]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/ipv4/sysctl_net_ipv4.c
net: avoid limits overflow
[net-next-2.6.git] / net / ipv4 / sysctl_net_ipv4.c
CommitLineData
1da177e4
LT
1/*
2 * sysctl_net_ipv4.c: sysctl interface to net IPV4 subsystem.
3 *
1da177e4
LT
4 * Begun April 1, 1996, Mike Shaver.
5 * Added /proc/sys/net/ipv4 directory entry (empty =) ). [MS]
6 */
7
8#include <linux/mm.h>
9#include <linux/module.h>
10#include <linux/sysctl.h>
20380731 11#include <linux/igmp.h>
14c85021 12#include <linux/inetdevice.h>
227b60f5 13#include <linux/seqlock.h>
3e37c3f9 14#include <linux/init.h>
5a0e3ad6 15#include <linux/slab.h>
1da177e4 16#include <net/snmp.h>
20380731 17#include <net/icmp.h>
1da177e4
LT
18#include <net/ip.h>
19#include <net/route.h>
20#include <net/tcp.h>
95766fff 21#include <net/udp.h>
446fda4f 22#include <net/cipso_ipv4.h>
04128f23 23#include <net/inet_frag.h>
1da177e4 24
89cee8b1 25static int zero;
e905a9ed 26static int tcp_retr1_max = 255;
1da177e4
LT
27static int ip_local_port_range_min[] = { 1, 1 };
28static int ip_local_port_range_max[] = { 65535, 65535 };
1da177e4 29
227b60f5
SH
30/* Update system visible IP port range */
31static void set_local_port_range(int range[2])
32{
3c689b73
ED
33 write_seqlock(&sysctl_local_ports.lock);
34 sysctl_local_ports.range[0] = range[0];
35 sysctl_local_ports.range[1] = range[1];
36 write_sequnlock(&sysctl_local_ports.lock);
227b60f5
SH
37}
38
39/* Validate changes from /proc interface. */
8d65af78 40static int ipv4_local_port_range(ctl_table *table, int write,
227b60f5
SH
41 void __user *buffer,
42 size_t *lenp, loff_t *ppos)
43{
44 int ret;
3c689b73 45 int range[2];
227b60f5
SH
46 ctl_table tmp = {
47 .data = &range,
48 .maxlen = sizeof(range),
49 .mode = table->mode,
50 .extra1 = &ip_local_port_range_min,
51 .extra2 = &ip_local_port_range_max,
52 };
53
3c689b73 54 inet_get_local_port_range(range, range + 1);
8d65af78 55 ret = proc_dointvec_minmax(&tmp, write, buffer, lenp, ppos);
227b60f5
SH
56
57 if (write && ret == 0) {
a25de534 58 if (range[1] < range[0])
227b60f5
SH
59 ret = -EINVAL;
60 else
61 set_local_port_range(range);
62 }
63
64 return ret;
65}
66
8d65af78 67static int proc_tcp_congestion_control(ctl_table *ctl, int write,
317a76f9
SH
68 void __user *buffer, size_t *lenp, loff_t *ppos)
69{
70 char val[TCP_CA_NAME_MAX];
71 ctl_table tbl = {
72 .data = val,
73 .maxlen = TCP_CA_NAME_MAX,
74 };
75 int ret;
76
77 tcp_get_default_congestion_control(val);
78
8d65af78 79 ret = proc_dostring(&tbl, write, buffer, lenp, ppos);
317a76f9
SH
80 if (write && ret == 0)
81 ret = tcp_set_default_congestion_control(val);
82 return ret;
83}
84
3ff825b2 85static int proc_tcp_available_congestion_control(ctl_table *ctl,
8d65af78 86 int write,
3ff825b2
SH
87 void __user *buffer, size_t *lenp,
88 loff_t *ppos)
89{
