2 * sysctl_net_ipv4.c: sysctl interface to net IPV4 subsystem.
4 * $Id: sysctl_net_ipv4.c,v 1.50 2001/10/20 00:00:11 davem Exp $
6 * Begun April 1, 1996, Mike Shaver.
7 * Added /proc/sys/net/ipv4 directory entry (empty =) ). [MS]
11 #include <linux/module.h>
12 #include <linux/sysctl.h>
13 #include <linux/igmp.h>
14 #include <linux/inetdevice.h>
15 #include <linux/seqlock.h>
19 #include <net/route.h>
21 #include <net/cipso_ipv4.h>
24 extern int sysctl_ip_nonlocal_bind
;
28 static int tcp_retr1_max
= 255;
29 static int ip_local_port_range_min
[] = { 1, 1 };
30 static int ip_local_port_range_max
[] = { 65535, 65535 };
33 struct ipv4_config ipv4_config
;
38 int ipv4_sysctl_forward(ctl_table
*ctl
, int write
, struct file
* filp
,
39 void __user
*buffer
, size_t *lenp
, loff_t
*ppos
)
41 int val
= IPV4_DEVCONF_ALL(FORWARDING
);
44 ret
= proc_dointvec(ctl
, write
, filp
, buffer
, lenp
, ppos
);
46 if (write
&& IPV4_DEVCONF_ALL(FORWARDING
) != val
)
47 inet_forward_change();
52 static int ipv4_sysctl_forward_strategy(ctl_table
*table
,
53 int __user
*name
, int nlen
,
54 void __user
*oldval
, size_t __user
*oldlenp
,
55 void __user
*newval
, size_t newlen
)
57 int *valp
= table
->data
;
60 if (!newval
|| !newlen
)
63 if (newlen
!= sizeof(int))
66 if (get_user(new, (int __user
*)newval
))
72 if (oldval
&& oldlenp
) {
75 if (get_user(len
, oldlenp
))
79 if (len
> table
->maxlen
)
81 if (copy_to_user(oldval
, valp
, len
))
83 if (put_user(len
, oldlenp
))
89 inet_forward_change();
93 extern seqlock_t sysctl_port_range_lock
;
94 extern int sysctl_local_port_range
[2];
96 /* Update system visible IP port range */
97 static void set_local_port_range(int range
[2])
99 write_seqlock(&sysctl_port_range_lock
);
100 sysctl_local_port_range
[0] = range
[0];
101 sysctl_local_port_range
[1] = range
[1];
102 write_sequnlock(&sysctl_port_range_lock
);
105 /* Validate changes from /proc interface. */
106 static int ipv4_local_port_range(ctl_table
*table
, int write
, struct file
*filp
,
108 size_t *lenp
, loff_t
*ppos
)
111 int range
[2] = { sysctl_local_port_range
[0],
112 sysctl_local_port_range
[1] };
115 .maxlen
= sizeof(range
),
117 .extra1
= &ip_local_port_range_min
,
118 .extra2
= &ip_local_port_range_max
,
121 ret
= proc_dointvec_minmax(&tmp
, write
, filp
, buffer
, lenp
, ppos
);
123 if (write
&& ret
== 0) {
124 if (range
[1] <= range
[0])
127 set_local_port_range(range
);
133 /* Validate changes from sysctl interface. */
134 static int ipv4_sysctl_local_port_range(ctl_table
*table
, int __user
*name
,
135 int nlen
, void __user
*oldval
,
136 size_t __user
*oldlenp
,
137 void __user
*newval
, size_t newlen
)
140 int range
[2] = { sysctl_local_port_range
[0],
141 sysctl_local_port_range
[1] };
144 .maxlen
= sizeof(range
),
