blob: bfd0dec6238d419b17f6d59a08f88e132307fb41 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * sysctl_net_ipv4.c: sysctl interface to net IPV4 subsystem.
3 *
4 * $Id: sysctl_net_ipv4.c,v 1.50 2001/10/20 00:00:11 davem Exp $
5 *
6 * Begun April 1, 1996, Mike Shaver.
7 * Added /proc/sys/net/ipv4 directory entry (empty =) ). [MS]
8 */
9
10#include <linux/mm.h>
11#include <linux/module.h>
12#include <linux/sysctl.h>
Arnaldo Carvalho de Melo20380732005-08-16 02:18:02 -030013#include <linux/igmp.h>
Arnaldo Carvalho de Melo14c85022005-12-27 02:43:12 -020014#include <linux/inetdevice.h>
Stephen Hemminger227b60f2007-10-10 17:30:46 -070015#include <linux/seqlock.h>
Pavel Emelyanov3e37c3f2007-12-05 01:41:26 -080016#include <linux/init.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070017#include <net/snmp.h>
Arnaldo Carvalho de Melo20380732005-08-16 02:18:02 -030018#include <net/icmp.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019#include <net/ip.h>
20#include <net/route.h>
21#include <net/tcp.h>
Paul Moore446fda42006-08-03 16:48:06 -070022#include <net/cipso_ipv4.h>
Pavel Emelyanov04128f22007-10-15 02:33:45 -070023#include <net/inet_frag.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070024
Herbert Xu89cee8b2005-12-13 23:14:27 -080025static int zero;
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +090026static int tcp_retr1_max = 255;
Linus Torvalds1da177e2005-04-16 15:20:36 -070027static int ip_local_port_range_min[] = { 1, 1 };
28static int ip_local_port_range_max[] = { 65535, 65535 };
Linus Torvalds1da177e2005-04-16 15:20:36 -070029
30static
31int ipv4_sysctl_forward(ctl_table *ctl, int write, struct file * filp,
32 void __user *buffer, size_t *lenp, loff_t *ppos)
33{
Herbert Xu42f811b2007-06-04 23:34:44 -070034 int val = IPV4_DEVCONF_ALL(FORWARDING);
Linus Torvalds1da177e2005-04-16 15:20:36 -070035 int ret;
36
37 ret = proc_dointvec(ctl, write, filp, buffer, lenp, ppos);
38
Herbert Xu42f811b2007-06-04 23:34:44 -070039 if (write && IPV4_DEVCONF_ALL(FORWARDING) != val)
Linus Torvalds1da177e2005-04-16 15:20:36 -070040 inet_forward_change();
41
42 return ret;
43}
44
45static int ipv4_sysctl_forward_strategy(ctl_table *table,
46 int __user *name, int nlen,
47 void __user *oldval, size_t __user *oldlenp,
Alexey Dobriyan1f29bcd2006-12-10 02:19:10 -080048 void __user *newval, size_t newlen)
Linus Torvalds1da177e2005-04-16 15:20:36 -070049{
50 int *valp = table->data;
51 int new;
52
53 if (!newval || !newlen)
54 return 0;
55
56 if (newlen != sizeof(int))
57 return -EINVAL;
58
59 if (get_user(new, (int __user *)newval))
60 return -EFAULT;
61
62 if (new == *valp)
63 return 0;
64
65 if (oldval && oldlenp) {
66 size_t len;
67
68 if (get_user(len, oldlenp))
69 return -EFAULT;
70
71 if (len) {
72 if (len > table->maxlen)
73 len = table->maxlen;
74 if (copy_to_user(oldval, valp, len))
75 return -EFAULT;
76 if (put_user(len, oldlenp))
77 return -EFAULT;
78 }
79 }
80
81 *valp = new;
82 inet_forward_change();
83 return 1;
84}
85
Stephen Hemminger227b60f2007-10-10 17:30:46 -070086extern seqlock_t sysctl_port_range_lock;
87extern int sysctl_local_port_range[2];
88
89/* Update system visible IP port range */
90static void set_local_port_range(int range[2])
91{
92 write_seqlock(&sysctl_port_range_lock);
93 sysctl_local_port_range[0] = range[0];
94 sysctl_local_port_range[1] = range[1];
95 write_sequnlock(&sysctl_port_range_lock);
96}
97
98/* Validate changes from /proc interface. */
99static int ipv4_local_port_range(ctl_table *table, int write, struct file *filp,
100 void __user *buffer,
