[PATCH] i386: fix MTRR code
[linux-2.6/x86.git] / net / ipv4 / sysctl_net_ipv4.c
blobdfcf47f10f88b94318a33fa36768d012606afba1
1 /*
2 * sysctl_net_ipv4.c: sysctl interface to net IPV4 subsystem.
4 * $Id: sysctl_net_ipv4.c,v 1.50 2001/10/20 00:00:11 davem Exp $
6 * Begun April 1, 1996, Mike Shaver.
7 * Added /proc/sys/net/ipv4 directory entry (empty =) ). [MS]
8 */
10 #include <linux/mm.h>
11 #include <linux/module.h>
12 #include <linux/sysctl.h>
13 #include <linux/igmp.h>
14 #include <linux/inetdevice.h>
15 #include <net/snmp.h>
16 #include <net/icmp.h>
17 #include <net/ip.h>
18 #include <net/route.h>
19 #include <net/tcp.h>
20 #include <net/cipso_ipv4.h>
22 /* From af_inet.c */
23 extern int sysctl_ip_nonlocal_bind;
25 #ifdef CONFIG_SYSCTL
26 static int zero;
27 static int tcp_retr1_max = 255;
28 static int ip_local_port_range_min[] = { 1, 1 };
29 static int ip_local_port_range_max[] = { 65535, 65535 };
30 #endif
32 struct ipv4_config ipv4_config;
34 #ifdef CONFIG_SYSCTL
36 static
37 int ipv4_sysctl_forward(ctl_table *ctl, int write, struct file * filp,
38 void __user *buffer, size_t *lenp, loff_t *ppos)
40 int val = ipv4_devconf.forwarding;
41 int ret;
43 ret = proc_dointvec(ctl, write, filp, buffer, lenp, ppos);
45 if (write && ipv4_devconf.forwarding != val)
46 inet_forward_change();
48 return ret;
51 static int ipv4_sysctl_forward_strategy(ctl_table *table,
52 int __user *name, int nlen,
53 void __user *oldval, size_t __user *oldlenp,
54 void __user *newval, size_t newlen,
55 void **context)
57 int *valp = table->data;
58 int new;
60 if (!newval || !newlen)
61 return 0;
63 if (newlen != sizeof(int))
64 return -EINVAL;
66 if (get_user(new, (int __user *)newval))
67 return -EFAULT;
69 if (new == *valp)
70 return 0;
72 if (oldval && oldlenp) {
73 size_t len;
75 if (get_user(len, oldlenp))
76 return -EFAULT;
78 if (len) {
79 if (len > table->maxlen)
80 len = table->maxlen;
81 if (copy_to_user(oldval, valp, len))
82 return -EFAULT;
83 if (put_user(len, oldlenp))
84 return -EFAULT;
88 *valp = new;
89 inet_forward_change();
90 return 1;
93 static int proc_tcp_congestion_control(ctl_table *ctl, int write, struct file * filp,
94 void __user *buffer, size_t *lenp, loff_t *ppos)
96 char val[TCP_CA_NAME_MAX];
97 ctl_table tbl = {
98 .data = val,
99 .maxlen = TCP_CA_NAME_MAX,
101 int ret;
103 tcp_get_default_congestion_control(val);
105 ret = proc_dostring(&tbl, write, filp, buffer, lenp, ppos);
106 if (write && ret == 0)
107 ret = tcp_set_default_congestion_control(val);
108 return ret;
111 static int sysctl_tcp_congestion_control(ctl_table *table, int __user *name,
112 int nlen, void __user *oldval,
113 size_t __user *oldlenp,
114 void __user *newval, size_t newlen,
115 void **context)
117 char val[TCP_CA_NAME_MAX];
118 ctl_table tbl = {
119 .data = val,
120 .maxlen = TCP_CA_NAME_MAX,
122 int ret;
124 tcp_get_default_congestion_control(val);