90 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX, };
91 int ret;
92
93 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
94 if (!tbl.data)
95 return -ENOMEM;
96 tcp_get_available_congestion_control(tbl.data, TCP_CA_BUF_MAX);
8d65af78 97 ret = proc_dostring(&tbl, write, buffer, lenp, ppos);
3ff825b2
SH
98 kfree(tbl.data);
99 return ret;
100}
101
ce7bc3bf 102static int proc_allowed_congestion_control(ctl_table *ctl,
8d65af78 103 int write,
ce7bc3bf
SH
104 void __user *buffer, size_t *lenp,
105 loff_t *ppos)
106{
107 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX };
108 int ret;
109
110 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
111 if (!tbl.data)
112 return -ENOMEM;
113
114 tcp_get_allowed_congestion_control(tbl.data, tbl.maxlen);
8d65af78 115 ret = proc_dostring(&tbl, write, buffer, lenp, ppos);
ce7bc3bf
SH
116 if (write && ret == 0)
117 ret = tcp_set_allowed_congestion_control(tbl.data);
118 kfree(tbl.data);
119 return ret;
120}
121
3e37c3f9 122static struct ctl_table ipv4_table[] = {
e905a9ed 123 {
1da177e4
LT
124 .procname = "tcp_timestamps",
125 .data = &sysctl_tcp_timestamps,
126 .maxlen = sizeof(int),
127 .mode = 0644,
6d9f239a 128 .proc_handler = proc_dointvec
1da177e4 129 },
e905a9ed 130 {
1da177e4
LT
131 .procname = "tcp_window_scaling",
132 .data = &sysctl_tcp_window_scaling,
133 .maxlen = sizeof(int),
134 .mode = 0644,
6d9f239a 135 .proc_handler = proc_dointvec
1da177e4 136 },
e905a9ed 137 {
1da177e4
LT
138 .procname = "tcp_sack",
139 .data = &sysctl_tcp_sack,
140 .maxlen = sizeof(int),
141 .mode = 0644,
6d9f239a 142 .proc_handler = proc_dointvec
1da177e4 143 },
e905a9ed 144 {
1da177e4
LT
145 .procname = "tcp_retrans_collapse",
146 .data = &sysctl_tcp_retrans_collapse,
147 .maxlen = sizeof(int),
148 .mode = 0644,
6d9f239a 149 .proc_handler = proc_dointvec
1da177e4 150 },
e905a9ed 151 {
1da177e4 152 .procname = "ip_default_ttl",
e905a9ed 153 .data = &sysctl_ip_default_ttl,
1da177e4
LT
154 .maxlen = sizeof(int),
155 .mode = 0644,
6d9f239a 156 .proc_handler = ipv4_doint_and_flush,
adf044c8 157 .extra2 = &init_net,
1da177e4 158 },
e905a9ed 159 {
1da177e4
LT
160 .procname = "ip_no_pmtu_disc",
161 .data = &ipv4_config.no_pmtu_disc,
162 .maxlen = sizeof(int),
163 .mode = 0644,
6d9f239a 164 .proc_handler = proc_dointvec
1da177e4
LT
165 },
166 {
1da177e4
LT
167 .procname = "ip_nonlocal_bind",
168 .data = &sysctl_ip_nonlocal_bind,
169 .maxlen = sizeof(int),
170 .mode = 0644,
6d9f239a 171 .proc_handler = proc_dointvec
1da177e4
LT
172 },
173 {
1da177e4
LT
174 .procname = "tcp_syn_retries",
175 .data = &sysctl_tcp_syn_retries,
176 .maxlen = sizeof(int),
177 .mode = 0644,
6d9f239a 178 .proc_handler = proc_dointvec
1da177e4
LT
179 },
180 {
1da177e4
LT
181 .procname = "tcp_synack_retries",
182 .data = &sysctl_tcp_synack_retries,
183 .maxlen = sizeof(int),