101 size_t *lenp, loff_t *ppos)
102{
103 int ret;
104 int range[2] = { sysctl_local_port_range[0],
105 sysctl_local_port_range[1] };
106 ctl_table tmp = {
107 .data = &range,
108 .maxlen = sizeof(range),
109 .mode = table->mode,
110 .extra1 = &ip_local_port_range_min,
111 .extra2 = &ip_local_port_range_max,
112 };
113
114 ret = proc_dointvec_minmax(&tmp, write, filp, buffer, lenp, ppos);
115
116 if (write && ret == 0) {
Anton Arapova25de532007-10-18 22:00:17 -0700117 if (range[1] < range[0])
Stephen Hemminger227b60f2007-10-10 17:30:46 -0700118 ret = -EINVAL;
119 else
120 set_local_port_range(range);
121 }
122
123 return ret;
124}
125
126/* Validate changes from sysctl interface. */
127static int ipv4_sysctl_local_port_range(ctl_table *table, int __user *name,
128 int nlen, void __user *oldval,
129 size_t __user *oldlenp,
130 void __user *newval, size_t newlen)
131{
132 int ret;
133 int range[2] = { sysctl_local_port_range[0],
134 sysctl_local_port_range[1] };
135 ctl_table tmp = {
136 .data = &range,
137 .maxlen = sizeof(range),
138 .mode = table->mode,
139 .extra1 = &ip_local_port_range_min,
140 .extra2 = &ip_local_port_range_max,
141 };
142
143 ret = sysctl_intvec(&tmp, name, nlen, oldval, oldlenp, newval, newlen);
144 if (ret == 0 && newval && newlen) {
Anton Arapova25de532007-10-18 22:00:17 -0700145 if (range[1] < range[0])
Stephen Hemminger227b60f2007-10-10 17:30:46 -0700146 ret = -EINVAL;
147 else
148 set_local_port_range(range);
149 }
150 return ret;
151}
152
153
Stephen Hemminger317a76f2005-06-23 12:19:55 -0700154static int proc_tcp_congestion_control(ctl_table *ctl, int write, struct file * filp,
155 void __user *buffer, size_t *lenp, loff_t *ppos)
156{
157 char val[TCP_CA_NAME_MAX];
158 ctl_table tbl = {
159 .data = val,
160 .maxlen = TCP_CA_NAME_MAX,
161 };
162 int ret;
163
164 tcp_get_default_congestion_control(val);
165
166 ret = proc_dostring(&tbl, write, filp, buffer, lenp, ppos);
167 if (write && ret == 0)
168 ret = tcp_set_default_congestion_control(val);
169 return ret;
170}
171
Arnaldo Carvalho de Melo20380732005-08-16 02:18:02 -0300172static int sysctl_tcp_congestion_control(ctl_table *table, int __user *name,
173 int nlen, void __user *oldval,
174 size_t __user *oldlenp,
Alexey Dobriyan1f29bcd2006-12-10 02:19:10 -0800175 void __user *newval, size_t newlen)
Stephen Hemminger317a76f2005-06-23 12:19:55 -0700176{
177 char val[TCP_CA_NAME_MAX];
178 ctl_table tbl = {
179 .data = val,
180 .maxlen = TCP_CA_NAME_MAX,
181 };
182 int ret;
183
184 tcp_get_default_congestion_control(val);
Alexey Dobriyan1f29bcd2006-12-10 02:19:10 -0800185 ret = sysctl_string(&tbl, name, nlen, oldval, oldlenp, newval, newlen);
Sam Jansen54877962007-11-19 23:28:21 -0800186 if (ret == 1 && newval && newlen)
Stephen Hemminger317a76f2005-06-23 12:19:55 -0700187 ret = tcp_set_default_congestion_control(val);
188 return ret;
189}
190
Stephen Hemminger3ff825b2006-11-09 16:32:06 -0800191static int proc_tcp_available_congestion_control(ctl_table *ctl,
192 int write, struct file * filp,
193 void __user *buffer, size_t *lenp,
194 loff_t *ppos)
195{
196 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX, };
197 int ret;
198
199 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
200 if (!tbl.data)
201 return -ENOMEM;
202 tcp_get_available_congestion_control(tbl.data, TCP_CA_BUF_MAX);
203 ret = proc_dostring(&tbl, write, filp, buffer, lenp, ppos);
204 kfree(tbl.data);
205 return ret;
206}
207
Stephen Hemmingerce7bc3b2006-11-09 16:35:15 -0800208static int proc_allowed_congestion_control(ctl_table *ctl,
