Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * sysctl_net_ipv4.c: sysctl interface to net IPV4 subsystem. | |
3 | * | |
1da177e4 LT |
4 | * Begun April 1, 1996, Mike Shaver. |
5 | * Added /proc/sys/net/ipv4 directory entry (empty =) ). [MS] | |
6 | */ | |
7 | ||
8 | #include <linux/mm.h> | |
9 | #include <linux/module.h> | |
10 | #include <linux/sysctl.h> | |
20380731 | 11 | #include <linux/igmp.h> |
14c85021 | 12 | #include <linux/inetdevice.h> |
227b60f5 | 13 | #include <linux/seqlock.h> |
3e37c3f9 | 14 | #include <linux/init.h> |
5a0e3ad6 | 15 | #include <linux/slab.h> |
c319b4d7 | 16 | #include <linux/nsproxy.h> |
3dc43e3e | 17 | #include <linux/swap.h> |
1da177e4 | 18 | #include <net/snmp.h> |
20380731 | 19 | #include <net/icmp.h> |
1da177e4 LT |
20 | #include <net/ip.h> |
21 | #include <net/route.h> | |
22 | #include <net/tcp.h> | |
95766fff | 23 | #include <net/udp.h> |
446fda4f | 24 | #include <net/cipso_ipv4.h> |
04128f23 | 25 | #include <net/inet_frag.h> |
c319b4d7 | 26 | #include <net/ping.h> |
3aaabe23 | 27 | #include <net/tcp_memcontrol.h> |
1da177e4 | 28 | |
89cee8b1 | 29 | static int zero; |
cdda8891 | 30 | static int one = 1; |
6ba8a3b1 | 31 | static int four = 4; |
e905a9ed | 32 | static int tcp_retr1_max = 255; |
1da177e4 LT |
33 | static int ip_local_port_range_min[] = { 1, 1 }; |
34 | static int ip_local_port_range_max[] = { 65535, 65535 }; | |
0147fc05 AD |
35 | static int tcp_adv_win_scale_min = -31; |
36 | static int tcp_adv_win_scale_max = 31; | |
249fab77 ED |
37 | static int ip_ttl_min = 1; |
38 | static int ip_ttl_max = 255; | |
c319b4d7 VK |
39 | static int ip_ping_group_range_min[] = { 0, 0 }; |
40 | static int ip_ping_group_range_max[] = { GID_T_MAX, GID_T_MAX }; | |
1da177e4 | 41 | |
227b60f5 SH |
42 | /* Update system visible IP port range */ |
43 | static void set_local_port_range(int range[2]) | |
44 | { | |
3c689b73 ED |
45 | write_seqlock(&sysctl_local_ports.lock); |
46 | sysctl_local_ports.range[0] = range[0]; | |
47 | sysctl_local_ports.range[1] = range[1]; | |
48 | write_sequnlock(&sysctl_local_ports.lock); | |
227b60f5 SH |
49 | } |
50 | ||
51 | /* Validate changes from /proc interface. */ | |
fe2c6338 | 52 | static int ipv4_local_port_range(struct ctl_table *table, int write, |
227b60f5 SH |
53 | void __user *buffer, |
54 | size_t *lenp, loff_t *ppos) | |
55 | { | |
56 | int ret; | |
3c689b73 | 57 | int range[2]; |
fe2c6338 | 58 | struct ctl_table tmp = { |
227b60f5 SH |
59 | .data = &range, |
60 | .maxlen = sizeof(range), | |
61 | .mode = table->mode, | |
62 | .extra1 = &ip_local_port_range_min, | |
63 | .extra2 = &ip_local_port_range_max, | |
64 | }; | |
65 | ||
3c689b73 | 66 | inet_get_local_port_range(range, range + 1); |
8d65af78 | 67 | ret = proc_dointvec_minmax(&tmp, write, buffer, lenp, ppos); |
227b60f5 SH |
68 | |
69 | if (write && ret == 0) { | |
a25de534 | 70 | if (range[1] < range[0]) |
227b60f5 SH |
71 | ret = -EINVAL; |
72 | else | |
73 | set_local_port_range(range); | |
74 | } | |
75 | ||
76 | return ret; | |
77 | } | |
78 | ||
c319b4d7 | 79 | |
7064d16e | 80 | static void inet_get_ping_group_range_table(struct ctl_table *table, kgid_t *low, kgid_t *high) |
c319b4d7 | 81 | { |
7064d16e | 82 | kgid_t *data = table->data; |
95c96174 | 83 | unsigned int seq; |
c319b4d7 VK |
84 | do { |
85 | seq = read_seqbegin(&sysctl_local_ports.lock); | |
86 | ||
87 | *low = data[0]; | |
88 | *high = data[1]; | |
89 | } while (read_seqretry(&sysctl_local_ports.lock, seq)); | |
90 | } | |
91 | ||
92 | /* Update system visible IP port range */ | |
7064d16e | 93 | static void set_ping_group_range(struct ctl_table *table, kgid_t low, kgid_t high) |
c319b4d7 | 94 | { |
7064d16e | 95 | kgid_t *data = table->data; |
c319b4d7 | 96 | write_seqlock(&sysctl_local_ports.lock); |
7064d16e EB |
97 | data[0] = low; |
98 | data[1] = high; | |
c319b4d7 VK |
99 | write_sequnlock(&sysctl_local_ports.lock); |
100 | } | |
101 | ||
102 | /* Validate changes from /proc interface. */ | |
fe2c6338 | 103 | static int ipv4_ping_group_range(struct ctl_table *table, int write, |
c319b4d7 VK |
104 | void __user *buffer, |
105 | size_t *lenp, loff_t *ppos) | |
106 | { | |
7064d16e | 107 | struct user_namespace *user_ns = current_user_ns(); |
c319b4d7 | 108 | int ret; |