184 .mode = 0644,
6d9f239a 185 .proc_handler = proc_dointvec
1da177e4
LT
186 },
187 {
1da177e4
LT
188 .procname = "tcp_max_orphans",
189 .data = &sysctl_tcp_max_orphans,
190 .maxlen = sizeof(int),
191 .mode = 0644,
6d9f239a 192 .proc_handler = proc_dointvec
1da177e4
LT
193 },
194 {
1da177e4 195 .procname = "tcp_max_tw_buckets",
295ff7ed 196 .data = &tcp_death_row.sysctl_max_tw_buckets,
1da177e4
LT
197 .maxlen = sizeof(int),
198 .mode = 0644,
6d9f239a 199 .proc_handler = proc_dointvec
1da177e4 200 },
1da177e4 201 {
1da177e4
LT
202 .procname = "ip_dynaddr",
203 .data = &sysctl_ip_dynaddr,
204 .maxlen = sizeof(int),
205 .mode = 0644,
6d9f239a 206 .proc_handler = proc_dointvec
1da177e4 207 },
1da177e4 208 {
1da177e4
LT
209 .procname = "tcp_keepalive_time",
210 .data = &sysctl_tcp_keepalive_time,
211 .maxlen = sizeof(int),
212 .mode = 0644,
6d9f239a 213 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
214 },
215 {
1da177e4
LT
216 .procname = "tcp_keepalive_probes",
217 .data = &sysctl_tcp_keepalive_probes,
218 .maxlen = sizeof(int),
219 .mode = 0644,
6d9f239a 220 .proc_handler = proc_dointvec
1da177e4
LT
221 },
222 {
1da177e4
LT
223 .procname = "tcp_keepalive_intvl",
224 .data = &sysctl_tcp_keepalive_intvl,
225 .maxlen = sizeof(int),
226 .mode = 0644,
6d9f239a 227 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
228 },
229 {
1da177e4
LT
230 .procname = "tcp_retries1",
231 .data = &sysctl_tcp_retries1,
232 .maxlen = sizeof(int),
233 .mode = 0644,
6d9f239a 234 .proc_handler = proc_dointvec_minmax,
1da177e4
LT
235 .extra2 = &tcp_retr1_max
236 },
237 {
1da177e4
LT
238 .procname = "tcp_retries2",
239 .data = &sysctl_tcp_retries2,
240 .maxlen = sizeof(int),
241 .mode = 0644,
6d9f239a 242 .proc_handler = proc_dointvec
1da177e4
LT
243 },
244 {
1da177e4
LT
245 .procname = "tcp_fin_timeout",
246 .data = &sysctl_tcp_fin_timeout,
247 .maxlen = sizeof(int),
248 .mode = 0644,
6d9f239a 249 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
250 },
251#ifdef CONFIG_SYN_COOKIES
252 {
1da177e4
LT
253 .procname = "tcp_syncookies",
254 .data = &sysctl_tcp_syncookies,
255 .maxlen = sizeof(int),
256 .mode = 0644,
6d9f239a 257 .proc_handler = proc_dointvec
1da177e4
LT
258 },
259#endif
260 {
1da177e4 261 .procname = "tcp_tw_recycle",
295ff7ed 262 .data = &tcp_death_row.sysctl_tw_recycle,
1da177e4
LT
263 .maxlen = sizeof(int),
264 .mode = 0644,
6d9f239a 265 .proc_handler = proc_dointvec
1da177e4
LT
266 },
267 {
1da177e4
LT
268 .procname = "tcp_abort_on_overflow",
269 .data = &sysctl_tcp_abort_on_overflow,
270 .maxlen = sizeof(int),
271 .mode = 0644,
6d9f239a 272 .proc_handler = proc_dointvec
1da177e4
LT
273 },
274 {
1da177e4
LT
275 .procname = "tcp_stdurg",
276 .data = &sysctl_tcp_stdurg,
277 .maxlen = sizeof(int),
278 .mode = 0644,
6d9f239a 279 .proc_handler = proc_dointvec
1da177e4
LT
280 },
281 {