209 int write, struct file * filp,
210 void __user *buffer, size_t *lenp,
211 loff_t *ppos)
212{
213 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX };
214 int ret;
215
216 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
217 if (!tbl.data)
218 return -ENOMEM;
219
220 tcp_get_allowed_congestion_control(tbl.data, tbl.maxlen);
221 ret = proc_dostring(&tbl, write, filp, buffer, lenp, ppos);
222 if (write && ret == 0)
223 ret = tcp_set_allowed_congestion_control(tbl.data);
224 kfree(tbl.data);
225 return ret;
226}
227
228static int strategy_allowed_congestion_control(ctl_table *table, int __user *name,
229 int nlen, void __user *oldval,
230 size_t __user *oldlenp,
Alexey Dobriyan1f29bcd2006-12-10 02:19:10 -0800231 void __user *newval,
232 size_t newlen)
Stephen Hemmingerce7bc3b2006-11-09 16:35:15 -0800233{
234 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX };
235 int ret;
236
237 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
238 if (!tbl.data)
239 return -ENOMEM;
240
241 tcp_get_available_congestion_control(tbl.data, tbl.maxlen);
Alexey Dobriyan1f29bcd2006-12-10 02:19:10 -0800242 ret = sysctl_string(&tbl, name, nlen, oldval, oldlenp, newval, newlen);
Stephen Hemmingerce7bc3b2006-11-09 16:35:15 -0800243 if (ret == 0 && newval && newlen)
244 ret = tcp_set_allowed_congestion_control(tbl.data);
245 kfree(tbl.data);
246
247 return ret;
248
249}
250
Pavel Emelyanov3e37c3f2007-12-05 01:41:26 -0800251static struct ctl_table ipv4_table[] = {
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +0900252 {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700253 .ctl_name = NET_IPV4_TCP_TIMESTAMPS,
254 .procname = "tcp_timestamps",
255 .data = &sysctl_tcp_timestamps,
256 .maxlen = sizeof(int),
257 .mode = 0644,
258 .proc_handler = &proc_dointvec
259 },
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +0900260 {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700261 .ctl_name = NET_IPV4_TCP_WINDOW_SCALING,
262 .procname = "tcp_window_scaling",
263 .data = &sysctl_tcp_window_scaling,
264 .maxlen = sizeof(int),
265 .mode = 0644,
266 .proc_handler = &proc_dointvec
267 },
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +0900268 {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700269 .ctl_name = NET_IPV4_TCP_SACK,
270 .procname = "tcp_sack",
271 .data = &sysctl_tcp_sack,
272 .maxlen = sizeof(int),
273 .mode = 0644,
274 .proc_handler = &proc_dointvec
275 },
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +0900276 {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700277 .ctl_name = NET_IPV4_TCP_RETRANS_COLLAPSE,
278 .procname = "tcp_retrans_collapse",
279 .data = &sysctl_tcp_retrans_collapse,
280 .maxlen = sizeof(int),
281 .mode = 0644,
282 .proc_handler = &proc_dointvec
283 },
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +0900284 {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700285 .ctl_name = NET_IPV4_FORWARD,
286 .procname = "ip_forward",
Herbert Xu42f811b2007-06-04 23:34:44 -0700287 .data = &IPV4_DEVCONF_ALL(FORWARDING),
Linus Torvalds1da177e2005-04-16 15:20:36 -0700288 .maxlen = sizeof(int),
289 .mode = 0644,
290 .proc_handler = &ipv4_sysctl_forward,
291 .strategy = &ipv4_sysctl_forward_strategy
292 },
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +0900293 {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700294 .ctl_name = NET_IPV4_DEFAULT_TTL,
295 .procname = "ip_default_ttl",
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +0900296 .data = &sysctl_ip_default_ttl,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700297 .maxlen = sizeof(int),