7064d16e EB |
109 | gid_t urange[2]; |
110 | kgid_t low, high; | |
fe2c6338 | 111 | struct ctl_table tmp = { |
7064d16e EB |
112 | .data = &urange, |
113 | .maxlen = sizeof(urange), | |
c319b4d7 VK |
114 | .mode = table->mode, |
115 | .extra1 = &ip_ping_group_range_min, | |
116 | .extra2 = &ip_ping_group_range_max, | |
117 | }; | |
118 | ||
7064d16e EB |
119 | inet_get_ping_group_range_table(table, &low, &high); |
120 | urange[0] = from_kgid_munged(user_ns, low); | |
121 | urange[1] = from_kgid_munged(user_ns, high); | |
c319b4d7 VK |
122 | ret = proc_dointvec_minmax(&tmp, write, buffer, lenp, ppos); |
123 | ||
7064d16e EB |
124 | if (write && ret == 0) { |
125 | low = make_kgid(user_ns, urange[0]); | |
126 | high = make_kgid(user_ns, urange[1]); | |
127 | if (!gid_valid(low) || !gid_valid(high) || | |
128 | (urange[1] < urange[0]) || gid_lt(high, low)) { | |
129 | low = make_kgid(&init_user_ns, 1); | |
130 | high = make_kgid(&init_user_ns, 0); | |
131 | } | |
132 | set_ping_group_range(table, low, high); | |
133 | } | |
c319b4d7 VK |
134 | |
135 | return ret; | |
136 | } | |
137 | ||
fe2c6338 | 138 | static int proc_tcp_congestion_control(struct ctl_table *ctl, int write, |
317a76f9 SH |
139 | void __user *buffer, size_t *lenp, loff_t *ppos) |
140 | { | |
141 | char val[TCP_CA_NAME_MAX]; | |
fe2c6338 | 142 | struct ctl_table tbl = { |
317a76f9 SH |
143 | .data = val, |
144 | .maxlen = TCP_CA_NAME_MAX, | |
145 | }; | |
146 | int ret; | |
147 | ||
148 | tcp_get_default_congestion_control(val); | |
149 | ||
8d65af78 | 150 | ret = proc_dostring(&tbl, write, buffer, lenp, ppos); |
317a76f9 SH |
151 | if (write && ret == 0) |
152 | ret = tcp_set_default_congestion_control(val); | |
153 | return ret; | |
154 | } | |
155 | ||
fe2c6338 | 156 | static int proc_tcp_available_congestion_control(struct ctl_table *ctl, |
8d65af78 | 157 | int write, |
3ff825b2 SH |
158 | void __user *buffer, size_t *lenp, |
159 | loff_t *ppos) | |
160 | { | |
fe2c6338 | 161 | struct ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX, }; |
3ff825b2 SH |
162 | int ret; |
163 | ||
164 | tbl.data = kmalloc(tbl.maxlen, GFP_USER); | |
165 | if (!tbl.data) | |
166 | return -ENOMEM; | |
167 | tcp_get_available_congestion_control(tbl.data, TCP_CA_BUF_MAX); | |
8d65af78 | 168 | ret = proc_dostring(&tbl, write, buffer, lenp, ppos); |
3ff825b2 SH |
169 | kfree(tbl.data); |
170 | return ret; | |
171 | } | |
172 | ||
fe2c6338 | 173 | static int proc_allowed_congestion_control(struct ctl_table *ctl, |
8d65af78 | 174 | int write, |
ce7bc3bf SH |
175 | void __user *buffer, size_t *lenp, |
176 | loff_t *ppos) | |
177 | { | |
fe2c6338 | 178 | struct ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX }; |
ce7bc3bf SH |
179 | int ret; |
180 | ||
181 | tbl.data = kmalloc(tbl.maxlen, GFP_USER); | |
182 | if (!tbl.data) | |
183 | return -ENOMEM; | |
184 | ||
185 | tcp_get_allowed_congestion_control(tbl.data, tbl.maxlen); | |
8d65af78 | 186 | ret = proc_dostring(&tbl, write, buffer, lenp, ppos); |
ce7bc3bf SH |
187 | if (write && ret == 0) |
188 | ret = tcp_set_allowed_congestion_control(tbl.data); | |
189 | kfree(tbl.data); | |
190 | return ret; | |
191 | } | |
192 | ||
fe2c6338 | 193 | static int ipv4_tcp_mem(struct ctl_table *ctl, int write, |
3dc43e3e GC |
194 | void __user *buffer, size_t *lenp, |
195 | loff_t *ppos) | |
196 | { | |
197 | int ret; | |
198 | unsigned long vec[3]; | |
199 | struct net *net = current->nsproxy->net_ns; | |
c255a458 | 200 | #ifdef CONFIG_MEMCG_KMEM |
3aaabe23 GC |
201 | struct mem_cgroup *memcg; |
202 | #endif | |
3dc43e3e | 203 | |
fe2c6338 | 204 | struct ctl_table tmp = { |
3dc43e3e GC |
205 | .data = &vec, |
206 | .maxlen = sizeof(vec), | |
207 | .mode = ctl->mode, | |
208 | }; | |
209 | ||
210 | if (!write) { | |
211 | ctl->data = &net->ipv4.sysctl_tcp_mem; | |
212 | return proc_doulongvec_minmax(ctl, write, buffer, lenp, ppos); | |
213 | } | |
214 | ||
215 | ret = proc_doulongvec_minmax(&tmp, write, buffer, lenp, ppos); | |
216 | if (ret) | |
217 | return ret; | |
218 | ||
c255a458 | 219 | #ifdef CONFIG_MEMCG_KMEM |
3aaabe23 GC |
220 | rcu_read_lock(); |
221 | memcg = mem_cgroup_from_task(current); | |
222 | ||
223 | tcp_prot_mem(memcg, vec[0], 0); | |
