan_unevictable_handler ,
} ,
# endif
2009-04-03 19:42:35 +04:00
# ifdef CONFIG_SLOW_WORK
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " slow-work " ,
. mode = 0555 ,
. child = slow_work_sysctls ,
} ,
# endif
2007-07-19 12:50:35 +04:00
/*
* NOTE : do not add new entries to this table unless you have read
* Documentation / sysctl / ctl_unnumbered . txt
*/
2005-04-17 02:20:36 +04:00
{ . ctl_name = 0 }
} ;
2007-10-18 14:05:22 +04:00
static struct ctl_table vm_table [ ] = {
2005-04-17 02:20:36 +04:00
{
. ctl_name = VM_OVERCOMMIT_MEMORY ,
. procname = " overcommit_memory " ,
. data = & sysctl_overcommit_memory ,
. maxlen = sizeof ( sysctl_overcommit_memory ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2006-06-23 13:03:13 +04:00
{
. ctl_name = VM_PANIC_ON_OOM ,
. procname = " panic_on_oom " ,
. data = & sysctl_panic_on_oom ,
. maxlen = sizeof ( sysctl_panic_on_oom ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2007-10-17 10:25:56 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " oom_kill_allocating_task " ,
. data = & sysctl_oom_kill_allocating_task ,
. maxlen = sizeof ( sysctl_oom_kill_allocating_task ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
oom: add sysctl to enable task memory dump
Adds a new sysctl, 'oom_dump_tasks', that enables the kernel to produce a
dump of all system tasks (excluding kernel threads) when performing an
OOM-killing. Information includes pid, uid, tgid, vm size, rss, cpu,
oom_adj score, and name.
This is helpful for determining why there was an OOM condition and which
rogue task caused it.
It is configurable so that large systems, such as those with several
thousand tasks, do not incur a performance penalty associated with dumping
data they may not desire.
If an OOM was triggered as a result of a memory controller, the tasklist
shall be filtered to exclude tasks that are not a member of the same
cgroup.
Cc: Andrea Arcangeli <andrea@suse.de>
Cc: Christoph Lameter <clameter@sgi.com>
Cc: Balbir Singh <balbir@linux.vnet.ibm.com>
Signed-off-by: David Rientjes <rientjes@google.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2008-02-07 11:14:07 +03:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " oom_dump_tasks " ,
. data = & sysctl_oom_dump_tasks ,
. maxlen = sizeof ( sysctl_oom_dump_tasks ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2005-04-17 02:20:36 +04:00
{
. ctl_name = VM_OVERCOMMIT_RATIO ,
. procname = " overcommit_ratio " ,
. data = & sysctl_overcommit_ratio ,
. maxlen = sizeof ( sysctl_overcommit_ratio ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
{
. ctl_name = VM_PAGE_CLUSTER ,
. procname = " page-cluster " ,
. data = & page_cluster ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
{
. ctl_name = VM_DIRTY_BACKGROUND ,
. procname = " dirty_background_ratio " ,
. data = & dirty_background_ratio ,
. maxlen = sizeof ( dirty_background_ratio ) ,
. mode = 0644 ,
mm: add dirty_background_bytes and dirty_bytes sysctls
This change introduces two new sysctls to /proc/sys/vm:
dirty_background_bytes and dirty_bytes.
dirty_background_bytes is the counterpart to dirty_background_ratio and
dirty_bytes is the counterpart to dirty_ratio.
With growing memory capacities of individual machines, it's no longer
sufficient to specify dirty thresholds as a percentage of the amount of
dirtyable memory over the entire system.
dirty_background_bytes and dirty_bytes specify quantities of memory, in
bytes, that represent the dirty limits for the entire system. If either
of these values is set, its value represents the amount of dirty memory
that is needed to commence either background or direct writeback.
When a `bytes' or `ratio' file is written, its counterpart becomes a
function of the written value. For example, if dirty_bytes is written to
be 8096, 8K of memory is required to commence direct writeback.
dirty_ratio is then functionally equivalent to 8K / the amount of
dirtyable memory:
dirtyable_memory = free pages + mapped pages + file cache
dirty_background_bytes = dirty_background_ratio * dirtyable_memory
-or-
dirty_background_ratio = dirty_background_bytes / dirtyable_memory
AND
dirty_bytes = dirty_ratio * dirtyable_memory
-or-
dirty_ratio = dirty_bytes / dirtyable_memory
Only one of dirty_background_bytes and dirty_background_ratio may be
specified at a time, and only one of dirty_bytes and dirty_ratio may be
specified. When one sysctl is written, the other appears as 0 when read.
The `bytes' files operate on a page size granularity since dirty limits
are compared with ZVC values, which are in page units.
Prior to this change, the minimum dirty_ratio was 5 as implemented by
get_dirty_limits() although /proc/sys/vm/dirty_ratio would show any user
written value between 0 and 100. This restriction is maintained, but
dirty_bytes has a lower limit of only one page.
Also prior to this change, the dirty_background_ratio could not equal or
exceed dirty_ratio. This restriction is maintained in addition to
restricting dirty_background_bytes. If either background threshold equals
or exceeds that of the dirty threshold, it is implicitly set to half the
dirty threshold.
Acked-by: Peter Zijlstra <peterz@infradead.org>
Cc: Dave Chinner <david@fromorbit.com>
Cc: Christoph Lameter <cl@linux-foundation.org>
Signed-off-by: David Rientjes <rientjes@google.com>
Cc: Andrea Righi <righi.andrea@gmail.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2009-01-07 01:39:31 +03:00
. proc_handler = & dirty_background_ratio_handler ,
2005-04-17 02:20:36 +04:00
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
. extra2 = & one_hundred ,
} ,
mm: add dirty_background_bytes and dirty_bytes sysctls
This change introduces two new sysctls to /proc/sys/vm:
dirty_background_bytes and dirty_bytes.
dirty_background_bytes is the counterpart to dirty_background_ratio and
dirty_bytes is the counterpart to dirty_ratio.
With growing memory capacities of individual machines, it's no longer
sufficient to specify dirty thresholds as a percentage of the amount of
dirtyable memory over the entire system.
dirty_background_bytes and dirty_bytes specify quantities of memory, in
bytes, that represent the dirty limits for the entire system. If either
of these values is set, its value represents the amount of dirty memory
that is needed to commence either background or direct writeback.
When a `bytes' or `ratio' file is written, its counterpart becomes a
function of the written value. For example, if dirty_bytes is written to
be 8096, 8K of memory is required to commence direct writeback.
dirty_ratio is then functionally equivalent to 8K / the amount of
dirtyable memory:
dirtyable_memory = free pages + mapped pages + file cache
dirty_background_bytes = dirty_background_ratio * dirtyable_memory
-or-
dirty_background_ratio = dirty_background_bytes / dirtyable_memory
AND
dirty_bytes = dirty_ratio * dirtyable_memory
-or-
dirty_ratio = dirty_bytes / dirtyable_memory
Only one of dirty_background_bytes and dirty_background_ratio may be
specified at a time, and only one of dirty_bytes and dirty_ratio may be
specified. When one sysctl is written, the other appears as 0 when read.
The `bytes' files operate on a page size granularity since dirty limits
are compared with ZVC values, which are in page units.
Prior to this change, the minimum dirty_ratio was 5 as implemented by
get_dirty_limits() although /proc/sys/vm/dirty_ratio would show any user
written value between 0 and 100. This restriction is maintained, but
dirty_bytes has a lower limit of only one page.
Also prior to this change, the dirty_background_ratio could not equal or
exceed dirty_ratio. This restriction is maintained in addition to
restricting dirty_background_bytes. If either background threshold equals
or exceeds that of the dirty threshold, it is implicitly set to half the
dirty threshold.
Acked-by: Peter Zijlstra <peterz@infradead.org>
Cc: Dave Chinner <david@fromorbit.com>
Cc: Christoph Lameter <cl@linux-foundation.org>
Signed-off-by: David Rientjes <rientjes@google.com>
Cc: Andrea Righi <righi.andrea@gmail.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2009-01-07 01:39:31 +03:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " dirty_background_bytes " ,
. data = & dirty_background_bytes ,
. maxlen = sizeof ( dirty_background_bytes ) ,
. mode = 0644 ,
. proc_handler = & dirty_background_bytes_handler ,
. strategy = & sysctl_intvec ,
2009-02-12 00:04:23 +03:00
. extra1 = & one_ul ,
mm: add dirty_background_bytes and dirty_bytes sysctls
This change introduces two new sysctls to /proc/sys/vm:
dirty_background_bytes and dirty_bytes.
dirty_background_bytes is the counterpart to dirty_background_ratio and
dirty_bytes is the counterpart to dirty_ratio.
With growing memory capacities of individual machines, it's no longer
sufficient to specify dirty thresholds as a percentage of the amount of
dirtyable memory over the entire system.
dirty_background_bytes and dirty_bytes specify quantities of memory, in
bytes, that represent the dirty limits for the entire system. If either
of these values is set, its value represents the amount of dirty memory
that is needed to commence either background or direct writeback.
When a `bytes' or `ratio' file is written, its counterpart becomes a
function of the written value. For example, if dirty_bytes is written to
be 8096, 8K of memory is required to commence direct writeback.
dirty_ratio is then functionally equivalent to 8K / the amount of
dirtyable memory:
dirtyable_memory = free pages + mapped pages + file cache
dirty_background_bytes = dirty_background_ratio * dirtyable_memory
-or-
dirty_background_ratio = dirty_background_bytes / dirtyable_memory
AND
dirty_bytes = dirty_ratio * dirtyable_memory
-or-
dirty_ratio = dirty_bytes / dirtyable_memory
Only one of dirty_background_bytes and dirty_background_ratio may be
specified at a time, and only one of dirty_bytes and dirty_ratio may be
specified. When one sysctl is written, the other appears as 0 when read.
The `bytes' files operate on a page size granularity since dirty limits
are compared with ZVC values, which are in page units.
Prior to this change, the minimum dirty_ratio was 5 as implemented by
get_dirty_limits() although /proc/sys/vm/dirty_ratio would show any user
written value between 0 and 100. This restriction is maintained, but
dirty_bytes has a lower limit of only one page.
Also prior to this change, the dirty_background_ratio could not equal or
exceed dirty_ratio. This restriction is maintained in addition to
restricting dirty_background_bytes. If either background threshold equals
or exceeds that of the dirty threshold, it is implicitly set to half the
dirty threshold.
Acked-by: Peter Zijlstra <peterz@infradead.org>
Cc: Dave Chinner <david@fromorbit.com>
Cc: Christoph Lameter <cl@linux-foundation.org>
Signed-off-by: David Rientjes <rientjes@google.com>
Cc: Andrea Righi <righi.andrea@gmail.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2009-01-07 01:39:31 +03:00
} ,
2005-04-17 02:20:36 +04:00
{
. ctl_name = VM_DIRTY_RATIO ,
. procname = " dirty_ratio " ,
. data = & vm_dirty_ratio ,
. maxlen = sizeof ( vm_dirty_ratio ) ,
. mode = 0644 ,
2007-10-17 10:25:50 +04:00
. proc_handler = & dirty_ratio_handler ,
2005-04-17 02:20:36 +04:00
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
. extra2 = & one_hundred ,
} ,
mm: add dirty_background_bytes and dirty_bytes sysctls
This change introduces two new sysctls to /proc/sys/vm:
dirty_background_bytes and dirty_bytes.
dirty_background_bytes is the counterpart to dirty_background_ratio and
dirty_bytes is the counterpart to dirty_ratio.
With growing memory capacities of individual machines, it's no longer
sufficient to specify dirty thresholds as a percentage of the amount of
dirtyable memory over the entire system.
dirty_background_bytes and dirty_bytes specify quantities of memory, in
bytes, that represent the dirty limits for the entire system. If either
of these values is set, its value represents the amount of dirty memory
that is needed to commence either background or direct writeback.
When a `bytes' or `ratio' file is written, its counterpart becomes a
function of the written value. For example, if dirty_bytes is written to
be 8096, 8K of memory is required to commence direct writeback.
dirty_ratio is then functionally equivalent to 8K / the amount of
dirtyable memory:
dirtyable_memory = free pages + mapped pages + file cache
dirty_background_bytes = dirty_background_ratio * dirtyable_memory
-or-
dirty_background_ratio = dirty_background_bytes / dirtyable_memory
AND
dirty_bytes = dirty_ratio * dirtyable_memory
-or-
dirty_ratio = dirty_bytes / dirtyable_memory
Only one of dirty_background_bytes and dirty_background_ratio may be
specified at a time, and only one of dirty_bytes and dirty_ratio may be
specified. When one sysctl is written, the other appears as 0 when read.
The `bytes' files operate on a page size granularity since dirty limits
are compared with ZVC values, which are in page units.
Prior to this change, the minimum dirty_ratio was 5 as implemented by
get_dirty_limits() although /proc/sys/vm/dirty_ratio would show any user
written value between 0 and 100. This restriction is maintained, but
dirty_bytes has a lower limit of only one page.
Also prior to this change, the dirty_background_ratio could not equal or
exceed dirty_ratio. This restriction is maintained in addition to
restricting dirty_background_bytes. If either background threshold equals
or exceeds that of the dirty threshold, it is implicitly set to half the
dirty threshold.
Acked-by: Peter Zijlstra <peterz@infradead.org>
Cc: Dave Chinner <david@fromorbit.com>
Cc: Christoph Lameter <cl@linux-foundation.org>
Signed-off-by: David Rientjes <rientjes@google.com>
Cc: Andrea Righi <righi.andrea@gmail.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2009-01-07 01:39:31 +03:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " dirty_bytes " ,
. data = & vm_dirty_bytes ,
. maxlen = sizeof ( vm_dirty_bytes ) ,
. mode = 0644 ,
. proc_handler = & dirty_bytes_handler ,
. strategy = & sysctl_intvec ,
2009-02-12 00:04:23 +03:00
. extra1 = & one_ul ,
mm: add dirty_background_bytes and dirty_bytes sysctls
This change introduces two new sysctls to /proc/sys/vm:
dirty_background_bytes and dirty_bytes.
dirty_background_bytes is the counterpart to dirty_background_ratio and
dirty_bytes is the counterpart to dirty_ratio.