298 .mode = 0644,
299 .proc_handler = &ipv4_doint_and_flush,
300 .strategy = &ipv4_doint_and_flush_strategy,
301 },
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +0900302 {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700303 .ctl_name = NET_IPV4_NO_PMTU_DISC,
304 .procname = "ip_no_pmtu_disc",
305 .data = &ipv4_config.no_pmtu_disc,
306 .maxlen = sizeof(int),
307 .mode = 0644,
308 .proc_handler = &proc_dointvec
309 },
310 {
311 .ctl_name = NET_IPV4_NONLOCAL_BIND,
312 .procname = "ip_nonlocal_bind",
313 .data = &sysctl_ip_nonlocal_bind,
314 .maxlen = sizeof(int),
315 .mode = 0644,
316 .proc_handler = &proc_dointvec
317 },
318 {
319 .ctl_name = NET_IPV4_TCP_SYN_RETRIES,
320 .procname = "tcp_syn_retries",
321 .data = &sysctl_tcp_syn_retries,
322 .maxlen = sizeof(int),
323 .mode = 0644,
324 .proc_handler = &proc_dointvec
325 },
326 {
327 .ctl_name = NET_TCP_SYNACK_RETRIES,
328 .procname = "tcp_synack_retries",
329 .data = &sysctl_tcp_synack_retries,
330 .maxlen = sizeof(int),
331 .mode = 0644,
332 .proc_handler = &proc_dointvec
333 },
334 {
335 .ctl_name = NET_TCP_MAX_ORPHANS,
336 .procname = "tcp_max_orphans",
337 .data = &sysctl_tcp_max_orphans,
338 .maxlen = sizeof(int),
339 .mode = 0644,
340 .proc_handler = &proc_dointvec
341 },
342 {
343 .ctl_name = NET_TCP_MAX_TW_BUCKETS,
344 .procname = "tcp_max_tw_buckets",
Arnaldo Carvalho de Melo295ff7e2005-08-09 20:44:40 -0700345 .data = &tcp_death_row.sysctl_max_tw_buckets,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700346 .maxlen = sizeof(int),
347 .mode = 0644,
348 .proc_handler = &proc_dointvec
349 },
350 {
351 .ctl_name = NET_IPV4_IPFRAG_HIGH_THRESH,
352 .procname = "ipfrag_high_thresh",
Pavel Emelyanov04128f22007-10-15 02:33:45 -0700353 .data = &ip4_frags_ctl.high_thresh,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700354 .maxlen = sizeof(int),
355 .mode = 0644,
356 .proc_handler = &proc_dointvec
357 },
358 {
359 .ctl_name = NET_IPV4_IPFRAG_LOW_THRESH,
360 .procname = "ipfrag_low_thresh",
Pavel Emelyanov04128f22007-10-15 02:33:45 -0700361 .data = &ip4_frags_ctl.low_thresh,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700362 .maxlen = sizeof(int),
363 .mode = 0644,
364 .proc_handler = &proc_dointvec
365 },
366 {
367 .ctl_name = NET_IPV4_DYNADDR,
368 .procname = "ip_dynaddr",
369 .data = &sysctl_ip_dynaddr,
370 .maxlen = sizeof(int),
371 .mode = 0644,
372 .proc_handler = &proc_dointvec
373 },
374 {
375 .ctl_name = NET_IPV4_IPFRAG_TIME,
376 .procname = "ipfrag_time",
Pavel Emelyanov04128f22007-10-15 02:33:45 -0700377 .data = &ip4_frags_ctl.timeout,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700378 .maxlen = sizeof(int),
379 .mode = 0644,
380 .proc_handler = &proc_dointvec_jiffies,
381 .strategy = &sysctl_jiffies
382 },
383 {
384 .ctl_name = NET_IPV4_TCP_KEEPALIVE_TIME,
385 .procname = "tcp_keepalive_time",
386 .data = &sysctl_tcp_keepalive_time,
387 .maxlen = sizeof(int),
388 .mode = 0644,
389 .proc_handler = &proc_dointvec_jiffies,
390 .strategy = &sysctl_jiffies
391 },
392 {
393 .ctl_name = NET_IPV4_TCP_KEEPALIVE_PROBES,
394 .procname = "tcp_keepalive_probes",
395 .data = &sysctl_tcp_keepalive_probes,
396 .maxlen = sizeof(int),
397 .mode = 0644,
398 .proc_handler = &proc_dointvec
399 },
400 {
401 .ctl_name = NET_IPV4_TCP_KEEPALIVE_INTVL,
402 .procname = "tcp_keepalive_intvl",
403 .data = &sysctl_tcp_keepalive_intvl,
404 .maxlen = sizeof(int),
405 .mode = 0644,
406 .proc_handler = &proc_dointvec_jiffies,
407 .strategy = &sysctl_jiffies
408 },
409 {
410 .ctl_name = NET_IPV4_TCP_RETRIES1,
