]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - net/ipv4/sysctl_net_ipv4.c
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit...
[mirror_ubuntu-artful-kernel.git] / net / ipv4 / sysctl_net_ipv4.c
CommitLineData
1da177e4
LT
1/*
2 * sysctl_net_ipv4.c: sysctl interface to net IPV4 subsystem.
3 *
1da177e4
LT
4 * Begun April 1, 1996, Mike Shaver.
5 * Added /proc/sys/net/ipv4 directory entry (empty =) ). [MS]
6 */
7
8#include <linux/mm.h>
9#include <linux/module.h>
10#include <linux/sysctl.h>
20380731 11#include <linux/igmp.h>
14c85021 12#include <linux/inetdevice.h>
227b60f5 13#include <linux/seqlock.h>
3e37c3f9 14#include <linux/init.h>
5a0e3ad6 15#include <linux/slab.h>
1da177e4 16#include <net/snmp.h>
20380731 17#include <net/icmp.h>
1da177e4
LT
18#include <net/ip.h>
19#include <net/route.h>
20#include <net/tcp.h>
95766fff 21#include <net/udp.h>
446fda4f 22#include <net/cipso_ipv4.h>
04128f23 23#include <net/inet_frag.h>
1da177e4 24
89cee8b1 25static int zero;
e905a9ed 26static int tcp_retr1_max = 255;
1da177e4
LT
27static int ip_local_port_range_min[] = { 1, 1 };
28static int ip_local_port_range_max[] = { 65535, 65535 };
1da177e4 29
227b60f5
SH
30/* Update system visible IP port range */
31static void set_local_port_range(int range[2])
32{
3c689b73
ED
33 write_seqlock(&sysctl_local_ports.lock);
34 sysctl_local_ports.range[0] = range[0];
35 sysctl_local_ports.range[1] = range[1];
36 write_sequnlock(&sysctl_local_ports.lock);
227b60f5
SH
37}
38
39/* Validate changes from /proc interface. */
8d65af78 40static int ipv4_local_port_range(ctl_table *table, int write,
227b60f5
SH
41 void __user *buffer,
42 size_t *lenp, loff_t *ppos)
43{
44 int ret;
3c689b73 45 int range[2];
227b60f5
SH
46 ctl_table tmp = {
47 .data = &range,
48 .maxlen = sizeof(range),
49 .mode = table->mode,
50 .extra1 = &ip_local_port_range_min,
51 .extra2 = &ip_local_port_range_max,
52 };
53
3c689b73 54 inet_get_local_port_range(range, range + 1);
8d65af78 55 ret = proc_dointvec_minmax(&tmp, write, buffer, lenp, ppos);
227b60f5
SH
56
57 if (write && ret == 0) {
a25de534 58 if (range[1] < range[0])
227b60f5
SH
59 ret = -EINVAL;
60 else
61 set_local_port_range(range);
62 }
63
64 return ret;
65}
66
8d65af78 67static int proc_tcp_congestion_control(ctl_table *ctl, int write,
317a76f9
SH
68 void __user *buffer, size_t *lenp, loff_t *ppos)
69{
70 char val[TCP_CA_NAME_MAX];
71 ctl_table tbl = {
72 .data = val,
73 .maxlen = TCP_CA_NAME_MAX,
74 };
75 int ret;
76
77 tcp_get_default_congestion_control(val);
78
8d65af78 79 ret = proc_dostring(&tbl, write, buffer, lenp, ppos);
317a76f9
SH
80 if (write && ret == 0)
81 ret = tcp_set_default_congestion_control(val);
82 return ret;
83}
84
3ff825b2 85static int proc_tcp_available_congestion_control(ctl_table *ctl,