125 ret = sysctl_string(&tbl, name, nlen, oldval, oldlenp, newval, newlen,
126 context);
127 if (ret == 0 && newval && newlen)
128 ret = tcp_set_default_congestion_control(val);
129 return ret;
132 static int proc_tcp_available_congestion_control(ctl_table *ctl,
133 int write, struct file * filp,
134 void __user *buffer, size_t *lenp,
135 loff_t *ppos)
137 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX, };
138 int ret;
140 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
141 if (!tbl.data)
142 return -ENOMEM;
143 tcp_get_available_congestion_control(tbl.data, TCP_CA_BUF_MAX);
144 ret = proc_dostring(&tbl, write, filp, buffer, lenp, ppos);
145 kfree(tbl.data);
146 return ret;
149 static int proc_allowed_congestion_control(ctl_table *ctl,
150 int write, struct file * filp,
151 void __user *buffer, size_t *lenp,
152 loff_t *ppos)
154 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX };
155 int ret;
157 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
158 if (!tbl.data)
159 return -ENOMEM;
161 tcp_get_allowed_congestion_control(tbl.data, tbl.maxlen);
162 ret = proc_dostring(&tbl, write, filp, buffer, lenp, ppos);
163 if (write && ret == 0)
164 ret = tcp_set_allowed_congestion_control(tbl.data);
165 kfree(tbl.data);
166 return ret;
169 static int strategy_allowed_congestion_control(ctl_table *table, int __user *name,
170 int nlen, void __user *oldval,
171 size_t __user *oldlenp,
172 void __user *newval, size_t newlen,
173 void **context)
175 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX };
176 int ret;
178 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
179 if (!tbl.data)
180 return -ENOMEM;
182 tcp_get_available_congestion_control(tbl.data, tbl.maxlen);
183 ret = sysctl_string(&tbl, name, nlen, oldval, oldlenp, newval, newlen,
184 context);
185 if (ret == 0 && newval && newlen)
186 ret = tcp_set_allowed_congestion_control(tbl.data);
187 kfree(tbl.data);
189 return ret;
193 ctl_table ipv4_table[] = {
195 .ctl_name = NET_IPV4_TCP_TIMESTAMPS,
196 .procname = "tcp_timestamps",
197 .data = &sysctl_tcp_timestamps,
198 .maxlen = sizeof(int),
199 .mode = 0644,
200 .proc_handler = &proc_dointvec
203 .ctl_name = NET_IPV4_TCP_WINDOW_SCALING,
204 .procname = "tcp_window_scaling",
205 .data = &sysctl_tcp_window_scaling,
206 .maxlen = sizeof(int),
207 .mode = 0644,
208 .proc_handler = &proc_dointvec
211 .ctl_name = NET_IPV4_TCP_SACK,
212 .procname = "tcp_sack",
213 .data = &sysctl_tcp_sack,
214 .maxlen = sizeof(int),
215 .mode = 0644,
216 .proc_handler = &proc_dointvec
219 .ctl_name = NET_IPV4_TCP_RETRANS_COLLAPSE,
220 .procname = "tcp_retrans_collapse",
221 .data = &sysctl_tcp_retrans_collapse,
222 .maxlen = sizeof(int),
223 .mode = 0644,
224 .proc_handler = &proc_dointvec
227 .ctl_name = NET_IPV4_FORWARD,
228 .procname = "ip_forward",
229 .data = &ipv4_devconf.forwarding,
230 .maxlen = sizeof(int),
231 .mode = 0644,