1da177e4
LT
282 .procname = "tcp_rfc1337",
283 .data = &sysctl_tcp_rfc1337,
284 .maxlen = sizeof(int),
285 .mode = 0644,
6d9f239a 286 .proc_handler = proc_dointvec
1da177e4
LT
287 },
288 {
1da177e4
LT
289 .procname = "tcp_max_syn_backlog",
290 .data = &sysctl_max_syn_backlog,
291 .maxlen = sizeof(int),
292 .mode = 0644,
6d9f239a 293 .proc_handler = proc_dointvec
1da177e4
LT
294 },
295 {
1da177e4 296 .procname = "ip_local_port_range",
3c689b73
ED
297 .data = &sysctl_local_ports.range,
298 .maxlen = sizeof(sysctl_local_ports.range),
1da177e4 299 .mode = 0644,
6d9f239a 300 .proc_handler = ipv4_local_port_range,
1da177e4 301 },
e3826f1e
AW
302 {
303 .procname = "ip_local_reserved_ports",
304 .data = NULL, /* initialized in sysctl_ipv4_init */
305 .maxlen = 65536,
306 .mode = 0644,
307 .proc_handler = proc_do_large_bitmap,
308 },
1da177e4
LT
309#ifdef CONFIG_IP_MULTICAST
310 {
1da177e4
LT
311 .procname = "igmp_max_memberships",
312 .data = &sysctl_igmp_max_memberships,
313 .maxlen = sizeof(int),
314 .mode = 0644,
6d9f239a 315 .proc_handler = proc_dointvec
1da177e4
LT
316 },
317
318#endif
319 {
1da177e4
LT
320 .procname = "igmp_max_msf",
321 .data = &sysctl_igmp_max_msf,
322 .maxlen = sizeof(int),
323 .mode = 0644,
6d9f239a 324 .proc_handler = proc_dointvec
1da177e4
LT
325 },
326 {
1da177e4
LT
327 .procname = "inet_peer_threshold",
328 .data = &inet_peer_threshold,
329 .maxlen = sizeof(int),
330 .mode = 0644,
6d9f239a 331 .proc_handler = proc_dointvec
1da177e4
LT
332 },
333 {
1da177e4
LT
334 .procname = "inet_peer_minttl",
335 .data = &inet_peer_minttl,
336 .maxlen = sizeof(int),
337 .mode = 0644,
6d9f239a 338 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
339 },
340 {
1da177e4
LT
341 .procname = "inet_peer_maxttl",
342 .data = &inet_peer_maxttl,
343 .maxlen = sizeof(int),
344 .mode = 0644,
6d9f239a 345 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
346 },
347 {
1da177e4
LT
348 .procname = "inet_peer_gc_mintime",
349 .data = &inet_peer_gc_mintime,
350 .maxlen = sizeof(int),
351 .mode = 0644,
6d9f239a 352 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
353 },
354 {
1da177e4
LT
355 .procname = "inet_peer_gc_maxtime",
356 .data = &inet_peer_gc_maxtime,
357 .maxlen = sizeof(int),
358 .mode = 0644,
6d9f239a 359 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
360 },
361 {
1da177e4
LT
362 .procname = "tcp_orphan_retries",
363 .data = &sysctl_tcp_orphan_retries,
364 .maxlen = sizeof(int),
365 .mode = 0644,
6d9f239a 366 .proc_handler = proc_dointvec
1da177e4
LT
367 },
368 {
1da177e4
LT
369 .procname = "tcp_fack",
370 .data = &sysctl_tcp_fack,
371 .maxlen = sizeof(int),
372 .mode = 0644,
6d9f239a 373 .proc_handler = proc_dointvec
1da177e4
LT
374 },
375 {
1da177e4
LT
376 .procname = "tcp_reordering",
377 .data = &sysctl_tcp_reordering,
378 .maxlen = sizeof(int),