224 | tcp_prot_mem(memcg, vec[1], 1); | |
225 | tcp_prot_mem(memcg, vec[2], 2); | |
226 | rcu_read_unlock(); | |
227 | #endif | |
228 | ||
3dc43e3e GC |
229 | net->ipv4.sysctl_tcp_mem[0] = vec[0]; |
230 | net->ipv4.sysctl_tcp_mem[1] = vec[1]; | |
231 | net->ipv4.sysctl_tcp_mem[2] = vec[2]; | |
232 | ||
233 | return 0; | |
234 | } | |
235 | ||
fe2c6338 JP |
236 | static int proc_tcp_fastopen_key(struct ctl_table *ctl, int write, |
237 | void __user *buffer, size_t *lenp, | |
238 | loff_t *ppos) | |
10467163 | 239 | { |
fe2c6338 | 240 | struct ctl_table tbl = { .maxlen = (TCP_FASTOPEN_KEY_LENGTH * 2 + 10) }; |
10467163 JC |
241 | struct tcp_fastopen_context *ctxt; |
242 | int ret; | |
243 | u32 user_key[4]; /* 16 bytes, matching TCP_FASTOPEN_KEY_LENGTH */ | |
244 | ||
245 | tbl.data = kmalloc(tbl.maxlen, GFP_KERNEL); | |
246 | if (!tbl.data) | |
247 | return -ENOMEM; | |
248 | ||
249 | rcu_read_lock(); | |
250 | ctxt = rcu_dereference(tcp_fastopen_ctx); | |
251 | if (ctxt) | |
252 | memcpy(user_key, ctxt->key, TCP_FASTOPEN_KEY_LENGTH); | |
0e24c4fc AC |
253 | else |
254 | memset(user_key, 0, sizeof(user_key)); | |
10467163 JC |
255 | rcu_read_unlock(); |
256 | ||
257 | snprintf(tbl.data, tbl.maxlen, "%08x-%08x-%08x-%08x", | |
258 | user_key[0], user_key[1], user_key[2], user_key[3]); | |
259 | ret = proc_dostring(&tbl, write, buffer, lenp, ppos); | |
260 | ||
261 | if (write && ret == 0) { | |
262 | if (sscanf(tbl.data, "%x-%x-%x-%x", user_key, user_key + 1, | |
263 | user_key + 2, user_key + 3) != 4) { | |
264 | ret = -EINVAL; | |
265 | goto bad_key; | |
266 | } | |
267 | tcp_fastopen_reset_cipher(user_key, TCP_FASTOPEN_KEY_LENGTH); | |
268 | } | |
269 | ||
270 | bad_key: | |
271 | pr_debug("proc FO key set 0x%x-%x-%x-%x <- 0x%s: %u\n", | |
272 | user_key[0], user_key[1], user_key[2], user_key[3], | |
273 | (char *)tbl.data, ret); | |
274 | kfree(tbl.data); | |
275 | return ret; | |
276 | } | |
277 | ||
3e37c3f9 | 278 | static struct ctl_table ipv4_table[] = { |
e905a9ed | 279 | { |
1da177e4 LT |
280 | .procname = "tcp_timestamps", |
281 | .data = &sysctl_tcp_timestamps, | |
282 | .maxlen = sizeof(int), | |
283 | .mode = 0644, | |
6d9f239a | 284 | .proc_handler = proc_dointvec |
1da177e4 | 285 | }, |
e905a9ed | 286 | { |
1da177e4 LT |
287 | .procname = "tcp_window_scaling", |
288 | .data = &sysctl_tcp_window_scaling, | |
289 | .maxlen = sizeof(int), | |
290 | .mode = 0644, | |
6d9f239a | 291 | .proc_handler = proc_dointvec |
1da177e4 | 292 | }, |
e905a9ed | 293 | { |
1da177e4 LT |
294 | .procname = "tcp_sack", |
295 | .data = &sysctl_tcp_sack, | |
296 | .maxlen = sizeof(int), | |
297 | .mode = 0644, | |
6d9f239a | 298 | .proc_handler = proc_dointvec |
1da177e4 | 299 | }, |
e905a9ed | 300 | { |
1da177e4 LT |
301 | .procname = "tcp_retrans_collapse", |
302 | .data = &sysctl_tcp_retrans_collapse, | |
303 | .maxlen = sizeof(int), | |
304 | .mode = 0644, | |
6d9f239a | 305 | .proc_handler = proc_dointvec |
1da177e4 | 306 | }, |
e905a9ed | 307 | { |
1da177e4 | 308 | .procname = "ip_default_ttl", |
e905a9ed | 309 | .data = &sysctl_ip_default_ttl, |
1da177e4 LT |
310 | .maxlen = sizeof(int), |
311 | .mode = 0644, | |
249fab77 ED |
312 | .proc_handler = proc_dointvec_minmax, |
313 | .extra1 = &ip_ttl_min, | |
314 | .extra2 = &ip_ttl_max, | |
1da177e4 | 315 | }, |
e905a9ed | 316 | { |
1da177e4 LT |
317 | .procname = "ip_no_pmtu_disc", |
318 | .data = &ipv4_config.no_pmtu_disc, | |
319 | .maxlen = sizeof(int), | |
320 | .mode = 0644, | |
6d9f239a | 321 | .proc_handler = proc_dointvec |
1da177e4 LT |
322 | }, |
323 | { | |
1da177e4 LT |
324 | .procname = "ip_nonlocal_bind", |
325 | .data = &sysctl_ip_nonlocal_bind, | |
326 | .maxlen = sizeof(int), | |
327 | .mode = 0644, | |
6d9f239a | 328 | .proc_handler = proc_dointvec |
1da177e4 LT |
329 | }, |
330 | { | |
1da177e4 LT |
331 | .procname = "tcp_syn_retries", |
332 | .data = &sysctl_tcp_syn_retries, | |
333 | .maxlen = sizeof(int), | |
334 | .mode = 0644, | |
6d9f239a | 335 | .proc_handler = proc_dointvec |
1da177e4 LT |
336 | }, |
337 | { | |
1da177e4 LT |
338 | .procname = "tcp_synack_retries", |
339 | .data = &sysctl_tcp_synack_retries, | |
340 | .maxlen = sizeof(int), | |
341 | .mode = 0644, | |
6d9f239a | 342 | .proc_handler = proc_dointvec |