232 .proc_handler = &ipv4_sysctl_forward,
233 .strategy = &ipv4_sysctl_forward_strategy
236 .ctl_name = NET_IPV4_DEFAULT_TTL,
237 .procname = "ip_default_ttl",
238 .data = &sysctl_ip_default_ttl,
239 .maxlen = sizeof(int),
240 .mode = 0644,
241 .proc_handler = &ipv4_doint_and_flush,
242 .strategy = &ipv4_doint_and_flush_strategy,
245 .ctl_name = NET_IPV4_NO_PMTU_DISC,
246 .procname = "ip_no_pmtu_disc",
247 .data = &ipv4_config.no_pmtu_disc,
248 .maxlen = sizeof(int),
249 .mode = 0644,
250 .proc_handler = &proc_dointvec
253 .ctl_name = NET_IPV4_NONLOCAL_BIND,
254 .procname = "ip_nonlocal_bind",
255 .data = &sysctl_ip_nonlocal_bind,
256 .maxlen = sizeof(int),
257 .mode = 0644,
258 .proc_handler = &proc_dointvec
261 .ctl_name = NET_IPV4_TCP_SYN_RETRIES,
262 .procname = "tcp_syn_retries",
263 .data = &sysctl_tcp_syn_retries,
264 .maxlen = sizeof(int),
265 .mode = 0644,
266 .proc_handler = &proc_dointvec
269 .ctl_name = NET_TCP_SYNACK_RETRIES,
270 .procname = "tcp_synack_retries",
271 .data = &sysctl_tcp_synack_retries,
272 .maxlen = sizeof(int),
273 .mode = 0644,
274 .proc_handler = &proc_dointvec
277 .ctl_name = NET_TCP_MAX_ORPHANS,
278 .procname = "tcp_max_orphans",
279 .data = &sysctl_tcp_max_orphans,
280 .maxlen = sizeof(int),
281 .mode = 0644,
282 .proc_handler = &proc_dointvec
285 .ctl_name = NET_TCP_MAX_TW_BUCKETS,
286 .procname = "tcp_max_tw_buckets",
287 .data = &tcp_death_row.sysctl_max_tw_buckets,
288 .maxlen = sizeof(int),
289 .mode = 0644,
290 .proc_handler = &proc_dointvec
293 .ctl_name = NET_IPV4_IPFRAG_HIGH_THRESH,
294 .procname = "ipfrag_high_thresh",
295 .data = &sysctl_ipfrag_high_thresh,
296 .maxlen = sizeof(int),
297 .mode = 0644,
298 .proc_handler = &proc_dointvec
301 .ctl_name = NET_IPV4_IPFRAG_LOW_THRESH,
302 .procname = "ipfrag_low_thresh",
303 .data = &sysctl_ipfrag_low_thresh,
304 .maxlen = sizeof(int),
305 .mode = 0644,
306 .proc_handler = &proc_dointvec
309 .ctl_name = NET_IPV4_DYNADDR,
310 .procname = "ip_dynaddr",
311 .data = &sysctl_ip_dynaddr,
312 .maxlen = sizeof(int),
313 .mode = 0644,
314 .proc_handler = &proc_dointvec
317 .ctl_name = NET_IPV4_IPFRAG_TIME,
318 .procname = "ipfrag_time",
319 .data = &sysctl_ipfrag_time,
320 .maxlen = sizeof(int),
321 .mode = 0644,
322 .proc_handler = &proc_dointvec_jiffies,
323 .strategy = &sysctl_jiffies
326 .ctl_name = NET_IPV4_TCP_KEEPALIVE_TIME,
327 .procname = "tcp_keepalive_time",
328 .data = &sysctl_tcp_keepalive_time,
329 .maxlen = sizeof(int),
330 .mode = 0644,
331 .proc_handler = &proc_dointvec_jiffies,
332 .strategy = &sysctl_jiffies
335 .ctl_name = NET_IPV4_TCP_KEEPALIVE_PROBES,
336 .procname = "tcp_keepalive_probes",
337 .data = &sysctl_tcp_keepalive_probes,
338 .maxlen = sizeof(int),
339 .mode = 0644,
340 .proc_handler = &proc_dointvec
343 .ctl_name = NET_IPV4_TCP_KEEPALIVE_INTVL,
344 .procname = "tcp_keepalive_intvl",
345 .data = &sysctl_tcp_keepalive_intvl,
346 .maxlen = sizeof(int),