With growing memory capacities of individual machines, it's no longer
sufficient to specify dirty thresholds as a percentage of the amount of
dirtyable memory over the entire system.
dirty_background_bytes and dirty_bytes specify quantities of memory, in
bytes, that represent the dirty limits for the entire system. If either
of these values is set, its value represents the amount of dirty memory
that is needed to commence either background or direct writeback.
When a `bytes' or `ratio' file is written, its counterpart becomes a
function of the written value. For example, if dirty_bytes is written to
be 8096, 8K of memory is required to commence direct writeback.
dirty_ratio is then functionally equivalent to 8K / the amount of
dirtyable memory:
dirtyable_memory = free pages + mapped pages + file cache
dirty_background_bytes = dirty_background_ratio * dirtyable_memory
-or-
dirty_background_ratio = dirty_background_bytes / dirtyable_memory
AND
dirty_bytes = dirty_ratio * dirtyable_memory
-or-
dirty_ratio = dirty_bytes / dirtyable_memory
Only one of dirty_background_bytes and dirty_background_ratio may be
specified at a time, and only one of dirty_bytes and dirty_ratio may be
specified. When one sysctl is written, the other appears as 0 when read.
The `bytes' files operate on a page size granularity since dirty limits
are compared with ZVC values, which are in page units.
Prior to this change, the minimum dirty_ratio was 5 as implemented by
get_dirty_limits() although /proc/sys/vm/dirty_ratio would show any user
written value between 0 and 100. This restriction is maintained, but
dirty_bytes has a lower limit of only one page.
Also prior to this change, the dirty_background_ratio could not equal or
exceed dirty_ratio. This restriction is maintained in addition to
restricting dirty_background_bytes. If either background threshold equals
or exceeds that of the dirty threshold, it is implicitly set to half the
dirty threshold.
Acked-by: Peter Zijlstra <peterz@infradead.org>
Cc: Dave Chinner <david@fromorbit.com>
Cc: Christoph Lameter <cl@linux-foundation.org>
Signed-off-by: David Rientjes <rientjes@google.com>
Cc: Andrea Righi <righi.andrea@gmail.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2009-01-07 01:39:31 +03:00
} ,
2005-04-17 02:20:36 +04:00
{
. procname = " dirty_writeback_centisecs " ,
2006-03-24 14:15:48 +03:00
. data = & dirty_writeback_interval ,
. maxlen = sizeof ( dirty_writeback_interval ) ,
2005-04-17 02:20:36 +04:00
. mode = 0644 ,
. proc_handler = & dirty_writeback_centisecs_handler ,
} ,
{
. procname = " dirty_expire_centisecs " ,
2006-03-24 14:15:48 +03:00
. data = & dirty_expire_interval ,
. maxlen = sizeof ( dirty_expire_interval ) ,
2005-04-17 02:20:36 +04:00
. mode = 0644 ,
2009-04-01 02:23:18 +04:00
. proc_handler = & proc_dointvec ,
2005-04-17 02:20:36 +04:00
} ,
{
. ctl_name = VM_NR_PDFLUSH_THREADS ,
. procname = " nr_pdflush_threads " ,
. data = & nr_pdflush_threads ,
. maxlen = sizeof nr_pdflush_threads ,
. mode = 0444 /* read-only*/ ,
. proc_handler = & proc_dointvec ,
} ,
2009-04-07 06:00:29 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " nr_pdflush_threads_min " ,
. data = & nr_pdflush_threads_min ,
. maxlen = sizeof nr_pdflush_threads_min ,
. mode = 0644 /* read-write */ ,
. proc_handler = & proc_dointvec_minmax ,
. strategy = & sysctl_intvec ,
. extra1 = & one ,
. extra2 = & nr_pdflush_threads_max ,
} ,
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " nr_pdflush_threads_max " ,
. data = & nr_pdflush_threads_max ,
. maxlen = sizeof nr_pdflush_threads_max ,
. mode = 0644 /* read-write */ ,
. proc_handler = & proc_dointvec_minmax ,
. strategy = & sysctl_intvec ,
. extra1 = & nr_pdflush_threads_min ,
. extra2 = & one_thousand ,
} ,
2005-04-17 02:20:36 +04:00
{
. ctl_name = VM_SWAPPINESS ,
. procname = " swappiness " ,
. data = & vm_swappiness ,
. maxlen = sizeof ( vm_swappiness ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec_minmax ,
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
. extra2 = & one_hundred ,
} ,
# ifdef CONFIG_HUGETLB_PAGE
{
. procname = " nr_hugepages " ,
2008-07-24 08:27:42 +04:00
. data = NULL ,
2005-04-17 02:20:36 +04:00
. maxlen = sizeof ( unsigned long ) ,
. mode = 0644 ,
. proc_handler = & hugetlb_sysctl_handler ,
. extra1 = ( void * ) & hugetlb_zero ,
. extra2 = ( void * ) & hugetlb_infinity ,
} ,
{
. ctl_name = VM_HUGETLB_GROUP ,
. procname = " hugetlb_shm_group " ,
. data = & sysctl_hugetlb_shm_group ,
. maxlen = sizeof ( gid_t ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2007-07-17 15:03:13 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " hugepages_treat_as_movable " ,
. data = & hugepages_treat_as_movable ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & hugetlb_treat_movable_handler ,
} ,
hugetlb: introduce nr_overcommit_hugepages sysctl
hugetlb: introduce nr_overcommit_hugepages sysctl
While examining the code to support /proc/sys/vm/hugetlb_dynamic_pool, I
became convinced that having a boolean sysctl was insufficient:
1) To support per-node control of hugepages, I have previously submitted
patches to add a sysfs attribute related to nr_hugepages. However, with
a boolean global value and per-mount quota enforcement constraining the
dynamic pool, adding corresponding control of the dynamic pool on a
per-node basis seems inconsistent to me.
2) Administration of the hugetlb dynamic pool with multiple hugetlbfs
mount points is, arguably, more arduous than it needs to be. Each quota
would need to be set separately, and the sum would need to be monitored.
To ease the administration, and to help make the way for per-node
control of the static & dynamic hugepage pool, I added a separate
sysctl, nr_overcommit_hugepages. This value serves as a high watermark
for the overall hugepage pool, while nr_hugepages serves as a low
watermark. The boolean sysctl can then be removed, as the condition
nr_overcommit_hugepages > 0
indicates the same administrative setting as
hugetlb_dynamic_pool == 1
Quotas still serve as local enforcement of the size of the pool on a
per-mount basis.
A few caveats:
1) There is a race whereby the global surplus huge page counter is
incremented before a hugepage has allocated. Another process could then
try grow the pool, and fail to convert a surplus huge page to a normal
huge page and instead allocate a fresh huge page. I believe this is
benign, as no memory is leaked (the actual pages are still tracked
correctly) and the counters won't go out of sync.
2) Shrinking the static pool while a surplus is in effect will allow the
number of surplus huge pages to exceed the overcommit value. As long as
this condition holds, however, no more surplus huge pages will be
allowed on the system until one of the two sysctls are increased
sufficiently, or the surplus huge pages go out of use and are freed.
Successfully tested on x86_64 with the current libhugetlbfs snapshot,
modified to use the new sysctl.
Signed-off-by: Nishanth Aravamudan <nacc@us.ibm.com>
Acked-by: Adam Litke <agl@us.ibm.com>
Cc: William Lee Irwin III <wli@holomorphy.com>
Cc: Dave Hansen <haveblue@us.ibm.com>
Cc: David Gibson <david@gibson.dropbear.id.au>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-12-18 03:20:12 +03:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " nr_overcommit_hugepages " ,
2008-07-24 08:27:42 +04:00
. data = NULL ,
. maxlen = sizeof ( unsigned long ) ,
hugetlb: introduce nr_overcommit_hugepages sysctl
hugetlb: introduce nr_overcommit_hugepages sysctl
While examining the code to support /proc/sys/vm/hugetlb_dynamic_pool, I
became convinced that having a boolean sysctl was insufficient:
1) To support per-node control of hugepages, I have previously submitted
patches to add a sysfs attribute related to nr_hugepages. However, with
a boolean global value and per-mount quota enforcement constraining the
dynamic pool, adding corresponding control of the dynamic pool on a
per-node basis seems inconsistent to me.
2) Administration of the hugetlb dynamic pool with multiple hugetlbfs
mount points is, arguably, more arduous than it needs to be. Each quota
would need to be set separately, and the sum would need to be monitored.
To ease the administration, and to help make the way for per-node
control of the static & dynamic hugepage pool, I added a separate
sysctl, nr_overcommit_hugepages. This value serves as a high watermark
for the overall hugepage pool, while nr_hugepages serves as a low
watermark. The boolean sysctl can then be removed, as the condition
nr_overcommit_hugepages > 0
indicates the same administrative setting as
hugetlb_dynamic_pool == 1
Quotas still serve as local enforcement of the size of the pool on a
per-mount basis.
A few caveats:
1) There is a race whereby the global surplus huge page counter is
incremented before a hugepage has allocated. Another process could then
try grow the pool, and fail to convert a surplus huge page to a normal
huge page and instead allocate a fresh huge page. I believe this is
benign, as no memory is leaked (the actual pages are still tracked
correctly) and the counters won't go out of sync.
2) Shrinking the static pool while a surplus is in effect will allow the
number of surplus huge pages to exceed the overcommit value. As long as
this condition holds, however, no more surplus huge pages will be
allowed on the system until one of the two sysctls are increased
sufficiently, or the surplus huge pages go out of use and are freed.
Successfully tested on x86_64 with the current libhugetlbfs snapshot,
modified to use the new sysctl.
Signed-off-by: Nishanth Aravamudan <nacc@us.ibm.com>
Acked-by: Adam Litke <agl@us.ibm.com>
Cc: William Lee Irwin III <wli@holomorphy.com>
Cc: Dave Hansen <haveblue@us.ibm.com>
Cc: David Gibson <david@gibson.dropbear.id.au>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-12-18 03:20:12 +03:00
. mode = 0644 ,
2008-02-08 15:18:18 +03:00
. proc_handler = & hugetlb_overcommit_handler ,
2008-07-24 08:27:42 +04:00
. extra1 = ( void * ) & hugetlb_zero ,
. extra2 = ( void * ) & hugetlb_infinity ,
hugetlb: introduce nr_overcommit_hugepages sysctl
hugetlb: introduce nr_overcommit_hugepages sysctl
While examining the code to support /proc/sys/vm/hugetlb_dynamic_pool, I
became convinced that having a boolean sysctl was insufficient:
1) To support per-node control of hugepages, I have previously submitted
patches to add a sysfs attribute related to nr_hugepages. However, with
a boolean global value and per-mount quota enforcement constraining the
dynamic pool, adding corresponding control of the dynamic pool on a
per-node basis seems inconsistent to me.
2) Administration of the hugetlb dynamic pool with multiple hugetlbfs
mount points is, arguably, more arduous than it needs to be. Each quota
would need to be set separately, and the sum would need to be monitored.
To ease the administration, and to help make the way for per-node
control of the static & dynamic hugepage pool, I added a separate
sysctl, nr_overcommit_hugepages. This value serves as a high watermark
for the overall hugepage pool, while nr_hugepages serves as a low
watermark. The boolean sysctl can then be removed, as the condition
nr_overcommit_hugepages > 0
indicates the same administrative setting as
hugetlb_dynamic_pool == 1
Quotas still serve as local enforcement of the size of the pool on a
per-mount basis.
A few caveats:
1) There is a race whereby the global surplus huge page counter is
incremented before a hugepage has allocated. Another process could then
try grow the pool, and fail to convert a surplus huge page to a normal
huge page and instead allocate a fresh huge page. I believe this is
benign, as no memory is leaked (the actual pages are still tracked
correctly) and the counters won't go out of sync.
2) Shrinking the static pool while a surplus is in effect will allow the
number of surplus huge pages to exceed the overcommit value. As long as
this condition holds, however, no more surplus huge pages will be
allowed on the system until one of the two sysctls are increased
sufficiently, or the surplus huge pages go out of use and are freed.
Successfully tested on x86_64 with the current libhugetlbfs snapshot,
modified to use the new sysctl.