1da177e4 LT |
343 | }, |
344 | { | |
1da177e4 LT |
345 | .procname = "tcp_max_orphans", |
346 | .data = &sysctl_tcp_max_orphans, | |
347 | .maxlen = sizeof(int), | |
348 | .mode = 0644, | |
6d9f239a | 349 | .proc_handler = proc_dointvec |
1da177e4 LT |
350 | }, |
351 | { | |
1da177e4 | 352 | .procname = "tcp_max_tw_buckets", |
295ff7ed | 353 | .data = &tcp_death_row.sysctl_max_tw_buckets, |
1da177e4 LT |
354 | .maxlen = sizeof(int), |
355 | .mode = 0644, | |
6d9f239a | 356 | .proc_handler = proc_dointvec |
1da177e4 | 357 | }, |
6648bd7e AD |
358 | { |
359 | .procname = "ip_early_demux", | |
360 | .data = &sysctl_ip_early_demux, | |
361 | .maxlen = sizeof(int), | |
362 | .mode = 0644, | |
363 | .proc_handler = proc_dointvec | |
364 | }, | |
1da177e4 | 365 | { |
1da177e4 LT |
366 | .procname = "ip_dynaddr", |
367 | .data = &sysctl_ip_dynaddr, | |
368 | .maxlen = sizeof(int), | |
369 | .mode = 0644, | |
6d9f239a | 370 | .proc_handler = proc_dointvec |
1da177e4 | 371 | }, |
1da177e4 | 372 | { |
1da177e4 LT |
373 | .procname = "tcp_keepalive_time", |
374 | .data = &sysctl_tcp_keepalive_time, | |
375 | .maxlen = sizeof(int), | |
376 | .mode = 0644, | |
6d9f239a | 377 | .proc_handler = proc_dointvec_jiffies, |
1da177e4 LT |
378 | }, |
379 | { | |
1da177e4 LT |
380 | .procname = "tcp_keepalive_probes", |
381 | .data = &sysctl_tcp_keepalive_probes, | |
382 | .maxlen = sizeof(int), | |
383 | .mode = 0644, | |
6d9f239a | 384 | .proc_handler = proc_dointvec |
1da177e4 LT |
385 | }, |
386 | { | |
1da177e4 LT |
387 | .procname = "tcp_keepalive_intvl", |
388 | .data = &sysctl_tcp_keepalive_intvl, | |
389 | .maxlen = sizeof(int), | |
390 | .mode = 0644, | |
6d9f239a | 391 | .proc_handler = proc_dointvec_jiffies, |
1da177e4 LT |
392 | }, |
393 | { | |
1da177e4 LT |
394 | .procname = "tcp_retries1", |
395 | .data = &sysctl_tcp_retries1, | |
396 | .maxlen = sizeof(int), | |
397 | .mode = 0644, | |
6d9f239a | 398 | .proc_handler = proc_dointvec_minmax, |
1da177e4 LT |
399 | .extra2 = &tcp_retr1_max |
400 | }, | |
401 | { | |
1da177e4 LT |
402 | .procname = "tcp_retries2", |
403 | .data = &sysctl_tcp_retries2, | |
404 | .maxlen = sizeof(int), | |
405 | .mode = 0644, | |
6d9f239a | 406 | .proc_handler = proc_dointvec |
1da177e4 LT |
407 | }, |
408 | { | |
1da177e4 LT |
409 | .procname = "tcp_fin_timeout", |
410 | .data = &sysctl_tcp_fin_timeout, | |
411 | .maxlen = sizeof(int), | |
412 | .mode = 0644, | |
6d9f239a | 413 | .proc_handler = proc_dointvec_jiffies, |
1da177e4 LT |
414 | }, |
415 | #ifdef CONFIG_SYN_COOKIES | |
416 | { | |
1da177e4 LT |
417 | .procname = "tcp_syncookies", |
418 | .data = &sysctl_tcp_syncookies, | |
419 | .maxlen = sizeof(int), | |
420 | .mode = 0644, | |
6d9f239a | 421 | .proc_handler = proc_dointvec |
1da177e4 LT |
422 | }, |
423 | #endif | |
2100c8d2 YC |
424 | { |
425 | .procname = "tcp_fastopen", | |
426 | .data = &sysctl_tcp_fastopen, | |
427 | .maxlen = sizeof(int), | |
428 | .mode = 0644, | |
429 | .proc_handler = proc_dointvec, | |
430 | }, | |
10467163 JC |
431 | { |
432 | .procname = "tcp_fastopen_key", | |
433 | .mode = 0600, | |
434 | .maxlen = ((TCP_FASTOPEN_KEY_LENGTH * 2) + 10), | |
435 | .proc_handler = proc_tcp_fastopen_key, | |
436 | }, | |
1da177e4 | 437 | { |
1da177e4 | 438 | .procname = "tcp_tw_recycle", |
295ff7ed | 439 | .data = &tcp_death_row.sysctl_tw_recycle, |
1da177e4 LT |
440 | .maxlen = sizeof(int), |
441 | .mode = 0644, | |
6d9f239a | 442 | .proc_handler = proc_dointvec |
1da177e4 LT |
443 | }, |
444 | { | |
1da177e4 LT |
445 | .procname = "tcp_abort_on_overflow", |
446 | .data = &sysctl_tcp_abort_on_overflow, | |
447 | .maxlen = sizeof(int), | |
448 | .mode = 0644, | |
6d9f239a | 449 | .proc_handler = proc_dointvec |
1da177e4 LT |
450 | }, |
451 | { | |
1da177e4 LT |
452 | .procname = "tcp_stdurg", |
453 | .data = &sysctl_tcp_stdurg, | |
454 | .maxlen = sizeof(int), | |
455 | .mode = 0644, | |
6d9f239a | 456 | .proc_handler = proc_dointvec |
1da177e4 LT |
457 | }, |
458 | { | |
1da177e4 LT |
459 | .procname = "tcp_rfc1337", |
460 | .data = &sysctl_tcp_rfc1337, | |
461 | .maxlen = sizeof(int), | |
462 | .mode = 0644, | |
6d9f239a | 463 | .proc_handler = proc_dointvec |
1da177e4 LT |
464 | }, |
465 | { | |
1da177e4 LT |