347 .mode = 0644,
348 .proc_handler = &proc_dointvec_jiffies,
349 .strategy = &sysctl_jiffies
352 .ctl_name = NET_IPV4_TCP_RETRIES1,
353 .procname = "tcp_retries1",
354 .data = &sysctl_tcp_retries1,
355 .maxlen = sizeof(int),
356 .mode = 0644,
357 .proc_handler = &proc_dointvec_minmax,
358 .strategy = &sysctl_intvec,
359 .extra2 = &tcp_retr1_max
362 .ctl_name = NET_IPV4_TCP_RETRIES2,
363 .procname = "tcp_retries2",
364 .data = &sysctl_tcp_retries2,
365 .maxlen = sizeof(int),
366 .mode = 0644,
367 .proc_handler = &proc_dointvec
370 .ctl_name = NET_IPV4_TCP_FIN_TIMEOUT,
371 .procname = "tcp_fin_timeout",
372 .data = &sysctl_tcp_fin_timeout,
373 .maxlen = sizeof(int),
374 .mode = 0644,
375 .proc_handler = &proc_dointvec_jiffies,
376 .strategy = &sysctl_jiffies
378 #ifdef CONFIG_SYN_COOKIES
380 .ctl_name = NET_TCP_SYNCOOKIES,
381 .procname = "tcp_syncookies",
382 .data = &sysctl_tcp_syncookies,
383 .maxlen = sizeof(int),
384 .mode = 0644,
385 .proc_handler = &proc_dointvec
387 #endif
389 .ctl_name = NET_TCP_TW_RECYCLE,
390 .procname = "tcp_tw_recycle",
391 .data = &tcp_death_row.sysctl_tw_recycle,
392 .maxlen = sizeof(int),
393 .mode = 0644,
394 .proc_handler = &proc_dointvec
397 .ctl_name = NET_TCP_ABORT_ON_OVERFLOW,
398 .procname = "tcp_abort_on_overflow",
399 .data = &sysctl_tcp_abort_on_overflow,
400 .maxlen = sizeof(int),
401 .mode = 0644,
402 .proc_handler = &proc_dointvec
405 .ctl_name = NET_TCP_STDURG,
406 .procname = "tcp_stdurg",
407 .data = &sysctl_tcp_stdurg,
408 .maxlen = sizeof(int),
409 .mode = 0644,
410 .proc_handler = &proc_dointvec
413 .ctl_name = NET_TCP_RFC1337,
414 .procname = "tcp_rfc1337",
415 .data = &sysctl_tcp_rfc1337,
416 .maxlen = sizeof(int),
417 .mode = 0644,
418 .proc_handler = &proc_dointvec
421 .ctl_name = NET_TCP_MAX_SYN_BACKLOG,
422 .procname = "tcp_max_syn_backlog",
423 .data = &sysctl_max_syn_backlog,
424 .maxlen = sizeof(int),
425 .mode = 0644,
426 .proc_handler = &proc_dointvec
429 .ctl_name = NET_IPV4_LOCAL_PORT_RANGE,
430 .procname = "ip_local_port_range",
431 .data = &sysctl_local_port_range,
432 .maxlen = sizeof(sysctl_local_port_range),
433 .mode = 0644,
434 .proc_handler = &proc_dointvec_minmax,
435 .strategy = &sysctl_intvec,
436 .extra1 = ip_local_port_range_min,
437 .extra2 = ip_local_port_range_max
440 .ctl_name = NET_IPV4_ICMP_ECHO_IGNORE_ALL,
441 .procname = "icmp_echo_ignore_all",
442 .data = &sysctl_icmp_echo_ignore_all,
443 .maxlen = sizeof(int),
444 .mode = 0644,
445 .proc_handler = &proc_dointvec
448 .ctl_name = NET_IPV4_ICMP_ECHO_IGNORE_BROADCASTS,
449 .procname = "icmp_echo_ignore_broadcasts",
450 .data = &sysctl_icmp_echo_ignore_broadcasts,
451 .maxlen = sizeof(int),
452 .mode = 0644,
453 .proc_handler = &proc_dointvec
456 .ctl_name = NET_IPV4_ICMP_IGNORE_BOGUS_ERROR_RESPONSES,
457 .procname = "icmp_ignore_bogus_error_responses",
458 .data = &sysctl_icmp_ignore_bogus_error_responses,