Signed-off-by: Nishanth Aravamudan <nacc@us.ibm.com>
Acked-by: Adam Litke <agl@us.ibm.com>
Cc: William Lee Irwin III <wli@holomorphy.com>
Cc: Dave Hansen <haveblue@us.ibm.com>
Cc: David Gibson <david@gibson.dropbear.id.au>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-12-18 03:20:12 +03:00
} ,
2005-04-17 02:20:36 +04:00
# endif
{
. ctl_name = VM_LOWMEM_RESERVE_RATIO ,
. procname = " lowmem_reserve_ratio " ,
. data = & sysctl_lowmem_reserve_ratio ,
. maxlen = sizeof ( sysctl_lowmem_reserve_ratio ) ,
. mode = 0644 ,
. proc_handler = & lowmem_reserve_ratio_sysctl_handler ,
. strategy = & sysctl_intvec ,
} ,
2006-01-08 12:00:39 +03:00
{
. ctl_name = VM_DROP_PAGECACHE ,
. procname = " drop_caches " ,
. data = & sysctl_drop_caches ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = drop_caches_sysctl_handler ,
. strategy = & sysctl_intvec ,
} ,
2005-04-17 02:20:36 +04:00
{
. ctl_name = VM_MIN_FREE_KBYTES ,
. procname = " min_free_kbytes " ,
. data = & min_free_kbytes ,
. maxlen = sizeof ( min_free_kbytes ) ,
. mode = 0644 ,
. proc_handler = & min_free_kbytes_sysctl_handler ,
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
} ,
2006-01-08 12:00:40 +03:00
{
. ctl_name = VM_PERCPU_PAGELIST_FRACTION ,
. procname = " percpu_pagelist_fraction " ,
. data = & percpu_pagelist_fraction ,
. maxlen = sizeof ( percpu_pagelist_fraction ) ,
. mode = 0644 ,
. proc_handler = & percpu_pagelist_fraction_sysctl_handler ,
. strategy = & sysctl_intvec ,
. extra1 = & min_percpu_pagelist_fract ,
} ,
2005-04-17 02:20:36 +04:00
# ifdef CONFIG_MMU
{
. ctl_name = VM_MAX_MAP_COUNT ,
. procname = " max_map_count " ,
. data = & sysctl_max_map_count ,
. maxlen = sizeof ( sysctl_max_map_count ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec
} ,
2009-01-08 15:04:47 +03:00
# else
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " nr_trim_pages " ,
. data = & sysctl_nr_trim_pages ,
. maxlen = sizeof ( sysctl_nr_trim_pages ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec_minmax ,
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
} ,
2005-04-17 02:20:36 +04:00
# endif
{
. ctl_name = VM_LAPTOP_MODE ,
. procname = " laptop_mode " ,
. data = & laptop_mode ,
. maxlen = sizeof ( laptop_mode ) ,
. mode = 0644 ,
2006-03-24 14:15:49 +03:00
. proc_handler = & proc_dointvec_jiffies ,
. strategy = & sysctl_jiffies ,
2005-04-17 02:20:36 +04:00
} ,
{
. ctl_name = VM_BLOCK_DUMP ,
. procname = " block_dump " ,
. data = & block_dump ,
. maxlen = sizeof ( block_dump ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
} ,
{
. ctl_name = VM_VFS_CACHE_PRESSURE ,
. procname = " vfs_cache_pressure " ,
. data = & sysctl_vfs_cache_pressure ,
. maxlen = sizeof ( sysctl_vfs_cache_pressure ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
} ,
# ifdef HAVE_ARCH_PICK_MMAP_LAYOUT
{
. ctl_name = VM_LEGACY_VA_LAYOUT ,
. procname = " legacy_va_layout " ,
. data = & sysctl_legacy_va_layout ,
. maxlen = sizeof ( sysctl_legacy_va_layout ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
} ,
# endif
2006-01-19 04:42:32 +03:00
# ifdef CONFIG_NUMA
{
. ctl_name = VM_ZONE_RECLAIM_MODE ,
. procname = " zone_reclaim_mode " ,
. data = & zone_reclaim_mode ,
. maxlen = sizeof ( zone_reclaim_mode ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
2006-02-01 14:05:29 +03:00
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
2006-01-19 04:42:32 +03:00
} ,
2006-07-03 11:24:13 +04:00
{
. ctl_name = VM_MIN_UNMAPPED ,
. procname = " min_unmapped_ratio " ,
. data = & sysctl_min_unmapped_ratio ,
. maxlen = sizeof ( sysctl_min_unmapped_ratio ) ,
. mode = 0644 ,
. proc_handler = & sysctl_min_unmapped_ratio_sysctl_handler ,
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
. extra2 = & one_hundred ,
} ,
2006-09-26 10:31:52 +04:00
{
. ctl_name = VM_MIN_SLAB ,
. procname = " min_slab_ratio " ,
. data = & sysctl_min_slab_ratio ,
. maxlen = sizeof ( sysctl_min_slab_ratio ) ,
. mode = 0644 ,
. proc_handler = & sysctl_min_slab_ratio_sysctl_handler ,
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
. extra2 = & one_hundred ,
} ,
[PATCH] vdso: randomize the i386 vDSO by moving it into a vma
Move the i386 VDSO down into a vma and thus randomize it.
Besides the security implications, this feature also helps debuggers, which
can COW a vma-backed VDSO just like a normal DSO and can thus do
single-stepping and other debugging features.
It's good for hypervisors (Xen, VMWare) too, which typically live in the same
high-mapped address space as the VDSO, hence whenever the VDSO is used, they
get lots of guest pagefaults and have to fix such guest accesses up - which
slows things down instead of speeding things up (the primary purpose of the
VDSO).
There's a new CONFIG_COMPAT_VDSO (default=y) option, which provides support
for older glibcs that still rely on a prelinked high-mapped VDSO. Newer
distributions (using glibc 2.3.3 or later) can turn this option off. Turning
it off is also recommended for security reasons: attackers cannot use the
predictable high-mapped VDSO page as syscall trampoline anymore.
There is a new vdso=[0|1] boot option as well, and a runtime
/proc/sys/vm/vdso_enabled sysctl switch, that allows the VDSO to be turned
on/off.
(This version of the VDSO-randomization patch also has working ELF
coredumping, the previous patch crashed in the coredumping code.)
This code is a combined work of the exec-shield VDSO randomization
code and Gerd Hoffmann's hypervisor-centric VDSO patch. Rusty Russell
started this patch and i completed it.
[akpm@osdl.org: cleanups]
[akpm@osdl.org: compile fix]
[akpm@osdl.org: compile fix 2]
[akpm@osdl.org: compile fix 3]
[akpm@osdl.org: revernt MAXMEM change]
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Arjan van de Ven <arjan@infradead.org>
Cc: Gerd Hoffmann <kraxel@suse.de>
Cc: Rusty Russell <rusty@rustcorp.com.au>
Cc: Zachary Amsden <zach@vmware.com>
Cc: Andi Kleen <ak@muc.de>
Cc: Jan Beulich <jbeulich@novell.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-06-27 13:53:50 +04:00
# endif
2007-05-09 13:35:13 +04:00
# ifdef CONFIG_SMP
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " stat_interval " ,
. data = & sysctl_stat_interval ,
. maxlen = sizeof ( sysctl_stat_interval ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec_jiffies ,
. strategy = & sysctl_jiffies ,
} ,
# endif
2007-06-28 23:55:21 +04:00
# ifdef CONFIG_SECURITY
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " mmap_min_addr " ,
. data = & mmap_min_addr ,
. maxlen = sizeof ( unsigned long ) ,
. mode = 0644 ,
. proc_handler = & proc_doulongvec_minmax ,
} ,
2007-08-11 00:00:51 +04:00
# endif
2007-07-16 10:38:01 +04:00
# ifdef CONFIG_NUMA
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " numa_zonelist_order " ,
. data = & numa_zonelist_order ,
. maxlen = NUMA_ZONELIST_ORDER_LEN ,
. mode = 0644 ,
. proc_handler = & numa_zonelist_order_handler ,
. strategy = & sysctl_string ,
} ,
# endif
2007-10-13 11:16:04 +04:00
# if (defined(CONFIG_X86_32) && !defined(CONFIG_UML))|| \
2007-03-01 04:07:42 +03:00
( defined ( CONFIG_SUPERH ) & & defined ( CONFIG_VSYSCALL ) )
[PATCH] vdso: randomize the i386 vDSO by moving it into a vma
Move the i386 VDSO down into a vma and thus randomize it.
Besides the security implications, this feature also helps debuggers, which
can COW a vma-backed VDSO just like a normal DSO and can thus do
single-stepping and other debugging features.
It's good for hypervisors (Xen, VMWare) too, which typically live in the same
high-mapped address space as the VDSO, hence whenever the VDSO is used, they
get lots of guest pagefaults and have to fix such guest accesses up - which
slows things down instead of speeding things up (the primary purpose of the
VDSO).
There's a new CONFIG_COMPAT_VDSO (default=y) option, which provides support
for older glibcs that still rely on a prelinked high-mapped VDSO. Newer
distributions (using glibc 2.3.3 or later) can turn this option off. Turning
it off is also recommended for security reasons: attackers cannot use the
predictable high-mapped VDSO page as syscall trampoline anymore.
There is a new vdso=[0|1] boot option as well, and a runtime
/proc/sys/vm/vdso_enabled sysctl switch, that allows the VDSO to be turned
on/off.
(This version of the VDSO-randomization patch also has working ELF
coredumping, the previous patch crashed in the coredumping code.)
This code is a combined work of the exec-shield VDSO randomization
code and Gerd Hoffmann's hypervisor-centric VDSO patch. Rusty Russell
started this patch and i completed it.
[akpm@osdl.org: cleanups]
[akpm@osdl.org: compile fix]
[akpm@osdl.org: compile fix 2]
[akpm@osdl.org: compile fix 3]
[akpm@osdl.org: revernt MAXMEM change]
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Arjan van de Ven <arjan@infradead.org>
Cc: Gerd Hoffmann <kraxel@suse.de>
Cc: Rusty Russell <rusty@rustcorp.com.au>
Cc: Zachary Amsden <zach@vmware.com>
Cc: Andi Kleen <ak@muc.de>
Cc: Jan Beulich <jbeulich@novell.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-06-27 13:53:50 +04:00
{
. ctl_name = VM_VDSO_ENABLED ,
. procname = " vdso_enabled " ,
. data = & vdso_enabled ,
. maxlen = sizeof ( vdso_enabled ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
} ,
2005-04-17 02:20:36 +04:00
# endif
2008-02-05 09:29:20 +03:00
# ifdef CONFIG_HIGHMEM
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " highmem_is_dirtyable " ,
. data = & vm_highmem_is_dirtyable ,
. maxlen = sizeof ( vm_highmem_is_dirtyable ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec_minmax ,
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
. extra2 = & one ,
} ,
# endif
2007-07-16 10:41:21 +04:00
/*
* NOTE : do not add new entries to this table unless you have read
* Documentation / sysctl / ctl_unnumbered . txt
*/
2005-04-17 02:20:36 +04:00
{ . ctl_name = 0 }
} ;
2007-02-14 11:34:07 +03:00
# if defined(CONFIG_BINFMT_MISC) || defined(CONFIG_BINFMT_MISC_MODULE)
2007-10-18 14:05:22 +04:00
static struct ctl_table binfmt_misc_table [ ] = {
2007-02-14 11:34:07 +03:00
{ . ctl_name = 0 }
} ;
# endif
2007-10-18 14:05:22 +04:00
static struct ctl_table fs_table [ ] = {
2005-04-17 02:20:36 +04:00
{
. ctl_name = FS_NRINODE ,
. procname = " inode-nr " ,
. data = & inodes_stat ,
. maxlen = 2 * sizeof ( int ) ,
. mode = 0444 ,
. proc_handler = & proc_dointvec ,
} ,
{
. ctl_name = FS_STATINODE ,
. procname = " inode-state " ,
. data = & inodes_stat ,
. maxlen = 7 * sizeof ( int ) ,
. mode = 0444 ,
. proc_handler = & proc_dointvec ,
} ,
{
. procname = " file-nr " ,
. data = & files_stat ,
. maxlen = 3 * sizeof ( int ) ,
. mode = 0444 ,
2006-03-08 08:55:35 +03:00
. proc_handler = & proc_nr_files ,
2005-04-17 02:20:36 +04:00
} ,
{
. ctl_name = FS_MAXFILE ,
. procname = " file-max " ,
. data = & files_stat . max_files ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2008-02-06 12:37:16 +03:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " nr_open " ,
. data = & sysctl_nr_open ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2008-05-10 18:08:32 +04:00
. proc_handler = & proc_dointvec_minmax ,
. extra1 = & sysctl_nr_open_min ,
. extra2 = & sysctl_nr_open_max ,
2008-02-06 12:37:16 +03:00
} ,
2005-04-17 02:20:36 +04:00
{
. ctl_name = FS_DENTRY ,
. procname = " dentry-state " ,
. data = & dentry_stat ,
. maxlen = 6 * sizeof ( int ) ,
. mode = 0444 ,
. proc_handler = & proc_dointvec ,
} ,
{
. ctl_name = FS_OVERFLOWUID ,
. procname = " overflowuid " ,
. data = & fs_overflowuid ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec_minmax ,
. strategy = & sysctl_intvec ,
. extra1 = & minolduid ,
. extra2 = & maxolduid ,
} ,
{
. ctl_name = FS_OVERFLOWGID ,
. procname = " overflowgid " ,
. data = & fs_overflowgid ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec_minmax ,
. strategy = & sysctl_intvec ,
. extra1 = & minolduid ,
. extra2 = & maxolduid ,
} ,
2008-08-06 17:12:22 +04:00
# ifdef CONFIG_FILE_LOCKING
2005-04-17 02:20:36 +04:00
{
. ctl_name = FS_LEASES ,
. procname = " leases-enable " ,
. data = & leases_enable ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
2008-08-06 17:12:22 +04:00
# endif
2005-04-17 02:20:36 +04:00
# ifdef CONFIG_DNOTIFY
{
. ctl_name = FS_DIR_NOTIFY ,
. procname = " dir-notify-enable " ,
. data = & dir_notify_enable ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec ,
} ,
# endif
# ifdef CONFIG_MMU
2008-08-06 17:12:22 +04:00
# ifdef CONFIG_FILE_LOCKING
2005-04-17 02:20:36 +04:00
{
. ctl_name = FS_LEASE_TIME ,
. procname = " lease-break-time " ,
. data = & lease_break_time ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2009-04-03 03:58:33 +04:00
. proc_handler = & proc_dointvec ,
2005-04-17 02:20:36 +04:00
} ,
2008-08-06 17:12:22 +04:00
# endif
2008-10-16 09:05:12 +04:00
# ifdef CONFIG_AIO
2005-04-17 02:20:36 +04:00
{
. procname = " aio-nr " ,
. data = & aio_nr ,
. maxlen = sizeof ( aio_nr ) ,
. mode = 0444 ,
2005-11-07 11:59:31 +03:00
. proc_handler = & proc_doulongvec_minmax ,
2005-04-17 02:20:36 +04:00
} ,
{
. procname = " aio-max-nr " ,
. data = & aio_max_nr ,
. maxlen = sizeof ( aio_max_nr ) ,
. mode = 0644 ,
2005-11-07 11:59:31 +03:00
. proc_handler = & proc_doulongvec_minmax ,
2005-04-17 02:20:36 +04:00
} ,
2008-10-16 09:05:12 +04:00
# endif /* CONFIG_AIO */
2006-06-02 00:10:59 +04:00
# ifdef CONFIG_INOTIFY_USER
2005-07-13 20:38:18 +04:00
{
. ctl_name = FS_INOTIFY ,
. procname = " inotify " ,
. mode = 0555 ,
. child = inotify_table ,
} ,
# endif
epoll: introduce resource usage limits
It has been thought that the per-user file descriptors limit would also
limit the resources that a normal user can request via the epoll
interface. Vegard Nossum reported a very simple program (a modified
version attached) that can make a normal user to request a pretty large
amount of kernel memory, well within the its maximum number of fds. To
solve such problem, default limits are now imposed, and /proc based
configuration has been introduced. A new directory has been created,
named /proc/sys/fs/epoll/ and inside there, there are two configuration
points:
max_user_instances = Maximum number of devices - per user
max_user_watches = Maximum number of "watched" fds - per user
The current default for "max_user_watches" limits the memory used by epoll
to store "watches", to 1/32 of the amount of the low RAM. As example, a
256MB 32bit machine, will have "max_user_watches" set to roughly 90000.
