blob: b46a416787ec3f883252ea5271ae46e9ef7ecef8 [file] [log] [blame]
Thomas Gleixner47505b82019-05-23 11:14:41 +02001// SPDX-License-Identifier: GPL-2.0-or-later
Vlad Yasevich60c778b2008-01-11 09:57:09 -05002/* SCTP kernel implementation
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 * (C) Copyright IBM Corp. 2002, 2004
4 * Copyright (c) 2002 Intel Corp.
5 *
Vlad Yasevich60c778b2008-01-11 09:57:09 -05006 * This file is part of the SCTP kernel implementation
Linus Torvalds1da177e2005-04-16 15:20:36 -07007 *
8 * Sysctl related interfaces for SCTP.
9 *
Linus Torvalds1da177e2005-04-16 15:20:36 -070010 * Please send any bug reports or fixes you make to the
11 * email address(es):
Daniel Borkmann91705c62013-07-23 14:51:47 +020012 * lksctp developers <linux-sctp@vger.kernel.org>
Linus Torvalds1da177e2005-04-16 15:20:36 -070013 *
Linus Torvalds1da177e2005-04-16 15:20:36 -070014 * Written or modified by:
15 * Mingqin Liu <liuming@us.ibm.com>
16 * Jon Grimm <jgrimm@us.ibm.com>
17 * Ardelle Fan <ardelle.fan@intel.com>
18 * Ryan Layer <rmlayer@us.ibm.com>
19 * Sridhar Samudrala <sri@us.ibm.com>
Linus Torvalds1da177e2005-04-16 15:20:36 -070020 */
21
Daniel Borkmannb58537a2014-06-15 00:59:14 +020022#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
23
Linus Torvalds1da177e2005-04-16 15:20:36 -070024#include <net/sctp/structs.h>
Adrian Bunk8c5955d2005-09-05 18:07:42 -070025#include <net/sctp/sctp.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070026#include <linux/sysctl.h>
27
Vladislav Yasevich3fd091e2006-08-22 13:29:17 -070028static int timer_max = 86400000; /* ms in one day */
Jean-Mickael Guerind48e0742009-05-13 00:03:20 +020029static int sack_timer_min = 1;
30static int sack_timer_max = 500;
Xin Long701ef3e2017-08-05 19:59:53 +080031static int addr_scope_max = SCTP_SCOPE_POLICY_MAX;
Vlad Yasevich90f2f532009-11-23 15:53:57 -050032static int rwnd_scale_max = 16;
Daniel Borkmannb58537a2014-06-15 00:59:14 +020033static int rto_alpha_min = 0;
34static int rto_beta_min = 0;
35static int rto_alpha_max = 1000;
36static int rto_beta_max = 1000;
Xin Longaef587b2019-11-08 13:20:32 +080037static int pf_expose_max = SCTP_PF_EXPOSE_MAX;
Xin Long34515e92019-11-08 13:20:35 +080038static int ps_retrans_max = SCTP_PS_RETRANS_MAX;
Xin Longe8a30012020-10-29 15:05:01 +080039static int udp_port_max = 65535;
Daniel Borkmannb58537a2014-06-15 00:59:14 +020040
Xi Wang2692ba62011-12-16 12:44:15 +000041static unsigned long max_autoclose_min = 0;
42static unsigned long max_autoclose_max =
43 (MAX_SCHEDULE_TIMEOUT / HZ > UINT_MAX)
44 ? UINT_MAX : MAX_SCHEDULE_TIMEOUT / HZ;
Linus Torvalds1da177e2005-04-16 15:20:36 -070045
wangweidongb486b222013-12-11 09:50:40 +080046static int proc_sctp_do_hmac_alg(struct ctl_table *ctl, int write,
Christoph Hellwig32927392020-04-24 08:43:38 +020047 void *buffer, size_t *lenp, loff_t *ppos);
wangweidong4f3fdf32013-12-11 09:50:39 +080048static int proc_sctp_do_rto_min(struct ctl_table *ctl, int write,
Christoph Hellwig32927392020-04-24 08:43:38 +020049 void *buffer, size_t *lenp, loff_t *ppos);
50static int proc_sctp_do_rto_max(struct ctl_table *ctl, int write, void *buffer,
51 size_t *lenp, loff_t *ppos);