379 .mode = 0644,
6d9f239a 380 .proc_handler = proc_dointvec
1da177e4
LT
381 },
382 {
1da177e4
LT
383 .procname = "tcp_ecn",
384 .data = &sysctl_tcp_ecn,
385 .maxlen = sizeof(int),
386 .mode = 0644,
6d9f239a 387 .proc_handler = proc_dointvec
1da177e4
LT
388 },
389 {
1da177e4
LT
390 .procname = "tcp_dsack",
391 .data = &sysctl_tcp_dsack,
392 .maxlen = sizeof(int),
393 .mode = 0644,
6d9f239a 394 .proc_handler = proc_dointvec
1da177e4
LT
395 },
396 {
1da177e4
LT
397 .procname = "tcp_mem",
398 .data = &sysctl_tcp_mem,
399 .maxlen = sizeof(sysctl_tcp_mem),
400 .mode = 0644,
8d987e5c 401 .proc_handler = proc_doulongvec_minmax
1da177e4
LT
402 },
403 {
1da177e4
LT
404 .procname = "tcp_wmem",
405 .data = &sysctl_tcp_wmem,
406 .maxlen = sizeof(sysctl_tcp_wmem),
407 .mode = 0644,
6d9f239a 408 .proc_handler = proc_dointvec
1da177e4
LT
409 },
410 {
1da177e4
LT
411 .procname = "tcp_rmem",
412 .data = &sysctl_tcp_rmem,
413 .maxlen = sizeof(sysctl_tcp_rmem),
414 .mode = 0644,
6d9f239a 415 .proc_handler = proc_dointvec
1da177e4
LT
416 },
417 {
1da177e4
LT
418 .procname = "tcp_app_win",
419 .data = &sysctl_tcp_app_win,
420 .maxlen = sizeof(int),
421 .mode = 0644,
6d9f239a 422 .proc_handler = proc_dointvec
1da177e4
LT
423 },
424 {
1da177e4
LT
425 .procname = "tcp_adv_win_scale",
426 .data = &sysctl_tcp_adv_win_scale,
427 .maxlen = sizeof(int),
428 .mode = 0644,
6d9f239a 429 .proc_handler = proc_dointvec
1da177e4 430 },
1da177e4 431 {
1da177e4
LT
432 .procname = "tcp_tw_reuse",
433 .data = &sysctl_tcp_tw_reuse,
434 .maxlen = sizeof(int),
435 .mode = 0644,
6d9f239a 436 .proc_handler = proc_dointvec
1da177e4
LT
437 },
438 {
1da177e4
LT
439 .procname = "tcp_frto",
440 .data = &sysctl_tcp_frto,
441 .maxlen = sizeof(int),
442 .mode = 0644,
6d9f239a 443 .proc_handler = proc_dointvec
1da177e4 444 },
3cfe3baa 445 {
3cfe3baa
IJ
446 .procname = "tcp_frto_response",
447 .data = &sysctl_tcp_frto_response,
448 .maxlen = sizeof(int),
449 .mode = 0644,
6d9f239a 450 .proc_handler = proc_dointvec
3cfe3baa 451 },
1da177e4 452 {
1da177e4
LT
453 .procname = "tcp_low_latency",
454 .data = &sysctl_tcp_low_latency,
455 .maxlen = sizeof(int),
456 .mode = 0644,
6d9f239a 457 .proc_handler = proc_dointvec
1da177e4 458 },
1da177e4 459 {
1da177e4
LT
460 .procname = "tcp_no_metrics_save",
461 .data = &sysctl_tcp_nometrics_save,
462 .maxlen = sizeof(int),
463 .mode = 0644,
6d9f239a 464 .proc_handler = proc_dointvec,
1da177e4 465 },
1da177e4 466 {
1da177e4
LT
467 .procname = "tcp_moderate_rcvbuf",
468 .data = &sysctl_tcp_moderate_rcvbuf,
469 .maxlen = sizeof(int),
470 .mode = 0644,
6d9f239a 471 .proc_handler = proc_dointvec,
1da177e4
LT
472 },
473 {
1da177e4
LT
474 .procname = "tcp_tso_win_divisor",
475 .data = &sysctl_tcp_tso_win_divisor,
476 .maxlen = sizeof(int),
477 .mode = 0644,
6d9f239a 478 .proc_handler = proc_dointvec,
1da177e4