146 .extra1
= &ip_local_port_range_min
,
147 .extra2
= &ip_local_port_range_max
,
150 ret
= sysctl_intvec(&tmp
, name
, nlen
, oldval
, oldlenp
, newval
, newlen
);
151 if (ret
== 0 && newval
&& newlen
) {
152 if (range
[1] <= range
[0])
155 set_local_port_range(range
);
161 static int proc_tcp_congestion_control(ctl_table
*ctl
, int write
, struct file
* filp
,
162 void __user
*buffer
, size_t *lenp
, loff_t
*ppos
)
164 char val
[TCP_CA_NAME_MAX
];
167 .maxlen
= TCP_CA_NAME_MAX
,
171 tcp_get_default_congestion_control(val
);
173 ret
= proc_dostring(&tbl
, write
, filp
, buffer
, lenp
, ppos
);
174 if (write
&& ret
== 0)
175 ret
= tcp_set_default_congestion_control(val
);
179 static int sysctl_tcp_congestion_control(ctl_table
*table
, int __user
*name
,
180 int nlen
, void __user
*oldval
,
181 size_t __user
*oldlenp
,
182 void __user
*newval
, size_t newlen
)
184 char val
[TCP_CA_NAME_MAX
];
187 .maxlen
= TCP_CA_NAME_MAX
,
191 tcp_get_default_congestion_control(val
);
192 ret
= sysctl_string(&tbl
, name
, nlen
, oldval
, oldlenp
, newval
, newlen
);
193 if (ret
== 0 && newval
&& newlen
)
194 ret
= tcp_set_default_congestion_control(val
);
198 static int proc_tcp_available_congestion_control(ctl_table
*ctl
,
199 int write
, struct file
* filp
,
200 void __user
*buffer
, size_t *lenp
,
203 ctl_table tbl
= { .maxlen
= TCP_CA_BUF_MAX
, };
206 tbl
.data
= kmalloc(tbl
.maxlen
, GFP_USER
);
209 tcp_get_available_congestion_control(tbl
.data
, TCP_CA_BUF_MAX
);
210 ret
= proc_dostring(&tbl
, write
, filp
, buffer
, lenp
, ppos
);
215 static int proc_allowed_congestion_control(ctl_table
*ctl
,
216 int write
, struct file
* filp
,
217 void __user
*buffer
, size_t *lenp
,
220 ctl_table tbl
= { .maxlen
= TCP_CA_BUF_MAX
};
223 tbl
.data
= kmalloc(tbl
.maxlen
, GFP_USER
);
227 tcp_get_allowed_congestion_control(tbl
.data
, tbl
.maxlen
);
228 ret
= proc_dostring(&tbl
, write
, filp
, buffer
, lenp
, ppos
);
229 if (write
&& ret
== 0)
230 ret
= tcp_set_allowed_congestion_control(tbl
.data
);
235 static int strategy_allowed_congestion_control(ctl_table
*table
, int __user
*name
,
236 int nlen
, void __user
*oldval
,
237 size_t __user
*oldlenp
,
241 ctl_table tbl
= { .maxlen
= TCP_CA_BUF_MAX
};
244 tbl
.data
= kmalloc(tbl
.maxlen
, GFP_USER
);
248 tcp_get_available_congestion_control(tbl
.data
, tbl
.maxlen
);
249 ret
= sysctl_string(&tbl
, name
, nlen
, oldval
, oldlenp
, newval
, newlen
);
250 if (ret
== 0 && newval
&& newlen
)
251 ret
= tcp_set_allowed_congestion_control(tbl
.data
);
258 ctl_table ipv4_table
[] = {
260 .ctl_name
= NET_IPV4_TCP_TIMESTAMPS
,
261 .procname
= "tcp_timestamps",
262 .data
= &sysctl_tcp_timestamps
,
263 .maxlen
= sizeof(int),
265 .proc_handler
= &proc_dointvec
268 .ctl_name
= NET_IPV4_TCP_WINDOW_SCALING
