]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/ipv4/sysctl_net_ipv4.c
sysctl: remove "struct file *" argument of ->proc_handler
[net-next-2.6.git] / net / ipv4 / sysctl_net_ipv4.c
CommitLineData
1da177e4
LT
1/*
2 * sysctl_net_ipv4.c: sysctl interface to net IPV4 subsystem.
3 *
1da177e4
LT
4 * Begun April 1, 1996, Mike Shaver.
5 * Added /proc/sys/net/ipv4 directory entry (empty =) ). [MS]
6 */
7
8#include <linux/mm.h>
9#include <linux/module.h>
10#include <linux/sysctl.h>
20380731 11#include <linux/igmp.h>
14c85021 12#include <linux/inetdevice.h>
227b60f5 13#include <linux/seqlock.h>
3e37c3f9 14#include <linux/init.h>
1da177e4 15#include <net/snmp.h>
20380731 16#include <net/icmp.h>
1da177e4
LT
17#include <net/ip.h>
18#include <net/route.h>
19#include <net/tcp.h>
95766fff 20#include <net/udp.h>
446fda4f 21#include <net/cipso_ipv4.h>
04128f23 22#include <net/inet_frag.h>
1da177e4 23
89cee8b1 24static int zero;
e905a9ed 25static int tcp_retr1_max = 255;
1da177e4
LT
26static int ip_local_port_range_min[] = { 1, 1 };
27static int ip_local_port_range_max[] = { 65535, 65535 };
1da177e4 28
227b60f5
SH
29/* Update system visible IP port range */
30static void set_local_port_range(int range[2])
31{
3c689b73
ED
32 write_seqlock(&sysctl_local_ports.lock);
33 sysctl_local_ports.range[0] = range[0];
34 sysctl_local_ports.range[1] = range[1];
35 write_sequnlock(&sysctl_local_ports.lock);
227b60f5
SH
36}
37
38/* Validate changes from /proc interface. */
8d65af78 39static int ipv4_local_port_range(ctl_table *table, int write,
227b60f5
SH
40 void __user *buffer,
41 size_t *lenp, loff_t *ppos)
42{
43 int ret;
3c689b73 44 int range[2];
227b60f5
SH
45 ctl_table tmp = {
46 .data = &range,
47 .maxlen = sizeof(range),
48 .mode = table->mode,
49 .extra1 = &ip_local_port_range_min,
50 .extra2 = &ip_local_port_range_max,
51 };
52
3c689b73 53 inet_get_local_port_range(range, range + 1);
8d65af78 54 ret = proc_dointvec_minmax(&tmp, write, buffer, lenp, ppos);
227b60f5
SH
55
56 if (write && ret == 0) {
a25de534 57 if (range[1] < range[0])
227b60f5
SH
58 ret = -EINVAL;
59 else
60 set_local_port_range(range);
61 }
62
63 return ret;
64}
65
66/* Validate changes from sysctl interface. */
f221e726
AD
67static int ipv4_sysctl_local_port_range(ctl_table *table,
68 void __user *oldval,
227b60f5
SH
69 size_t __user *oldlenp,
70 void __user *newval, size_t newlen)
71{
72 int ret;
3c689b73 73 int range[2];
227b60f5
SH
74 ctl_table tmp = {
75 .data = &range,
76 .maxlen = sizeof(range),
77 .mode = table->mode,
78 .extra1 = &ip_local_port_range_min,
79 .extra2 = &ip_local_port_range_max,
80 };
81
3c689b73 82 inet_get_local_port_range(range, range + 1);
f221e726 83 ret = sysctl_intvec(&tmp, oldval, oldlenp, newval, newlen);
227b60f5 84 if (ret == 0 && newval && newlen) {
a25de534 85 if (range[1] < range[0])
227b60f5
SH
86 ret = -EINVAL;
87 else
88 set_local_port_range(range);
89 }
90 return ret;
91}
92
93
8d65af78 94static int proc_tcp_congestion_control(ctl_table *ctl, int write,
317a76f9
SH
95 void __user *buffer, size_t *lenp, loff_t *ppos)
96{
97 char val[TCP_CA_NAME_MAX];
98 ctl_table tbl = {
99 .data = val,
100 .maxlen = TCP_CA_NAME_MAX,
101 };
102 int ret;
103
104 tcp_get_default_congestion_control(val);
105
8d65af78 106 ret = proc_dostring(&tbl, write, buffer, lenp, ppos);