LT
479 },
480 {
317a76f9 481 .procname = "tcp_congestion_control",
1da177e4 482 .mode = 0644,
317a76f9 483 .maxlen = TCP_CA_NAME_MAX,
6d9f239a 484 .proc_handler = proc_tcp_congestion_control,
1da177e4 485 },
9772efb9 486 {
9772efb9
SH
487 .procname = "tcp_abc",
488 .data = &sysctl_tcp_abc,
489 .maxlen = sizeof(int),
490 .mode = 0644,
6d9f239a 491 .proc_handler = proc_dointvec,
9772efb9 492 },
5d424d5a 493 {
5d424d5a
JH
494 .procname = "tcp_mtu_probing",
495 .data = &sysctl_tcp_mtu_probing,
496 .maxlen = sizeof(int),
497 .mode = 0644,
6d9f239a 498 .proc_handler = proc_dointvec,
5d424d5a
JH
499 },
500 {
5d424d5a
JH
501 .procname = "tcp_base_mss",
502 .data = &sysctl_tcp_base_mss,
503 .maxlen = sizeof(int),
504 .mode = 0644,
6d9f239a 505 .proc_handler = proc_dointvec,
5d424d5a 506 },
e905a9ed 507 {
15d99e02
RJ
508 .procname = "tcp_workaround_signed_windows",
509 .data = &sysctl_tcp_workaround_signed_windows,
510 .maxlen = sizeof(int),
511 .mode = 0644,
6d9f239a 512 .proc_handler = proc_dointvec
15d99e02 513 },
95937825
CL
514#ifdef CONFIG_NET_DMA
515 {
95937825
CL
516 .procname = "tcp_dma_copybreak",
517 .data = &sysctl_tcp_dma_copybreak,
518 .maxlen = sizeof(int),
519 .mode = 0644,
6d9f239a 520 .proc_handler = proc_dointvec
95937825
CL
521 },
522#endif
35089bb2 523 {
35089bb2
DM
524 .procname = "tcp_slow_start_after_idle",
525 .data = &sysctl_tcp_slow_start_after_idle,
526 .maxlen = sizeof(int),
527 .mode = 0644,
6d9f239a 528 .proc_handler = proc_dointvec
35089bb2 529 },
446fda4f
PM
530#ifdef CONFIG_NETLABEL
531 {
446fda4f
PM
532 .procname = "cipso_cache_enable",
533 .data = &cipso_v4_cache_enabled,
534 .maxlen = sizeof(int),
535 .mode = 0644,
6d9f239a 536 .proc_handler = proc_dointvec,
446fda4f
PM
537 },
538 {
446fda4f
PM
539 .procname = "cipso_cache_bucket_size",
540 .data = &cipso_v4_cache_bucketsize,
541 .maxlen = sizeof(int),
542 .mode = 0644,
6d9f239a 543 .proc_handler = proc_dointvec,
446fda4f
PM
544 },
545 {
446fda4f
PM
546 .procname = "cipso_rbm_optfmt",
547 .data = &cipso_v4_rbm_optfmt,
548 .maxlen = sizeof(int),
549 .mode = 0644,
6d9f239a 550 .proc_handler = proc_dointvec,
446fda4f
PM
551 },
552 {
446fda4f
PM
553 .procname = "cipso_rbm_strictvalid",
554 .data = &cipso_v4_rbm_strictvalid,
555 .maxlen = sizeof(int),
556 .mode = 0644,
6d9f239a 557 .proc_handler = proc_dointvec,
446fda4f
PM
558 },
559#endif /* CONFIG_NETLABEL */
3ff825b2 560 {
3ff825b2
SH
561 .procname = "tcp_available_congestion_control",
562 .maxlen = TCP_CA_BUF_MAX,
563 .mode = 0444,
6d9f239a 564 .proc_handler = proc_tcp_available_congestion_control,
3ff825b2 565 },
ce7bc3bf 566 {
ce7bc3bf
SH
567 .procname = "tcp_allowed_congestion_control",
568 .maxlen = TCP_CA_BUF_MAX,
569 .mode = 0644,
6d9f239a 570 .proc_handler = proc_allowed_congestion_control,
ce7bc3bf 571 },
886236c1 572 {
886236c1
JH