8d65af78 86 int write,
3ff825b2
SH
87 void __user *buffer, size_t *lenp,
88 loff_t *ppos)
89{
90 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX, };
91 int ret;
92
93 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
94 if (!tbl.data)
95 return -ENOMEM;
96 tcp_get_available_congestion_control(tbl.data, TCP_CA_BUF_MAX);
8d65af78 97 ret = proc_dostring(&tbl, write, buffer, lenp, ppos);
3ff825b2
SH
98 kfree(tbl.data);
99 return ret;
100}
101
ce7bc3bf 102static int proc_allowed_congestion_control(ctl_table *ctl,
8d65af78 103 int write,
ce7bc3bf
SH
104 void __user *buffer, size_t *lenp,
105 loff_t *ppos)
106{
107 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX };
108 int ret;
109
110 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
111 if (!tbl.data)
112 return -ENOMEM;
113
114 tcp_get_allowed_congestion_control(tbl.data, tbl.maxlen);
8d65af78 115 ret = proc_dostring(&tbl, write, buffer, lenp, ppos);
ce7bc3bf
SH
116 if (write && ret == 0)
117 ret = tcp_set_allowed_congestion_control(tbl.data);
118 kfree(tbl.data);
119 return ret;
120}
121
3e37c3f9 122static struct ctl_table ipv4_table[] = {
e905a9ed 123 {
1da177e4
LT
124 .procname = "tcp_timestamps",
125 .data = &sysctl_tcp_timestamps,
126 .maxlen = sizeof(int),
127 .mode = 0644,
6d9f239a 128 .proc_handler = proc_dointvec
1da177e4 129 },
e905a9ed 130 {
1da177e4
LT
131 .procname = "tcp_window_scaling",
132 .data = &sysctl_tcp_window_scaling,
133 .maxlen = sizeof(int),
134 .mode = 0644,
6d9f239a 135 .proc_handler = proc_dointvec
1da177e4 136 },
e905a9ed 137 {
1da177e4
LT
138 .procname = "tcp_sack",
139 .data = &sysctl_tcp_sack,
140 .maxlen = sizeof(int),
141 .mode = 0644,
6d9f239a 142 .proc_handler = proc_dointvec
1da177e4 143 },
e905a9ed 144 {
1da177e4
LT
145 .procname = "tcp_retrans_collapse",
146 .data = &sysctl_tcp_retrans_collapse,
147 .maxlen = sizeof(int),
148 .mode = 0644,
6d9f239a 149 .proc_handler = proc_dointvec
1da177e4 150 },
e905a9ed 151 {
1da177e4 152 .procname = "ip_default_ttl",
e905a9ed 153 .data = &sysctl_ip_default_ttl,
1da177e4
LT
154 .maxlen = sizeof(int),
155 .mode = 0644,
6d9f239a 156 .proc_handler = ipv4_doint_and_flush,
adf044c8 157 .extra2 = &init_net,
1da177e4 158 },
e905a9ed 159 {
1da177e4
LT
160 .procname = "ip_no_pmtu_disc",
161 .data = &ipv4_config.no_pmtu_disc,
162 .maxlen = sizeof(int),
163 .mode = 0644,
6d9f239a 164 .proc_handler = proc_dointvec
1da177e4
LT
165 },
166 {
1da177e4
LT
167 .procname = "ip_nonlocal_bind",
168 .data = &sysctl_ip_nonlocal_bind,
169 .maxlen = sizeof(int),
170 .mode = 0644,
6d9f239a 171 .proc_handler = proc_dointvec
1da177e4
LT
172 },
173 {
1da177e4
LT
174 .procname = "tcp_syn_retries",
175 .data = &sysctl_tcp_syn_retries,
176 .maxlen = sizeof(int),
177 .mode = 0644,
6d9f239a 178 .proc_handler = proc_dointvec