411 .procname = "tcp_retries1",
412 .data = &sysctl_tcp_retries1,
413 .maxlen = sizeof(int),
414 .mode = 0644,
415 .proc_handler = &proc_dointvec_minmax,
416 .strategy = &sysctl_intvec,
417 .extra2 = &tcp_retr1_max
418 },
419 {
420 .ctl_name = NET_IPV4_TCP_RETRIES2,
421 .procname = "tcp_retries2",
422 .data = &sysctl_tcp_retries2,
423 .maxlen = sizeof(int),
424 .mode = 0644,
425 .proc_handler = &proc_dointvec
426 },
427 {
428 .ctl_name = NET_IPV4_TCP_FIN_TIMEOUT,
429 .procname = "tcp_fin_timeout",
430 .data = &sysctl_tcp_fin_timeout,
431 .maxlen = sizeof(int),
432 .mode = 0644,
433 .proc_handler = &proc_dointvec_jiffies,
434 .strategy = &sysctl_jiffies
435 },
436#ifdef CONFIG_SYN_COOKIES
437 {
438 .ctl_name = NET_TCP_SYNCOOKIES,
439 .procname = "tcp_syncookies",
440 .data = &sysctl_tcp_syncookies,
441 .maxlen = sizeof(int),
442 .mode = 0644,
443 .proc_handler = &proc_dointvec
444 },
445#endif
446 {
447 .ctl_name = NET_TCP_TW_RECYCLE,
448 .procname = "tcp_tw_recycle",
Arnaldo Carvalho de Melo295ff7e2005-08-09 20:44:40 -0700449 .data = &tcp_death_row.sysctl_tw_recycle,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700450 .maxlen = sizeof(int),
451 .mode = 0644,
452 .proc_handler = &proc_dointvec
453 },
454 {
455 .ctl_name = NET_TCP_ABORT_ON_OVERFLOW,
456 .procname = "tcp_abort_on_overflow",
457 .data = &sysctl_tcp_abort_on_overflow,
458 .maxlen = sizeof(int),
459 .mode = 0644,
460 .proc_handler = &proc_dointvec
461 },
462 {
463 .ctl_name = NET_TCP_STDURG,
464 .procname = "tcp_stdurg",
465 .data = &sysctl_tcp_stdurg,
466 .maxlen = sizeof(int),
467 .mode = 0644,
468 .proc_handler = &proc_dointvec
469 },
470 {
471 .ctl_name = NET_TCP_RFC1337,
472 .procname = "tcp_rfc1337",
473 .data = &sysctl_tcp_rfc1337,
474 .maxlen = sizeof(int),
475 .mode = 0644,
476 .proc_handler = &proc_dointvec
477 },
478 {
479 .ctl_name = NET_TCP_MAX_SYN_BACKLOG,
480 .procname = "tcp_max_syn_backlog",
481 .data = &sysctl_max_syn_backlog,
482 .maxlen = sizeof(int),
483 .mode = 0644,
484 .proc_handler = &proc_dointvec
485 },
486 {
487 .ctl_name = NET_IPV4_LOCAL_PORT_RANGE,
488 .procname = "ip_local_port_range",
489 .data = &sysctl_local_port_range,
490 .maxlen = sizeof(sysctl_local_port_range),
491 .mode = 0644,
Stephen Hemminger227b60f2007-10-10 17:30:46 -0700492 .proc_handler = &ipv4_local_port_range,
493 .strategy = &ipv4_sysctl_local_port_range,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700494 },
495 {
496 .ctl_name = NET_IPV4_ICMP_ECHO_IGNORE_ALL,
497 .procname = "icmp_echo_ignore_all",
498 .data = &sysctl_icmp_echo_ignore_all,
499 .maxlen = sizeof(int),
500 .mode = 0644,
501 .proc_handler = &proc_dointvec
502 },
503 {
504 .ctl_name = NET_IPV4_ICMP_ECHO_IGNORE_BROADCASTS,
505 .procname = "icmp_echo_ignore_broadcasts",
506 .data = &sysctl_icmp_echo_ignore_broadcasts,
507 .maxlen = sizeof(int),
508 .mode = 0644,
509 .proc_handler = &proc_dointvec
510 },
511 {
512 .ctl_name = NET_IPV4_ICMP_IGNORE_BOGUS_ERROR_RESPONSES,
513 .procname = "icmp_ignore_bogus_error_responses",
514 .data = &sysctl_icmp_ignore_bogus_error_responses,
515 .maxlen = sizeof(int),
516 .mode = 0644,
517 .proc_handler = &proc_dointvec
518 },
519 {
J. Simonetti1c2fb7f2005-06-13 15:19:03 -0700520 .ctl_name = NET_IPV4_ICMP_ERRORS_USE_INBOUND_IFADDR,
521 .procname = "icmp_errors_use_inbound_ifaddr",
522 .data = &sysctl_icmp_errors_use_inbound_ifaddr,
523 .maxlen = sizeof(int),
524 .mode = 0644,
525 .proc_handler = &proc_dointvec
526 },
527 {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700528 .ctl_name = NET_IPV4_ROUTE,
529 .procname = "route",