317a76f9
SH
107 if (write && ret == 0)
108 ret = tcp_set_default_congestion_control(val);
109 return ret;
110}
111
f221e726
AD
112static int sysctl_tcp_congestion_control(ctl_table *table,
113 void __user *oldval,
20380731 114 size_t __user *oldlenp,
1f29bcd7 115 void __user *newval, size_t newlen)
317a76f9
SH
116{
117 char val[TCP_CA_NAME_MAX];
118 ctl_table tbl = {
119 .data = val,
120 .maxlen = TCP_CA_NAME_MAX,
121 };
122 int ret;
123
124 tcp_get_default_congestion_control(val);
f221e726 125 ret = sysctl_string(&tbl, oldval, oldlenp, newval, newlen);
5487796f 126 if (ret == 1 && newval && newlen)
317a76f9
SH
127 ret = tcp_set_default_congestion_control(val);
128 return ret;
129}
130
3ff825b2 131static int proc_tcp_available_congestion_control(ctl_table *ctl,
8d65af78 132 int write,
3ff825b2
SH
133 void __user *buffer, size_t *lenp,
134 loff_t *ppos)
135{
136 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX, };
137 int ret;
138
139 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
140 if (!tbl.data)
141 return -ENOMEM;
142 tcp_get_available_congestion_control(tbl.data, TCP_CA_BUF_MAX);
8d65af78 143 ret = proc_dostring(&tbl, write, buffer, lenp, ppos);
3ff825b2
SH
144 kfree(tbl.data);
145 return ret;
146}
147
ce7bc3bf 148static int proc_allowed_congestion_control(ctl_table *ctl,
8d65af78 149 int write,
ce7bc3bf
SH
150 void __user *buffer, size_t *lenp,
151 loff_t *ppos)
152{
153 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX };
154 int ret;
155
156 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
157 if (!tbl.data)
158 return -ENOMEM;
159
160 tcp_get_allowed_congestion_control(tbl.data, tbl.maxlen);
8d65af78 161 ret = proc_dostring(&tbl, write, buffer, lenp, ppos);
ce7bc3bf
SH
162 if (write && ret == 0)
163 ret = tcp_set_allowed_congestion_control(tbl.data);
164 kfree(tbl.data);
165 return ret;
166}
167
f221e726
AD
168static int strategy_allowed_congestion_control(ctl_table *table,
169 void __user *oldval,
ce7bc3bf 170 size_t __user *oldlenp,
1f29bcd7
AD
171 void __user *newval,
172 size_t newlen)
ce7bc3bf
SH
173{
174 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX };
175 int ret;
176
177 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
178 if (!tbl.data)
179 return -ENOMEM;
180
181 tcp_get_available_congestion_control(tbl.data, tbl.maxlen);
f221e726 182 ret = sysctl_string(&tbl, oldval, oldlenp, newval, newlen);
16ca3f91 183 if (ret == 1 && newval && newlen)
ce7bc3bf
SH
184 ret = tcp_set_allowed_congestion_control(tbl.data);
185 kfree(tbl.data);
186
187 return ret;
188
189}
190
3e37c3f9 191static struct ctl_table ipv4_table[] = {
e905a9ed 192 {
1da177e4
LT
193 .ctl_name = NET_IPV4_TCP_TIMESTAMPS,
194 .procname = "tcp_timestamps",
195 .data = &sysctl_tcp_timestamps,
196 .maxlen = sizeof(int),
197 .mode = 0644,
6d9f239a 198 .proc_handler = proc_dointvec
1da177e4 199 },
e905a9ed 200 {
1da177e4
LT
201 .ctl_name = NET_IPV4_TCP_WINDOW_SCALING,
202 .procname = "tcp_window_scaling",
203 .data = &sysctl_tcp_window_scaling,
204 .maxlen = sizeof(int),
205 .mode = 0644,
6d9f239a 206 .proc_handler = proc_dointvec
1da177e4 207 },
e905a9ed 208 {
1da177e4
LT
209 .ctl_name = NET_IPV4_TCP_SACK,
210 .procname = "tcp_sack",
211 .data = &sysctl_tcp_sack,
212 .maxlen = sizeof(int),
213 .mode = 0644,
6d9f239a 214 .proc_handler = proc_dointvec