466 | .procname = "tcp_max_syn_backlog", |
467 | .data = &sysctl_max_syn_backlog, | |
468 | .maxlen = sizeof(int), | |
469 | .mode = 0644, | |
6d9f239a | 470 | .proc_handler = proc_dointvec |
1da177e4 LT |
471 | }, |
472 | { | |
1da177e4 | 473 | .procname = "ip_local_port_range", |
3c689b73 ED |
474 | .data = &sysctl_local_ports.range, |
475 | .maxlen = sizeof(sysctl_local_ports.range), | |
1da177e4 | 476 | .mode = 0644, |
6d9f239a | 477 | .proc_handler = ipv4_local_port_range, |
1da177e4 | 478 | }, |
e3826f1e AW |
479 | { |
480 | .procname = "ip_local_reserved_ports", | |
481 | .data = NULL, /* initialized in sysctl_ipv4_init */ | |
482 | .maxlen = 65536, | |
483 | .mode = 0644, | |
484 | .proc_handler = proc_do_large_bitmap, | |
485 | }, | |
1da177e4 | 486 | { |
1da177e4 LT |
487 | .procname = "igmp_max_memberships", |
488 | .data = &sysctl_igmp_max_memberships, | |
489 | .maxlen = sizeof(int), | |
490 | .mode = 0644, | |
6d9f239a | 491 | .proc_handler = proc_dointvec |
1da177e4 | 492 | }, |
1da177e4 | 493 | { |
1da177e4 LT |
494 | .procname = "igmp_max_msf", |
495 | .data = &sysctl_igmp_max_msf, | |
496 | .maxlen = sizeof(int), | |
497 | .mode = 0644, | |
6d9f239a | 498 | .proc_handler = proc_dointvec |
1da177e4 LT |
499 | }, |
500 | { | |
1da177e4 LT |
501 | .procname = "inet_peer_threshold", |
502 | .data = &inet_peer_threshold, | |
503 | .maxlen = sizeof(int), | |
504 | .mode = 0644, | |
6d9f239a | 505 | .proc_handler = proc_dointvec |
1da177e4 LT |
506 | }, |
507 | { | |
1da177e4 LT |
508 | .procname = "inet_peer_minttl", |
509 | .data = &inet_peer_minttl, | |
510 | .maxlen = sizeof(int), | |
511 | .mode = 0644, | |
6d9f239a | 512 | .proc_handler = proc_dointvec_jiffies, |
1da177e4 LT |
513 | }, |
514 | { | |
1da177e4 LT |
515 | .procname = "inet_peer_maxttl", |
516 | .data = &inet_peer_maxttl, | |
517 | .maxlen = sizeof(int), | |
518 | .mode = 0644, | |
6d9f239a | 519 | .proc_handler = proc_dointvec_jiffies, |
1da177e4 | 520 | }, |
1da177e4 | 521 | { |
1da177e4 LT |
522 | .procname = "tcp_orphan_retries", |
523 | .data = &sysctl_tcp_orphan_retries, | |
524 | .maxlen = sizeof(int), | |
525 | .mode = 0644, | |
6d9f239a | 526 | .proc_handler = proc_dointvec |
1da177e4 LT |
527 | }, |
528 | { | |
1da177e4 LT |
529 | .procname = "tcp_fack", |
530 | .data = &sysctl_tcp_fack, | |
531 | .maxlen = sizeof(int), | |
532 | .mode = 0644, | |
6d9f239a | 533 | .proc_handler = proc_dointvec |
1da177e4 LT |
534 | }, |
535 | { | |
1da177e4 LT |
536 | .procname = "tcp_reordering", |
537 | .data = &sysctl_tcp_reordering, | |
538 | .maxlen = sizeof(int), | |
539 | .mode = 0644, | |
6d9f239a | 540 | .proc_handler = proc_dointvec |
1da177e4 | 541 | }, |
1da177e4 | 542 | { |
1da177e4 LT |
543 | .procname = "tcp_dsack", |
544 | .data = &sysctl_tcp_dsack, | |
545 | .maxlen = sizeof(int), | |
546 | .mode = 0644, | |
6d9f239a | 547 | .proc_handler = proc_dointvec |
1da177e4 | 548 | }, |
1da177e4 | 549 | { |
1da177e4 LT |
550 | .procname = "tcp_wmem", |
551 | .data = &sysctl_tcp_wmem, | |
552 | .maxlen = sizeof(sysctl_tcp_wmem), | |
553 | .mode = 0644, | |
cdda8891 | 554 | .proc_handler = proc_dointvec_minmax, |
555 | .extra1 = &one, | |
1da177e4 | 556 | }, |
c9bee3b7 ED |
557 | { |
558 | .procname = "tcp_notsent_lowat", | |
559 | .data = &sysctl_tcp_notsent_lowat, | |
560 | .maxlen = sizeof(sysctl_tcp_notsent_lowat), | |
561 | .mode = 0644, | |
562 | .proc_handler = proc_dointvec, | |
563 | }, | |
1da177e4 | 564 | { |
1da177e4 LT |
565 | .procname = "tcp_rmem", |
566 | .data = &sysctl_tcp_rmem, | |
567 | .maxlen = sizeof(sysctl_tcp_rmem), | |
568 | .mode = 0644, | |
cdda8891 | 569 | .proc_handler = proc_dointvec_minmax, |
570 | .extra1 = &one, | |
1da177e4 LT |
571 | }, |
572 | { | |
1da177e4 LT |
573 | .procname = "tcp_app_win", |
574 | .data = &sysctl_tcp_app_win, | |
575 | .maxlen = sizeof(int), | |
576 | .mode = 0644, | |
6d9f239a | 577 | .proc_handler = proc_dointvec |
1da177e4 LT |
578 | }, |
579 | { | |
1da177e4 LT |
580 | .procname = "tcp_adv_win_scale", |
581 | .data = &sysctl_tcp_adv_win_scale, | |
582 | .maxlen = sizeof(int), | |
583 | .mode = 0644, | |
0147fc05 AD |
584 | .proc_handler = proc_dointvec_minmax, |
585 | .extra1 = &tcp_adv_win_scale_min, | |
586 | .extra2 = &tcp_adv_win_scale_max, | |