,
269 .procname
= "tcp_window_scaling",
270 .data
= &sysctl_tcp_window_scaling
,
271 .maxlen
= sizeof(int),
273 .proc_handler
= &proc_dointvec
276 .ctl_name
= NET_IPV4_TCP_SACK
,
277 .procname
= "tcp_sack",
278 .data
= &sysctl_tcp_sack
,
279 .maxlen
= sizeof(int),
281 .proc_handler
= &proc_dointvec
284 .ctl_name
= NET_IPV4_TCP_RETRANS_COLLAPSE
,
285 .procname
= "tcp_retrans_collapse",
286 .data
= &sysctl_tcp_retrans_collapse
,
287 .maxlen
= sizeof(int),
289 .proc_handler
= &proc_dointvec
292 .ctl_name
= NET_IPV4_FORWARD
,
293 .procname
= "ip_forward",
294 .data
= &IPV4_DEVCONF_ALL(FORWARDING
),
295 .maxlen
= sizeof(int),
297 .proc_handler
= &ipv4_sysctl_forward
,
298 .strategy
= &ipv4_sysctl_forward_strategy
301 .ctl_name
= NET_IPV4_DEFAULT_TTL
,
302 .procname
= "ip_default_ttl",
303 .data
= &sysctl_ip_default_ttl
,
304 .maxlen
= sizeof(int),
306 .proc_handler
= &ipv4_doint_and_flush
,
307 .strategy
= &ipv4_doint_and_flush_strategy
,
310 .ctl_name
= NET_IPV4_NO_PMTU_DISC
,
311 .procname
= "ip_no_pmtu_disc",
312 .data
= &ipv4_config
.no_pmtu_disc
,
313 .maxlen
= sizeof(int),
315 .proc_handler
= &proc_dointvec
318 .ctl_name
= NET_IPV4_NONLOCAL_BIND
,
319 .procname
= "ip_nonlocal_bind",
320 .data
= &sysctl_ip_nonlocal_bind
,
321 .maxlen
= sizeof(int),
323 .proc_handler
= &proc_dointvec
326 .ctl_name
= NET_IPV4_TCP_SYN_RETRIES
,
327 .procname
= "tcp_syn_retries",
328 .data
= &sysctl_tcp_syn_retries
,
329 .maxlen
= sizeof(int),
331 .proc_handler
= &proc_dointvec
334 .ctl_name
= NET_TCP_SYNACK_RETRIES
,
335 .procname
= "tcp_synack_retries",
336 .data
= &sysctl_tcp_synack_retries
,
337 .maxlen
= sizeof(int),
339 .proc_handler
= &proc_dointvec
342 .ctl_name
= NET_TCP_MAX_ORPHANS
,
343 .procname
= "tcp_max_orphans",
344 .data
= &sysctl_tcp_max_orphans
,
345 .maxlen
= sizeof(int),
347 .proc_handler
= &proc_dointvec
350 .ctl_name
= NET_TCP_MAX_TW_BUCKETS
,
351 .procname
= "tcp_max_tw_buckets",
352 .data
= &tcp_death_row
.sysctl_max_tw_buckets
,
353 .maxlen
= sizeof(int),
355 .proc_handler
= &proc_dointvec
358 .ctl_name
= NET_IPV4_IPFRAG_HIGH_THRESH
,
359 .procname
= "ipfrag_high_thresh",
360 .data
= &sysctl_ipfrag_high_thresh
,
361 .maxlen
= sizeof(int),
363 .proc_handler
= &proc_dointvec
366 .ctl_name
= NET_IPV4_IPFRAG_LOW_THRESH
,
367 .procname
= "ipfrag_low_thresh",
368 .data
= &sysctl_ipfrag_low_thresh
,
369 .maxlen
= sizeof(int),
371 .proc_handler
= &proc_dointvec
374 .ctl_name
= NET_IPV4_DYNADDR
,
375 .procname
= "ip_dynaddr",
376 .data
= &sysctl_ip_dynaddr
,
377 .maxlen
= sizeof(int),
379 .proc_handler
= &proc_dointvec
382 .ctl_name
= NET_IPV4_IPFRAG_TIME
,
383 .procname
= "ipfrag_time",
384 .data
= &sysctl_ipfrag_time
,
385 .maxlen
= sizeof(int),
387 .proc_handler
= &proc_dointvec_jiffies
,
388 .strategy
= &sysctl_jiffies