1da177e4 215 },
e905a9ed 216 {
1da177e4
LT
217 .ctl_name = NET_IPV4_TCP_RETRANS_COLLAPSE,
218 .procname = "tcp_retrans_collapse",
219 .data = &sysctl_tcp_retrans_collapse,
220 .maxlen = sizeof(int),
221 .mode = 0644,
6d9f239a 222 .proc_handler = proc_dointvec
1da177e4 223 },
e905a9ed 224 {
1da177e4
LT
225 .ctl_name = NET_IPV4_DEFAULT_TTL,
226 .procname = "ip_default_ttl",
e905a9ed 227 .data = &sysctl_ip_default_ttl,
1da177e4
LT
228 .maxlen = sizeof(int),
229 .mode = 0644,
6d9f239a
AD
230 .proc_handler = ipv4_doint_and_flush,
231 .strategy = ipv4_doint_and_flush_strategy,
adf044c8 232 .extra2 = &init_net,
1da177e4 233 },
e905a9ed 234 {
1da177e4
LT
235 .ctl_name = NET_IPV4_NO_PMTU_DISC,
236 .procname = "ip_no_pmtu_disc",
237 .data = &ipv4_config.no_pmtu_disc,
238 .maxlen = sizeof(int),
239 .mode = 0644,
6d9f239a 240 .proc_handler = proc_dointvec
1da177e4
LT
241 },
242 {
243 .ctl_name = NET_IPV4_NONLOCAL_BIND,
244 .procname = "ip_nonlocal_bind",
245 .data = &sysctl_ip_nonlocal_bind,
246 .maxlen = sizeof(int),
247 .mode = 0644,
6d9f239a 248 .proc_handler = proc_dointvec
1da177e4
LT
249 },
250 {
251 .ctl_name = NET_IPV4_TCP_SYN_RETRIES,
252 .procname = "tcp_syn_retries",
253 .data = &sysctl_tcp_syn_retries,
254 .maxlen = sizeof(int),
255 .mode = 0644,
6d9f239a 256 .proc_handler = proc_dointvec
1da177e4
LT
257 },
258 {
259 .ctl_name = NET_TCP_SYNACK_RETRIES,
260 .procname = "tcp_synack_retries",
261 .data = &sysctl_tcp_synack_retries,
262 .maxlen = sizeof(int),
263 .mode = 0644,
6d9f239a 264 .proc_handler = proc_dointvec
1da177e4
LT
265 },
266 {
267 .ctl_name = NET_TCP_MAX_ORPHANS,
268 .procname = "tcp_max_orphans",
269 .data = &sysctl_tcp_max_orphans,
270 .maxlen = sizeof(int),
271 .mode = 0644,
6d9f239a 272 .proc_handler = proc_dointvec
1da177e4
LT
273 },
274 {
275 .ctl_name = NET_TCP_MAX_TW_BUCKETS,
276 .procname = "tcp_max_tw_buckets",
295ff7ed 277 .data = &tcp_death_row.sysctl_max_tw_buckets,
1da177e4
LT
278 .maxlen = sizeof(int),
279 .mode = 0644,
6d9f239a 280 .proc_handler = proc_dointvec
1da177e4 281 },
1da177e4
LT
282 {
283 .ctl_name = NET_IPV4_DYNADDR,
284 .procname = "ip_dynaddr",
285 .data = &sysctl_ip_dynaddr,
286 .maxlen = sizeof(int),
287 .mode = 0644,
6d9f239a 288 .proc_handler = proc_dointvec
1da177e4 289 },
1da177e4
LT
290 {
291 .ctl_name = NET_IPV4_TCP_KEEPALIVE_TIME,
292 .procname = "tcp_keepalive_time",
293 .data = &sysctl_tcp_keepalive_time,
294 .maxlen = sizeof(int),
295 .mode = 0644,
6d9f239a
AD
296 .proc_handler = proc_dointvec_jiffies,
297 .strategy = sysctl_jiffies
1da177e4
LT
298 },
299 {
300 .ctl_name = NET_IPV4_TCP_KEEPALIVE_PROBES,
301 .procname = "tcp_keepalive_probes",
302 .data = &sysctl_tcp_keepalive_probes,
303 .maxlen = sizeof(int),
304 .mode = 0644,
6d9f239a 305 .proc_handler = proc_dointvec
1da177e4
LT
306 },
307 {
308 .ctl_name = NET_IPV4_TCP_KEEPALIVE_INTVL,
309 .procname = "tcp_keepalive_intvl",
310 .data = &sysctl_tcp_keepalive_intvl,
311 .maxlen = sizeof(int),
312 .mode = 0644,
6d9f239a
AD
313 .proc_handler = proc_dointvec_jiffies,
314 .strategy = sysctl_jiffies
1da177e4
LT
315 },
316 {
317 .ctl_name = NET_IPV4_TCP_RETRIES1,
318 .procname = "tcp_retries1",
319 .data = &sysctl_tcp_retries1,
320 .maxlen = sizeof(int),
321 .mode = 0644,
6d9f239a
AD
322 .proc_handler = proc_dointvec_minmax,