Xin Long046c0522020-10-29 15:05:10 +080052static int proc_sctp_do_udp_port(struct ctl_table *ctl, int write, void *buffer,
53 size_t *lenp, loff_t *ppos);
Daniel Borkmannb58537a2014-06-15 00:59:14 +020054static int proc_sctp_do_alpha_beta(struct ctl_table *ctl, int write,
Christoph Hellwig32927392020-04-24 08:43:38 +020055 void *buffer, size_t *lenp, loff_t *ppos);
Vlad Yasevichb14878c2014-04-17 17:26:50 +020056static int proc_sctp_do_auth(struct ctl_table *ctl, int write,
Christoph Hellwig32927392020-04-24 08:43:38 +020057 void *buffer, size_t *lenp, loff_t *ppos);
Xin Longd1e462a2021-06-22 14:04:48 -040058static int proc_sctp_do_probe_interval(struct ctl_table *ctl, int write,
59 void *buffer, size_t *lenp, loff_t *ppos);
wangweidong4f3fdf32013-12-11 09:50:39 +080060
Joe Perchesfe2c6332013-06-11 23:04:25 -070061static struct ctl_table sctp_table[] = {
Linus Torvalds1da177e2005-04-16 15:20:36 -070062 {
Neil Horman4d93df02007-08-15 16:07:44 -070063 .procname = "sctp_mem",
64 .data = &sysctl_sctp_mem,
65 .maxlen = sizeof(sysctl_sctp_mem),
66 .mode = 0644,
Eric Dumazet8d987e52010-11-09 23:24:26 +000067 .proc_handler = proc_doulongvec_minmax
Neil Horman4d93df02007-08-15 16:07:44 -070068 },
69 {
Neil Horman4d93df02007-08-15 16:07:44 -070070 .procname = "sctp_rmem",
71 .data = &sysctl_sctp_rmem,
72 .maxlen = sizeof(sysctl_sctp_rmem),
73 .mode = 0644,
Alexey Dobriyan6d9f2392008-11-03 18:21:05 -080074 .proc_handler = proc_dointvec,
Neil Horman4d93df02007-08-15 16:07:44 -070075 },
76 {
Neil Horman4d93df02007-08-15 16:07:44 -070077 .procname = "sctp_wmem",
78 .data = &sysctl_sctp_wmem,
79 .maxlen = sizeof(sysctl_sctp_wmem),
80 .mode = 0644,
Alexey Dobriyan6d9f2392008-11-03 18:21:05 -080081 .proc_handler = proc_dointvec,
Neil Horman4d93df02007-08-15 16:07:44 -070082 },
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +000083
84 { /* sentinel */ }
85};
86
Joe Perchesfe2c6332013-06-11 23:04:25 -070087static struct ctl_table sctp_net_table[] = {
Vlad Yasevicha29a5bd2007-09-16 19:31:35 -070088 {
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +000089 .procname = "rto_initial",
90 .data = &init_net.sctp.rto_initial,
91 .maxlen = sizeof(unsigned int),
92 .mode = 0644,
93 .proc_handler = proc_dointvec_minmax,
Matteo Croceeec48442019-07-18 15:58:50 -070094 .extra1 = SYSCTL_ONE,
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +000095 .extra2 = &timer_max
96 },
97 {
98 .procname = "rto_min",
99 .data = &init_net.sctp.rto_min,
100 .maxlen = sizeof(unsigned int),
101 .mode = 0644,
wangweidong4f3fdf32013-12-11 09:50:39 +0800102 .proc_handler = proc_sctp_do_rto_min,
Matteo Croceeec48442019-07-18 15:58:50 -0700103 .extra1 = SYSCTL_ONE,
wangweidong4f3fdf32013-12-11 09:50:39 +0800104 .extra2 = &init_net.sctp.rto_max
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000105 },
106 {
107 .procname = "rto_max",
108 .data = &init_net.sctp.rto_max,
109 .maxlen = sizeof(unsigned int),
110 .mode = 0644,
wangweidong4f3fdf32013-12-11 09:50:39 +0800111 .proc_handler = proc_sctp_do_rto_max,
112 .extra1 = &init_net.sctp.rto_min,
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000113 .extra2 = &timer_max
114 },
115 {
116 .procname = "rto_alpha_exp_divisor",
117 .data = &init_net.sctp.rto_alpha,
118 .maxlen = sizeof(int),