391 .ctl_name
= NET_IPV4_TCP_KEEPALIVE_TIME
,
392 .procname
= "tcp_keepalive_time",
393 .data
= &sysctl_tcp_keepalive_time
,
394 .maxlen
= sizeof(int),
396 .proc_handler
= &proc_dointvec_jiffies
,
397 .strategy
= &sysctl_jiffies
400 .ctl_name
= NET_IPV4_TCP_KEEPALIVE_PROBES
,
401 .procname
= "tcp_keepalive_probes",
402 .data
= &sysctl_tcp_keepalive_probes
,
403 .maxlen
= sizeof(int),
405 .proc_handler
= &proc_dointvec
408 .ctl_name
= NET_IPV4_TCP_KEEPALIVE_INTVL
,
409 .procname
= "tcp_keepalive_intvl",
410 .data
= &sysctl_tcp_keepalive_intvl
,
411 .maxlen
= sizeof(int),
413 .proc_handler
= &proc_dointvec_jiffies
,
414 .strategy
= &sysctl_jiffies
417 .ctl_name
= NET_IPV4_TCP_RETRIES1
,
418 .procname
= "tcp_retries1",
419 .data
= &sysctl_tcp_retries1
,
420 .maxlen
= sizeof(int),
422 .proc_handler
= &proc_dointvec_minmax
,
423 .strategy
= &sysctl_intvec
,
424 .extra2
= &tcp_retr1_max
427 .ctl_name
= NET_IPV4_TCP_RETRIES2
,
428 .procname
= "tcp_retries2",
429 .data
= &sysctl_tcp_retries2
,
430 .maxlen
= sizeof(int),
432 .proc_handler
= &proc_dointvec
435 .ctl_name
= NET_IPV4_TCP_FIN_TIMEOUT
,
436 .procname
= "tcp_fin_timeout",
437 .data
= &sysctl_tcp_fin_timeout
,
438 .maxlen
= sizeof(int),
440 .proc_handler
= &proc_dointvec_jiffies
,
441 .strategy
= &sysctl_jiffies
443 #ifdef CONFIG_SYN_COOKIES
445 .ctl_name
= NET_TCP_SYNCOOKIES
,
446 .procname
= "tcp_syncookies",
447 .data
= &sysctl_tcp_syncookies
,
448 .maxlen
= sizeof(int),
450 .proc_handler
= &proc_dointvec
454 .ctl_name
= NET_TCP_TW_RECYCLE
,
455 .procname
= "tcp_tw_recycle",
456 .data
= &tcp_death_row
.sysctl_tw_recycle
,
457 .maxlen
= sizeof(int),
459 .proc_handler
= &proc_dointvec
462 .ctl_name
= NET_TCP_ABORT_ON_OVERFLOW
,
463 .procname
= "tcp_abort_on_overflow",
464 .data
= &sysctl_tcp_abort_on_overflow
,
465 .maxlen
= sizeof(int),
467 .proc_handler
= &proc_dointvec
470 .ctl_name
= NET_TCP_STDURG
,
471 .procname
= "tcp_stdurg",
472 .data
= &sysctl_tcp_stdurg
,
473 .maxlen
= sizeof(int),
475 .proc_handler
= &proc_dointvec
478 .ctl_name
= NET_TCP_RFC1337
,
479 .procname
= "tcp_rfc1337",
480 .data
= &sysctl_tcp_rfc1337
,
481 .maxlen
= sizeof(int),
483 .proc_handler
= &proc_dointvec
486 .ctl_name
= NET_TCP_MAX_SYN_BACKLOG
,
487 .procname
= "tcp_max_syn_backlog",
488 .data
= &sysctl_max_syn_backlog
,
489 .maxlen
= sizeof(int),
491 .proc_handler
= &proc_dointvec
494 .ctl_name
= NET_IPV4_LOCAL_PORT_RANGE
,
495 .procname
= "ip_local_port_range",
496 .data
= &sysctl_local_port_range
,
497 .maxlen
= sizeof(sysctl_local_port_range
),
499 .proc_handler
= &ipv4_local_port_range
,
500 .strategy
= &ipv4_sysctl_local_port_range
,
503 .ctl_name
= NET_IPV4_ICMP_ECHO_IGNORE_ALL
,
504 .procname
= "icmp_echo_ignore_all",
505 .data
= &sysctl_icmp_echo_ignore_all
,
506 .maxlen