323 .strategy = sysctl_intvec,
1da177e4
LT
324 .extra2 = &tcp_retr1_max
325 },
326 {
327 .ctl_name = NET_IPV4_TCP_RETRIES2,
328 .procname = "tcp_retries2",
329 .data = &sysctl_tcp_retries2,
330 .maxlen = sizeof(int),
331 .mode = 0644,
6d9f239a 332 .proc_handler = proc_dointvec
1da177e4
LT
333 },
334 {
335 .ctl_name = NET_IPV4_TCP_FIN_TIMEOUT,
336 .procname = "tcp_fin_timeout",
337 .data = &sysctl_tcp_fin_timeout,
338 .maxlen = sizeof(int),
339 .mode = 0644,
6d9f239a
AD
340 .proc_handler = proc_dointvec_jiffies,
341 .strategy = sysctl_jiffies
1da177e4
LT
342 },
343#ifdef CONFIG_SYN_COOKIES
344 {
345 .ctl_name = NET_TCP_SYNCOOKIES,
346 .procname = "tcp_syncookies",
347 .data = &sysctl_tcp_syncookies,
348 .maxlen = sizeof(int),
349 .mode = 0644,
6d9f239a 350 .proc_handler = proc_dointvec
1da177e4
LT
351 },
352#endif
353 {
354 .ctl_name = NET_TCP_TW_RECYCLE,
355 .procname = "tcp_tw_recycle",
295ff7ed 356 .data = &tcp_death_row.sysctl_tw_recycle,
1da177e4
LT
357 .maxlen = sizeof(int),
358 .mode = 0644,
6d9f239a 359 .proc_handler = proc_dointvec
1da177e4
LT
360 },
361 {
362 .ctl_name = NET_TCP_ABORT_ON_OVERFLOW,
363 .procname = "tcp_abort_on_overflow",
364 .data = &sysctl_tcp_abort_on_overflow,
365 .maxlen = sizeof(int),
366 .mode = 0644,
6d9f239a 367 .proc_handler = proc_dointvec
1da177e4
LT
368 },
369 {
370 .ctl_name = NET_TCP_STDURG,
371 .procname = "tcp_stdurg",
372 .data = &sysctl_tcp_stdurg,
373 .maxlen = sizeof(int),
374 .mode = 0644,
6d9f239a 375 .proc_handler = proc_dointvec
1da177e4
LT
376 },
377 {
378 .ctl_name = NET_TCP_RFC1337,
379 .procname = "tcp_rfc1337",
380 .data = &sysctl_tcp_rfc1337,
381 .maxlen = sizeof(int),
382 .mode = 0644,
6d9f239a 383 .proc_handler = proc_dointvec
1da177e4
LT
384 },
385 {
386 .ctl_name = NET_TCP_MAX_SYN_BACKLOG,
387 .procname = "tcp_max_syn_backlog",
388 .data = &sysctl_max_syn_backlog,
389 .maxlen = sizeof(int),
390 .mode = 0644,
6d9f239a 391 .proc_handler = proc_dointvec
1da177e4
LT
392 },
393 {
394 .ctl_name = NET_IPV4_LOCAL_PORT_RANGE,
395 .procname = "ip_local_port_range",
3c689b73
ED
396 .data = &sysctl_local_ports.range,
397 .maxlen = sizeof(sysctl_local_ports.range),
1da177e4 398 .mode = 0644,
6d9f239a
AD
399 .proc_handler = ipv4_local_port_range,
400 .strategy = ipv4_sysctl_local_port_range,
1da177e4 401 },
1da177e4
LT
402#ifdef CONFIG_IP_MULTICAST
403 {
404 .ctl_name = NET_IPV4_IGMP_MAX_MEMBERSHIPS,
405 .procname = "igmp_max_memberships",
406 .data = &sysctl_igmp_max_memberships,
407 .maxlen = sizeof(int),
408 .mode = 0644,
6d9f239a 409 .proc_handler = proc_dointvec
1da177e4
LT
410 },
411
412#endif
413 {
414 .ctl_name = NET_IPV4_IGMP_MAX_MSF,
415 .procname = "igmp_max_msf",
416 .data = &sysctl_igmp_max_msf,
417 .maxlen = sizeof(int),
418 .mode = 0644,
6d9f239a 419 .proc_handler = proc_dointvec
1da177e4
LT
420 },
421 {
422 .ctl_name = NET_IPV4_INET_PEER_THRESHOLD,
423 .procname = "inet_peer_threshold",
424 .data = &inet_peer_threshold,
425 .maxlen = sizeof(int),
426 .mode = 0644,
6d9f239a 427 .proc_handler = proc_dointvec
1da177e4
LT
428 },
429 {
430 .ctl_name = NET_IPV4_INET_PEER_MINTTL,
431 .procname = "inet_peer_minttl",
432 .data = &inet_peer_minttl,
433 .maxlen = sizeof(int),
434 .mode = 0644,
6d9f239a
AD
435 .proc_handler = proc_dointvec_jiffies,
436 .strategy = sysctl_jiffies
1da177e4