Daniel Borkmannb58537a2014-06-15 00:59:14 +0200119 .mode = 0644,
120 .proc_handler = proc_sctp_do_alpha_beta,
121 .extra1 = &rto_alpha_min,
122 .extra2 = &rto_alpha_max,
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000123 },
124 {
125 .procname = "rto_beta_exp_divisor",
126 .data = &init_net.sctp.rto_beta,
127 .maxlen = sizeof(int),
Daniel Borkmannb58537a2014-06-15 00:59:14 +0200128 .mode = 0644,
129 .proc_handler = proc_sctp_do_alpha_beta,
130 .extra1 = &rto_beta_min,
131 .extra2 = &rto_beta_max,
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000132 },
133 {
134 .procname = "max_burst",
135 .data = &init_net.sctp.max_burst,
136 .maxlen = sizeof(int),
137 .mode = 0644,
138 .proc_handler = proc_dointvec_minmax,
Matteo Croceeec48442019-07-18 15:58:50 -0700139 .extra1 = SYSCTL_ZERO,
140 .extra2 = SYSCTL_INT_MAX,
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000141 },
142 {
143 .procname = "cookie_preserve_enable",
144 .data = &init_net.sctp.cookie_preserve_enable,
145 .maxlen = sizeof(int),
146 .mode = 0644,
147 .proc_handler = proc_dointvec,
148 },
149 {
Neil Horman3c681982012-10-24 09:20:03 +0000150 .procname = "cookie_hmac_alg",
wangweidong22a1f5142014-02-12 09:44:43 +0800151 .data = &init_net.sctp.sctp_hmac_alg,
Neil Horman3c681982012-10-24 09:20:03 +0000152 .maxlen = 8,
153 .mode = 0644,
154 .proc_handler = proc_sctp_do_hmac_alg,
155 },
156 {
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000157 .procname = "valid_cookie_life",
158 .data = &init_net.sctp.valid_cookie_life,
159 .maxlen = sizeof(unsigned int),
160 .mode = 0644,
161 .proc_handler = proc_dointvec_minmax,
Matteo Croceeec48442019-07-18 15:58:50 -0700162 .extra1 = SYSCTL_ONE,
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000163 .extra2 = &timer_max
164 },
165 {
166 .procname = "sack_timeout",
167 .data = &init_net.sctp.sack_timeout,
168 .maxlen = sizeof(int),
169 .mode = 0644,
170 .proc_handler = proc_dointvec_minmax,
171 .extra1 = &sack_timer_min,
172 .extra2 = &sack_timer_max,
173 },
174 {
175 .procname = "hb_interval",
176 .data = &init_net.sctp.hb_interval,
177 .maxlen = sizeof(unsigned int),
178 .mode = 0644,
179 .proc_handler = proc_dointvec_minmax,
Matteo Croceeec48442019-07-18 15:58:50 -0700180 .extra1 = SYSCTL_ONE,
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000181 .extra2 = &timer_max
182 },
183 {
184 .procname = "association_max_retrans",
185 .data = &init_net.sctp.max_retrans_association,
186 .maxlen = sizeof(int),
187 .mode = 0644,
188 .proc_handler = proc_dointvec_minmax,
Matteo Croceeec48442019-07-18 15:58:50 -0700189 .extra1 = SYSCTL_ONE,
190 .extra2 = SYSCTL_INT_MAX,
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000191 },
192 {
193 .procname = "path_max_retrans",
194 .data = &init_net.sctp.max_retrans_path,
195 .maxlen = sizeof(int),
196 .mode = 0644,
197 .proc_handler = proc_dointvec_minmax,
Matteo Croceeec48442019-07-18 15:58:50 -0700198 .extra1 = SYSCTL_ONE,
199 .extra2 = SYSCTL_INT_MAX,
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000200 },
201 {
202 .procname = "max_init_retransmits",
203 .data = &init_net.sctp.max_retrans_init,
204 .maxlen = sizeof(int),
205 .mode = 0644,
206 .proc_handler = proc_dointvec_minmax,
Matteo Croceeec48442019-07-18 15:58:50 -0700207 .extra1 = SYSCTL_ONE,