= sizeof(int),
508 .proc_handler
= &proc_dointvec
511 .ctl_name
= NET_IPV4_ICMP_ECHO_IGNORE_BROADCASTS
,
512 .procname
= "icmp_echo_ignore_broadcasts",
513 .data
= &sysctl_icmp_echo_ignore_broadcasts
,
514 .maxlen
= sizeof(int),
516 .proc_handler
= &proc_dointvec
519 .ctl_name
= NET_IPV4_ICMP_IGNORE_BOGUS_ERROR_RESPONSES
,
520 .procname
= "icmp_ignore_bogus_error_responses",
521 .data
= &sysctl_icmp_ignore_bogus_error_responses
,
522 .maxlen
= sizeof(int),
524 .proc_handler
= &proc_dointvec
527 .ctl_name
= NET_IPV4_ICMP_ERRORS_USE_INBOUND_IFADDR
,
528 .procname
= "icmp_errors_use_inbound_ifaddr",
529 .data
= &sysctl_icmp_errors_use_inbound_ifaddr
,
530 .maxlen
= sizeof(int),
532 .proc_handler
= &proc_dointvec
535 .ctl_name
= NET_IPV4_ROUTE
,
539 .child
= ipv4_route_table
541 #ifdef CONFIG_IP_MULTICAST
543 .ctl_name
= NET_IPV4_IGMP_MAX_MEMBERSHIPS
,
544 .procname
= "igmp_max_memberships",
545 .data
= &sysctl_igmp_max_memberships
,
546 .maxlen
= sizeof(int),
548 .proc_handler
= &proc_dointvec
553 .ctl_name
= NET_IPV4_IGMP_MAX_MSF
,
554 .procname
= "igmp_max_msf",
555 .data
= &sysctl_igmp_max_msf
,
556 .maxlen
= sizeof(int),
558 .proc_handler
= &proc_dointvec
561 .ctl_name
= NET_IPV4_INET_PEER_THRESHOLD
,
562 .procname
= "inet_peer_threshold",
563 .data
= &inet_peer_threshold
,
564 .maxlen
= sizeof(int),
566 .proc_handler
= &proc_dointvec
569 .ctl_name
= NET_IPV4_INET_PEER_MINTTL
,
570 .procname
= "inet_peer_minttl",
571 .data
= &inet_peer_minttl
,
572 .maxlen
= sizeof(int),
574 .proc_handler
= &proc_dointvec_jiffies
,
575 .strategy
= &sysctl_jiffies
578 .ctl_name
= NET_IPV4_INET_PEER_MAXTTL
,
579 .procname
= "inet_peer_maxttl",
580 .data
= &inet_peer_maxttl
,
581 .maxlen
= sizeof(int),
583 .proc_handler
= &proc_dointvec_jiffies
,
584 .strategy
= &sysctl_jiffies
587 .ctl_name
= NET_IPV4_INET_PEER_GC_MINTIME
,
588 .procname
= "inet_peer_gc_mintime",
589 .data
= &inet_peer_gc_mintime
,
590 .maxlen
= sizeof(int),
592 .proc_handler
= &proc_dointvec_jiffies
,
593 .strategy
= &sysctl_jiffies
596 .ctl_name
= NET_IPV4_INET_PEER_GC_MAXTIME
,
597 .procname
= "inet_peer_gc_maxtime",
598 .data
= &inet_peer_gc_maxtime
,
599 .maxlen
= sizeof(int),
601 .proc_handler
= &proc_dointvec_jiffies
,
602 .strategy
= &sysctl_jiffies
605 .ctl_name
= NET_TCP_ORPHAN_RETRIES
,
606 .procname
= "tcp_orphan_retries",
607 .data
= &sysctl_tcp_orphan_retries
,
608 .maxlen
= sizeof(int),
610 .proc_handler
= &proc_dointvec
613 .ctl_name
= NET_TCP_FACK
,
614 .procname
= "tcp_fack",
615 .data
= &sysctl_tcp_fack
,
616 .maxlen
= sizeof(int),
618 .proc_handler
= &proc_dointvec
621 .ctl_name
= NET_TCP_REORDERING
,
622 .procname
= "tcp_reordering",
623 .data
= &sysctl_tcp_reordering
,
624 .maxlen
= sizeof(int),
626 .proc_handler
= &proc_dointvec
629 .ctl_name