1da177e4 | 587 | }, |
1da177e4 | 588 | { |
1da177e4 LT |
589 | .procname = "tcp_tw_reuse", |
590 | .data = &sysctl_tcp_tw_reuse, | |
591 | .maxlen = sizeof(int), | |
592 | .mode = 0644, | |
6d9f239a | 593 | .proc_handler = proc_dointvec |
1da177e4 LT |
594 | }, |
595 | { | |
1da177e4 LT |
596 | .procname = "tcp_frto", |
597 | .data = &sysctl_tcp_frto, | |
598 | .maxlen = sizeof(int), | |
599 | .mode = 0644, | |
6d9f239a | 600 | .proc_handler = proc_dointvec |
1da177e4 LT |
601 | }, |
602 | { | |
1da177e4 LT |
603 | .procname = "tcp_low_latency", |
604 | .data = &sysctl_tcp_low_latency, | |
605 | .maxlen = sizeof(int), | |
606 | .mode = 0644, | |
6d9f239a | 607 | .proc_handler = proc_dointvec |
1da177e4 | 608 | }, |
1da177e4 | 609 | { |
1da177e4 LT |
610 | .procname = "tcp_no_metrics_save", |
611 | .data = &sysctl_tcp_nometrics_save, | |
612 | .maxlen = sizeof(int), | |
613 | .mode = 0644, | |
6d9f239a | 614 | .proc_handler = proc_dointvec, |
1da177e4 | 615 | }, |
1da177e4 | 616 | { |
1da177e4 LT |
617 | .procname = "tcp_moderate_rcvbuf", |
618 | .data = &sysctl_tcp_moderate_rcvbuf, | |
619 | .maxlen = sizeof(int), | |
620 | .mode = 0644, | |
6d9f239a | 621 | .proc_handler = proc_dointvec, |
1da177e4 LT |
622 | }, |
623 | { | |
1da177e4 LT |
624 | .procname = "tcp_tso_win_divisor", |
625 | .data = &sysctl_tcp_tso_win_divisor, | |
626 | .maxlen = sizeof(int), | |
627 | .mode = 0644, | |
6d9f239a | 628 | .proc_handler = proc_dointvec, |
1da177e4 LT |
629 | }, |
630 | { | |
317a76f9 | 631 | .procname = "tcp_congestion_control", |
1da177e4 | 632 | .mode = 0644, |
317a76f9 | 633 | .maxlen = TCP_CA_NAME_MAX, |
6d9f239a | 634 | .proc_handler = proc_tcp_congestion_control, |
1da177e4 | 635 | }, |
5d424d5a | 636 | { |
5d424d5a JH |
637 | .procname = "tcp_mtu_probing", |
638 | .data = &sysctl_tcp_mtu_probing, | |
639 | .maxlen = sizeof(int), | |
640 | .mode = 0644, | |
6d9f239a | 641 | .proc_handler = proc_dointvec, |
5d424d5a JH |
642 | }, |
643 | { | |
5d424d5a JH |
644 | .procname = "tcp_base_mss", |
645 | .data = &sysctl_tcp_base_mss, | |
646 | .maxlen = sizeof(int), | |
647 | .mode = 0644, | |
6d9f239a | 648 | .proc_handler = proc_dointvec, |
5d424d5a | 649 | }, |
e905a9ed | 650 | { |
15d99e02 RJ |
651 | .procname = "tcp_workaround_signed_windows", |
652 | .data = &sysctl_tcp_workaround_signed_windows, | |
653 | .maxlen = sizeof(int), | |
654 | .mode = 0644, | |
6d9f239a | 655 | .proc_handler = proc_dointvec |
15d99e02 | 656 | }, |
46d3ceab ED |
657 | { |
658 | .procname = "tcp_limit_output_bytes", | |
659 | .data = &sysctl_tcp_limit_output_bytes, | |
660 | .maxlen = sizeof(int), | |
661 | .mode = 0644, | |
662 | .proc_handler = proc_dointvec | |
663 | }, | |
282f23c6 ED |
664 | { |
665 | .procname = "tcp_challenge_ack_limit", | |
666 | .data = &sysctl_tcp_challenge_ack_limit, | |
667 | .maxlen = sizeof(int), | |
668 | .mode = 0644, | |
669 | .proc_handler = proc_dointvec | |
670 | }, | |
95937825 CL |
671 | #ifdef CONFIG_NET_DMA |
672 | { | |
95937825 CL |
673 | .procname = "tcp_dma_copybreak", |
674 | .data = &sysctl_tcp_dma_copybreak, | |
675 | .maxlen = sizeof(int), | |
676 | .mode = 0644, | |
6d9f239a | 677 | .proc_handler = proc_dointvec |
95937825 CL |
678 | }, |
679 | #endif | |
35089bb2 | 680 | { |
35089bb2 DM |
681 | .procname = "tcp_slow_start_after_idle", |
682 | .data = &sysctl_tcp_slow_start_after_idle, | |
683 | .maxlen = sizeof(int), | |
684 | .mode = 0644, | |
6d9f239a | 685 | .proc_handler = proc_dointvec |
35089bb2 | 686 | }, |
446fda4f PM |
687 | #ifdef CONFIG_NETLABEL |
688 | { | |
446fda4f PM |
689 | .procname = "cipso_cache_enable", |
690 | .data = &cipso_v4_cache_enabled, | |
691 | .maxlen = sizeof(int), | |
692 | .mode = 0644, | |
6d9f239a | 693 | .proc_handler = proc_dointvec, |
446fda4f PM |
694 | }, |
695 | { | |
446fda4f PM |
696 | .procname = "cipso_cache_bucket_size", |
697 | .data = &cipso_v4_cache_bucketsize, | |
698 | .maxlen = sizeof(int), | |
699 | .mode = 0644, | |
6d9f239a | 700 | .proc_handler = proc_dointvec, |
446fda4f PM |
701 | }, |
702 | { | |
446fda4f PM |
703 | .procname = "cipso_rbm_optfmt", |
704 | .data = &cipso_v4_rbm_optfmt, | |
705 | .maxlen = sizeof(int), | |
706 | .mode = 0644, | |
6d9f239a | 707 | .proc_handler = proc_dointvec, |