459 .maxlen = sizeof(int),
460 .mode = 0644,
461 .proc_handler = &proc_dointvec
464 .ctl_name = NET_IPV4_ICMP_ERRORS_USE_INBOUND_IFADDR,
465 .procname = "icmp_errors_use_inbound_ifaddr",
466 .data = &sysctl_icmp_errors_use_inbound_ifaddr,
467 .maxlen = sizeof(int),
468 .mode = 0644,
469 .proc_handler = &proc_dointvec
472 .ctl_name = NET_IPV4_ROUTE,
473 .procname = "route",
474 .maxlen = 0,
475 .mode = 0555,
476 .child = ipv4_route_table
478 #ifdef CONFIG_IP_MULTICAST
480 .ctl_name = NET_IPV4_IGMP_MAX_MEMBERSHIPS,
481 .procname = "igmp_max_memberships",
482 .data = &sysctl_igmp_max_memberships,
483 .maxlen = sizeof(int),
484 .mode = 0644,
485 .proc_handler = &proc_dointvec
488 #endif
490 .ctl_name = NET_IPV4_IGMP_MAX_MSF,
491 .procname = "igmp_max_msf",
492 .data = &sysctl_igmp_max_msf,
493 .maxlen = sizeof(int),
494 .mode = 0644,
495 .proc_handler = &proc_dointvec
498 .ctl_name = NET_IPV4_INET_PEER_THRESHOLD,
499 .procname = "inet_peer_threshold",
500 .data = &inet_peer_threshold,
501 .maxlen = sizeof(int),
502 .mode = 0644,
503 .proc_handler = &proc_dointvec
506 .ctl_name = NET_IPV4_INET_PEER_MINTTL,
507 .procname = "inet_peer_minttl",
508 .data = &inet_peer_minttl,
509 .maxlen = sizeof(int),
510 .mode = 0644,
511 .proc_handler = &proc_dointvec_jiffies,
512 .strategy = &sysctl_jiffies
515 .ctl_name = NET_IPV4_INET_PEER_MAXTTL,
516 .procname = "inet_peer_maxttl",
517 .data = &inet_peer_maxttl,
518 .maxlen = sizeof(int),
519 .mode = 0644,
520 .proc_handler = &proc_dointvec_jiffies,
521 .strategy = &sysctl_jiffies
524 .ctl_name = NET_IPV4_INET_PEER_GC_MINTIME,
525 .procname = "inet_peer_gc_mintime",
526 .data = &inet_peer_gc_mintime,
527 .maxlen = sizeof(int),
528 .mode = 0644,
529 .proc_handler = &proc_dointvec_jiffies,
530 .strategy = &sysctl_jiffies
533 .ctl_name = NET_IPV4_INET_PEER_GC_MAXTIME,
534 .procname = "inet_peer_gc_maxtime",
535 .data = &inet_peer_gc_maxtime,
536 .maxlen = sizeof(int),
537 .mode = 0644,
538 .proc_handler = &proc_dointvec_jiffies,
539 .strategy = &sysctl_jiffies
542 .ctl_name = NET_TCP_ORPHAN_RETRIES,
543 .procname = "tcp_orphan_retries",
544 .data = &sysctl_tcp_orphan_retries,
545 .maxlen = sizeof(int),
546 .mode = 0644,
547 .proc_handler = &proc_dointvec
550 .ctl_name = NET_TCP_FACK,
551 .procname = "tcp_fack",
552 .data = &sysctl_tcp_fack,
553 .maxlen = sizeof(int),
554 .mode = 0644,
555 .proc_handler = &proc_dointvec
558 .ctl_name = NET_TCP_REORDERING,
559 .procname = "tcp_reordering",
560 .data = &sysctl_tcp_reordering,
561 .maxlen = sizeof(int),
562 .mode = 0644,
563 .proc_handler = &proc_dointvec
566 .ctl_name = NET_TCP_ECN,
567 .procname = "tcp_ecn",
568 .data = &sysctl_tcp_ecn,
569 .maxlen = sizeof(int),
570 .mode = 0644,
571 .proc_handler = &proc_dointvec
574 .ctl_name = NET_TCP_DSACK,
575 .procname = "tcp_dsack",
576 .data = &sysctl_tcp_dsack,
577 .maxlen = sizeof(int),
578 .mode = 0644,