573 .procname = "tcp_max_ssthresh",
574 .data = &sysctl_tcp_max_ssthresh,
575 .maxlen = sizeof(int),
576 .mode = 0644,
6d9f239a 577 .proc_handler = proc_dointvec,
886236c1 578 },
519855c5 579 {
519855c5
WAS
580 .procname = "tcp_cookie_size",
581 .data = &sysctl_tcp_cookie_size,
582 .maxlen = sizeof(int),
583 .mode = 0644,
584 .proc_handler = proc_dointvec
585 },
36e31b0a
AP
586 {
587 .procname = "tcp_thin_linear_timeouts",
588 .data = &sysctl_tcp_thin_linear_timeouts,
589 .maxlen = sizeof(int),
590 .mode = 0644,
591 .proc_handler = proc_dointvec
592 },
7e380175
AP
593 {
594 .procname = "tcp_thin_dupack",
595 .data = &sysctl_tcp_thin_dupack,
596 .maxlen = sizeof(int),
597 .mode = 0644,
598 .proc_handler = proc_dointvec
599 },
95766fff 600 {
95766fff
HA
601 .procname = "udp_mem",
602 .data = &sysctl_udp_mem,
603 .maxlen = sizeof(sysctl_udp_mem),
604 .mode = 0644,
8d987e5c 605 .proc_handler = proc_doulongvec_minmax,
95766fff
HA
606 },
607 {
95766fff
HA
608 .procname = "udp_rmem_min",
609 .data = &sysctl_udp_rmem_min,
610 .maxlen = sizeof(sysctl_udp_rmem_min),
611 .mode = 0644,
6d9f239a 612 .proc_handler = proc_dointvec_minmax,
95766fff
HA
613 .extra1 = &zero
614 },
615 {
95766fff
HA
616 .procname = "udp_wmem_min",
617 .data = &sysctl_udp_wmem_min,
618 .maxlen = sizeof(sysctl_udp_wmem_min),
619 .mode = 0644,
6d9f239a 620 .proc_handler = proc_dointvec_minmax,
95766fff
HA
621 .extra1 = &zero
622 },
f8572d8f 623 { }
1da177e4 624};
3e37c3f9 625
68528f09
PE
626static struct ctl_table ipv4_net_table[] = {
627 {
68528f09
PE
628 .procname = "icmp_echo_ignore_all",
629 .data = &init_net.ipv4.sysctl_icmp_echo_ignore_all,
630 .maxlen = sizeof(int),
631 .mode = 0644,
6d9f239a 632 .proc_handler = proc_dointvec
68528f09
PE
633 },
634 {
68528f09
PE
635 .procname = "icmp_echo_ignore_broadcasts",
636 .data = &init_net.ipv4.sysctl_icmp_echo_ignore_broadcasts,
637 .maxlen = sizeof(int),
638 .mode = 0644,
6d9f239a 639 .proc_handler = proc_dointvec
68528f09
PE
640 },
641 {
68528f09
PE
642 .procname = "icmp_ignore_bogus_error_responses",
643 .data = &init_net.ipv4.sysctl_icmp_ignore_bogus_error_responses,
644 .maxlen = sizeof(int),
645 .mode = 0644,
6d9f239a 646 .proc_handler = proc_dointvec
68528f09
PE
647 },
648 {
68528f09
PE
649 .procname = "icmp_errors_use_inbound_ifaddr",
650 .data = &init_net.ipv4.sysctl_icmp_errors_use_inbound_ifaddr,
651 .maxlen = sizeof(int),
652 .mode = 0644,
6d9f239a 653 .proc_handler = proc_dointvec
68528f09
PE
654 },
655 {
68528f09
PE
656 .procname = "icmp_ratelimit",
657 .data = &init_net.ipv4.sysctl_icmp_ratelimit,
658 .maxlen = sizeof(int),
659 .mode = 0644,
6d9f239a 660 .proc_handler = proc_dointvec_ms_jiffies,
68528f09
PE
661 },
662 {
68528f09
PE
663 .procname = "icmp_ratemask",
664 .data = &init_net.ipv4.sysctl_icmp_ratemask,
665 .maxlen = sizeof(int),
666 .mode = 0644,