530 .maxlen = 0,
531 .mode = 0555,
532 .child = ipv4_route_table
533 },
534#ifdef CONFIG_IP_MULTICAST
535 {
536 .ctl_name = NET_IPV4_IGMP_MAX_MEMBERSHIPS,
537 .procname = "igmp_max_memberships",
538 .data = &sysctl_igmp_max_memberships,
539 .maxlen = sizeof(int),
540 .mode = 0644,
541 .proc_handler = &proc_dointvec
542 },
543
544#endif
545 {
546 .ctl_name = NET_IPV4_IGMP_MAX_MSF,
547 .procname = "igmp_max_msf",
548 .data = &sysctl_igmp_max_msf,
549 .maxlen = sizeof(int),
550 .mode = 0644,
551 .proc_handler = &proc_dointvec
552 },
553 {
554 .ctl_name = NET_IPV4_INET_PEER_THRESHOLD,
555 .procname = "inet_peer_threshold",
556 .data = &inet_peer_threshold,
557 .maxlen = sizeof(int),
558 .mode = 0644,
559 .proc_handler = &proc_dointvec
560 },
561 {
562 .ctl_name = NET_IPV4_INET_PEER_MINTTL,
563 .procname = "inet_peer_minttl",
564 .data = &inet_peer_minttl,
565 .maxlen = sizeof(int),
566 .mode = 0644,
567 .proc_handler = &proc_dointvec_jiffies,
568 .strategy = &sysctl_jiffies
569 },
570 {
571 .ctl_name = NET_IPV4_INET_PEER_MAXTTL,
572 .procname = "inet_peer_maxttl",
573 .data = &inet_peer_maxttl,
574 .maxlen = sizeof(int),
575 .mode = 0644,
576 .proc_handler = &proc_dointvec_jiffies,
577 .strategy = &sysctl_jiffies
578 },
579 {
580 .ctl_name = NET_IPV4_INET_PEER_GC_MINTIME,
581 .procname = "inet_peer_gc_mintime",
582 .data = &inet_peer_gc_mintime,
583 .maxlen = sizeof(int),
584 .mode = 0644,
585 .proc_handler = &proc_dointvec_jiffies,
586 .strategy = &sysctl_jiffies
587 },
588 {
589 .ctl_name = NET_IPV4_INET_PEER_GC_MAXTIME,
590 .procname = "inet_peer_gc_maxtime",
591 .data = &inet_peer_gc_maxtime,
592 .maxlen = sizeof(int),
593 .mode = 0644,
594 .proc_handler = &proc_dointvec_jiffies,
595 .strategy = &sysctl_jiffies
596 },
597 {
598 .ctl_name = NET_TCP_ORPHAN_RETRIES,
599 .procname = "tcp_orphan_retries",
600 .data = &sysctl_tcp_orphan_retries,
601 .maxlen = sizeof(int),
602 .mode = 0644,
603 .proc_handler = &proc_dointvec
604 },
605 {
606 .ctl_name = NET_TCP_FACK,
607 .procname = "tcp_fack",
608 .data = &sysctl_tcp_fack,
609 .maxlen = sizeof(int),
610 .mode = 0644,
611 .proc_handler = &proc_dointvec
612 },
613 {
614 .ctl_name = NET_TCP_REORDERING,
615 .procname = "tcp_reordering",
616 .data = &sysctl_tcp_reordering,
617 .maxlen = sizeof(int),
618 .mode = 0644,
619 .proc_handler = &proc_dointvec
620 },
621 {
622 .ctl_name = NET_TCP_ECN,
623 .procname = "tcp_ecn",
624 .data = &sysctl_tcp_ecn,
625 .maxlen = sizeof(int),
626 .mode = 0644,
627 .proc_handler = &proc_dointvec
628 },
629 {
630 .ctl_name = NET_TCP_DSACK,
631 .procname = "tcp_dsack",
632 .data = &sysctl_tcp_dsack,
633 .maxlen = sizeof(int),
634 .mode = 0644,
635 .proc_handler = &proc_dointvec
636 },
637 {
638 .ctl_name = NET_TCP_MEM,
639 .procname = "tcp_mem",
640 .data = &sysctl_tcp_mem,
641 .maxlen = sizeof(sysctl_tcp_mem),
642 .mode = 0644,
643 .proc_handler = &proc_dointvec
644 },
645 {
646 .ctl_name = NET_TCP_WMEM,
647 .procname = "tcp_wmem",
648 .data = &sysctl_tcp_wmem,
649 .maxlen = sizeof(sysctl_tcp_wmem),
650 .mode = 0644,
651 .proc_handler = &proc_dointvec
652 },
653 {
654 .ctl_name = NET_TCP_RMEM,
655 .procname = "tcp_rmem",
656 .data = &sysctl_tcp_rmem,
657 .maxlen = sizeof(sysctl_tcp_rmem),
658 .mode = 0644,
659 .proc_handler = &proc_dointvec
660 },
661 {
662 .ctl_name = NET_TCP_APP_WIN,
663 .procname = "tcp_app_win",
664 .data = &sysctl_tcp_app_win,
665 .maxlen = sizeof(int),
666 .mode = 0644,
667 .proc_handler = &proc_dointvec
668 },
669 {
670 .ctl_name = NET_TCP_ADV_WIN_SCALE,
671 .procname = "tcp_adv_win_scale",