208 .extra2 = SYSCTL_INT_MAX,
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000209 },
210 {
211 .procname = "pf_retrans",
212 .data = &init_net.sctp.pf_retrans,
213 .maxlen = sizeof(int),
214 .mode = 0644,
215 .proc_handler = proc_dointvec_minmax,
Matteo Croceeec48442019-07-18 15:58:50 -0700216 .extra1 = SYSCTL_ZERO,
Xin Long34515e92019-11-08 13:20:35 +0800217 .extra2 = &init_net.sctp.ps_retrans,
218 },
219 {
220 .procname = "ps_retrans",
221 .data = &init_net.sctp.ps_retrans,
222 .maxlen = sizeof(int),
223 .mode = 0644,
224 .proc_handler = proc_dointvec_minmax,
225 .extra1 = &init_net.sctp.pf_retrans,
226 .extra2 = &ps_retrans_max,
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000227 },
228 {
229 .procname = "sndbuf_policy",
230 .data = &init_net.sctp.sndbuf_policy,
231 .maxlen = sizeof(int),
232 .mode = 0644,
233 .proc_handler = proc_dointvec,
234 },
235 {
236 .procname = "rcvbuf_policy",
237 .data = &init_net.sctp.rcvbuf_policy,
238 .maxlen = sizeof(int),
239 .mode = 0644,
240 .proc_handler = proc_dointvec,
241 },
242 {
243 .procname = "default_auto_asconf",
244 .data = &init_net.sctp.default_auto_asconf,
245 .maxlen = sizeof(int),
246 .mode = 0644,
247 .proc_handler = proc_dointvec,
248 },
249 {
250 .procname = "addip_enable",
251 .data = &init_net.sctp.addip_enable,
Vlad Yasevicha29a5bd2007-09-16 19:31:35 -0700252 .maxlen = sizeof(int),
253 .mode = 0644,
Alexey Dobriyan6d9f2392008-11-03 18:21:05 -0800254 .proc_handler = proc_dointvec,
Vlad Yasevicha29a5bd2007-09-16 19:31:35 -0700255 },
Vlad Yasevich73d9c4f2007-10-24 17:24:26 -0400256 {
Vlad Yasevich73d9c4f2007-10-24 17:24:26 -0400257 .procname = "addip_noauth_enable",
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000258 .data = &init_net.sctp.addip_noauth,
259 .maxlen = sizeof(int),
260 .mode = 0644,
261 .proc_handler = proc_dointvec,
262 },
263 {
264 .procname = "prsctp_enable",
265 .data = &init_net.sctp.prsctp_enable,
266 .maxlen = sizeof(int),
267 .mode = 0644,
268 .proc_handler = proc_dointvec,
269 },
270 {
Xin Longc0d8bab2017-03-10 12:11:12 +0800271 .procname = "reconf_enable",
272 .data = &init_net.sctp.reconf_enable,
273 .maxlen = sizeof(int),
274 .mode = 0644,
275 .proc_handler = proc_dointvec,
276 },
277 {
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000278 .procname = "auth_enable",
279 .data = &init_net.sctp.auth_enable,
Vlad Yasevich73d9c4f2007-10-24 17:24:26 -0400280 .maxlen = sizeof(int),
281 .mode = 0644,
Vlad Yasevichb14878c2014-04-17 17:26:50 +0200282 .proc_handler = proc_sctp_do_auth,
Vlad Yasevich73d9c4f2007-10-24 17:24:26 -0400283 },
Bhaskar Dutta72388432009-09-03 17:25:47 +0530284 {
Xin Long463118c2017-12-15 00:41:32 +0800285 .procname = "intl_enable",
286 .data = &init_net.sctp.intl_enable,
287 .maxlen = sizeof(int),
288 .mode = 0644,
289 .proc_handler = proc_dointvec,
290 },
291 {
Xin Long2f5268a2019-08-26 16:30:03 +0800292 .procname = "ecn_enable",
293 .data = &init_net.sctp.ecn_enable,
294 .maxlen = sizeof(int),
295 .mode = 0644,
296 .proc_handler = proc_dointvec,
297 },
298 {
Xin Longd1e462a2021-06-22 14:04:48 -0400299 .procname = "plpmtud_probe_interval",
300 .data = &init_net.sctp.probe_interval,
301 .maxlen = sizeof(int),
302 .mode = 0644,