LT
437 },
438 {
439 .ctl_name = NET_IPV4_INET_PEER_MAXTTL,
440 .procname = "inet_peer_maxttl",
441 .data = &inet_peer_maxttl,
442 .maxlen = sizeof(int),
443 .mode = 0644,
6d9f239a
AD
444 .proc_handler = proc_dointvec_jiffies,
445 .strategy = sysctl_jiffies
1da177e4
LT
446 },
447 {
448 .ctl_name = NET_IPV4_INET_PEER_GC_MINTIME,
449 .procname = "inet_peer_gc_mintime",
450 .data = &inet_peer_gc_mintime,
451 .maxlen = sizeof(int),
452 .mode = 0644,
6d9f239a
AD
453 .proc_handler = proc_dointvec_jiffies,
454 .strategy = sysctl_jiffies
1da177e4
LT
455 },
456 {
457 .ctl_name = NET_IPV4_INET_PEER_GC_MAXTIME,
458 .procname = "inet_peer_gc_maxtime",
459 .data = &inet_peer_gc_maxtime,
460 .maxlen = sizeof(int),
461 .mode = 0644,
6d9f239a
AD
462 .proc_handler = proc_dointvec_jiffies,
463 .strategy = sysctl_jiffies
1da177e4
LT
464 },
465 {
466 .ctl_name = NET_TCP_ORPHAN_RETRIES,
467 .procname = "tcp_orphan_retries",
468 .data = &sysctl_tcp_orphan_retries,
469 .maxlen = sizeof(int),
470 .mode = 0644,
6d9f239a 471 .proc_handler = proc_dointvec
1da177e4
LT
472 },
473 {
474 .ctl_name = NET_TCP_FACK,
475 .procname = "tcp_fack",
476 .data = &sysctl_tcp_fack,
477 .maxlen = sizeof(int),
478 .mode = 0644,
6d9f239a 479 .proc_handler = proc_dointvec
1da177e4
LT
480 },
481 {
482 .ctl_name = NET_TCP_REORDERING,
483 .procname = "tcp_reordering",
484 .data = &sysctl_tcp_reordering,
485 .maxlen = sizeof(int),
486 .mode = 0644,
6d9f239a 487 .proc_handler = proc_dointvec
1da177e4
LT
488 },
489 {
490 .ctl_name = NET_TCP_ECN,
491 .procname = "tcp_ecn",
492 .data = &sysctl_tcp_ecn,
493 .maxlen = sizeof(int),
494 .mode = 0644,
6d9f239a 495 .proc_handler = proc_dointvec
1da177e4
LT
496 },
497 {
498 .ctl_name = NET_TCP_DSACK,
499 .procname = "tcp_dsack",
500 .data = &sysctl_tcp_dsack,
501 .maxlen = sizeof(int),
502 .mode = 0644,
6d9f239a 503 .proc_handler = proc_dointvec
1da177e4
LT
504 },
505 {
506 .ctl_name = NET_TCP_MEM,
507 .procname = "tcp_mem",
508 .data = &sysctl_tcp_mem,
509 .maxlen = sizeof(sysctl_tcp_mem),
510 .mode = 0644,
6d9f239a 511 .proc_handler = proc_dointvec
1da177e4
LT
512 },
513 {
514 .ctl_name = NET_TCP_WMEM,
515 .procname = "tcp_wmem",
516 .data = &sysctl_tcp_wmem,
517 .maxlen = sizeof(sysctl_tcp_wmem),
518 .mode = 0644,
6d9f239a 519 .proc_handler = proc_dointvec
1da177e4
LT
520 },
521 {
522 .ctl_name = NET_TCP_RMEM,
523 .procname = "tcp_rmem",
524 .data = &sysctl_tcp_rmem,
525 .maxlen = sizeof(sysctl_tcp_rmem),
526 .mode = 0644,
6d9f239a 527 .proc_handler = proc_dointvec
1da177e4
LT
528 },
529 {
530 .ctl_name = NET_TCP_APP_WIN,
531 .procname = "tcp_app_win",
532 .data = &sysctl_tcp_app_win,
533 .maxlen = sizeof(int),
534 .mode = 0644,
6d9f239a 535 .proc_handler = proc_dointvec
1da177e4
LT
536 },
537 {
538 .ctl_name = NET_TCP_ADV_WIN_SCALE,
539 .procname = "tcp_adv_win_scale",
540 .data = &sysctl_tcp_adv_win_scale,
541 .maxlen = sizeof(int),
542 .mode = 0644,
6d9f239a 543 .proc_handler = proc_dointvec
1da177e4 544 },
1da177e4
LT
545 {
546 .ctl_name = NET_TCP_TW_REUSE,
547 .procname = "tcp_tw_reuse",
548 .data = &sysctl_tcp_tw_reuse,
549 .maxlen = sizeof(int),
550 .mode = 0644,
6d9f239a 551 .proc_handler = proc_dointvec
1da177e4
LT
552 },
553 {
554 .ctl_name = NET_TCP_FRTO,
555 .procname = "tcp_frto",
556 .data = &sysctl_tcp_frto,
557 .maxlen = sizeof(int),