672 .data = &sysctl_tcp_adv_win_scale,
673 .maxlen = sizeof(int),
674 .mode = 0644,
675 .proc_handler = &proc_dointvec
676 },
677 {
678 .ctl_name = NET_IPV4_ICMP_RATELIMIT,
679 .procname = "icmp_ratelimit",
680 .data = &sysctl_icmp_ratelimit,
681 .maxlen = sizeof(int),
682 .mode = 0644,
683 .proc_handler = &proc_dointvec
684 },
685 {
686 .ctl_name = NET_IPV4_ICMP_RATEMASK,
687 .procname = "icmp_ratemask",
688 .data = &sysctl_icmp_ratemask,
689 .maxlen = sizeof(int),
690 .mode = 0644,
691 .proc_handler = &proc_dointvec
692 },
693 {
694 .ctl_name = NET_TCP_TW_REUSE,
695 .procname = "tcp_tw_reuse",
696 .data = &sysctl_tcp_tw_reuse,
697 .maxlen = sizeof(int),
698 .mode = 0644,
699 .proc_handler = &proc_dointvec
700 },
701 {
702 .ctl_name = NET_TCP_FRTO,
703 .procname = "tcp_frto",
704 .data = &sysctl_tcp_frto,
705 .maxlen = sizeof(int),
706 .mode = 0644,
707 .proc_handler = &proc_dointvec
708 },
709 {
Ilpo Järvinen3cfe3ba2007-02-27 10:09:49 -0800710 .ctl_name = NET_TCP_FRTO_RESPONSE,
711 .procname = "tcp_frto_response",
712 .data = &sysctl_tcp_frto_response,
713 .maxlen = sizeof(int),
714 .mode = 0644,
715 .proc_handler = &proc_dointvec
716 },
717 {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700718 .ctl_name = NET_TCP_LOW_LATENCY,
719 .procname = "tcp_low_latency",
720 .data = &sysctl_tcp_low_latency,
721 .maxlen = sizeof(int),
722 .mode = 0644,
723 .proc_handler = &proc_dointvec
724 },
725 {
726 .ctl_name = NET_IPV4_IPFRAG_SECRET_INTERVAL,
727 .procname = "ipfrag_secret_interval",
Pavel Emelyanov04128f22007-10-15 02:33:45 -0700728 .data = &ip4_frags_ctl.secret_interval,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700729 .maxlen = sizeof(int),
730 .mode = 0644,
731 .proc_handler = &proc_dointvec_jiffies,
732 .strategy = &sysctl_jiffies
733 },
734 {
Herbert Xu89cee8b2005-12-13 23:14:27 -0800735 .procname = "ipfrag_max_dist",
736 .data = &sysctl_ipfrag_max_dist,
737 .maxlen = sizeof(int),
738 .mode = 0644,
739 .proc_handler = &proc_dointvec_minmax,
740 .extra1 = &zero
741 },
742 {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700743 .ctl_name = NET_TCP_NO_METRICS_SAVE,
744 .procname = "tcp_no_metrics_save",
745 .data = &sysctl_tcp_nometrics_save,
746 .maxlen = sizeof(int),
747 .mode = 0644,
748 .proc_handler = &proc_dointvec,
749 },
750 {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700751 .ctl_name = NET_TCP_MODERATE_RCVBUF,
752 .procname = "tcp_moderate_rcvbuf",
753 .data = &sysctl_tcp_moderate_rcvbuf,
754 .maxlen = sizeof(int),
755 .mode = 0644,
756 .proc_handler = &proc_dointvec,
757 },
758 {
759 .ctl_name = NET_TCP_TSO_WIN_DIVISOR,
760 .procname = "tcp_tso_win_divisor",
761 .data = &sysctl_tcp_tso_win_divisor,
762 .maxlen = sizeof(int),
763 .mode = 0644,
764 .proc_handler = &proc_dointvec,
765 },
766 {
Stephen Hemminger317a76f2005-06-23 12:19:55 -0700767 .ctl_name = NET_TCP_CONG_CONTROL,
768 .procname = "tcp_congestion_control",
Linus Torvalds1da177e2005-04-16 15:20:36 -0700769 .mode = 0644,
Stephen Hemminger317a76f2005-06-23 12:19:55 -0700770 .maxlen = TCP_CA_NAME_MAX,
771 .proc_handler = &proc_tcp_congestion_control,
772 .strategy = &sysctl_tcp_congestion_control,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700773 },
Stephen Hemminger9772efb2005-11-10 17:09:53 -0800774 {
775 .ctl_name = NET_TCP_ABC,
776 .procname = "tcp_abc",
777 .data = &sysctl_tcp_abc,
778 .maxlen = sizeof(int),
779 .mode = 0644,
780 .proc_handler = &proc_dointvec,
781 },
John Heffner5d424d52006-03-20 17:53:41 -0800782 {
783 .ctl_name = NET_TCP_MTU_PROBING,
784 .procname = "tcp_mtu_probing",