1da177e4
LT
179 },
180 {
1da177e4
LT
181 .procname = "tcp_synack_retries",
182 .data = &sysctl_tcp_synack_retries,
183 .maxlen = sizeof(int),
184 .mode = 0644,
6d9f239a 185 .proc_handler = proc_dointvec
1da177e4
LT
186 },
187 {
1da177e4
LT
188 .procname = "tcp_max_orphans",
189 .data = &sysctl_tcp_max_orphans,
190 .maxlen = sizeof(int),
191 .mode = 0644,
6d9f239a 192 .proc_handler = proc_dointvec
1da177e4
LT
193 },
194 {
1da177e4 195 .procname = "tcp_max_tw_buckets",
295ff7ed 196 .data = &tcp_death_row.sysctl_max_tw_buckets,
1da177e4
LT
197 .maxlen = sizeof(int),
198 .mode = 0644,
6d9f239a 199 .proc_handler = proc_dointvec
1da177e4 200 },
1da177e4 201 {
1da177e4
LT
202 .procname = "ip_dynaddr",
203 .data = &sysctl_ip_dynaddr,
204 .maxlen = sizeof(int),
205 .mode = 0644,
6d9f239a 206 .proc_handler = proc_dointvec
1da177e4 207 },
1da177e4 208 {
1da177e4
LT
209 .procname = "tcp_keepalive_time",
210 .data = &sysctl_tcp_keepalive_time,
211 .maxlen = sizeof(int),
212 .mode = 0644,
6d9f239a 213 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
214 },
215 {
1da177e4
LT
216 .procname = "tcp_keepalive_probes",
217 .data = &sysctl_tcp_keepalive_probes,
218 .maxlen = sizeof(int),
219 .mode = 0644,
6d9f239a 220 .proc_handler = proc_dointvec
1da177e4
LT
221 },
222 {
1da177e4
LT
223 .procname = "tcp_keepalive_intvl",
224 .data = &sysctl_tcp_keepalive_intvl,
225 .maxlen = sizeof(int),
226 .mode = 0644,
6d9f239a 227 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
228 },
229 {
1da177e4
LT
230 .procname = "tcp_retries1",
231 .data = &sysctl_tcp_retries1,
232 .maxlen = sizeof(int),
233 .mode = 0644,
6d9f239a 234 .proc_handler = proc_dointvec_minmax,
1da177e4
LT
235 .extra2 = &tcp_retr1_max
236 },
237 {
1da177e4
LT
238 .procname = "tcp_retries2",
239 .data = &sysctl_tcp_retries2,
240 .maxlen = sizeof(int),
241 .mode = 0644,
6d9f239a 242 .proc_handler = proc_dointvec
1da177e4
LT
243 },
244 {
1da177e4
LT
245 .procname = "tcp_fin_timeout",
246 .data = &sysctl_tcp_fin_timeout,
247 .maxlen = sizeof(int),
248 .mode = 0644,
6d9f239a 249 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
250 },
251#ifdef CONFIG_SYN_COOKIES
252 {
1da177e4
LT
253 .procname = "tcp_syncookies",
254 .data = &sysctl_tcp_syncookies,
255 .maxlen = sizeof(int),
256 .mode = 0644,
6d9f239a 257 .proc_handler = proc_dointvec
1da177e4
LT
258 },
259#endif
260 {
1da177e4 261 .procname = "tcp_tw_recycle",
295ff7ed 262 .data = &tcp_death_row.sysctl_tw_recycle,
1da177e4
LT
263 .maxlen = sizeof(int),
264 .mode = 0644,
6d9f239a 265 .proc_handler = proc_dointvec
1da177e4
LT
266 },
267 {
1da177e4
LT
268 .procname = "tcp_abort_on_overflow",
269 .data = &sysctl_tcp_abort_on_overflow,
270 .maxlen = sizeof(int),
271 .mode = 0644,
6d9f239a 272 .proc_handler = proc_dointvec
1da177e4