303 .proc_handler = proc_sctp_do_probe_interval,
304 },
305 {
Xin Long046c0522020-10-29 15:05:10 +0800306 .procname = "udp_port",
307 .data = &init_net.sctp.udp_port,
308 .maxlen = sizeof(int),
309 .mode = 0644,
310 .proc_handler = proc_sctp_do_udp_port,
311 .extra1 = SYSCTL_ZERO,
312 .extra2 = &udp_port_max,
313 },
314 {
Xin Longe8a30012020-10-29 15:05:01 +0800315 .procname = "encap_port",
316 .data = &init_net.sctp.encap_port,
317 .maxlen = sizeof(int),
318 .mode = 0644,
Xin Longb2540cd2021-05-24 22:49:42 -0400319 .proc_handler = proc_dointvec_minmax,
Xin Longe8a30012020-10-29 15:05:01 +0800320 .extra1 = SYSCTL_ZERO,
321 .extra2 = &udp_port_max,
322 },
323 {
Bhaskar Dutta72388432009-09-03 17:25:47 +0530324 .procname = "addr_scope_policy",
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000325 .data = &init_net.sctp.scope_policy,
Bhaskar Dutta72388432009-09-03 17:25:47 +0530326 .maxlen = sizeof(int),
327 .mode = 0644,
Eric W. Biederman6d456112009-11-16 03:11:48 -0800328 .proc_handler = proc_dointvec_minmax,
Matteo Croceeec48442019-07-18 15:58:50 -0700329 .extra1 = SYSCTL_ZERO,
Bhaskar Dutta72388432009-09-03 17:25:47 +0530330 .extra2 = &addr_scope_max,
331 },
Vlad Yasevich90f2f532009-11-23 15:53:57 -0500332 {
Vlad Yasevich90f2f532009-11-23 15:53:57 -0500333 .procname = "rwnd_update_shift",
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000334 .data = &init_net.sctp.rwnd_upd_shift,
Vlad Yasevich90f2f532009-11-23 15:53:57 -0500335 .maxlen = sizeof(int),
336 .mode = 0644,
337 .proc_handler = &proc_dointvec_minmax,
Matteo Croceeec48442019-07-18 15:58:50 -0700338 .extra1 = SYSCTL_ONE,
Vlad Yasevich90f2f532009-11-23 15:53:57 -0500339 .extra2 = &rwnd_scale_max,
340 },
Xi Wang2692ba62011-12-16 12:44:15 +0000341 {
342 .procname = "max_autoclose",
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000343 .data = &init_net.sctp.max_autoclose,
Xi Wang2692ba62011-12-16 12:44:15 +0000344 .maxlen = sizeof(unsigned long),
345 .mode = 0644,
346 .proc_handler = &proc_doulongvec_minmax,
347 .extra1 = &max_autoclose_min,
348 .extra2 = &max_autoclose_max,
349 },
Zhu Yanjun566178f2015-12-16 13:55:04 +0800350 {
351 .procname = "pf_enable",
352 .data = &init_net.sctp.pf_enable,
353 .maxlen = sizeof(int),
354 .mode = 0644,
355 .proc_handler = proc_dointvec,
356 },
Xin Longaef587b2019-11-08 13:20:32 +0800357 {
358 .procname = "pf_expose",
359 .data = &init_net.sctp.pf_expose,
360 .maxlen = sizeof(int),
361 .mode = 0644,
362 .proc_handler = proc_dointvec_minmax,
363 .extra1 = SYSCTL_ZERO,
364 .extra2 = &pf_expose_max,
365 },
David S. Miller71acc0d2013-08-09 13:09:41 -0700366
Linus Torvaldsd7fc02c2009-12-08 07:55:01 -0800367 { /* sentinel */ }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700368};
369
wangweidongb486b222013-12-11 09:50:40 +0800370static int proc_sctp_do_hmac_alg(struct ctl_table *ctl, int write,
Christoph Hellwig32927392020-04-24 08:43:38 +0200371 void *buffer, size_t *lenp, loff_t *ppos)
Neil Horman3c681982012-10-24 09:20:03 +0000372{
373 struct net *net = current->nsproxy->net_ns;
Joe Perchesfe2c6332013-06-11 23:04:25 -0700374 struct ctl_table tbl;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200375 bool changed = false;