= NET_TCP_ECN
,
630 .procname
= "tcp_ecn",
631 .data
= &sysctl_tcp_ecn
,
632 .maxlen
= sizeof(int),
634 .proc_handler
= &proc_dointvec
637 .ctl_name
= NET_TCP_DSACK
,
638 .procname
= "tcp_dsack",
639 .data
= &sysctl_tcp_dsack
,
640 .maxlen
= sizeof(int),
642 .proc_handler
= &proc_dointvec
645 .ctl_name
= NET_TCP_MEM
,
646 .procname
= "tcp_mem",
647 .data
= &sysctl_tcp_mem
,
648 .maxlen
= sizeof(sysctl_tcp_mem
),
650 .proc_handler
= &proc_dointvec
653 .ctl_name
= NET_TCP_WMEM
,
654 .procname
= "tcp_wmem",
655 .data
= &sysctl_tcp_wmem
,
656 .maxlen
= sizeof(sysctl_tcp_wmem
),
658 .proc_handler
= &proc_dointvec
661 .ctl_name
= NET_TCP_RMEM
,
662 .procname
= "tcp_rmem",
663 .data
= &sysctl_tcp_rmem
,
664 .maxlen
= sizeof(sysctl_tcp_rmem
),
666 .proc_handler
= &proc_dointvec
669 .ctl_name
= NET_TCP_APP_WIN
,
670 .procname
= "tcp_app_win",
671 .data
= &sysctl_tcp_app_win
,
672 .maxlen
= sizeof(int),
674 .proc_handler
= &proc_dointvec
677 .ctl_name
= NET_TCP_ADV_WIN_SCALE
,
678 .procname
= "tcp_adv_win_scale",
679 .data
= &sysctl_tcp_adv_win_scale
,
680 .maxlen
= sizeof(int),
682 .proc_handler
= &proc_dointvec
685 .ctl_name
= NET_IPV4_ICMP_RATELIMIT
,
686 .procname
= "icmp_ratelimit",
687 .data
= &sysctl_icmp_ratelimit
,
688 .maxlen
= sizeof(int),
690 .proc_handler
= &proc_dointvec
693 .ctl_name
= NET_IPV4_ICMP_RATEMASK
,
694 .procname
= "icmp_ratemask",
695 .data
= &sysctl_icmp_ratemask
,
696 .maxlen
= sizeof(int),
698 .proc_handler
= &proc_dointvec
701 .ctl_name
= NET_TCP_TW_REUSE
,
702 .procname
= "tcp_tw_reuse",
703 .data
= &sysctl_tcp_tw_reuse
,
704 .maxlen
= sizeof(int),
706 .proc_handler
= &proc_dointvec
709 .ctl_name
= NET_TCP_FRTO
,
710 .procname
= "tcp_frto",
711 .data
= &sysctl_tcp_frto
,
712 .maxlen
= sizeof(int),
714 .proc_handler
= &proc_dointvec
717 .ctl_name
= NET_TCP_FRTO_RESPONSE
,
718 .procname
= "tcp_frto_response",
719 .data
= &sysctl_tcp_frto_response
,
720 .maxlen
= sizeof(int),
722 .proc_handler
= &proc_dointvec
725 .ctl_name
= NET_TCP_LOW_LATENCY
,
726 .procname
= "tcp_low_latency",
727 .data
= &sysctl_tcp_low_latency
,
728 .maxlen
= sizeof(int),
730 .proc_handler
= &proc_dointvec
733 .ctl_name
= NET_IPV4_IPFRAG_SECRET_INTERVAL
,
734 .procname
= "ipfrag_secret_interval",
735 .data
= &sysctl_ipfrag_secret_interval
,
736 .maxlen
= sizeof(int),
738 .proc_handler
= &proc_dointvec_jiffies
,
739 .strategy
= &sysctl_jiffies
742 .ctl_name
= NET_IPV4_IPFRAG_MAX_DIST
,
743 .procname
= "ipfrag_max_dist",
744 .data
= &sysctl_ipfrag_max_dist
,
745 .maxlen
= sizeof(int),
747 .proc_handler
= &proc_dointvec_minmax
,
751 .ctl_name
= NET_TCP_NO_METRICS_SAVE
,
752 .procname
= "tcp_no_metrics_save",
753 .data
= &sysctl_tcp_nometrics_save
,
754 .maxlen
= sizeof(int),
756 .proc_handler
= &proc_dointvec
,