That should be enough to not break existing heavy epoll users. The
default value for "max_user_instances" is set to 128, that should be
enough too.
This also changes the userspace, because a new error code can now come out
from EPOLL_CTL_ADD (-ENOSPC). The EMFILE from epoll_create() was already
listed, so that should be ok.
[akpm@linux-foundation.org: use get_current_user()]
Signed-off-by: Davide Libenzi <davidel@xmailserver.org>
Cc: Michael Kerrisk <mtk.manpages@gmail.com>
Cc: <stable@kernel.org>
Cc: Cyrill Gorcunov <gorcunov@gmail.com>
Reported-by: Vegard Nossum <vegardno@ifi.uio.no>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2008-12-02 00:13:55 +03:00
# ifdef CONFIG_EPOLL
{
. procname = " epoll " ,
. mode = 0555 ,
. child = epoll_table ,
} ,
# endif
2005-04-17 02:20:36 +04:00
# endif
2005-06-23 11:09:43 +04:00
{
. ctl_name = KERN_SETUID_DUMPABLE ,
. procname = " suid_dumpable " ,
. data = & suid_dumpable ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2009-04-03 03:58:33 +04:00
. proc_handler = & proc_dointvec_minmax ,
. strategy = & sysctl_intvec ,
. extra1 = & zero ,
. extra2 = & two ,
2005-06-23 11:09:43 +04:00
} ,
2007-02-14 11:34:07 +03:00
# if defined(CONFIG_BINFMT_MISC) || defined(CONFIG_BINFMT_MISC_MODULE)
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " binfmt_misc " ,
. mode = 0555 ,
. child = binfmt_misc_table ,
} ,
# endif
2007-07-16 10:41:21 +04:00
/*
* NOTE : do not add new entries to this table unless you have read
* Documentation / sysctl / ctl_unnumbered . txt
*/
2005-04-17 02:20:36 +04:00
{ . ctl_name = 0 }
} ;
2007-10-18 14:05:22 +04:00
static struct ctl_table debug_table [ ] = {
2007-10-12 04:20:07 +04:00
# if defined(CONFIG_X86) || defined(CONFIG_PPC)
2007-07-22 13:12:28 +04:00
{
. ctl_name = CTL_UNNUMBERED ,
. procname = " exception-trace " ,
. data = & show_unhandled_signals ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec
} ,
# endif
2005-04-17 02:20:36 +04:00
{ . ctl_name = 0 }
} ;
2007-10-18 14:05:22 +04:00
static struct ctl_table dev_table [ ] = {
2005-04-17 02:20:36 +04:00
{ . ctl_name = 0 }
[PATCH] inotify
inotify is intended to correct the deficiencies of dnotify, particularly
its inability to scale and its terrible user interface:
* dnotify requires the opening of one fd per each directory
that you intend to watch. This quickly results in too many
open files and pins removable media, preventing unmount.
* dnotify is directory-based. You only learn about changes to
directories. Sure, a change to a file in a directory affects
the directory, but you are then forced to keep a cache of
stat structures.
* dnotify's interface to user-space is awful. Signals?
inotify provides a more usable, simple, powerful solution to file change
notification:
* inotify's interface is a system call that returns a fd, not SIGIO.
You get a single fd, which is select()-able.
* inotify has an event that says "the filesystem that the item
you were watching is on was unmounted."
* inotify can watch directories or files.
Inotify is currently used by Beagle (a desktop search infrastructure),
Gamin (a FAM replacement), and other projects.
See Documentation/filesystems/inotify.txt.
Signed-off-by: Robert Love <rml@novell.com>
Cc: John McCutchan <ttb@tentacle.dhs.org>
Cc: Christoph Hellwig <hch@lst.de>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-07-13 01:06:03 +04:00
} ;
2005-04-17 02:20:36 +04:00
2005-11-04 13:18:40 +03:00
static DEFINE_SPINLOCK ( sysctl_lock ) ;
/* called under sysctl_lock */
static int use_table ( struct ctl_table_header * p )
{
if ( unlikely ( p - > unregistering ) )
return 0 ;
p - > used + + ;
return 1 ;
}
/* called under sysctl_lock */
static void unuse_table ( struct ctl_table_header * p )
{
if ( ! - - p - > used )
if ( unlikely ( p - > unregistering ) )
complete ( p - > unregistering ) ;
}
/* called under sysctl_lock, will reacquire if has to wait */
static void start_unregistering ( struct ctl_table_header * p )
{
/*
* if p - > used is 0 , nobody will ever touch that entry again ;
* we ' ll eliminate all paths to it before dropping sysctl_lock
*/
if ( unlikely ( p - > used ) ) {
struct completion wait ;
init_completion ( & wait ) ;
p - > unregistering = & wait ;
spin_unlock ( & sysctl_lock ) ;
wait_for_completion ( & wait ) ;
spin_lock ( & sysctl_lock ) ;
2008-07-15 09:44:23 +04:00
} else {
/* anything non-NULL; we'll never dereference it */
p - > unregistering = ERR_PTR ( - EINVAL ) ;
2005-11-04 13:18:40 +03:00
}
/*
* do not remove from the list until nobody holds it ; walking the
* list in do_sysctl ( ) relies on that .
*/
list_del_init ( & p - > ctl_entry ) ;
}
2008-07-15 09:44:23 +04:00
void sysctl_head_get ( struct ctl_table_header * head )
{
spin_lock ( & sysctl_lock ) ;
head - > count + + ;
spin_unlock ( & sysctl_lock ) ;
}
void sysctl_head_put ( struct ctl_table_header * head )
{
spin_lock ( & sysctl_lock ) ;
if ( ! - - head - > count )
kfree ( head ) ;
spin_unlock ( & sysctl_lock ) ;
}
struct ctl_table_header * sysctl_head_grab ( struct ctl_table_header * head )
{
if ( ! head )
BUG ( ) ;
spin_lock ( & sysctl_lock ) ;
if ( ! use_table ( head ) )
head = ERR_PTR ( - ENOENT ) ;
spin_unlock ( & sysctl_lock ) ;
return head ;
}
2007-02-14 11:34:11 +03:00
void sysctl_head_finish ( struct ctl_table_header * head )
{
if ( ! head )
return ;
spin_lock ( & sysctl_lock ) ;
unuse_table ( head ) ;
spin_unlock ( & sysctl_lock ) ;
}
2008-07-15 05:22:20 +04:00
static struct ctl_table_set *
lookup_header_set ( struct ctl_table_root * root , struct nsproxy * namespaces )
{
struct ctl_table_set * set = & root - > default_set ;
if ( root - > lookup )
set = root - > lookup ( root , namespaces ) ;
return set ;
}
2007-11-30 15:54:00 +03:00
static struct list_head *
lookup_header_list ( struct ctl_table_root * root , struct nsproxy * namespaces )
2007-02-14 11:34:11 +03:00
{
2008-07-15 05:22:20 +04:00
struct ctl_table_set * set = lookup_header_set ( root , namespaces ) ;
return & set - > list ;
2007-11-30 15:54:00 +03:00
}
struct ctl_table_header * __sysctl_head_next ( struct nsproxy * namespaces ,
struct ctl_table_header * prev )
{
struct ctl_table_root * root ;
struct list_head * header_list ;
2007-02-14 11:34:11 +03:00
struct ctl_table_header * head ;
struct list_head * tmp ;
2007-11-30 15:54:00 +03:00
2007-02-14 11:34:11 +03:00
spin_lock ( & sysctl_lock ) ;
if ( prev ) {
2007-11-30 15:54:00 +03:00
head = prev ;
2007-02-14 11:34:11 +03:00
tmp = & prev - > ctl_entry ;
unuse_table ( prev ) ;
goto next ;
}
tmp = & root_table_header . ctl_entry ;
for ( ; ; ) {
head = list_entry ( tmp , struct ctl_table_header , ctl_entry ) ;
if ( ! use_table ( head ) )
goto next ;
spin_unlock ( & sysctl_lock ) ;
return head ;
next :
2007-11-30 15:54:00 +03:00
root = head - > root ;
2007-02-14 11:34:11 +03:00
tmp = tmp - > next ;
2007-11-30 15:54:00 +03:00
header_list = lookup_header_list ( root , namespaces ) ;
if ( tmp ! = header_list )
continue ;
do {
root = list_entry ( root - > root_list . next ,
struct ctl_table_root , root_list ) ;
if ( root = = & sysctl_table_root )
goto out ;
header_list = lookup_header_list ( root , namespaces ) ;
} while ( list_empty ( header_list ) ) ;
tmp = header_list - > next ;
2007-02-14 11:34:11 +03:00
}
2007-11-30 15:54:00 +03:00
out :
2007-02-14 11:34:11 +03:00
spin_unlock ( & sysctl_lock ) ;
return NULL ;
}
2007-11-30 15:54:00 +03:00
struct ctl_table_header * sysctl_head_next ( struct ctl_table_header * prev )
{
return __sysctl_head_next ( current - > nsproxy , prev ) ;
}
void register_sysctl_root ( struct ctl_table_root * root )
{
spin_lock ( & sysctl_lock ) ;
list_add_tail ( & root - > root_list , & sysctl_table_root . root_list ) ;
spin_unlock ( & sysctl_lock ) ;
}
2006-09-27 12:51:04 +04:00
# ifdef CONFIG_SYSCTL_SYSCALL
2008-04-29 12:02:41 +04:00
/* Perform the actual read/write of a sysctl table entry. */
2008-04-29 12:02:44 +04:00
static int do_sysctl_strategy ( struct ctl_table_root * root ,
struct ctl_table * table ,
2008-04-29 12:02:41 +04:00
void __user * oldval , size_t __user * oldlenp ,
void __user * newval , size_t newlen )
{
int op = 0 , rc ;
if ( oldval )
2008-07-16 05:03:57 +04:00
op | = MAY_READ ;
2008-04-29 12:02:41 +04:00
if ( newval )
2008-07-16 05:03:57 +04:00
op | = MAY_WRITE ;
2008-04-29 12:02:44 +04:00
if ( sysctl_perm ( root , table , op ) )
2008-04-29 12:02:41 +04:00
return - EPERM ;
if ( table - > strategy ) {
2008-10-16 09:04:23 +04:00
rc = table - > strategy ( table , oldval , oldlenp , newval , newlen ) ;
2008-04-29 12:02:41 +04:00
if ( rc < 0 )
return rc ;
if ( rc > 0 )
return 0 ;
}
/* If there is no strategy routine, or if the strategy returns
* zero , proceed with automatic r / w */
if ( table - > data & & table - > maxlen ) {
2008-10-16 09:04:23 +04:00
rc = sysctl_data ( table , oldval , oldlenp , newval , newlen ) ;
2008-04-29 12:02:41 +04:00
if ( rc < 0 )
return rc ;
}
return 0 ;
}
static int parse_table ( int __user * name , int nlen ,
void __user * oldval , size_t __user * oldlenp ,
void __user * newval , size_t newlen ,
2008-04-29 12:02:44 +04:00
struct ctl_table_root * root ,
2008-04-29 12:02:41 +04:00
struct ctl_table * table )
{
int n ;
repeat :
if ( ! nlen )
return - ENOTDIR ;
if ( get_user ( n , name ) )
return - EFAULT ;
for ( ; table - > ctl_name | | table - > procname ; table + + ) {
if ( ! table - > ctl_name )
continue ;
if ( n = = table - > ctl_name ) {
int error ;
if ( table - > child ) {
2008-07-16 05:03:57 +04:00
if ( sysctl_perm ( root , table , MAY_EXEC ) )
2008-04-29 12:02:41 +04:00
return - EPERM ;
name + + ;
nlen - - ;
table = table - > child ;
goto repeat ;
}
2008-10-16 09:04:23 +04:00
error = do_sysctl_strategy ( root , table ,
2008-04-29 12:02:41 +04:00
oldval , oldlenp ,
newval , newlen ) ;
return error ;
}
}
return - ENOTDIR ;
}
2005-04-17 02:20:36 +04:00
int do_sysctl ( int __user * name , int nlen , void __user * oldval , size_t __user * oldlenp ,
void __user * newval , size_t newlen )
{
2007-02-14 11:34:11 +03:00
struct ctl_table_header * head ;
2005-11-04 13:18:40 +03:00
int error = - ENOTDIR ;
2005-04-17 02:20:36 +04:00
if ( nlen < = 0 | | nlen > = CTL_MAXNAME )
return - ENOTDIR ;
if ( oldval ) {
int old_len ;
if ( ! oldlenp | | get_user ( old_len , oldlenp ) )
return - EFAULT ;
}
2005-11-04 13:18:40 +03:00
2007-02-14 11:34:11 +03:00
for ( head = sysctl_head_next ( NULL ) ; head ;
head = sysctl_head_next ( head ) ) {
2005-11-04 13:18:40 +03:00
error = parse_table ( name , nlen , oldval , oldlenp ,
2008-04-29 12:02:44 +04:00
newval , newlen ,
head - > root , head - > ctl_table ) ;
2007-02-14 11:34:11 +03:00
if ( error ! = - ENOTDIR ) {
sysctl_head_finish ( head ) ;
2005-11-04 13:18:40 +03:00
break ;
2007-02-14 11:34:11 +03:00
}
}
2005-11-04 13:18:40 +03:00
return error ;
2005-04-17 02:20:36 +04:00
}
2009-01-14 16:14:29 +03:00
SYSCALL_DEFINE1 ( sysctl , struct __sysctl_args __user * , args )
2005-04-17 02:20:36 +04:00
{
struct __sysctl_args tmp ;
int error ;
if ( copy_from_user ( & tmp , args , sizeof ( tmp ) ) )
return - EFAULT ;
2007-10-18 14:05:58 +04:00
error = deprecated_sysctl_warning ( & tmp ) ;
if ( error )
goto out ;
2005-04-17 02:20:36 +04:00
lock_kernel ( ) ;
error = do_sysctl ( tmp . name , tmp . nlen , tmp . oldval , tmp . oldlenp ,
tmp . newval , tmp . newlen ) ;
unlock_kernel ( ) ;
2007-10-18 14:05:58 +04:00
out :
2005-04-17 02:20:36 +04:00
return error ;
}
2006-09-27 12:51:04 +04:00
# endif /* CONFIG_SYSCTL_SYSCALL */
2005-04-17 02:20:36 +04:00
/*
2007-02-14 11:34:11 +03:00
* sysctl_perm does NOT grant the superuser all rights automatically , because
2005-04-17 02:20:36 +04:00
* some sysctl variables are readonly even to root .