446fda4f PM |
708 | }, |
709 | { | |
446fda4f PM |
710 | .procname = "cipso_rbm_strictvalid", |
711 | .data = &cipso_v4_rbm_strictvalid, | |
712 | .maxlen = sizeof(int), | |
713 | .mode = 0644, | |
6d9f239a | 714 | .proc_handler = proc_dointvec, |
446fda4f PM |
715 | }, |
716 | #endif /* CONFIG_NETLABEL */ | |
3ff825b2 | 717 | { |
3ff825b2 SH |
718 | .procname = "tcp_available_congestion_control", |
719 | .maxlen = TCP_CA_BUF_MAX, | |
720 | .mode = 0444, | |
6d9f239a | 721 | .proc_handler = proc_tcp_available_congestion_control, |
3ff825b2 | 722 | }, |
ce7bc3bf | 723 | { |
ce7bc3bf SH |
724 | .procname = "tcp_allowed_congestion_control", |
725 | .maxlen = TCP_CA_BUF_MAX, | |
726 | .mode = 0644, | |
6d9f239a | 727 | .proc_handler = proc_allowed_congestion_control, |
ce7bc3bf | 728 | }, |
886236c1 | 729 | { |
886236c1 JH |
730 | .procname = "tcp_max_ssthresh", |
731 | .data = &sysctl_tcp_max_ssthresh, | |
732 | .maxlen = sizeof(int), | |
733 | .mode = 0644, | |
6d9f239a | 734 | .proc_handler = proc_dointvec, |
886236c1 | 735 | }, |
36e31b0a AP |
736 | { |
737 | .procname = "tcp_thin_linear_timeouts", | |
738 | .data = &sysctl_tcp_thin_linear_timeouts, | |
739 | .maxlen = sizeof(int), | |
740 | .mode = 0644, | |
741 | .proc_handler = proc_dointvec | |
742 | }, | |
7e380175 AP |
743 | { |
744 | .procname = "tcp_thin_dupack", | |
745 | .data = &sysctl_tcp_thin_dupack, | |
746 | .maxlen = sizeof(int), | |
747 | .mode = 0644, | |
748 | .proc_handler = proc_dointvec | |
749 | }, | |
eed530b6 YC |
750 | { |
751 | .procname = "tcp_early_retrans", | |
752 | .data = &sysctl_tcp_early_retrans, | |
753 | .maxlen = sizeof(int), | |
754 | .mode = 0644, | |
755 | .proc_handler = proc_dointvec_minmax, | |
756 | .extra1 = &zero, | |
6ba8a3b1 | 757 | .extra2 = &four, |
eed530b6 | 758 | }, |
95766fff | 759 | { |
95766fff HA |
760 | .procname = "udp_mem", |
761 | .data = &sysctl_udp_mem, | |
762 | .maxlen = sizeof(sysctl_udp_mem), | |
763 | .mode = 0644, | |
8d987e5c | 764 | .proc_handler = proc_doulongvec_minmax, |
95766fff HA |
765 | }, |
766 | { | |
95766fff HA |
767 | .procname = "udp_rmem_min", |
768 | .data = &sysctl_udp_rmem_min, | |
769 | .maxlen = sizeof(sysctl_udp_rmem_min), | |
770 | .mode = 0644, | |
6d9f239a | 771 | .proc_handler = proc_dointvec_minmax, |
cdda8891 | 772 | .extra1 = &one |
95766fff HA |
773 | }, |
774 | { | |
95766fff HA |
775 | .procname = "udp_wmem_min", |
776 | .data = &sysctl_udp_wmem_min, | |
777 | .maxlen = sizeof(sysctl_udp_wmem_min), | |
778 | .mode = 0644, | |
6d9f239a | 779 | .proc_handler = proc_dointvec_minmax, |
cdda8891 | 780 | .extra1 = &one |
95766fff | 781 | }, |
f8572d8f | 782 | { } |
1da177e4 | 783 | }; |
3e37c3f9 | 784 | |
68528f09 PE |
785 | static struct ctl_table ipv4_net_table[] = { |
786 | { | |
68528f09 PE |
787 | .procname = "icmp_echo_ignore_all", |
788 | .data = &init_net.ipv4.sysctl_icmp_echo_ignore_all, | |
789 | .maxlen = sizeof(int), | |
790 | .mode = 0644, | |
6d9f239a | 791 | .proc_handler = proc_dointvec |
68528f09 PE |
792 | }, |
793 | { | |
68528f09 PE |
794 | .procname = "icmp_echo_ignore_broadcasts", |
795 | .data = &init_net.ipv4.sysctl_icmp_echo_ignore_broadcasts, | |
796 | .maxlen = sizeof(int), | |
797 | .mode = 0644, | |
6d9f239a | 798 | .proc_handler = proc_dointvec |
68528f09 PE |
799 | }, |
800 | { | |
68528f09 PE |
801 | .procname = "icmp_ignore_bogus_error_responses", |
802 | .data = &init_net.ipv4.sysctl_icmp_ignore_bogus_error_responses, | |
803 | .maxlen = sizeof(int), | |
804 | .mode = 0644, | |
6d9f239a | 805 | .proc_handler = proc_dointvec |
68528f09 PE |
806 | }, |
807 | { | |
68528f09 PE |
808 | .procname = "icmp_errors_use_inbound_ifaddr", |
809 | .data = &init_net.ipv4.sysctl_icmp_errors_use_inbound_ifaddr, | |
810 | .maxlen = sizeof(int), | |
811 | .mode = 0644, | |
6d9f239a | 812 | .proc_handler = proc_dointvec |
68528f09 PE |
813 | }, |
814 | { | |
68528f09 PE |
815 | .procname = "icmp_ratelimit", |
816 | .data = &init_net.ipv4.sysctl_icmp_ratelimit, | |
817 | .maxlen = sizeof(int), | |
818 | .mode = 0644, | |
6d9f239a | 819 | .proc_handler = proc_dointvec_ms_jiffies, |
68528f09 PE |
820 | }, |
821 | { | |
68528f09 PE |
822 | .procname = "icmp_ratemask", |
823 | .data = &init_net.ipv4.sysctl_icmp_ratemask, | |