579 .proc_handler = &proc_dointvec
582 .ctl_name = NET_TCP_MEM,
583 .procname = "tcp_mem",
584 .data = &sysctl_tcp_mem,
585 .maxlen = sizeof(sysctl_tcp_mem),
586 .mode = 0644,
587 .proc_handler = &proc_dointvec
590 .ctl_name = NET_TCP_WMEM,
591 .procname = "tcp_wmem",
592 .data = &sysctl_tcp_wmem,
593 .maxlen = sizeof(sysctl_tcp_wmem),
594 .mode = 0644,
595 .proc_handler = &proc_dointvec
598 .ctl_name = NET_TCP_RMEM,
599 .procname = "tcp_rmem",
600 .data = &sysctl_tcp_rmem,
601 .maxlen = sizeof(sysctl_tcp_rmem),
602 .mode = 0644,
603 .proc_handler = &proc_dointvec
606 .ctl_name = NET_TCP_APP_WIN,
607 .procname = "tcp_app_win",
608 .data = &sysctl_tcp_app_win,
609 .maxlen = sizeof(int),
610 .mode = 0644,
611 .proc_handler = &proc_dointvec
614 .ctl_name = NET_TCP_ADV_WIN_SCALE,
615 .procname = "tcp_adv_win_scale",
616 .data = &sysctl_tcp_adv_win_scale,
617 .maxlen = sizeof(int),
618 .mode = 0644,
619 .proc_handler = &proc_dointvec
622 .ctl_name = NET_IPV4_ICMP_RATELIMIT,
623 .procname = "icmp_ratelimit",
624 .data = &sysctl_icmp_ratelimit,
625 .maxlen = sizeof(int),
626 .mode = 0644,
627 .proc_handler = &proc_dointvec
630 .ctl_name = NET_IPV4_ICMP_RATEMASK,
631 .procname = "icmp_ratemask",
632 .data = &sysctl_icmp_ratemask,
633 .maxlen = sizeof(int),
634 .mode = 0644,
635 .proc_handler = &proc_dointvec
638 .ctl_name = NET_TCP_TW_REUSE,
639 .procname = "tcp_tw_reuse",
640 .data = &sysctl_tcp_tw_reuse,
641 .maxlen = sizeof(int),
642 .mode = 0644,
643 .proc_handler = &proc_dointvec
646 .ctl_name = NET_TCP_FRTO,
647 .procname = "tcp_frto",
648 .data = &sysctl_tcp_frto,
649 .maxlen = sizeof(int),
650 .mode = 0644,
651 .proc_handler = &proc_dointvec
654 .ctl_name = NET_TCP_LOW_LATENCY,
655 .procname = "tcp_low_latency",
656 .data = &sysctl_tcp_low_latency,
657 .maxlen = sizeof(int),
658 .mode = 0644,
659 .proc_handler = &proc_dointvec
662 .ctl_name = NET_IPV4_IPFRAG_SECRET_INTERVAL,
663 .procname = "ipfrag_secret_interval",
664 .data = &sysctl_ipfrag_secret_interval,
665 .maxlen = sizeof(int),
666 .mode = 0644,
667 .proc_handler = &proc_dointvec_jiffies,
668 .strategy = &sysctl_jiffies
671 .ctl_name = NET_IPV4_IPFRAG_MAX_DIST,
672 .procname = "ipfrag_max_dist",
673 .data = &sysctl_ipfrag_max_dist,
674 .maxlen = sizeof(int),
675 .mode = 0644,
676 .proc_handler = &proc_dointvec_minmax,
677 .extra1 = &zero
680 .ctl_name = NET_TCP_NO_METRICS_SAVE,
681 .procname = "tcp_no_metrics_save",
682 .data = &sysctl_tcp_nometrics_save,
683 .maxlen = sizeof(int),
684 .mode = 0644,
685 .proc_handler = &proc_dointvec,
688 .ctl_name = NET_TCP_MODERATE_RCVBUF,
689 .procname = "tcp_moderate_rcvbuf",
690 .data = &sysctl_tcp_moderate_rcvbuf,
691 .maxlen = sizeof(int),
692 .mode = 0644,
693 .proc_handler = &proc_dointvec,
696 .ctl_name = NET_TCP_TSO_WIN_DIVISOR,
697 .procname = "tcp_tso_win_divisor",
698 .data = &sysctl_tcp_tso_win_divisor,
699 .maxlen = sizeof(int),
700 .mode = 0644,