6d9f239a 667 .proc_handler = proc_dointvec
68528f09 668 },
1080d709 669 {
1080d709
NH
670 .procname = "rt_cache_rebuild_count",
671 .data = &init_net.ipv4.sysctl_rt_cache_rebuild_count,
672 .maxlen = sizeof(int),
673 .mode = 0644,
6d9f239a 674 .proc_handler = proc_dointvec
1080d709 675 },
68528f09
PE
676 { }
677};
678
3d7cc2ba 679struct ctl_path net_ipv4_ctl_path[] = {
f8572d8f
EB
680 { .procname = "net", },
681 { .procname = "ipv4", },
3e37c3f9
PE
682 { },
683};
3d7cc2ba 684EXPORT_SYMBOL_GPL(net_ipv4_ctl_path);
3e37c3f9 685
1577519d
PE
686static __net_init int ipv4_sysctl_init_net(struct net *net)
687{
68528f09
PE
688 struct ctl_table *table;
689
690 table = ipv4_net_table;
09ad9bc7 691 if (!net_eq(net, &init_net)) {
68528f09
PE
692 table = kmemdup(table, sizeof(ipv4_net_table), GFP_KERNEL);
693 if (table == NULL)
694 goto err_alloc;
695
696 table[0].data =
697 &net->ipv4.sysctl_icmp_echo_ignore_all;
698 table[1].data =
699 &net->ipv4.sysctl_icmp_echo_ignore_broadcasts;
700 table[2].data =
701 &net->ipv4.sysctl_icmp_ignore_bogus_error_responses;
702 table[3].data =
703 &net->ipv4.sysctl_icmp_errors_use_inbound_ifaddr;
704 table[4].data =
705 &net->ipv4.sysctl_icmp_ratelimit;
706 table[5].data =
707 &net->ipv4.sysctl_icmp_ratemask;
1080d709
NH
708 table[6].data =
709 &net->ipv4.sysctl_rt_cache_rebuild_count;
68528f09
PE
710 }
711
1080d709
NH
712 net->ipv4.sysctl_rt_cache_rebuild_count = 4;
713
68528f09
PE
714 net->ipv4.ipv4_hdr = register_net_sysctl_table(net,
715 net_ipv4_ctl_path, table);
716 if (net->ipv4.ipv4_hdr == NULL)
717 goto err_reg;
718
1577519d 719 return 0;
68528f09
PE
720
721err_reg:
09ad9bc7 722 if (!net_eq(net, &init_net))
68528f09
PE
723 kfree(table);
724err_alloc:
725 return -ENOMEM;
1577519d
PE
726}
727
728static __net_exit void ipv4_sysctl_exit_net(struct net *net)
729{
68528f09
PE
730 struct ctl_table *table;
731
732 table = net->ipv4.ipv4_hdr->ctl_table_arg;
733 unregister_net_sysctl_table(net->ipv4.ipv4_hdr);
734 kfree(table);
1577519d
PE
735}
736
737static __net_initdata struct pernet_operations ipv4_sysctl_ops = {
738 .init = ipv4_sysctl_init_net,
739 .exit = ipv4_sysctl_exit_net,
740};
741
3e37c3f9
PE
742static __init int sysctl_ipv4_init(void)
743{
744 struct ctl_table_header *hdr;
e3826f1e
AW
745 struct ctl_table *i;
746
747 for (i = ipv4_table; i->procname; i++) {
748 if (strcmp(i->procname, "ip_local_reserved_ports") == 0) {
749 i->data = sysctl_local_reserved_ports;
750 break;
751 }
752 }
753 if (!i->procname)
754 return -EINVAL;
3e37c3f9 755
3d7cc2ba 756 hdr = register_sysctl_paths(net_ipv4_ctl_path, ipv4_table);
1577519d
PE
757 if (hdr == NULL)
758 return -ENOMEM;
759
760 if (register_pernet_subsys(&ipv4_sysctl_ops)) {
761 unregister_sysctl_table(hdr);
762 return -ENOMEM;
763 }
764
765 return 0;
3e37c3f9
PE
766}
767
768__initcall(sysctl_ipv4_init);