LT
273 },
274 {
1da177e4
LT
275 .procname = "tcp_stdurg",
276 .data = &sysctl_tcp_stdurg,
277 .maxlen = sizeof(int),
278 .mode = 0644,
6d9f239a 279 .proc_handler = proc_dointvec
1da177e4
LT
280 },
281 {
1da177e4
LT
282 .procname = "tcp_rfc1337",
283 .data = &sysctl_tcp_rfc1337,
284 .maxlen = sizeof(int),
285 .mode = 0644,
6d9f239a 286 .proc_handler = proc_dointvec
1da177e4
LT
287 },
288 {
1da177e4
LT
289 .procname = "tcp_max_syn_backlog",
290 .data = &sysctl_max_syn_backlog,
291 .maxlen = sizeof(int),
292 .mode = 0644,
6d9f239a 293 .proc_handler = proc_dointvec
1da177e4
LT
294 },
295 {
1da177e4 296 .procname = "ip_local_port_range",
3c689b73
ED
297 .data = &sysctl_local_ports.range,
298 .maxlen = sizeof(sysctl_local_ports.range),
1da177e4 299 .mode = 0644,
6d9f239a 300 .proc_handler = ipv4_local_port_range,
1da177e4 301 },
1da177e4
LT
302#ifdef CONFIG_IP_MULTICAST
303 {
1da177e4
LT
304 .procname = "igmp_max_memberships",
305 .data = &sysctl_igmp_max_memberships,
306 .maxlen = sizeof(int),
307 .mode = 0644,
6d9f239a 308 .proc_handler = proc_dointvec
1da177e4
LT
309 },
310
311#endif
312 {
1da177e4
LT
313 .procname = "igmp_max_msf",
314 .data = &sysctl_igmp_max_msf,
315 .maxlen = sizeof(int),
316 .mode = 0644,
6d9f239a 317 .proc_handler = proc_dointvec
1da177e4
LT
318 },
319 {
1da177e4
LT
320 .procname = "inet_peer_threshold",
321 .data = &inet_peer_threshold,
322 .maxlen = sizeof(int),
323 .mode = 0644,
6d9f239a 324 .proc_handler = proc_dointvec
1da177e4
LT
325 },
326 {
1da177e4
LT
327 .procname = "inet_peer_minttl",
328 .data = &inet_peer_minttl,
329 .maxlen = sizeof(int),
330 .mode = 0644,
6d9f239a 331 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
332 },
333 {
1da177e4
LT
334 .procname = "inet_peer_maxttl",
335 .data = &inet_peer_maxttl,
336 .maxlen = sizeof(int),
337 .mode = 0644,
6d9f239a 338 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
339 },
340 {
1da177e4
LT
341 .procname = "inet_peer_gc_mintime",
342 .data = &inet_peer_gc_mintime,
343 .maxlen = sizeof(int),
344 .mode = 0644,
6d9f239a 345 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
346 },
347 {
1da177e4
LT
348 .procname = "inet_peer_gc_maxtime",
349 .data = &inet_peer_gc_maxtime,
350 .maxlen = sizeof(int),
351 .mode = 0644,
6d9f239a 352 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
353 },
354 {
1da177e4
LT
355 .procname = "tcp_orphan_retries",
356 .data = &sysctl_tcp_orphan_retries,
357 .maxlen = sizeof(int),
358 .mode = 0644,
6d9f239a 359 .proc_handler = proc_dointvec
1da177e4
LT
360 },
361 {
1da177e4
LT
362 .procname = "tcp_fack",
363 .data = &sysctl_tcp_fack,
364 .maxlen = sizeof(int),
365 .mode = 0644,
6d9f239a 366 .proc_handler = proc_dointvec
1da177e4
LT
367 },
368 {
1da177e4
LT
369 .procname = "tcp_reordering",
370 .data = &sysctl_tcp_reordering,