824 | .maxlen = sizeof(int), | |
825 | .mode = 0644, | |
6d9f239a | 826 | .proc_handler = proc_dointvec |
68528f09 | 827 | }, |
c319b4d7 VK |
828 | { |
829 | .procname = "ping_group_range", | |
830 | .data = &init_net.ipv4.sysctl_ping_group_range, | |
7064d16e | 831 | .maxlen = sizeof(gid_t)*2, |
c319b4d7 VK |
832 | .mode = 0644, |
833 | .proc_handler = ipv4_ping_group_range, | |
834 | }, | |
5d134f1c HFS |
835 | { |
836 | .procname = "tcp_ecn", | |
837 | .data = &init_net.ipv4.sysctl_tcp_ecn, | |
838 | .maxlen = sizeof(int), | |
839 | .mode = 0644, | |
840 | .proc_handler = proc_dointvec | |
841 | }, | |
3dc43e3e GC |
842 | { |
843 | .procname = "tcp_mem", | |
844 | .maxlen = sizeof(init_net.ipv4.sysctl_tcp_mem), | |
845 | .mode = 0644, | |
846 | .proc_handler = ipv4_tcp_mem, | |
847 | }, | |
68528f09 PE |
848 | { } |
849 | }; | |
850 | ||
1577519d PE |
851 | static __net_init int ipv4_sysctl_init_net(struct net *net) |
852 | { | |
68528f09 PE |
853 | struct ctl_table *table; |
854 | ||
855 | table = ipv4_net_table; | |
09ad9bc7 | 856 | if (!net_eq(net, &init_net)) { |
68528f09 PE |
857 | table = kmemdup(table, sizeof(ipv4_net_table), GFP_KERNEL); |
858 | if (table == NULL) | |
859 | goto err_alloc; | |
860 | ||
861 | table[0].data = | |
862 | &net->ipv4.sysctl_icmp_echo_ignore_all; | |
863 | table[1].data = | |
864 | &net->ipv4.sysctl_icmp_echo_ignore_broadcasts; | |
865 | table[2].data = | |
866 | &net->ipv4.sysctl_icmp_ignore_bogus_error_responses; | |
867 | table[3].data = | |
868 | &net->ipv4.sysctl_icmp_errors_use_inbound_ifaddr; | |
869 | table[4].data = | |
870 | &net->ipv4.sysctl_icmp_ratelimit; | |
871 | table[5].data = | |
872 | &net->ipv4.sysctl_icmp_ratemask; | |
1080d709 | 873 | table[6].data = |
c319b4d7 | 874 | &net->ipv4.sysctl_ping_group_range; |
5d134f1c HFS |
875 | table[7].data = |
876 | &net->ipv4.sysctl_tcp_ecn; | |
c319b4d7 | 877 | |
464dc801 EB |
878 | /* Don't export sysctls to unprivileged users */ |
879 | if (net->user_ns != &init_user_ns) | |
880 | table[0].procname = NULL; | |
68528f09 PE |
881 | } |
882 | ||
c319b4d7 VK |
883 | /* |
884 | * Sane defaults - nobody may create ping sockets. | |
885 | * Boot scripts should set this to distro-specific group. | |
886 | */ | |
7064d16e EB |
887 | net->ipv4.sysctl_ping_group_range[0] = make_kgid(&init_user_ns, 1); |
888 | net->ipv4.sysctl_ping_group_range[1] = make_kgid(&init_user_ns, 0); | |
c319b4d7 | 889 | |
4acb4190 | 890 | tcp_init_mem(net); |
3dc43e3e | 891 | |
ec8f23ce | 892 | net->ipv4.ipv4_hdr = register_net_sysctl(net, "net/ipv4", table); |
68528f09 PE |
893 | if (net->ipv4.ipv4_hdr == NULL) |
894 | goto err_reg; | |
895 | ||
1577519d | 896 | return 0; |
68528f09 PE |
897 | |
898 | err_reg: | |
09ad9bc7 | 899 | if (!net_eq(net, &init_net)) |
68528f09 PE |
900 | kfree(table); |
901 | err_alloc: | |
902 | return -ENOMEM; | |
1577519d PE |
903 | } |
904 | ||
905 | static __net_exit void ipv4_sysctl_exit_net(struct net *net) | |
906 | { | |
68528f09 PE |
907 | struct ctl_table *table; |
908 | ||
909 | table = net->ipv4.ipv4_hdr->ctl_table_arg; | |
910 | unregister_net_sysctl_table(net->ipv4.ipv4_hdr); | |
911 | kfree(table); | |
1577519d PE |
912 | } |
913 | ||
914 | static __net_initdata struct pernet_operations ipv4_sysctl_ops = { | |
915 | .init = ipv4_sysctl_init_net, | |
916 | .exit = ipv4_sysctl_exit_net, | |
917 | }; | |
918 | ||
3e37c3f9 PE |
919 | static __init int sysctl_ipv4_init(void) |
920 | { | |
921 | struct ctl_table_header *hdr; | |
e3826f1e AW |
922 | struct ctl_table *i; |
923 | ||
924 | for (i = ipv4_table; i->procname; i++) { | |
925 | if (strcmp(i->procname, "ip_local_reserved_ports") == 0) { | |
926 | i->data = sysctl_local_reserved_ports; | |
927 | break; | |
928 | } | |
929 | } | |
930 | if (!i->procname) | |
931 | return -EINVAL; | |
3e37c3f9 | 932 | |
ec8f23ce | 933 | hdr = register_net_sysctl(&init_net, "net/ipv4", ipv4_table); |
1577519d PE |
934 | if (hdr == NULL) |
935 | return -ENOMEM; | |
936 | ||
937 | if (register_pernet_subsys(&ipv4_sysctl_ops)) { | |
5dd3df10 | 938 | unregister_net_sysctl_table(hdr); |
1577519d PE |
939 | return -ENOMEM; |
940 | } | |
941 | ||
942 | return 0; | |
3e37c3f9 PE |
943 | } |
944 | ||
945 | __initcall(sysctl_ipv4_init); |