Neil Horman3c681982012-10-24 09:20:03 +0000376 char *none = "none";
Sasha Levin320f1a42016-01-07 14:52:43 -0500377 char tmp[8] = {0};
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200378 int ret;
Neil Horman3c681982012-10-24 09:20:03 +0000379
380 memset(&tbl, 0, sizeof(struct ctl_table));
381
382 if (write) {
383 tbl.data = tmp;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200384 tbl.maxlen = sizeof(tmp);
Neil Horman3c681982012-10-24 09:20:03 +0000385 } else {
386 tbl.data = net->sctp.sctp_hmac_alg ? : none;
387 tbl.maxlen = strlen(tbl.data);
388 }
Neil Horman3c681982012-10-24 09:20:03 +0000389
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200390 ret = proc_dostring(&tbl, write, buffer, lenp, ppos);
391 if (write && ret == 0) {
Neil Horman3c681982012-10-24 09:20:03 +0000392#ifdef CONFIG_CRYPTO_MD5
393 if (!strncmp(tmp, "md5", 3)) {
394 net->sctp.sctp_hmac_alg = "md5";
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200395 changed = true;
Neil Horman3c681982012-10-24 09:20:03 +0000396 }
397#endif
398#ifdef CONFIG_CRYPTO_SHA1
399 if (!strncmp(tmp, "sha1", 4)) {
400 net->sctp.sctp_hmac_alg = "sha1";
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200401 changed = true;
Neil Horman3c681982012-10-24 09:20:03 +0000402 }
403#endif
404 if (!strncmp(tmp, "none", 4)) {
405 net->sctp.sctp_hmac_alg = NULL;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200406 changed = true;
Neil Horman3c681982012-10-24 09:20:03 +0000407 }
Neil Horman3c681982012-10-24 09:20:03 +0000408 if (!changed)
409 ret = -EINVAL;
410 }
411
412 return ret;
413}
414
wangweidong4f3fdf32013-12-11 09:50:39 +0800415static int proc_sctp_do_rto_min(struct ctl_table *ctl, int write,
Christoph Hellwig32927392020-04-24 08:43:38 +0200416 void *buffer, size_t *lenp, loff_t *ppos)
wangweidong4f3fdf32013-12-11 09:50:39 +0800417{
418 struct net *net = current->nsproxy->net_ns;
wangweidong4f3fdf32013-12-11 09:50:39 +0800419 unsigned int min = *(unsigned int *) ctl->extra1;
420 unsigned int max = *(unsigned int *) ctl->extra2;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200421 struct ctl_table tbl;
422 int ret, new_value;
wangweidong4f3fdf32013-12-11 09:50:39 +0800423
424 memset(&tbl, 0, sizeof(struct ctl_table));
425 tbl.maxlen = sizeof(unsigned int);
426
427 if (write)
428 tbl.data = &new_value;
429 else
430 tbl.data = &net->sctp.rto_min;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200431
wangweidong4f3fdf32013-12-11 09:50:39 +0800432 ret = proc_dointvec(&tbl, write, buffer, lenp, ppos);
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200433 if (write && ret == 0) {
434 if (new_value > max || new_value < min)
wangweidong4f3fdf32013-12-11 09:50:39 +0800435 return -EINVAL;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200436
wangweidong4f3fdf32013-12-11 09:50:39 +0800437 net->sctp.rto_min = new_value;
438 }
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200439
wangweidong4f3fdf32013-12-11 09:50:39 +0800440 return ret;
441}
442
443static int proc_sctp_do_rto_max(struct ctl_table *ctl, int write,
Christoph Hellwig32927392020-04-24 08:43:38 +0200444 void *buffer, size_t *lenp, loff_t *ppos)
wangweidong4f3fdf32013-12-11 09:50:39 +0800445{
446 struct net *net = current->nsproxy->net_ns;