371 .maxlen = sizeof(int),
372 .mode = 0644,
6d9f239a 373 .proc_handler = proc_dointvec
1da177e4
LT
374 },
375 {
1da177e4
LT
376 .procname = "tcp_ecn",
377 .data = &sysctl_tcp_ecn,
378 .maxlen = sizeof(int),
379 .mode = 0644,
6d9f239a 380 .proc_handler = proc_dointvec
1da177e4
LT
381 },
382 {
1da177e4
LT
383 .procname = "tcp_dsack",
384 .data = &sysctl_tcp_dsack,
385 .maxlen = sizeof(int),
386 .mode = 0644,
6d9f239a 387 .proc_handler = proc_dointvec
1da177e4
LT
388 },
389 {
1da177e4
LT
390 .procname = "tcp_mem",
391 .data = &sysctl_tcp_mem,
392 .maxlen = sizeof(sysctl_tcp_mem),
393 .mode = 0644,
6d9f239a 394 .proc_handler = proc_dointvec
1da177e4
LT
395 },
396 {
1da177e4
LT
397 .procname = "tcp_wmem",
398 .data = &sysctl_tcp_wmem,
399 .maxlen = sizeof(sysctl_tcp_wmem),
400 .mode = 0644,
6d9f239a 401 .proc_handler = proc_dointvec
1da177e4
LT
402 },
403 {
1da177e4
LT
404 .procname = "tcp_rmem",
405 .data = &sysctl_tcp_rmem,
406 .maxlen = sizeof(sysctl_tcp_rmem),
407 .mode = 0644,
6d9f239a 408 .proc_handler = proc_dointvec
1da177e4
LT
409 },
410 {
1da177e4
LT
411 .procname = "tcp_app_win",
412 .data = &sysctl_tcp_app_win,
413 .maxlen = sizeof(int),
414 .mode = 0644,
6d9f239a 415 .proc_handler = proc_dointvec
1da177e4
LT
416 },
417 {
1da177e4
LT
418 .procname = "tcp_adv_win_scale",
419 .data = &sysctl_tcp_adv_win_scale,
420 .maxlen = sizeof(int),
421 .mode = 0644,
6d9f239a 422 .proc_handler = proc_dointvec
1da177e4 423 },
1da177e4 424 {
1da177e4
LT
425 .procname = "tcp_tw_reuse",
426 .data = &sysctl_tcp_tw_reuse,
427 .maxlen = sizeof(int),
428 .mode = 0644,
6d9f239a 429 .proc_handler = proc_dointvec
1da177e4
LT
430 },
431 {
1da177e4
LT
432 .procname = "tcp_frto",
433 .data = &sysctl_tcp_frto,
434 .maxlen = sizeof(int),
435 .mode = 0644,
6d9f239a 436 .proc_handler = proc_dointvec
1da177e4 437 },
3cfe3baa 438 {
3cfe3baa
IJ
439 .procname = "tcp_frto_response",
440 .data = &sysctl_tcp_frto_response,
441 .maxlen = sizeof(int),
442 .mode = 0644,
6d9f239a 443 .proc_handler = proc_dointvec
3cfe3baa 444 },
1da177e4 445 {
1da177e4
LT
446 .procname = "tcp_low_latency",
447 .data = &sysctl_tcp_low_latency,
448 .maxlen = sizeof(int),
449 .mode = 0644,
6d9f239a 450 .proc_handler = proc_dointvec
1da177e4 451 },
1da177e4 452 {
1da177e4
LT
453 .procname = "tcp_no_metrics_save",
454 .data = &sysctl_tcp_nometrics_save,
455 .maxlen = sizeof(int),
456 .mode = 0644,
6d9f239a 457 .proc_handler = proc_dointvec,
1da177e4 458 },
1da177e4 459 {
1da177e4
LT
460 .procname = "tcp_moderate_rcvbuf",
461 .data = &sysctl_tcp_moderate_rcvbuf,
462 .maxlen = sizeof(int),
463 .mode = 0644,
6d9f239a 464 .proc_handler = proc_dointvec,
1da177e4
LT
465 },
466 {
1da177e4
LT
467 .procname = "tcp_tso_win_divisor",
468 .data = &sysctl_tcp_tso_win_divisor,