*/
static int test_perm ( int mode , int op )
{
2008-11-14 02:39:12 +03:00
if ( ! current_euid ( ) )
2005-04-17 02:20:36 +04:00
mode > > = 6 ;
else if ( in_egroup_p ( 0 ) )
mode > > = 3 ;
2008-07-16 05:03:57 +04:00
if ( ( op & ~ mode & ( MAY_READ | MAY_WRITE | MAY_EXEC ) ) = = 0 )
2005-04-17 02:20:36 +04:00
return 0 ;
return - EACCES ;
}
2008-04-29 12:02:44 +04:00
int sysctl_perm ( struct ctl_table_root * root , struct ctl_table * table , int op )
2005-04-17 02:20:36 +04:00
{
int error ;
2008-04-29 12:02:44 +04:00
int mode ;
2008-07-16 05:03:57 +04:00
error = security_sysctl ( table , op & ( MAY_READ | MAY_WRITE | MAY_EXEC ) ) ;
2005-04-17 02:20:36 +04:00
if ( error )
return error ;
2008-04-29 12:02:44 +04:00
if ( root - > permissions )
mode = root - > permissions ( root , current - > nsproxy , table ) ;
else
mode = table - > mode ;
return test_perm ( mode , op ) ;
2005-04-17 02:20:36 +04:00
}
2007-02-14 11:34:13 +03:00
static void sysctl_set_parent ( struct ctl_table * parent , struct ctl_table * table )
{
for ( ; table - > ctl_name | | table - > procname ; table + + ) {
table - > parent = parent ;
if ( table - > child )
sysctl_set_parent ( table , table - > child ) ;
}
}
static __init int sysctl_init ( void )
{
sysctl_set_parent ( NULL , root_table ) ;
2008-04-29 12:02:36 +04:00
# ifdef CONFIG_SYSCTL_SYSCALL_CHECK
{
int err ;
err = sysctl_check_table ( current - > nsproxy , root_table ) ;
}
# endif
2007-02-14 11:34:13 +03:00
return 0 ;
}
core_initcall ( sysctl_init ) ;
2008-07-27 09:31:22 +04:00
static struct ctl_table * is_branch_in ( struct ctl_table * branch ,
struct ctl_table * table )
2008-07-15 14:33:31 +04:00
{
struct ctl_table * p ;
const char * s = branch - > procname ;
/* branch should have named subdirectory as its first element */
if ( ! s | | ! branch - > child )
2008-07-27 09:31:22 +04:00
return NULL ;
2008-07-15 14:33:31 +04:00
/* ... and nothing else */
if ( branch [ 1 ] . procname | | branch [ 1 ] . ctl_name )
2008-07-27 09:31:22 +04:00
return NULL ;
2008-07-15 14:33:31 +04:00
/* table should contain subdirectory with the same name */
for ( p = table ; p - > procname | | p - > ctl_name ; p + + ) {
if ( ! p - > child )
continue ;
if ( p - > procname & & strcmp ( p - > procname , s ) = = 0 )
2008-07-27 09:31:22 +04:00
return p ;
2008-07-15 14:33:31 +04:00
}
2008-07-27 09:31:22 +04:00
return NULL ;
2008-07-15 14:33:31 +04:00
}
/* see if attaching q to p would be an improvement */
static void try_attach ( struct ctl_table_header * p , struct ctl_table_header * q )
{
struct ctl_table * to = p - > ctl_table , * by = q - > ctl_table ;
2008-07-27 09:31:22 +04:00
struct ctl_table * next ;
2008-07-15 14:33:31 +04:00
int is_better = 0 ;
int not_in_parent = ! p - > attached_by ;
2008-07-27 09:31:22 +04:00
while ( ( next = is_branch_in ( by , to ) ) ! = NULL ) {
2008-07-15 14:33:31 +04:00
if ( by = = q - > attached_by )
is_better = 1 ;
if ( to = = p - > attached_by )
not_in_parent = 1 ;
by = by - > child ;
2008-07-27 09:31:22 +04:00
to = next - > child ;
2008-07-15 14:33:31 +04:00
}
if ( is_better & & not_in_parent ) {
q - > attached_by = by ;
q - > attached_to = to ;
q - > parent = p ;
}
}
2005-04-17 02:20:36 +04:00
/**
2007-11-30 15:54:00 +03:00
* __register_sysctl_paths - register a sysctl hierarchy
* @ root : List of sysctl headers to register on
* @ namespaces : Data to compute which lists of sysctl entries are visible
2007-11-30 15:50:18 +03:00
* @ path : The path to the directory the sysctl table is in .
2005-04-17 02:20:36 +04:00
* @ table : the top - level table structure
*
* Register a sysctl table hierarchy . @ table should be a filled in ctl_table
2007-11-30 15:50:18 +03:00
* array . A completely 0 filled entry terminates the table .
2005-04-17 02:20:36 +04:00
*
2007-10-18 14:05:22 +04:00
* The members of the & struct ctl_table structure are used as follows :
2005-04-17 02:20:36 +04:00
*
* ctl_name - This is the numeric sysctl value used by sysctl ( 2 ) . The number
* must be unique within that level of sysctl
*
* procname - the name of the sysctl file under / proc / sys . Set to % NULL to not
* enter a sysctl file
*
* data - a pointer to data for use by proc_handler
*
* maxlen - the maximum size in bytes of the data
*
* mode - the file permissions for the / proc / sys file , and for sysctl ( 2 )
*
* child - a pointer to the child sysctl table if this entry is a directory , or
* % NULL .
*
* proc_handler - the text handler routine ( described below )
*
* strategy - the strategy routine ( described below )
*
* de - for internal use by the sysctl routines
*
* extra1 , extra2 - extra pointers usable by the proc handler routines
*
* Leaf nodes in the sysctl tree will be represented by a single file
* under / proc ; non - leaf nodes will be represented by directories .
*
* sysctl ( 2 ) can automatically manage read and write requests through
* the sysctl table . The data and maxlen fields of the ctl_table
* struct enable minimal validation of the values being written to be
* performed , and the mode field allows minimal authentication .
*
* More sophisticated management can be enabled by the provision of a
* strategy routine with the table entry . This will be called before
* any automatic read or write of the data is performed .
*
* The strategy routine may return
*
* < 0 - Error occurred ( error is passed to user process )
*
* 0 - OK - proceed with automatic read or write .
*
* > 0 - OK - read or write has been done by the strategy routine , so
* return immediately .
*
* There must be a proc_handler routine for any terminal nodes
* mirrored under / proc / sys ( non - terminals are handled by a built - in
* directory handler ) . Several default handlers are available to
* cover common cases -
*
* proc_dostring ( ) , proc_dointvec ( ) , proc_dointvec_jiffies ( ) ,
* proc_dointvec_userhz_jiffies ( ) , proc_dointvec_minmax ( ) ,
* proc_doulongvec_ms_jiffies_minmax ( ) , proc_doulongvec_minmax ( )
*
* It is the handler ' s job to read the input buffer from user memory
* and process it . The handler should return 0 on success .
*
* This routine returns % NULL on a failure to register , and a pointer
* to the table header on success .
*/
2007-11-30 15:54:00 +03:00
struct ctl_table_header * __register_sysctl_paths (
struct ctl_table_root * root ,
struct nsproxy * namespaces ,
const struct ctl_path * path , struct ctl_table * table )
2005-04-17 02:20:36 +04:00
{
2007-11-30 15:50:18 +03:00
struct ctl_table_header * header ;
struct ctl_table * new , * * prevp ;
unsigned int n , npath ;
2008-07-15 14:33:31 +04:00
struct ctl_table_set * set ;
2007-11-30 15:50:18 +03:00
/* Count the path components */
for ( npath = 0 ; path [ npath ] . ctl_name | | path [ npath ] . procname ; + + npath )
;
/*
* For each path component , allocate a 2 - element ctl_table array .
* The first array element will be filled with the sysctl entry
* for this , the second will be the sentinel ( ctl_name = = 0 ) .
*
* We allocate everything in one go so that we don ' t have to
* worry about freeing additional memory in unregister_sysctl_table .
*/
header = kzalloc ( sizeof ( struct ctl_table_header ) +
( 2 * npath * sizeof ( struct ctl_table ) ) , GFP_KERNEL ) ;
if ( ! header )
2005-04-17 02:20:36 +04:00
return NULL ;
2007-11-30 15:50:18 +03:00
new = ( struct ctl_table * ) ( header + 1 ) ;
/* Now connect the dots */
prevp = & header - > ctl_table ;
for ( n = 0 ; n < npath ; + + n , + + path ) {
/* Copy the procname */
new - > procname = path - > procname ;
new - > ctl_name = path - > ctl_name ;
new - > mode = 0555 ;
* prevp = new ;
prevp = & new - > child ;
new + = 2 ;
}
* prevp = table ;
2007-11-30 15:52:10 +03:00
header - > ctl_table_arg = table ;
2007-11-30 15:50:18 +03:00
INIT_LIST_HEAD ( & header - > ctl_entry ) ;
header - > used = 0 ;
header - > unregistering = NULL ;
2007-11-30 15:54:00 +03:00
header - > root = root ;
2007-11-30 15:50:18 +03:00
sysctl_set_parent ( NULL , header - > ctl_table ) ;
2008-07-15 09:44:23 +04:00
header - > count = 1 ;
2008-04-29 12:02:36 +04:00
# ifdef CONFIG_SYSCTL_SYSCALL_CHECK
2007-11-30 15:54:00 +03:00
if ( sysctl_check_table ( namespaces , header - > ctl_table ) ) {
2007-11-30 15:50:18 +03:00
kfree ( header ) ;
2007-10-18 14:05:54 +04:00
return NULL ;
}
2008-04-29 12:02:36 +04:00
# endif
2005-11-04 13:18:40 +03:00
spin_lock ( & sysctl_lock ) ;
2008-07-15 05:22:20 +04:00
header - > set = lookup_header_set ( root , namespaces ) ;
2008-07-15 14:33:31 +04:00
header - > attached_by = header - > ctl_table ;
header - > attached_to = root_table ;
header - > parent = & root_table_header ;
for ( set = header - > set ; set ; set = set - > parent ) {
struct ctl_table_header * p ;
list_for_each_entry ( p , & set - > list , ctl_entry ) {
if ( p - > unregistering )
continue ;
try_attach ( p , header ) ;
}
}
header - > parent - > count + + ;
2008-07-15 05:22:20 +04:00
list_add_tail ( & header - > ctl_entry , & header - > set - > list ) ;
2005-11-04 13:18:40 +03:00
spin_unlock ( & sysctl_lock ) ;
2007-11-30 15:50:18 +03:00
return header ;
}
2007-11-30 15:54:00 +03:00
/**
* register_sysctl_table_path - register a sysctl table hierarchy
* @ path : The path to the directory the sysctl table is in .
* @ table : the top - level table structure
*
* Register a sysctl table hierarchy . @ table should be a filled in ctl_table
* array . A completely 0 filled entry terminates the table .
*
* See __register_sysctl_paths for more details .
*/
struct ctl_table_header * register_sysctl_paths ( const struct ctl_path * path ,
struct ctl_table * table )
{
return __register_sysctl_paths ( & sysctl_table_root , current - > nsproxy ,
path , table ) ;
}
2007-11-30 15:50:18 +03:00
/**
* register_sysctl_table - register a sysctl table hierarchy
* @ table : the top - level table structure
*
* Register a sysctl table hierarchy . @ table should be a filled in ctl_table
* array . A completely 0 filled entry terminates the table .
*
* See register_sysctl_paths for more details .
*/
struct ctl_table_header * register_sysctl_table ( struct ctl_table * table )
{
static const struct ctl_path null_path [ ] = { { } } ;
return register_sysctl_paths ( null_path , table ) ;
2005-04-17 02:20:36 +04:00
}
/**
* unregister_sysctl_table - unregister a sysctl table hierarchy
* @ header : the header returned from register_sysctl_table
*
* Unregisters the sysctl table and all children . proc entries may not
* actually be removed until they are no longer used by anyone .