558 .mode = 0644,
6d9f239a 559 .proc_handler = proc_dointvec
1da177e4 560 },
3cfe3baa
IJ
561 {
562 .ctl_name = NET_TCP_FRTO_RESPONSE,
563 .procname = "tcp_frto_response",
564 .data = &sysctl_tcp_frto_response,
565 .maxlen = sizeof(int),
566 .mode = 0644,
6d9f239a 567 .proc_handler = proc_dointvec
3cfe3baa 568 },
1da177e4
LT
569 {
570 .ctl_name = NET_TCP_LOW_LATENCY,
571 .procname = "tcp_low_latency",
572 .data = &sysctl_tcp_low_latency,
573 .maxlen = sizeof(int),
574 .mode = 0644,
6d9f239a 575 .proc_handler = proc_dointvec
1da177e4 576 },
1da177e4
LT
577 {
578 .ctl_name = NET_TCP_NO_METRICS_SAVE,
579 .procname = "tcp_no_metrics_save",
580 .data = &sysctl_tcp_nometrics_save,
581 .maxlen = sizeof(int),
582 .mode = 0644,
6d9f239a 583 .proc_handler = proc_dointvec,
1da177e4 584 },
1da177e4
LT
585 {
586 .ctl_name = NET_TCP_MODERATE_RCVBUF,
587 .procname = "tcp_moderate_rcvbuf",
588 .data = &sysctl_tcp_moderate_rcvbuf,
589 .maxlen = sizeof(int),
590 .mode = 0644,
6d9f239a 591 .proc_handler = proc_dointvec,
1da177e4
LT
592 },
593 {
594 .ctl_name = NET_TCP_TSO_WIN_DIVISOR,
595 .procname = "tcp_tso_win_divisor",
596 .data = &sysctl_tcp_tso_win_divisor,
597 .maxlen = sizeof(int),
598 .mode = 0644,
6d9f239a 599 .proc_handler = proc_dointvec,
1da177e4
LT
600 },
601 {
317a76f9
SH
602 .ctl_name = NET_TCP_CONG_CONTROL,
603 .procname = "tcp_congestion_control",
1da177e4 604 .mode = 0644,
317a76f9 605 .maxlen = TCP_CA_NAME_MAX,
6d9f239a
AD
606 .proc_handler = proc_tcp_congestion_control,
607 .strategy = sysctl_tcp_congestion_control,
1da177e4 608 },
9772efb9
SH
609 {
610 .ctl_name = NET_TCP_ABC,
611 .procname = "tcp_abc",
612 .data = &sysctl_tcp_abc,
613 .maxlen = sizeof(int),
614 .mode = 0644,
6d9f239a 615 .proc_handler = proc_dointvec,
9772efb9 616 },
5d424d5a
JH
617 {
618 .ctl_name = NET_TCP_MTU_PROBING,
619 .procname = "tcp_mtu_probing",
620 .data = &sysctl_tcp_mtu_probing,
621 .maxlen = sizeof(int),
622 .mode = 0644,
6d9f239a 623 .proc_handler = proc_dointvec,
5d424d5a
JH
624 },
625 {
626 .ctl_name = NET_TCP_BASE_MSS,
627 .procname = "tcp_base_mss",
628 .data = &sysctl_tcp_base_mss,
629 .maxlen = sizeof(int),
630 .mode = 0644,
6d9f239a 631 .proc_handler = proc_dointvec,
5d424d5a 632 },
e905a9ed 633 {
15d99e02
RJ
634 .ctl_name = NET_IPV4_TCP_WORKAROUND_SIGNED_WINDOWS,
635 .procname = "tcp_workaround_signed_windows",
636 .data = &sysctl_tcp_workaround_signed_windows,
637 .maxlen = sizeof(int),
638 .mode = 0644,
6d9f239a 639 .proc_handler = proc_dointvec
15d99e02 640 },
95937825
CL
641#ifdef CONFIG_NET_DMA
642 {
643 .ctl_name = NET_TCP_DMA_COPYBREAK,
644 .procname = "tcp_dma_copybreak",
645 .data = &sysctl_tcp_dma_copybreak,
646 .maxlen = sizeof(int),
647 .mode = 0644,
6d9f239a 648 .proc_handler = proc_dointvec
95937825
CL
649 },
650#endif
35089bb2
DM
651 {
652 .ctl_name = NET_TCP_SLOW_START_AFTER_IDLE,
653 .procname = "tcp_slow_start_after_idle",
654 .data = &sysctl_tcp_slow_start_after_idle,
655 .maxlen = sizeof(int),
656 .mode = 0644,
6d9f239a 657 .proc_handler = proc_dointvec
35089bb2 658 },
446fda4f
PM
659#ifdef CONFIG_NETLABEL
660 {
661 .ctl_name = NET_CIPSOV4_CACHE_ENABLE,
662 .procname = "cipso_cache_enable",
663 .data = &cipso_v4_cache_enabled,
664 .maxlen = sizeof(int),
665 .mode = 0644,
6d9f239a 666 .proc_handler = proc_dointvec,
446fda4f
PM