469 .maxlen = sizeof(int),
470 .mode = 0644,
6d9f239a 471 .proc_handler = proc_dointvec,
1da177e4
LT
472 },
473 {
317a76f9 474 .procname = "tcp_congestion_control",
1da177e4 475 .mode = 0644,
317a76f9 476 .maxlen = TCP_CA_NAME_MAX,
6d9f239a 477 .proc_handler = proc_tcp_congestion_control,
1da177e4 478 },
9772efb9 479 {
9772efb9
SH
480 .procname = "tcp_abc",
481 .data = &sysctl_tcp_abc,
482 .maxlen = sizeof(int),
483 .mode = 0644,
6d9f239a 484 .proc_handler = proc_dointvec,
9772efb9 485 },
5d424d5a 486 {
5d424d5a
JH
487 .procname = "tcp_mtu_probing",
488 .data = &sysctl_tcp_mtu_probing,
489 .maxlen = sizeof(int),
490 .mode = 0644,
6d9f239a 491 .proc_handler = proc_dointvec,
5d424d5a
JH
492 },
493 {
5d424d5a
JH
494 .procname = "tcp_base_mss",
495 .data = &sysctl_tcp_base_mss,
496 .maxlen = sizeof(int),
497 .mode = 0644,
6d9f239a 498 .proc_handler = proc_dointvec,
5d424d5a 499 },
e905a9ed 500 {
15d99e02
RJ
501 .procname = "tcp_workaround_signed_windows",
502 .data = &sysctl_tcp_workaround_signed_windows,
503 .maxlen = sizeof(int),
504 .mode = 0644,
6d9f239a 505 .proc_handler = proc_dointvec
15d99e02 506 },
95937825
CL
507#ifdef CONFIG_NET_DMA
508 {
95937825
CL
509 .procname = "tcp_dma_copybreak",
510 .data = &sysctl_tcp_dma_copybreak,
511 .maxlen = sizeof(int),
512 .mode = 0644,
6d9f239a 513 .proc_handler = proc_dointvec
95937825
CL
514 },
515#endif
35089bb2 516 {
35089bb2
DM
517 .procname = "tcp_slow_start_after_idle",
518 .data = &sysctl_tcp_slow_start_after_idle,
519 .maxlen = sizeof(int),
520 .mode = 0644,
6d9f239a 521 .proc_handler = proc_dointvec
35089bb2 522 },
446fda4f
PM
523#ifdef CONFIG_NETLABEL
524 {
446fda4f
PM
525 .procname = "cipso_cache_enable",
526 .data = &cipso_v4_cache_enabled,
527 .maxlen = sizeof(int),
528 .mode = 0644,
6d9f239a 529 .proc_handler = proc_dointvec,
446fda4f
PM
530 },
531 {
446fda4f
PM
532 .procname = "cipso_cache_bucket_size",
533 .data = &cipso_v4_cache_bucketsize,
534 .maxlen = sizeof(int),
535 .mode = 0644,
6d9f239a 536 .proc_handler = proc_dointvec,
446fda4f
PM
537 },
538 {
446fda4f
PM
539 .procname = "cipso_rbm_optfmt",
540 .data = &cipso_v4_rbm_optfmt,
541 .maxlen = sizeof(int),
542 .mode = 0644,
6d9f239a 543 .proc_handler = proc_dointvec,
446fda4f
PM
544 },
545 {
446fda4f
PM
546 .procname = "cipso_rbm_strictvalid",
547 .data = &cipso_v4_rbm_strictvalid,
548 .maxlen = sizeof(int),
549 .mode = 0644,
6d9f239a 550 .proc_handler = proc_dointvec,
446fda4f
PM
551 },
552#endif /* CONFIG_NETLABEL */
3ff825b2 553 {
3ff825b2
SH
554 .procname = "tcp_available_congestion_control",
555 .maxlen = TCP_CA_BUF_MAX,
556 .mode = 0444,
6d9f239a 557 .proc_handler = proc_tcp_available_congestion_control,
3ff825b2 558 },
ce7bc3bf 559 {
ce7bc3bf
SH
560 .procname = "tcp_allowed_congestion_control",
561 .maxlen = TCP_CA_BUF_MAX,