*/
void unregister_sysctl_table ( struct ctl_table_header * header )
{
2005-11-04 13:18:40 +03:00
might_sleep ( ) ;
2007-12-05 10:45:24 +03:00
if ( header = = NULL )
return ;
2005-11-04 13:18:40 +03:00
spin_lock ( & sysctl_lock ) ;
start_unregistering ( header ) ;
2008-07-15 14:33:31 +04:00
if ( ! - - header - > parent - > count ) {
WARN_ON ( 1 ) ;
kfree ( header - > parent ) ;
}
2008-07-15 09:44:23 +04:00
if ( ! - - header - > count )
kfree ( header ) ;
2005-11-04 13:18:40 +03:00
spin_unlock ( & sysctl_lock ) ;
2005-04-17 02:20:36 +04:00
}
2008-07-15 16:54:06 +04:00
int sysctl_is_seen ( struct ctl_table_header * p )
{
struct ctl_table_set * set = p - > set ;
int res ;
spin_lock ( & sysctl_lock ) ;
if ( p - > unregistering )
res = 0 ;
else if ( ! set - > is_seen )
res = 1 ;
else
res = set - > is_seen ( set ) ;
spin_unlock ( & sysctl_lock ) ;
return res ;
}
2008-07-15 05:22:20 +04:00
void setup_sysctl_set ( struct ctl_table_set * p ,
struct ctl_table_set * parent ,
int ( * is_seen ) ( struct ctl_table_set * ) )
{
INIT_LIST_HEAD ( & p - > list ) ;
p - > parent = parent ? parent : & sysctl_table_root . default_set ;
p - > is_seen = is_seen ;
}
2006-09-27 12:51:04 +04:00
# else /* !CONFIG_SYSCTL */
2007-10-18 14:05:22 +04:00
struct ctl_table_header * register_sysctl_table ( struct ctl_table * table )
2006-09-27 12:51:04 +04:00
{
return NULL ;
}
2007-11-30 15:50:18 +03:00
struct ctl_table_header * register_sysctl_paths ( const struct ctl_path * path ,
struct ctl_table * table )
{
return NULL ;
}
2006-09-27 12:51:04 +04:00
void unregister_sysctl_table ( struct ctl_table_header * table )
{
}
2008-07-15 05:22:20 +04:00
void setup_sysctl_set ( struct ctl_table_set * p ,
struct ctl_table_set * parent ,
int ( * is_seen ) ( struct ctl_table_set * ) )
{
}
2008-07-15 09:44:23 +04:00
void sysctl_head_put ( struct ctl_table_header * head )
{
}
2006-09-27 12:51:04 +04:00
# endif /* CONFIG_SYSCTL */
2005-04-17 02:20:36 +04:00
/*
* / proc / sys support
*/
2006-09-27 12:51:04 +04:00
# ifdef CONFIG_PROC_SYSCTL
2005-04-17 02:20:36 +04:00
2006-10-02 13:18:05 +04:00
static int _proc_do_string ( void * data , int maxlen , int write ,
struct file * filp , void __user * buffer ,
size_t * lenp , loff_t * ppos )
2005-04-17 02:20:36 +04:00
{
size_t len ;
char __user * p ;
char c ;
2007-02-10 12:46:38 +03:00
if ( ! data | | ! maxlen | | ! * lenp ) {
2005-04-17 02:20:36 +04:00
* lenp = 0 ;
return 0 ;
}
2007-02-10 12:46:38 +03:00
2005-04-17 02:20:36 +04:00
if ( write ) {
len = 0 ;
p = buffer ;
while ( len < * lenp ) {
if ( get_user ( c , p + + ) )
return - EFAULT ;
if ( c = = 0 | | c = = ' \n ' )
break ;
len + + ;
}
2006-10-02 13:18:04 +04:00
if ( len > = maxlen )
len = maxlen - 1 ;
if ( copy_from_user ( data , buffer , len ) )
2005-04-17 02:20:36 +04:00
return - EFAULT ;
2006-10-02 13:18:04 +04:00
( ( char * ) data ) [ len ] = 0 ;
2005-04-17 02:20:36 +04:00
* ppos + = * lenp ;
} else {
2006-10-02 13:18:04 +04:00
len = strlen ( data ) ;
if ( len > maxlen )
len = maxlen ;
2007-02-10 12:46:38 +03:00
if ( * ppos > len ) {
* lenp = 0 ;
return 0 ;
}
data + = * ppos ;
len - = * ppos ;
2005-04-17 02:20:36 +04:00
if ( len > * lenp )
len = * lenp ;
if ( len )
2006-10-02 13:18:04 +04:00
if ( copy_to_user ( buffer , data , len ) )
2005-04-17 02:20:36 +04:00
return - EFAULT ;
if ( len < * lenp ) {
if ( put_user ( ' \n ' , ( ( char __user * ) buffer ) + len ) )
return - EFAULT ;
len + + ;
}
* lenp = len ;
* ppos + = len ;
}
return 0 ;
}
2006-10-02 13:18:04 +04:00
/**
* proc_dostring - read a string sysctl
* @ table : the sysctl table
* @ write : % TRUE if this is a write to the sysctl file
* @ filp : the file structure
* @ buffer : the user buffer
* @ lenp : the size of the user buffer
* @ ppos : file position
*
* Reads / writes a string from / to the user buffer . If the kernel
* buffer provided is not large enough to hold the string , the
* string is truncated . The copied string is % NULL - terminated .
* If the string is being read by the user process , it is copied
* and a newline ' \n ' is added . It is truncated if the buffer is
* not large enough .
*
* Returns 0 on success .
*/
2007-10-18 14:05:22 +04:00
int proc_dostring ( struct ctl_table * table , int write , struct file * filp ,
2006-10-02 13:18:04 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
return _proc_do_string ( table - > data , table - > maxlen , write , filp ,
buffer , lenp , ppos ) ;
}
2005-04-17 02:20:36 +04:00
static int do_proc_dointvec_conv ( int * negp , unsigned long * lvalp ,
int * valp ,
int write , void * data )
{
if ( write ) {
* valp = * negp ? - * lvalp : * lvalp ;
} else {
int val = * valp ;
if ( val < 0 ) {
* negp = - 1 ;
* lvalp = ( unsigned long ) - val ;
} else {
* negp = 0 ;
* lvalp = ( unsigned long ) val ;
}
}
return 0 ;
}
2007-10-18 14:05:22 +04:00
static int __do_proc_dointvec ( void * tbl_data , struct ctl_table * table ,
2006-10-02 13:18:23 +04:00
int write , struct file * filp , void __user * buffer ,
size_t * lenp , loff_t * ppos ,
2005-04-17 02:20:36 +04:00
int ( * conv ) ( int * negp , unsigned long * lvalp , int * valp ,
int write , void * data ) ,
void * data )
{
# define TMPBUFLEN 21
int * i , vleft , first = 1 , neg , val ;
unsigned long lval ;
size_t left , len ;
char buf [ TMPBUFLEN ] , * p ;
char __user * s = buffer ;
2006-10-02 13:18:23 +04:00
if ( ! tbl_data | | ! table - > maxlen | | ! * lenp | |
2005-04-17 02:20:36 +04:00
( * ppos & & ! write ) ) {
* lenp = 0 ;
return 0 ;
}
2006-10-02 13:18:23 +04:00
i = ( int * ) tbl_data ;
2005-04-17 02:20:36 +04:00
vleft = table - > maxlen / sizeof ( * i ) ;
left = * lenp ;
if ( ! conv )
conv = do_proc_dointvec_conv ;
for ( ; left & & vleft - - ; i + + , first = 0 ) {
if ( write ) {
while ( left ) {
char c ;
if ( get_user ( c , s ) )
return - EFAULT ;
if ( ! isspace ( c ) )
break ;
left - - ;
s + + ;
}
if ( ! left )
break ;
neg = 0 ;
len = left ;
if ( len > sizeof ( buf ) - 1 )
len = sizeof ( buf ) - 1 ;
if ( copy_from_user ( buf , s , len ) )
return - EFAULT ;
buf [ len ] = 0 ;
p = buf ;
if ( * p = = ' - ' & & left > 1 ) {
neg = 1 ;
2006-12-07 07:39:09 +03:00
p + + ;
2005-04-17 02:20:36 +04:00
}
if ( * p < ' 0 ' | | * p > ' 9 ' )
break ;
lval = simple_strtoul ( p , & p , 0 ) ;
len = p - buf ;
if ( ( len < left ) & & * p & & ! isspace ( * p ) )
break ;
if ( neg )
val = - val ;
s + = len ;
left - = len ;
if ( conv ( & neg , & lval , i , 1 , data ) )
break ;
} else {
p = buf ;
if ( ! first )
* p + + = ' \t ' ;
if ( conv ( & neg , & lval , i , 0 , data ) )
break ;
sprintf ( p , " %s%lu " , neg ? " - " : " " , lval ) ;
len = strlen ( buf ) ;
if ( len > left )
len = left ;
if ( copy_to_user ( s , buf , len ) )
return - EFAULT ;
left - = len ;
s + = len ;
}
}
if ( ! write & & ! first & & left ) {
if ( put_user ( ' \n ' , s ) )
return - EFAULT ;
left - - , s + + ;
}
if ( write ) {
while ( left ) {
char c ;
if ( get_user ( c , s + + ) )
return - EFAULT ;
if ( ! isspace ( c ) )
break ;
left - - ;
}
}
if ( write & & first )
return - EINVAL ;
* lenp - = left ;
* ppos + = * lenp ;
return 0 ;
# undef TMPBUFLEN
}
2007-10-18 14:05:22 +04:00
static int do_proc_dointvec ( struct ctl_table * table , int write , struct file * filp ,
2006-10-02 13:18:23 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos ,
int ( * conv ) ( int * negp , unsigned long * lvalp , int * valp ,
int write , void * data ) ,
void * data )
{
return __do_proc_dointvec ( table - > data , table , write , filp ,
buffer , lenp , ppos , conv , data ) ;
}
2005-04-17 02:20:36 +04:00
/**
* proc_dointvec - read a vector of integers
* @ table : the sysctl table
* @ write : % TRUE if this is a write to the sysctl file
* @ filp : the file structure
* @ buffer : the user buffer
* @ lenp : the size of the user buffer
* @ ppos : file position
*
* Reads / writes up to table - > maxlen / sizeof ( unsigned int ) integer
* values from / to the user buffer , treated as an ASCII string .
*
* Returns 0 on success .
*/
2007-10-18 14:05:22 +04:00
int proc_dointvec ( struct ctl_table * table , int write , struct file * filp ,
2005-04-17 02:20:36 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
return do_proc_dointvec ( table , write , filp , buffer , lenp , ppos ,
NULL , NULL ) ;
}
2007-02-10 12:45:24 +03:00
/*
2008-10-16 09:01:41 +04:00
* Taint values can only be increased
* This means we can safely use a temporary .
2007-02-10 12:45:24 +03:00
*/
2008-10-16 09:01:41 +04:00
static int proc_taint ( struct ctl_table * table , int write , struct file * filp ,
2007-02-10 12:45:24 +03:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
2008-10-16 09:01:41 +04:00
struct ctl_table t ;
unsigned long tmptaint = get_taint ( ) ;
int err ;
2007-02-10 12:45:24 +03:00
2007-04-24 01:41:14 +04:00
if ( write & & ! capable ( CAP_SYS_ADMIN ) )
2007-02-10 12:45:24 +03:00
return - EPERM ;
2008-10-16 09:01:41 +04:00
t = * table ;
t . data = & tmptaint ;
err = proc_doulongvec_minmax ( & t , write , filp , buffer , lenp , ppos ) ;
if ( err < 0 )
return err ;
if ( write ) {
/*
* Poor man ' s atomic or . Not worth adding a primitive
* to everyone ' s atomic . h for this
*/
int i ;
for ( i = 0 ; i < BITS_PER_LONG & & tmptaint > > i ; i + + ) {
if ( ( tmptaint > > i ) & 1 )
add_taint ( i ) ;
}
}
return err ;
2007-02-10 12:45:24 +03:00
}
2005-04-17 02:20:36 +04:00
struct do_proc_dointvec_minmax_conv_param {
int * min ;
int * max ;
} ;
static int do_proc_dointvec_minmax_conv ( int * negp , unsigned long * lvalp ,
int * valp ,
int write , void * data )
{
struct do_proc_dointvec_minmax_conv_param * param = data ;
if ( write ) {
int val = * negp ? - * lvalp : * lvalp ;
if ( ( param - > min & & * param - > min > val ) | |
( param - > max & & * param - > max < val ) )
return - EINVAL ;
* valp = val ;
} else {
int val = * valp ;
if ( val < 0 ) {
* negp = - 1 ;
* lvalp = ( unsigned long ) - val ;
} else {
* negp = 0 ;
* lvalp = ( unsigned long ) val ;
}
}
return 0 ;
}
/**
* proc_dointvec_minmax - read a vector of integers with min / max values
* @ table : the sysctl table
* @ write : % TRUE if this is a write to the sysctl file
* @ filp : the file structure
* @ buffer : the user buffer
* @ lenp : the size of the user buffer
* @ ppos : file position
*
* Reads / writes up to table - > maxlen / sizeof ( unsigned int ) integer
* values from / to the user buffer , treated as an ASCII string .
*
* This routine will ensure the values are within the range specified by
* table - > extra1 ( min ) and table - > extra2 ( max ) .
*
* Returns 0 on success .
*/
2007-10-18 14:05:22 +04:00
int proc_dointvec_minmax ( struct ctl_table * table , int write , struct file * filp ,
2005-04-17 02:20:36 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
struct do_proc_dointvec_minmax_conv_param param = {
. min = ( int * ) table - > extra1 ,
. max = ( int * ) table - > extra2 ,
} ;
return do_proc_dointvec ( table , write , filp , buffer , lenp , ppos ,
do_proc_dointvec_minmax_conv , & param ) ;
}
2007-10-18 14:05:22 +04:00
static int __do_proc_doulongvec_minmax ( void * data , struct ctl_table * table , int write ,
2005-04-17 02:20:36 +04:00
struct file * filp ,
void __user * buffer ,
size_t * lenp , loff_t * ppos ,
unsigned long convmul ,
unsigned long convdiv )
{
# define TMPBUFLEN 21
unsigned long * i , * min , * max , val ;
int vleft , first = 1 , neg ;
size_t len , left ;
char buf [ TMPBUFLEN ] , * p ;
char __user * s = buffer ;
2006-10-02 13:18:23 +04:00
if ( ! data | | ! table - > maxlen | | ! * lenp | |
2005-04-17 02:20:36 +04:00
( * ppos & & ! write ) ) {
* lenp = 0 ;
return 0 ;
}
2006-10-02 13:18:23 +04:00
i = ( unsigned long * ) data ;
2005-04-17 02:20:36 +04:00
min = ( unsigned long * ) table - > extra1 ;
max = ( unsigned long * ) table - > extra2 ;
vleft = table - > maxlen / sizeof ( unsigned long ) ;
left = * lenp ;
for ( ; left & & vleft - - ; i + + , min + + , max + + , first = 0 ) {
if ( write ) {
while ( left ) {
char c ;
if ( get_user ( c , s ) )
return - EFAULT ;
if ( ! isspace ( c ) )
break ;
left - - ;
s + + ;
}
if ( ! left )
break ;
neg = 0 ;
len = left ;
if ( len > TMPBUFLEN - 1 )
len = TMPBUFLEN - 1 ;
if ( copy_from_user ( buf , s , len ) )
return - EFAULT ;
buf [ len ] = 0 ;
p = buf ;
if ( * p = = ' - ' & & left > 1 ) {
neg = 1 ;
2006-12-07 07:39:09 +03:00
p + + ;
2005-04-17 02:20:36 +04:00
}
if ( * p < ' 0 ' | | * p > ' 9 ' )
break ;
val = simple_strtoul ( p , & p , 0 ) * convmul / convdiv ;
len = p - buf ;
if ( ( len < left ) & & * p & & ! isspace ( * p ) )
break ;
if ( neg )
val = - val ;
s + = len ;
left - = len ;
if ( neg )
continue ;
if ( ( min & & val < * min ) | | ( max & & val > * max ) )
continue ;
* i = val ;
} else {
p = buf ;
if ( ! first )
* p + + = ' \t ' ;
sprintf ( p , " %lu " , convdiv * ( * i ) / convmul ) ;
len = strlen ( buf ) ;
if ( len > left )
len = left ;
if ( copy_to_user ( s , buf , len ) )
return - EFAULT ;
left - = len ;
s + = len ;
}
}
if ( ! write & & ! first & & left ) {
if ( put_user ( ' \n ' , s ) )
return - EFAULT ;
left - - , s + + ;
}
if ( write ) {
while ( left ) {
char c ;
if ( get_user ( c , s + + ) )
return - EFAULT ;
if ( ! isspace ( c ) )
break ;
left - - ;
}
}
if ( write & & first )
return - EINVAL ;
* lenp - = left ;
* ppos + = * lenp ;
return 0 ;
# undef TMPBUFLEN
}
2007-10-18 14:05:22 +04:00
static int do_proc_doulongvec_minmax ( struct ctl_table * table , int write ,
2006-10-02 13:18:23 +04:00
struct file * filp ,
void __user * buffer ,
size_t * lenp , loff_t * ppos ,
unsigned long convmul ,
unsigned long convdiv )
{
return __do_proc_doulongvec_minmax ( table - > data , table , write ,
filp , buffer , lenp , ppos , convmul , convdiv ) ;
}
2005-04-17 02:20:36 +04:00
/**
* proc_doulongvec_minmax - read a vector of long integers with min / max values
* @ table : the sysctl table
* @ write : % TRUE if this is a write to the sysctl file
* @ filp : the file structure
* @ buffer : the user buffer
* @ lenp : the size of the user buffer
* @ ppos : file position
*
* Reads / writes up to table - > maxlen / sizeof ( unsigned long ) unsigned long
* values from / to the user buffer , treated as an ASCII string .