667 },
668 {
669 .ctl_name = NET_CIPSOV4_CACHE_BUCKET_SIZE,
670 .procname = "cipso_cache_bucket_size",
671 .data = &cipso_v4_cache_bucketsize,
672 .maxlen = sizeof(int),
673 .mode = 0644,
6d9f239a 674 .proc_handler = proc_dointvec,
446fda4f
PM
675 },
676 {
677 .ctl_name = NET_CIPSOV4_RBM_OPTFMT,
678 .procname = "cipso_rbm_optfmt",
679 .data = &cipso_v4_rbm_optfmt,
680 .maxlen = sizeof(int),
681 .mode = 0644,
6d9f239a 682 .proc_handler = proc_dointvec,
446fda4f
PM
683 },
684 {
685 .ctl_name = NET_CIPSOV4_RBM_STRICTVALID,
686 .procname = "cipso_rbm_strictvalid",
687 .data = &cipso_v4_rbm_strictvalid,
688 .maxlen = sizeof(int),
689 .mode = 0644,
6d9f239a 690 .proc_handler = proc_dointvec,
446fda4f
PM
691 },
692#endif /* CONFIG_NETLABEL */
3ff825b2 693 {
3ff825b2
SH
694 .procname = "tcp_available_congestion_control",
695 .maxlen = TCP_CA_BUF_MAX,
696 .mode = 0444,
6d9f239a 697 .proc_handler = proc_tcp_available_congestion_control,
3ff825b2 698 },
ce7bc3bf
SH
699 {
700 .ctl_name = NET_TCP_ALLOWED_CONG_CONTROL,
701 .procname = "tcp_allowed_congestion_control",
702 .maxlen = TCP_CA_BUF_MAX,
703 .mode = 0644,
6d9f239a
AD
704 .proc_handler = proc_allowed_congestion_control,
705 .strategy = strategy_allowed_congestion_control,
ce7bc3bf 706 },
886236c1
JH
707 {
708 .ctl_name = NET_TCP_MAX_SSTHRESH,
709 .procname = "tcp_max_ssthresh",
710 .data = &sysctl_tcp_max_ssthresh,
711 .maxlen = sizeof(int),
712 .mode = 0644,
6d9f239a 713 .proc_handler = proc_dointvec,
886236c1 714 },
95766fff
HA
715 {
716 .ctl_name = CTL_UNNUMBERED,
717 .procname = "udp_mem",
718 .data = &sysctl_udp_mem,
719 .maxlen = sizeof(sysctl_udp_mem),
720 .mode = 0644,
6d9f239a
AD
721 .proc_handler = proc_dointvec_minmax,
722 .strategy = sysctl_intvec,
95766fff
HA
723 .extra1 = &zero
724 },
725 {
726 .ctl_name = CTL_UNNUMBERED,
727 .procname = "udp_rmem_min",
728 .data = &sysctl_udp_rmem_min,
729 .maxlen = sizeof(sysctl_udp_rmem_min),
730 .mode = 0644,
6d9f239a
AD
731 .proc_handler = proc_dointvec_minmax,
732 .strategy = sysctl_intvec,
95766fff
HA
733 .extra1 = &zero
734 },
735 {
736 .ctl_name = CTL_UNNUMBERED,
737 .procname = "udp_wmem_min",
738 .data = &sysctl_udp_wmem_min,
739 .maxlen = sizeof(sysctl_udp_wmem_min),
740 .mode = 0644,
6d9f239a
AD
741 .proc_handler = proc_dointvec_minmax,
742 .strategy = sysctl_intvec,
95766fff
HA
743 .extra1 = &zero
744 },
1da177e4
LT
745 { .ctl_name = 0 }
746};
3e37c3f9 747
68528f09
PE
748static struct ctl_table ipv4_net_table[] = {
749 {
750 .ctl_name = NET_IPV4_ICMP_ECHO_IGNORE_ALL,
751 .procname = "icmp_echo_ignore_all",
752 .data = &init_net.ipv4.sysctl_icmp_echo_ignore_all,
753 .maxlen = sizeof(int),
754 .mode = 0644,
6d9f239a 755 .proc_handler = proc_dointvec
68528f09
PE
756 },
757 {
758 .ctl_name = NET_IPV4_ICMP_ECHO_IGNORE_BROADCASTS,
759 .procname = "icmp_echo_ignore_broadcasts",
760 .data = &init_net.ipv4.sysctl_icmp_echo_ignore_broadcasts,
761 .maxlen = sizeof(int),
762 .mode = 0644,
6d9f239a 763 .proc_handler = proc_dointvec
68528f09
PE
764 },
765 {
766 .ctl_name = NET_IPV4_ICMP_IGNORE_BOGUS_ERROR_RESPONSES,
767 .procname = "icmp_ignore_bogus_error_responses",
768 .data = &init_net.ipv4.sysctl_icmp_ignore_bogus_error_responses,
769 .maxlen = sizeof(int),
770 .mode = 0644,
6d9f239a 771 .proc_handler = proc_dointvec
68528f09
PE
772 },
773 {