562 .mode = 0644,
6d9f239a 563 .proc_handler = proc_allowed_congestion_control,
ce7bc3bf 564 },
886236c1 565 {
886236c1
JH
566 .procname = "tcp_max_ssthresh",
567 .data = &sysctl_tcp_max_ssthresh,
568 .maxlen = sizeof(int),
569 .mode = 0644,
6d9f239a 570 .proc_handler = proc_dointvec,
886236c1 571 },
519855c5 572 {
519855c5
WAS
573 .procname = "tcp_cookie_size",
574 .data = &sysctl_tcp_cookie_size,
575 .maxlen = sizeof(int),
576 .mode = 0644,
577 .proc_handler = proc_dointvec
578 },
36e31b0a
AP
579 {
580 .procname = "tcp_thin_linear_timeouts",
581 .data = &sysctl_tcp_thin_linear_timeouts,
582 .maxlen = sizeof(int),
583 .mode = 0644,
584 .proc_handler = proc_dointvec
585 },
7e380175
AP
586 {
587 .procname = "tcp_thin_dupack",
588 .data = &sysctl_tcp_thin_dupack,
589 .maxlen = sizeof(int),
590 .mode = 0644,
591 .proc_handler = proc_dointvec
592 },
95766fff 593 {
95766fff
HA
594 .procname = "udp_mem",
595 .data = &sysctl_udp_mem,
596 .maxlen = sizeof(sysctl_udp_mem),
597 .mode = 0644,
6d9f239a 598 .proc_handler = proc_dointvec_minmax,
95766fff
HA
599 .extra1 = &zero
600 },
601 {
95766fff
HA
602 .procname = "udp_rmem_min",
603 .data = &sysctl_udp_rmem_min,
604 .maxlen = sizeof(sysctl_udp_rmem_min),
605 .mode = 0644,
6d9f239a 606 .proc_handler = proc_dointvec_minmax,
95766fff
HA
607 .extra1 = &zero
608 },
609 {
95766fff
HA
610 .procname = "udp_wmem_min",
611 .data = &sysctl_udp_wmem_min,
612 .maxlen = sizeof(sysctl_udp_wmem_min),
613 .mode = 0644,
6d9f239a 614 .proc_handler = proc_dointvec_minmax,
95766fff
HA
615 .extra1 = &zero
616 },
f8572d8f 617 { }
1da177e4 618};
3e37c3f9 619
68528f09
PE
620static struct ctl_table ipv4_net_table[] = {
621 {
68528f09
PE
622 .procname = "icmp_echo_ignore_all",
623 .data = &init_net.ipv4.sysctl_icmp_echo_ignore_all,
624 .maxlen = sizeof(int),
625 .mode = 0644,
6d9f239a 626 .proc_handler = proc_dointvec
68528f09
PE
627 },
628 {
68528f09
PE
629 .procname = "icmp_echo_ignore_broadcasts",
630 .data = &init_net.ipv4.sysctl_icmp_echo_ignore_broadcasts,
631 .maxlen = sizeof(int),
632 .mode = 0644,
6d9f239a 633 .proc_handler = proc_dointvec
68528f09
PE
634 },
635 {
68528f09
PE
636 .procname = "icmp_ignore_bogus_error_responses",
637 .data = &init_net.ipv4.sysctl_icmp_ignore_bogus_error_responses,
638 .maxlen = sizeof(int),
639 .mode = 0644,
6d9f239a 640 .proc_handler = proc_dointvec
68528f09
PE
641 },
642 {
68528f09
PE
643 .procname = "icmp_errors_use_inbound_ifaddr",
644 .data = &init_net.ipv4.sysctl_icmp_errors_use_inbound_ifaddr,
645 .maxlen = sizeof(int),
646 .mode = 0644,
6d9f239a 647 .proc_handler = proc_dointvec
68528f09
PE
648 },
649 {
68528f09
PE
650 .procname = "icmp_ratelimit",
651 .data = &init_net.ipv4.sysctl_icmp_ratelimit,
652 .maxlen = sizeof(int),
653 .mode = 0644,