*
* This routine will ensure the values are within the range specified by
* table - > extra1 ( min ) and table - > extra2 ( max ) .
*
* Returns 0 on success .
*/
2007-10-18 14:05:22 +04:00
int proc_doulongvec_minmax ( struct ctl_table * table , int write , struct file * filp ,
2005-04-17 02:20:36 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
return do_proc_doulongvec_minmax ( table , write , filp , buffer , lenp , ppos , 1l , 1l ) ;
}
/**
* proc_doulongvec_ms_jiffies_minmax - read a vector of millisecond values with min / max values
* @ table : the sysctl table
* @ write : % TRUE if this is a write to the sysctl file
* @ filp : the file structure
* @ buffer : the user buffer
* @ lenp : the size of the user buffer
* @ ppos : file position
*
* Reads / writes up to table - > maxlen / sizeof ( unsigned long ) unsigned long
* values from / to the user buffer , treated as an ASCII string . The values
* are treated as milliseconds , and converted to jiffies when they are stored .
*
* This routine will ensure the values are within the range specified by
* table - > extra1 ( min ) and table - > extra2 ( max ) .
*
* Returns 0 on success .
*/
2007-10-18 14:05:22 +04:00
int proc_doulongvec_ms_jiffies_minmax ( struct ctl_table * table , int write ,
2005-04-17 02:20:36 +04:00
struct file * filp ,
void __user * buffer ,
size_t * lenp , loff_t * ppos )
{
return do_proc_doulongvec_minmax ( table , write , filp , buffer ,
lenp , ppos , HZ , 1000l ) ;
}
static int do_proc_dointvec_jiffies_conv ( int * negp , unsigned long * lvalp ,
int * valp ,
int write , void * data )
{
if ( write ) {
2006-03-24 14:15:50 +03:00
if ( * lvalp > LONG_MAX / HZ )
return 1 ;
2005-04-17 02:20:36 +04:00
* valp = * negp ? - ( * lvalp * HZ ) : ( * lvalp * HZ ) ;
} else {
int val = * valp ;
unsigned long lval ;
if ( val < 0 ) {
* negp = - 1 ;
lval = ( unsigned long ) - val ;
} else {
* negp = 0 ;
lval = ( unsigned long ) val ;
}
* lvalp = lval / HZ ;
}
return 0 ;
}
static int do_proc_dointvec_userhz_jiffies_conv ( int * negp , unsigned long * lvalp ,
int * valp ,
int write , void * data )
{
if ( write ) {
2006-03-24 14:15:50 +03:00
if ( USER_HZ < HZ & & * lvalp > ( LONG_MAX / HZ ) * USER_HZ )
return 1 ;
2005-04-17 02:20:36 +04:00
* valp = clock_t_to_jiffies ( * negp ? - * lvalp : * lvalp ) ;
} else {
int val = * valp ;
unsigned long lval ;
if ( val < 0 ) {
* negp = - 1 ;
lval = ( unsigned long ) - val ;
} else {
* negp = 0 ;
lval = ( unsigned long ) val ;
}
* lvalp = jiffies_to_clock_t ( lval ) ;
}
return 0 ;
}
static int do_proc_dointvec_ms_jiffies_conv ( int * negp , unsigned long * lvalp ,
int * valp ,
int write , void * data )
{
if ( write ) {
* valp = msecs_to_jiffies ( * negp ? - * lvalp : * lvalp ) ;
} else {
int val = * valp ;
unsigned long lval ;
if ( val < 0 ) {
* negp = - 1 ;
lval = ( unsigned long ) - val ;
} else {
* negp = 0 ;
lval = ( unsigned long ) val ;
}
* lvalp = jiffies_to_msecs ( lval ) ;
}
return 0 ;
}
/**
* proc_dointvec_jiffies - read a vector of integers as seconds
* @ table : the sysctl table
* @ write : % TRUE if this is a write to the sysctl file
* @ filp : the file structure
* @ buffer : the user buffer
* @ lenp : the size of the user buffer
* @ ppos : file position
*
* Reads / writes up to table - > maxlen / sizeof ( unsigned int ) integer
* values from / to the user buffer , treated as an ASCII string .
* The values read are assumed to be in seconds , and are converted into
* jiffies .
*
* Returns 0 on success .
*/
2007-10-18 14:05:22 +04:00
int proc_dointvec_jiffies ( struct ctl_table * table , int write , struct file * filp ,
2005-04-17 02:20:36 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
return do_proc_dointvec ( table , write , filp , buffer , lenp , ppos ,
do_proc_dointvec_jiffies_conv , NULL ) ;
}
/**
* proc_dointvec_userhz_jiffies - read a vector of integers as 1 / USER_HZ seconds
* @ table : the sysctl table
* @ write : % TRUE if this is a write to the sysctl file
* @ filp : the file structure
* @ buffer : the user buffer
* @ lenp : the size of the user buffer
2005-11-07 12:01:06 +03:00
* @ ppos : pointer to the file position
2005-04-17 02:20:36 +04:00
*
* Reads / writes up to table - > maxlen / sizeof ( unsigned int ) integer
* values from / to the user buffer , treated as an ASCII string .
* The values read are assumed to be in 1 / USER_HZ seconds , and
* are converted into jiffies .
*
* Returns 0 on success .
*/
2007-10-18 14:05:22 +04:00
int proc_dointvec_userhz_jiffies ( struct ctl_table * table , int write , struct file * filp ,
2005-04-17 02:20:36 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
return do_proc_dointvec ( table , write , filp , buffer , lenp , ppos ,
do_proc_dointvec_userhz_jiffies_conv , NULL ) ;
}
/**
* proc_dointvec_ms_jiffies - read a vector of integers as 1 milliseconds
* @ table : the sysctl table
* @ write : % TRUE if this is a write to the sysctl file
* @ filp : the file structure
* @ buffer : the user buffer
* @ lenp : the size of the user buffer
2005-05-01 19:59:26 +04:00
* @ ppos : file position
* @ ppos : the current position in the file
2005-04-17 02:20:36 +04:00
*
* Reads / writes up to table - > maxlen / sizeof ( unsigned int ) integer
* values from / to the user buffer , treated as an ASCII string .
* The values read are assumed to be in 1 / 1000 seconds , and
* are converted into jiffies .
*
* Returns 0 on success .
*/
2007-10-18 14:05:22 +04:00
int proc_dointvec_ms_jiffies ( struct ctl_table * table , int write , struct file * filp ,
2005-04-17 02:20:36 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
return do_proc_dointvec ( table , write , filp , buffer , lenp , ppos ,
do_proc_dointvec_ms_jiffies_conv , NULL ) ;
}
2007-10-18 14:05:22 +04:00
static int proc_do_cad_pid ( struct ctl_table * table , int write , struct file * filp ,
2006-10-02 13:19:00 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
struct pid * new_pid ;
pid_t tmp ;
int r ;
2008-02-08 15:19:20 +03:00
tmp = pid_vnr ( cad_pid ) ;
2006-10-02 13:19:00 +04:00
r = __do_proc_dointvec ( & tmp , table , write , filp , buffer ,
lenp , ppos , NULL , NULL ) ;
if ( r | | ! write )
return r ;
new_pid = find_get_pid ( tmp ) ;
if ( ! new_pid )
return - ESRCH ;
put_pid ( xchg ( & cad_pid , new_pid ) ) ;
return 0 ;
}
2005-04-17 02:20:36 +04:00
# else /* CONFIG_PROC_FS */
2007-10-18 14:05:22 +04:00
int proc_dostring ( struct ctl_table * table , int write , struct file * filp ,
2005-04-17 02:20:36 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
return - ENOSYS ;
}
2007-10-18 14:05:22 +04:00
int proc_dointvec ( struct ctl_table * table , int write , struct file * filp ,
2005-04-17 02:20:36 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
return - ENOSYS ;
}
2007-10-18 14:05:22 +04:00
int proc_dointvec_minmax ( struct ctl_table * table , int write , struct file * filp ,
2005-04-17 02:20:36 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
return - ENOSYS ;
}
2007-10-18 14:05:22 +04:00
int proc_dointvec_jiffies ( struct ctl_table * table , int write , struct file * filp ,
2005-04-17 02:20:36 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
return - ENOSYS ;
}
2007-10-18 14:05:22 +04:00
int proc_dointvec_userhz_jiffies ( struct ctl_table * table , int write , struct file * filp ,
2005-04-17 02:20:36 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
return - ENOSYS ;
}
2007-10-18 14:05:22 +04:00
int proc_dointvec_ms_jiffies ( struct ctl_table * table , int write , struct file * filp ,
2005-04-17 02:20:36 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
return - ENOSYS ;
}
2007-10-18 14:05:22 +04:00
int proc_doulongvec_minmax ( struct ctl_table * table , int write , struct file * filp ,
2005-04-17 02:20:36 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
return - ENOSYS ;
}
2007-10-18 14:05:22 +04:00
int proc_doulongvec_ms_jiffies_minmax ( struct ctl_table * table , int write ,
2005-04-17 02:20:36 +04:00
struct file * filp ,
void __user * buffer ,
size_t * lenp , loff_t * ppos )
{
return - ENOSYS ;
}
# endif /* CONFIG_PROC_FS */
2006-09-27 12:51:04 +04:00
# ifdef CONFIG_SYSCTL_SYSCALL
2005-04-17 02:20:36 +04:00
/*
* General sysctl support routines
*/
2007-10-18 14:05:23 +04:00
/* The generic sysctl data routine (used if no strategy routine supplied) */
2008-10-16 09:04:23 +04:00
int sysctl_data ( struct ctl_table * table ,
2007-10-18 14:05:23 +04:00
void __user * oldval , size_t __user * oldlenp ,
void __user * newval , size_t newlen )
{
size_t len ;
/* Get out of I don't have a variable */
if ( ! table - > data | | ! table - > maxlen )
return - ENOTDIR ;
if ( oldval & & oldlenp ) {
if ( get_user ( len , oldlenp ) )
return - EFAULT ;
if ( len ) {
if ( len > table - > maxlen )
len = table - > maxlen ;
if ( copy_to_user ( oldval , table - > data , len ) )
return - EFAULT ;
if ( put_user ( len , oldlenp ) )
return - EFAULT ;
}
}
if ( newval & & newlen ) {
if ( newlen > table - > maxlen )
newlen = table - > maxlen ;
if ( copy_from_user ( table - > data , newval , newlen ) )
return - EFAULT ;
}
return 1 ;
}
2005-04-17 02:20:36 +04:00
/* The generic string strategy routine: */
2008-10-16 09:04:23 +04:00
int sysctl_string ( struct ctl_table * table ,
2005-04-17 02:20:36 +04:00
void __user * oldval , size_t __user * oldlenp ,
2006-12-10 13:19:10 +03:00
void __user * newval , size_t newlen )
2005-04-17 02:20:36 +04:00
{
if ( ! table - > data | | ! table - > maxlen )
return - ENOTDIR ;
if ( oldval & & oldlenp ) {
2006-01-01 04:00:29 +03:00
size_t bufsize ;
if ( get_user ( bufsize , oldlenp ) )
2005-04-17 02:20:36 +04:00
return - EFAULT ;
2006-01-01 04:00:29 +03:00
if ( bufsize ) {
size_t len = strlen ( table - > data ) , copied ;
/* This shouldn't trigger for a well-formed sysctl */
if ( len > table - > maxlen )
2005-04-17 02:20:36 +04:00
len = table - > maxlen ;
2006-01-01 04:00:29 +03:00
/* Copy up to a max of bufsize-1 bytes of the string */
copied = ( len > = bufsize ) ? bufsize - 1 : len ;
if ( copy_to_user ( oldval , table - > data , copied ) | |
put_user ( 0 , ( char __user * ) ( oldval + copied ) ) )
2005-04-17 02:20:36 +04:00
return - EFAULT ;
2006-01-01 04:00:29 +03:00
if ( put_user ( len , oldlenp ) )
2005-04-17 02:20:36 +04:00
return - EFAULT ;
}
}
if ( newval & & newlen ) {
2006-01-01 04:00:29 +03:00
size_t len = newlen ;
2005-04-17 02:20:36 +04:00
if ( len > table - > maxlen )
len = table - > maxlen ;
if ( copy_from_user ( table - > data , newval , len ) )
return - EFAULT ;
if ( len = = table - > maxlen )
len - - ;
( ( char * ) table - > data ) [ len ] = 0 ;
}
2005-12-30 11:37:10 +03:00
return 1 ;
2005-04-17 02:20:36 +04:00
}
/*
* This function makes sure that all of the integers in the vector
* are between the minimum and maximum values given in the arrays
* table - > extra1 and table - > extra2 , respectively .