774 .ctl_name = NET_IPV4_ICMP_ERRORS_USE_INBOUND_IFADDR,
775 .procname = "icmp_errors_use_inbound_ifaddr",
776 .data = &init_net.ipv4.sysctl_icmp_errors_use_inbound_ifaddr,
777 .maxlen = sizeof(int),
778 .mode = 0644,
6d9f239a 779 .proc_handler = proc_dointvec
68528f09
PE
780 },
781 {
782 .ctl_name = NET_IPV4_ICMP_RATELIMIT,
783 .procname = "icmp_ratelimit",
784 .data = &init_net.ipv4.sysctl_icmp_ratelimit,
785 .maxlen = sizeof(int),
786 .mode = 0644,
6d9f239a
AD
787 .proc_handler = proc_dointvec_ms_jiffies,
788 .strategy = sysctl_ms_jiffies
68528f09
PE
789 },
790 {
791 .ctl_name = NET_IPV4_ICMP_RATEMASK,
792 .procname = "icmp_ratemask",
793 .data = &init_net.ipv4.sysctl_icmp_ratemask,
794 .maxlen = sizeof(int),
795 .mode = 0644,
6d9f239a 796 .proc_handler = proc_dointvec
68528f09 797 },
1080d709
NH
798 {
799 .ctl_name = CTL_UNNUMBERED,
800 .procname = "rt_cache_rebuild_count",
801 .data = &init_net.ipv4.sysctl_rt_cache_rebuild_count,
802 .maxlen = sizeof(int),
803 .mode = 0644,
6d9f239a 804 .proc_handler = proc_dointvec
1080d709 805 },
68528f09
PE
806 { }
807};
808
3d7cc2ba 809struct ctl_path net_ipv4_ctl_path[] = {
3e37c3f9
PE
810 { .procname = "net", .ctl_name = CTL_NET, },
811 { .procname = "ipv4", .ctl_name = NET_IPV4, },
812 { },
813};
3d7cc2ba 814EXPORT_SYMBOL_GPL(net_ipv4_ctl_path);
3e37c3f9 815
1577519d
PE
816static __net_init int ipv4_sysctl_init_net(struct net *net)
817{
68528f09
PE
818 struct ctl_table *table;
819
820 table = ipv4_net_table;
821 if (net != &init_net) {
822 table = kmemdup(table, sizeof(ipv4_net_table), GFP_KERNEL);
823 if (table == NULL)
824 goto err_alloc;
825
826 table[0].data =
827 &net->ipv4.sysctl_icmp_echo_ignore_all;
828 table[1].data =
829 &net->ipv4.sysctl_icmp_echo_ignore_broadcasts;
830 table[2].data =
831 &net->ipv4.sysctl_icmp_ignore_bogus_error_responses;
832 table[3].data =
833 &net->ipv4.sysctl_icmp_errors_use_inbound_ifaddr;
834 table[4].data =
835 &net->ipv4.sysctl_icmp_ratelimit;
836 table[5].data =
837 &net->ipv4.sysctl_icmp_ratemask;
1080d709
NH
838 table[6].data =
839 &net->ipv4.sysctl_rt_cache_rebuild_count;
68528f09
PE
840 }
841
1080d709
NH
842 net->ipv4.sysctl_rt_cache_rebuild_count = 4;
843
68528f09
PE
844 net->ipv4.ipv4_hdr = register_net_sysctl_table(net,
845 net_ipv4_ctl_path, table);
846 if (net->ipv4.ipv4_hdr == NULL)
847 goto err_reg;
848
1577519d 849 return 0;
68528f09
PE
850
851err_reg:
852 if (net != &init_net)
853 kfree(table);
854err_alloc:
855 return -ENOMEM;
1577519d
PE
856}
857
858static __net_exit void ipv4_sysctl_exit_net(struct net *net)
859{
68528f09
PE
860 struct ctl_table *table;
861
862 table = net->ipv4.ipv4_hdr->ctl_table_arg;
863 unregister_net_sysctl_table(net->ipv4.ipv4_hdr);
864 kfree(table);
1577519d
PE
865}
866
867static __net_initdata struct pernet_operations ipv4_sysctl_ops = {
868 .init = ipv4_sysctl_init_net,
869 .exit = ipv4_sysctl_exit_net,
870};
871
3e37c3f9
PE
872static __init int sysctl_ipv4_init(void)
873{
874 struct ctl_table_header *hdr;
875
3d7cc2ba 876 hdr = register_sysctl_paths(net_ipv4_ctl_path, ipv4_table);
1577519d
PE
877 if (hdr == NULL)
878 return -ENOMEM;
879
880 if (register_pernet_subsys(&ipv4_sysctl_ops)) {
881 unregister_sysctl_table(hdr);
882 return -ENOMEM;
883 }
884
885 return 0;
3e37c3f9
PE
886}
887
888__initcall(sysctl_ipv4_init);