wangweidong4f3fdf32013-12-11 09:50:39 +0800447 unsigned int min = *(unsigned int *) ctl->extra1;
448 unsigned int max = *(unsigned int *) ctl->extra2;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200449 struct ctl_table tbl;
450 int ret, new_value;
wangweidong4f3fdf32013-12-11 09:50:39 +0800451
452 memset(&tbl, 0, sizeof(struct ctl_table));
453 tbl.maxlen = sizeof(unsigned int);
454
455 if (write)
456 tbl.data = &new_value;
457 else
458 tbl.data = &net->sctp.rto_max;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200459
wangweidong4f3fdf32013-12-11 09:50:39 +0800460 ret = proc_dointvec(&tbl, write, buffer, lenp, ppos);
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200461 if (write && ret == 0) {
462 if (new_value > max || new_value < min)
wangweidong4f3fdf32013-12-11 09:50:39 +0800463 return -EINVAL;
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200464
wangweidong4f3fdf32013-12-11 09:50:39 +0800465 net->sctp.rto_max = new_value;
466 }
Daniel Borkmannff5e92c2014-06-19 01:31:30 +0200467
wangweidong4f3fdf32013-12-11 09:50:39 +0800468 return ret;
469}
470
Daniel Borkmannb58537a2014-06-15 00:59:14 +0200471static int proc_sctp_do_alpha_beta(struct ctl_table *ctl, int write,
Christoph Hellwig32927392020-04-24 08:43:38 +0200472 void *buffer, size_t *lenp, loff_t *ppos)
Daniel Borkmannb58537a2014-06-15 00:59:14 +0200473{
Daniel Borkmanneaea2da2014-06-30 13:52:09 +0200474 if (write)
475 pr_warn_once("Changing rto_alpha or rto_beta may lead to "
476 "suboptimal rtt/srtt estimations!\n");
Daniel Borkmannb58537a2014-06-15 00:59:14 +0200477
478 return proc_dointvec_minmax(ctl, write, buffer, lenp, ppos);
479}
480
Vlad Yasevichb14878c2014-04-17 17:26:50 +0200481static int proc_sctp_do_auth(struct ctl_table *ctl, int write,
Christoph Hellwig32927392020-04-24 08:43:38 +0200482 void *buffer, size_t *lenp, loff_t *ppos)
Vlad Yasevichb14878c2014-04-17 17:26:50 +0200483{
484 struct net *net = current->nsproxy->net_ns;
485 struct ctl_table tbl;
486 int new_value, ret;
487
488 memset(&tbl, 0, sizeof(struct ctl_table));
489 tbl.maxlen = sizeof(unsigned int);
490
491 if (write)
492 tbl.data = &new_value;
493 else
494 tbl.data = &net->sctp.auth_enable;
495
496 ret = proc_dointvec(&tbl, write, buffer, lenp, ppos);
Daniel Borkmann24599e62014-06-18 23:46:31 +0200497 if (write && ret == 0) {
Vlad Yasevichb14878c2014-04-17 17:26:50 +0200498 struct sock *sk = net->sctp.ctl_sock;
499
500 net->sctp.auth_enable = new_value;
501 /* Update the value in the control socket */
502 lock_sock(sk);
503 sctp_sk(sk)->ep->auth_enable = new_value;
504 release_sock(sk);
505 }
506
507 return ret;
508}
509
Xin Long046c0522020-10-29 15:05:10 +0800510static int proc_sctp_do_udp_port(struct ctl_table *ctl, int write,
511 void *buffer, size_t *lenp, loff_t *ppos)
512{
513 struct net *net = current->nsproxy->net_ns;
514 unsigned int min = *(unsigned int *)ctl->extra1;
515 unsigned int max = *(unsigned int *)ctl->extra2;
516 struct ctl_table tbl;
517 int ret, new_value;
518
519 memset(&tbl, 0, sizeof(struct ctl_table));
520 tbl.maxlen = sizeof(unsigned int);
521
522 if (write)
523 tbl.data = &new_value;
524 else
525 tbl.data = &net->sctp.udp_port;
526
527 ret = proc_dointvec(&tbl, write, buffer, lenp, ppos);