785 .data = &sysctl_tcp_mtu_probing,
786 .maxlen = sizeof(int),
787 .mode = 0644,
788 .proc_handler = &proc_dointvec,
789 },
790 {
791 .ctl_name = NET_TCP_BASE_MSS,
792 .procname = "tcp_base_mss",
793 .data = &sysctl_tcp_base_mss,
794 .maxlen = sizeof(int),
795 .mode = 0644,
796 .proc_handler = &proc_dointvec,
797 },
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +0900798 {
Rick Jones15d99e02006-03-20 22:40:29 -0800799 .ctl_name = NET_IPV4_TCP_WORKAROUND_SIGNED_WINDOWS,
800 .procname = "tcp_workaround_signed_windows",
801 .data = &sysctl_tcp_workaround_signed_windows,
802 .maxlen = sizeof(int),
803 .mode = 0644,
804 .proc_handler = &proc_dointvec
805 },
Chris Leech95937822006-05-23 18:02:55 -0700806#ifdef CONFIG_NET_DMA
807 {
808 .ctl_name = NET_TCP_DMA_COPYBREAK,
809 .procname = "tcp_dma_copybreak",
810 .data = &sysctl_tcp_dma_copybreak,
811 .maxlen = sizeof(int),
812 .mode = 0644,
813 .proc_handler = &proc_dointvec
814 },
815#endif
David S. Miller35089bb2006-06-13 22:33:04 -0700816 {
817 .ctl_name = NET_TCP_SLOW_START_AFTER_IDLE,
818 .procname = "tcp_slow_start_after_idle",
819 .data = &sysctl_tcp_slow_start_after_idle,
820 .maxlen = sizeof(int),
821 .mode = 0644,
822 .proc_handler = &proc_dointvec
823 },
Paul Moore446fda42006-08-03 16:48:06 -0700824#ifdef CONFIG_NETLABEL
825 {
826 .ctl_name = NET_CIPSOV4_CACHE_ENABLE,
827 .procname = "cipso_cache_enable",
828 .data = &cipso_v4_cache_enabled,
829 .maxlen = sizeof(int),
830 .mode = 0644,
831 .proc_handler = &proc_dointvec,
832 },
833 {
834 .ctl_name = NET_CIPSOV4_CACHE_BUCKET_SIZE,
835 .procname = "cipso_cache_bucket_size",
836 .data = &cipso_v4_cache_bucketsize,
837 .maxlen = sizeof(int),
838 .mode = 0644,
839 .proc_handler = &proc_dointvec,
840 },
841 {
842 .ctl_name = NET_CIPSOV4_RBM_OPTFMT,
843 .procname = "cipso_rbm_optfmt",
844 .data = &cipso_v4_rbm_optfmt,
845 .maxlen = sizeof(int),
846 .mode = 0644,
847 .proc_handler = &proc_dointvec,
848 },
849 {
850 .ctl_name = NET_CIPSOV4_RBM_STRICTVALID,
851 .procname = "cipso_rbm_strictvalid",
852 .data = &cipso_v4_rbm_strictvalid,
853 .maxlen = sizeof(int),
854 .mode = 0644,
855 .proc_handler = &proc_dointvec,
856 },
857#endif /* CONFIG_NETLABEL */
Stephen Hemminger3ff825b2006-11-09 16:32:06 -0800858 {
Stephen Hemminger3ff825b2006-11-09 16:32:06 -0800859 .procname = "tcp_available_congestion_control",
860 .maxlen = TCP_CA_BUF_MAX,
861 .mode = 0444,
862 .proc_handler = &proc_tcp_available_congestion_control,
863 },
Stephen Hemmingerce7bc3b2006-11-09 16:35:15 -0800864 {
865 .ctl_name = NET_TCP_ALLOWED_CONG_CONTROL,
866 .procname = "tcp_allowed_congestion_control",
867 .maxlen = TCP_CA_BUF_MAX,
868 .mode = 0644,
869 .proc_handler = &proc_allowed_congestion_control,
870 .strategy = &strategy_allowed_congestion_control,
871 },
John Heffner886236c2007-03-25 19:21:45 -0700872 {
873 .ctl_name = NET_TCP_MAX_SSTHRESH,
874 .procname = "tcp_max_ssthresh",
875 .data = &sysctl_tcp_max_ssthresh,
876 .maxlen = sizeof(int),
877 .mode = 0644,
878 .proc_handler = &proc_dointvec,
879 },
Linus Torvalds1da177e2005-04-16 15:20:36 -0700880 { .ctl_name = 0 }
881};
Pavel Emelyanov3e37c3f2007-12-05 01:41:26 -0800882
883static __initdata struct ctl_path net_ipv4_path[] = {
884 { .procname = "net", .ctl_name = CTL_NET, },
885 { .procname = "ipv4", .ctl_name = NET_IPV4, },
886 { },
887};
888
889static __init int sysctl_ipv4_init(void)
890{
891 struct ctl_table_header *hdr;
892
893 hdr = register_sysctl_paths(net_ipv4_path, ipv4_table);
894 return hdr == NULL ? -ENOMEM : 0;
895}
896
897__initcall(sysctl_ipv4_init);