*/
2008-10-16 09:04:23 +04:00
int sysctl_intvec ( struct ctl_table * table ,
2005-04-17 02:20:36 +04:00
void __user * oldval , size_t __user * oldlenp ,
2006-12-10 13:19:10 +03:00
void __user * newval , size_t newlen )
2005-04-17 02:20:36 +04:00
{
if ( newval & & newlen ) {
int __user * vec = ( int __user * ) newval ;
int * min = ( int * ) table - > extra1 ;
int * max = ( int * ) table - > extra2 ;
size_t length ;
int i ;
if ( newlen % sizeof ( int ) ! = 0 )
return - EINVAL ;
if ( ! table - > extra1 & & ! table - > extra2 )
return 0 ;
if ( newlen > table - > maxlen )
newlen = table - > maxlen ;
length = newlen / sizeof ( int ) ;
for ( i = 0 ; i < length ; i + + ) {
int value ;
if ( get_user ( value , vec + i ) )
return - EFAULT ;
if ( min & & value < min [ i ] )
return - EINVAL ;
if ( max & & value > max [ i ] )
return - EINVAL ;
}
}
return 0 ;
}
/* Strategy function to convert jiffies to seconds */
2008-10-16 09:04:23 +04:00
int sysctl_jiffies ( struct ctl_table * table ,
2005-04-17 02:20:36 +04:00
void __user * oldval , size_t __user * oldlenp ,
2006-12-10 13:19:10 +03:00
void __user * newval , size_t newlen )
2005-04-17 02:20:36 +04:00
{
[PATCH] sysctl_{,ms_}jiffies: fix oldlen semantics
currently it's
1) if *oldlenp == 0,
don't writeback anything
2) if *oldlenp >= table->maxlen,
don't writeback more than table->maxlen bytes and rewrite *oldlenp
don't look at underlying type granularity
3) if 0 < *oldlenp < table->maxlen,
*cough*
string sysctls don't writeback more than *oldlenp bytes.
OK, that's because sizeof(char) == 1
int sysctls writeback anything in (0, table->maxlen] range
Though accept integers divisible by sizeof(int) for writing.
sysctl_jiffies and sysctl_ms_jiffies don't writeback anything but
sizeof(int), which violates 1) and 2).
So, make sysctl_jiffies and sysctl_ms_jiffies accept
a) *oldlenp == 0, not doing writeback
b) *oldlenp >= sizeof(int), writing one integer.
-EINVAL still returned for *oldlenp == 1, 2, 3.
Signed-off-by: Alexey Dobriyan <adobriyan@openvz.org>
Cc: "Eric W. Biederman" <ebiederm@xmission.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-02-10 12:44:39 +03:00
if ( oldval & & oldlenp ) {
2005-04-17 02:20:36 +04:00
size_t olen ;
[PATCH] sysctl_{,ms_}jiffies: fix oldlen semantics
currently it's
1) if *oldlenp == 0,
don't writeback anything
2) if *oldlenp >= table->maxlen,
don't writeback more than table->maxlen bytes and rewrite *oldlenp
don't look at underlying type granularity
3) if 0 < *oldlenp < table->maxlen,
*cough*
string sysctls don't writeback more than *oldlenp bytes.
OK, that's because sizeof(char) == 1
int sysctls writeback anything in (0, table->maxlen] range
Though accept integers divisible by sizeof(int) for writing.
sysctl_jiffies and sysctl_ms_jiffies don't writeback anything but
sizeof(int), which violates 1) and 2).
So, make sysctl_jiffies and sysctl_ms_jiffies accept
a) *oldlenp == 0, not doing writeback
b) *oldlenp >= sizeof(int), writing one integer.
-EINVAL still returned for *oldlenp == 1, 2, 3.
Signed-off-by: Alexey Dobriyan <adobriyan@openvz.org>
Cc: "Eric W. Biederman" <ebiederm@xmission.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-02-10 12:44:39 +03:00
if ( get_user ( olen , oldlenp ) )
return - EFAULT ;
if ( olen ) {
int val ;
if ( olen < sizeof ( int ) )
return - EINVAL ;
val = * ( int * ) ( table - > data ) / HZ ;
if ( put_user ( val , ( int __user * ) oldval ) )
return - EFAULT ;
if ( put_user ( sizeof ( int ) , oldlenp ) )
2005-04-17 02:20:36 +04:00
return - EFAULT ;
}
}
if ( newval & & newlen ) {
int new ;
if ( newlen ! = sizeof ( int ) )
return - EINVAL ;
if ( get_user ( new , ( int __user * ) newval ) )
return - EFAULT ;
* ( int * ) ( table - > data ) = new * HZ ;
}
return 1 ;
}
/* Strategy function to convert jiffies to seconds */
2008-10-16 09:04:23 +04:00
int sysctl_ms_jiffies ( struct ctl_table * table ,
2005-04-17 02:20:36 +04:00
void __user * oldval , size_t __user * oldlenp ,
2006-12-10 13:19:10 +03:00
void __user * newval , size_t newlen )
2005-04-17 02:20:36 +04:00
{
[PATCH] sysctl_{,ms_}jiffies: fix oldlen semantics
currently it's
1) if *oldlenp == 0,
don't writeback anything
2) if *oldlenp >= table->maxlen,
don't writeback more than table->maxlen bytes and rewrite *oldlenp
don't look at underlying type granularity
3) if 0 < *oldlenp < table->maxlen,
*cough*
string sysctls don't writeback more than *oldlenp bytes.
OK, that's because sizeof(char) == 1
int sysctls writeback anything in (0, table->maxlen] range
Though accept integers divisible by sizeof(int) for writing.
sysctl_jiffies and sysctl_ms_jiffies don't writeback anything but
sizeof(int), which violates 1) and 2).
So, make sysctl_jiffies and sysctl_ms_jiffies accept
a) *oldlenp == 0, not doing writeback
b) *oldlenp >= sizeof(int), writing one integer.
-EINVAL still returned for *oldlenp == 1, 2, 3.
Signed-off-by: Alexey Dobriyan <adobriyan@openvz.org>
Cc: "Eric W. Biederman" <ebiederm@xmission.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-02-10 12:44:39 +03:00
if ( oldval & & oldlenp ) {
2005-04-17 02:20:36 +04:00
size_t olen ;
[PATCH] sysctl_{,ms_}jiffies: fix oldlen semantics
currently it's
1) if *oldlenp == 0,
don't writeback anything
2) if *oldlenp >= table->maxlen,
don't writeback more than table->maxlen bytes and rewrite *oldlenp
don't look at underlying type granularity
3) if 0 < *oldlenp < table->maxlen,
*cough*
string sysctls don't writeback more than *oldlenp bytes.
OK, that's because sizeof(char) == 1
int sysctls writeback anything in (0, table->maxlen] range
Though accept integers divisible by sizeof(int) for writing.
sysctl_jiffies and sysctl_ms_jiffies don't writeback anything but
sizeof(int), which violates 1) and 2).
So, make sysctl_jiffies and sysctl_ms_jiffies accept
a) *oldlenp == 0, not doing writeback
b) *oldlenp >= sizeof(int), writing one integer.
-EINVAL still returned for *oldlenp == 1, 2, 3.
Signed-off-by: Alexey Dobriyan <adobriyan@openvz.org>
Cc: "Eric W. Biederman" <ebiederm@xmission.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-02-10 12:44:39 +03:00
if ( get_user ( olen , oldlenp ) )
return - EFAULT ;
if ( olen ) {
int val ;
if ( olen < sizeof ( int ) )
return - EINVAL ;
val = jiffies_to_msecs ( * ( int * ) ( table - > data ) ) ;
if ( put_user ( val , ( int __user * ) oldval ) )
return - EFAULT ;
if ( put_user ( sizeof ( int ) , oldlenp ) )
2005-04-17 02:20:36 +04:00
return - EFAULT ;
}
}
if ( newval & & newlen ) {
int new ;
if ( newlen ! = sizeof ( int ) )
return - EINVAL ;
if ( get_user ( new , ( int __user * ) newval ) )
return - EFAULT ;
* ( int * ) ( table - > data ) = msecs_to_jiffies ( new ) ;
}
return 1 ;
}
2006-12-08 13:39:55 +03:00
2006-09-27 12:51:04 +04:00
# else /* CONFIG_SYSCTL_SYSCALL */
2005-04-17 02:20:36 +04:00
2009-01-14 16:14:29 +03:00
SYSCALL_DEFINE1 ( sysctl , struct __sysctl_args __user * , args )
2005-04-17 02:20:36 +04:00
{
2006-11-06 10:52:11 +03:00
struct __sysctl_args tmp ;
2007-10-18 14:05:58 +04:00
int error ;
2006-11-06 10:52:11 +03:00
if ( copy_from_user ( & tmp , args , sizeof ( tmp ) ) )
return - EFAULT ;
2007-10-18 14:05:58 +04:00
error = deprecated_sysctl_warning ( & tmp ) ;
2006-09-27 12:51:04 +04:00
2007-10-18 14:05:58 +04:00
/* If no error reading the parameters then just -ENOSYS ... */
if ( ! error )
error = - ENOSYS ;
return error ;
2005-04-17 02:20:36 +04:00
}
2008-10-16 09:04:23 +04:00
int sysctl_data ( struct ctl_table * table ,
2007-10-18 14:05:23 +04:00
void __user * oldval , size_t __user * oldlenp ,
void __user * newval , size_t newlen )
{
return - ENOSYS ;
}
2008-10-16 09:04:23 +04:00
int sysctl_string ( struct ctl_table * table ,
2005-04-17 02:20:36 +04:00
void __user * oldval , size_t __user * oldlenp ,
2006-12-10 13:19:10 +03:00
void __user * newval , size_t newlen )
2005-04-17 02:20:36 +04:00
{
return - ENOSYS ;
}
2008-10-16 09:04:23 +04:00
int sysctl_intvec ( struct ctl_table * table ,
2005-04-17 02:20:36 +04:00
void __user * oldval , size_t __user * oldlenp ,
2006-12-10 13:19:10 +03:00
void __user * newval , size_t newlen )
2005-04-17 02:20:36 +04:00
{
return - ENOSYS ;
}
2008-10-16 09:04:23 +04:00
int sysctl_jiffies ( struct ctl_table * table ,
2005-04-17 02:20:36 +04:00
void __user * oldval , size_t __user * oldlenp ,
2006-12-10 13:19:10 +03:00
void __user * newval , size_t newlen )
2005-04-17 02:20:36 +04:00
{
return - ENOSYS ;
}
2008-10-16 09:04:23 +04:00
int sysctl_ms_jiffies ( struct ctl_table * table ,
2005-04-17 02:20:36 +04:00
void __user * oldval , size_t __user * oldlenp ,
2006-12-10 13:19:10 +03:00
void __user * newval , size_t newlen )
2005-04-17 02:20:36 +04:00
{
return - ENOSYS ;
}
2006-09-27 12:51:04 +04:00
# endif /* CONFIG_SYSCTL_SYSCALL */
2005-04-17 02:20:36 +04:00
2007-10-18 14:05:58 +04:00
static int deprecated_sysctl_warning ( struct __sysctl_args * args )
{
static int msg_count ;
int name [ CTL_MAXNAME ] ;
int i ;
2007-11-15 03:58:38 +03:00
/* Check args->nlen. */
if ( args - > nlen < 0 | | args - > nlen > CTL_MAXNAME )
return - ENOTDIR ;
2007-10-18 14:05:58 +04:00
/* Read in the sysctl name for better debug message logging */
for ( i = 0 ; i < args - > nlen ; i + + )
if ( get_user ( name [ i ] , args - > name + i ) )
return - EFAULT ;
/* Ignore accesses to kernel.version */
if ( ( args - > nlen = = 2 ) & & ( name [ 0 ] = = CTL_KERN ) & & ( name [ 1 ] = = KERN_VERSION ) )
return 0 ;
if ( msg_count < 5 ) {
msg_count + + ;
printk ( KERN_INFO
" warning: process `%s' used the deprecated sysctl "
" system call with " , current - > comm ) ;
for ( i = 0 ; i < args - > nlen ; i + + )
printk ( " %d. " , name [ i ] ) ;
printk ( " \n " ) ;
}
return 0 ;
}
2005-04-17 02:20:36 +04:00
/*
* No sense putting this after each symbol definition , twice ,
* exception granted : - )
*/
EXPORT_SYMBOL ( proc_dointvec ) ;
EXPORT_SYMBOL ( proc_dointvec_jiffies ) ;
EXPORT_SYMBOL ( proc_dointvec_minmax ) ;
EXPORT_SYMBOL ( proc_dointvec_userhz_jiffies ) ;
EXPORT_SYMBOL ( proc_dointvec_ms_jiffies ) ;
EXPORT_SYMBOL ( proc_dostring ) ;
EXPORT_SYMBOL ( proc_doulongvec_minmax ) ;
EXPORT_SYMBOL ( proc_doulongvec_ms_jiffies_minmax ) ;
EXPORT_SYMBOL ( register_sysctl_table ) ;
2007-11-30 15:50:18 +03:00
EXPORT_SYMBOL ( register_sysctl_paths ) ;
2005-04-17 02:20:36 +04:00
EXPORT_SYMBOL ( sysctl_intvec ) ;
EXPORT_SYMBOL ( sysctl_jiffies ) ;
EXPORT_SYMBOL ( sysctl_ms_jiffies ) ;
EXPORT_SYMBOL ( sysctl_string ) ;
2007-10-18 14:05:23 +04:00
EXPORT_SYMBOL ( sysctl_data ) ;
2005-04-17 02:20:36 +04:00
EXPORT_SYMBOL ( unregister_sysctl_table ) ;