701 .proc_handler = &proc_dointvec,
704 .ctl_name = NET_TCP_CONG_CONTROL,
705 .procname = "tcp_congestion_control",
706 .mode = 0644,
707 .maxlen = TCP_CA_NAME_MAX,
708 .proc_handler = &proc_tcp_congestion_control,
709 .strategy = &sysctl_tcp_congestion_control,
712 .ctl_name = NET_TCP_ABC,
713 .procname = "tcp_abc",
714 .data = &sysctl_tcp_abc,
715 .maxlen = sizeof(int),
716 .mode = 0644,
717 .proc_handler = &proc_dointvec,
720 .ctl_name = NET_TCP_MTU_PROBING,
721 .procname = "tcp_mtu_probing",
722 .data = &sysctl_tcp_mtu_probing,
723 .maxlen = sizeof(int),
724 .mode = 0644,
725 .proc_handler = &proc_dointvec,
728 .ctl_name = NET_TCP_BASE_MSS,
729 .procname = "tcp_base_mss",
730 .data = &sysctl_tcp_base_mss,
731 .maxlen = sizeof(int),
732 .mode = 0644,
733 .proc_handler = &proc_dointvec,
736 .ctl_name = NET_IPV4_TCP_WORKAROUND_SIGNED_WINDOWS,
737 .procname = "tcp_workaround_signed_windows",
738 .data = &sysctl_tcp_workaround_signed_windows,
739 .maxlen = sizeof(int),
740 .mode = 0644,
741 .proc_handler = &proc_dointvec
743 #ifdef CONFIG_NET_DMA
745 .ctl_name = NET_TCP_DMA_COPYBREAK,
746 .procname = "tcp_dma_copybreak",
747 .data = &sysctl_tcp_dma_copybreak,
748 .maxlen = sizeof(int),
749 .mode = 0644,
750 .proc_handler = &proc_dointvec
752 #endif
754 .ctl_name = NET_TCP_SLOW_START_AFTER_IDLE,
755 .procname = "tcp_slow_start_after_idle",
756 .data = &sysctl_tcp_slow_start_after_idle,
757 .maxlen = sizeof(int),
758 .mode = 0644,
759 .proc_handler = &proc_dointvec
761 #ifdef CONFIG_NETLABEL
763 .ctl_name = NET_CIPSOV4_CACHE_ENABLE,
764 .procname = "cipso_cache_enable",
765 .data = &cipso_v4_cache_enabled,
766 .maxlen = sizeof(int),
767 .mode = 0644,
768 .proc_handler = &proc_dointvec,
771 .ctl_name = NET_CIPSOV4_CACHE_BUCKET_SIZE,
772 .procname = "cipso_cache_bucket_size",
773 .data = &cipso_v4_cache_bucketsize,
774 .maxlen = sizeof(int),
775 .mode = 0644,
776 .proc_handler = &proc_dointvec,
779 .ctl_name = NET_CIPSOV4_RBM_OPTFMT,
780 .procname = "cipso_rbm_optfmt",
781 .data = &cipso_v4_rbm_optfmt,
782 .maxlen = sizeof(int),
783 .mode = 0644,
784 .proc_handler = &proc_dointvec,
787 .ctl_name = NET_CIPSOV4_RBM_STRICTVALID,
788 .procname = "cipso_rbm_strictvalid",
789 .data = &cipso_v4_rbm_strictvalid,
790 .maxlen = sizeof(int),
791 .mode = 0644,
792 .proc_handler = &proc_dointvec,
794 #endif /* CONFIG_NETLABEL */
796 .ctl_name = NET_TCP_AVAIL_CONG_CONTROL,
797 .procname = "tcp_available_congestion_control",
798 .maxlen = TCP_CA_BUF_MAX,
799 .mode = 0444,
800 .proc_handler = &proc_tcp_available_congestion_control,
803 .ctl_name = NET_TCP_ALLOWED_CONG_CONTROL,
804 .procname = "tcp_allowed_congestion_control",
805 .maxlen = TCP_CA_BUF_MAX,
806 .mode = 0644,
807 .proc_handler = &proc_allowed_congestion_control,
808 .strategy = &strategy_allowed_congestion_control,
810 { .ctl_name = 0 }
813 #endif /* CONFIG_SYSCTL */
815 EXPORT_SYMBOL(ipv4_config);