6d9f239a 654 .proc_handler = proc_dointvec_ms_jiffies,
68528f09
PE
655 },
656 {
68528f09
PE
657 .procname = "icmp_ratemask",
658 .data = &init_net.ipv4.sysctl_icmp_ratemask,
659 .maxlen = sizeof(int),
660 .mode = 0644,
6d9f239a 661 .proc_handler = proc_dointvec
68528f09 662 },
1080d709 663 {
1080d709
NH
664 .procname = "rt_cache_rebuild_count",
665 .data = &init_net.ipv4.sysctl_rt_cache_rebuild_count,
666 .maxlen = sizeof(int),
667 .mode = 0644,
6d9f239a 668 .proc_handler = proc_dointvec
1080d709 669 },
68528f09
PE
670 { }
671};
672
3d7cc2ba 673struct ctl_path net_ipv4_ctl_path[] = {
f8572d8f
EB
674 { .procname = "net", },
675 { .procname = "ipv4", },
3e37c3f9
PE
676 { },
677};
3d7cc2ba 678EXPORT_SYMBOL_GPL(net_ipv4_ctl_path);
3e37c3f9 679
1577519d
PE
680static __net_init int ipv4_sysctl_init_net(struct net *net)
681{
68528f09
PE
682 struct ctl_table *table;
683
684 table = ipv4_net_table;
09ad9bc7 685 if (!net_eq(net, &init_net)) {
68528f09
PE
686 table = kmemdup(table, sizeof(ipv4_net_table), GFP_KERNEL);
687 if (table == NULL)
688 goto err_alloc;
689
690 table[0].data =
691 &net->ipv4.sysctl_icmp_echo_ignore_all;
692 table[1].data =
693 &net->ipv4.sysctl_icmp_echo_ignore_broadcasts;
694 table[2].data =
695 &net->ipv4.sysctl_icmp_ignore_bogus_error_responses;
696 table[3].data =
697 &net->ipv4.sysctl_icmp_errors_use_inbound_ifaddr;
698 table[4].data =
699 &net->ipv4.sysctl_icmp_ratelimit;
700 table[5].data =
701 &net->ipv4.sysctl_icmp_ratemask;
1080d709
NH
702 table[6].data =
703 &net->ipv4.sysctl_rt_cache_rebuild_count;
68528f09
PE
704 }
705
1080d709
NH
706 net->ipv4.sysctl_rt_cache_rebuild_count = 4;
707
68528f09
PE
708 net->ipv4.ipv4_hdr = register_net_sysctl_table(net,
709 net_ipv4_ctl_path, table);
710 if (net->ipv4.ipv4_hdr == NULL)
711 goto err_reg;
712
1577519d 713 return 0;
68528f09
PE
714
715err_reg:
09ad9bc7 716 if (!net_eq(net, &init_net))
68528f09
PE
717 kfree(table);
718err_alloc:
719 return -ENOMEM;
1577519d
PE
720}
721
722static __net_exit void ipv4_sysctl_exit_net(struct net *net)
723{
68528f09
PE
724 struct ctl_table *table;
725
726 table = net->ipv4.ipv4_hdr->ctl_table_arg;
727 unregister_net_sysctl_table(net->ipv4.ipv4_hdr);
728 kfree(table);
1577519d
PE
729}
730
731static __net_initdata struct pernet_operations ipv4_sysctl_ops = {
732 .init = ipv4_sysctl_init_net,
733 .exit = ipv4_sysctl_exit_net,
734};
735
3e37c3f9
PE
736static __init int sysctl_ipv4_init(void)
737{
738 struct ctl_table_header *hdr;
739
3d7cc2ba 740 hdr = register_sysctl_paths(net_ipv4_ctl_path, ipv4_table);
1577519d
PE
741 if (hdr == NULL)
742 return -ENOMEM;
743
744 if (register_pernet_subsys(&ipv4_sysctl_ops)) {
745 unregister_sysctl_table(hdr);
746 return -ENOMEM;
747 }
748
749 return 0;
3e37c3f9
PE
750}
751
752__initcall(sysctl_ipv4_init);