528 if (write && ret == 0) {
529 struct sock *sk = net->sctp.ctl_sock;
530
531 if (new_value > max || new_value < min)
532 return -EINVAL;
533
534 net->sctp.udp_port = new_value;
535 sctp_udp_sock_stop(net);
536 if (new_value) {
537 ret = sctp_udp_sock_start(net);
538 if (ret)
539 net->sctp.udp_port = 0;
540 }
541
542 /* Update the value in the control socket */
543 lock_sock(sk);
544 sctp_sk(sk)->udp_port = htons(net->sctp.udp_port);
545 release_sock(sk);
546 }
547
548 return ret;
549}
550
Xin Longd1e462a2021-06-22 14:04:48 -0400551static int proc_sctp_do_probe_interval(struct ctl_table *ctl, int write,
552 void *buffer, size_t *lenp, loff_t *ppos)
553{
554 struct net *net = current->nsproxy->net_ns;
555 struct ctl_table tbl;
556 int ret, new_value;
557
558 memset(&tbl, 0, sizeof(struct ctl_table));
559 tbl.maxlen = sizeof(unsigned int);
560
561 if (write)
562 tbl.data = &new_value;
563 else
564 tbl.data = &net->sctp.probe_interval;
565
566 ret = proc_dointvec(&tbl, write, buffer, lenp, ppos);
567 if (write && ret == 0) {
568 if (new_value && new_value < SCTP_PROBE_TIMER_MIN)
569 return -EINVAL;
570
571 net->sctp.probe_interval = new_value;
572 }
573
574 return ret;
575}
576
Eric W. Biedermanebb7e952012-08-07 07:23:59 +0000577int sctp_sysctl_net_register(struct net *net)
578{
wangweidongeb9f3702014-05-08 20:55:01 +0800579 struct ctl_table *table;
580 int i;
Eric W. Biedermanebb7e952012-08-07 07:23:59 +0000581
wangweidongeb9f3702014-05-08 20:55:01 +0800582 table = kmemdup(sctp_net_table, sizeof(sctp_net_table), GFP_KERNEL);
583 if (!table)
584 return -ENOMEM;
Eric W. Biedermanebb7e952012-08-07 07:23:59 +0000585
wangweidongeb9f3702014-05-08 20:55:01 +0800586 for (i = 0; table[i].data; i++)
587 table[i].data += (char *)(&net->sctp) - (char *)&init_net.sctp;
Eric W. Biedermane1fc3b12012-08-07 07:29:57 +0000588
Eric W. Biedermanebb7e952012-08-07 07:23:59 +0000589 net->sctp.sysctl_header = register_net_sysctl(net, "net/sctp", table);
wangweidongf66138c2014-05-08 20:55:02 +0800590 if (net->sctp.sysctl_header == NULL) {
591 kfree(table);
592 return -ENOMEM;
593 }
Eric W. Biedermanebb7e952012-08-07 07:23:59 +0000594 return 0;
595}
596
597void sctp_sysctl_net_unregister(struct net *net)
598{
Vlad Yasevich5f19d122013-01-24 11:02:47 -0500599 struct ctl_table *table;
600
601 table = net->sctp.sysctl_header->ctl_table_arg;
Eric W. Biedermanebb7e952012-08-07 07:23:59 +0000602 unregister_net_sysctl_table(net->sctp.sysctl_header);
Vlad Yasevich5f19d122013-01-24 11:02:47 -0500603 kfree(table);
Eric W. Biedermanebb7e952012-08-07 07:23:59 +0000604}
605
wangweidong26ac8e52013-12-23 12:16:51 +0800606static struct ctl_table_header *sctp_sysctl_header;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700607
608/* Sysctl registration. */
609void sctp_sysctl_register(void)
610{
Eric W. Biedermanec8f23c2012-04-19 13:44:49 +0000611 sctp_sysctl_header = register_net_sysctl(&init_net, "net/sctp", sctp_table);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700612}
613
614/* Sysctl deregistration. */
615void sctp_sysctl_unregister(void)
616{
Eric W. Biederman5dd3df12012-04-19 13:24:33 +0000617 unregister_net_sysctl_table(sctp_sysctl_header);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700618}