759 .ctl_name
= NET_TCP_MODERATE_RCVBUF
,
760 .procname
= "tcp_moderate_rcvbuf",
761 .data
= &sysctl_tcp_moderate_rcvbuf
,
762 .maxlen
= sizeof(int),
764 .proc_handler
= &proc_dointvec
,
767 .ctl_name
= NET_TCP_TSO_WIN_DIVISOR
,
768 .procname
= "tcp_tso_win_divisor",
769 .data
= &sysctl_tcp_tso_win_divisor
,
770 .maxlen
= sizeof(int),
772 .proc_handler
= &proc_dointvec
,
775 .ctl_name
= NET_TCP_CONG_CONTROL
,
776 .procname
= "tcp_congestion_control",
778 .maxlen
= TCP_CA_NAME_MAX
,
779 .proc_handler
= &proc_tcp_congestion_control
,
780 .strategy
= &sysctl_tcp_congestion_control
,
783 .ctl_name
= NET_TCP_ABC
,
784 .procname
= "tcp_abc",
785 .data
= &sysctl_tcp_abc
,
786 .maxlen
= sizeof(int),
788 .proc_handler
= &proc_dointvec
,
791 .ctl_name
= NET_TCP_MTU_PROBING
,
792 .procname
= "tcp_mtu_probing",
793 .data
= &sysctl_tcp_mtu_probing
,
794 .maxlen
= sizeof(int),
796 .proc_handler
= &proc_dointvec
,
799 .ctl_name
= NET_TCP_BASE_MSS
,
800 .procname
= "tcp_base_mss",
801 .data
= &sysctl_tcp_base_mss
,
802 .maxlen
= sizeof(int),
804 .proc_handler
= &proc_dointvec
,
807 .ctl_name
= NET_IPV4_TCP_WORKAROUND_SIGNED_WINDOWS
,
808 .procname
= "tcp_workaround_signed_windows",
809 .data
= &sysctl_tcp_workaround_signed_windows
,
810 .maxlen
= sizeof(int),
812 .proc_handler
= &proc_dointvec
814 #ifdef CONFIG_NET_DMA
816 .ctl_name
= NET_TCP_DMA_COPYBREAK
,
817 .procname
= "tcp_dma_copybreak",
818 .data
= &sysctl_tcp_dma_copybreak
,
819 .maxlen
= sizeof(int),
821 .proc_handler
= &proc_dointvec
825 .ctl_name
= NET_TCP_SLOW_START_AFTER_IDLE
,
826 .procname
= "tcp_slow_start_after_idle",
827 .data
= &sysctl_tcp_slow_start_after_idle
,
828 .maxlen
= sizeof(int),
830 .proc_handler
= &proc_dointvec
832 #ifdef CONFIG_NETLABEL
834 .ctl_name
= NET_CIPSOV4_CACHE_ENABLE
,
835 .procname
= "cipso_cache_enable",
836 .data
= &cipso_v4_cache_enabled
,
837 .maxlen
= sizeof(int),
839 .proc_handler
= &proc_dointvec
,
842 .ctl_name
= NET_CIPSOV4_CACHE_BUCKET_SIZE
,
843 .procname
= "cipso_cache_bucket_size",
844 .data
= &cipso_v4_cache_bucketsize
,
845 .maxlen
= sizeof(int),
847 .proc_handler
= &proc_dointvec
,
850 .ctl_name
= NET_CIPSOV4_RBM_OPTFMT
,
851 .procname
= "cipso_rbm_optfmt",
852 .data
= &cipso_v4_rbm_optfmt
,
853 .maxlen
= sizeof(int),
855 .proc_handler
= &proc_dointvec
,
858 .ctl_name
= NET_CIPSOV4_RBM_STRICTVALID
,
859 .procname
= "cipso_rbm_strictvalid",
860 .data
= &cipso_v4_rbm_strictvalid
,
861 .maxlen
= sizeof(int),
863 .proc_handler
= &proc_dointvec
,
865 #endif /* CONFIG_NETLABEL */
867 .ctl_name
= NET_TCP_AVAIL_CONG_CONTROL
,
868 .procname
= "tcp_available_congestion_control",
869 .maxlen
= TCP_CA_BUF_MAX
,
871 .proc_handler
= &proc_tcp_available_congestion_control
,
874 .ctl_name
= NET_TCP_ALLOWED_CONG_CONTROL
,
875 .procname
= "tcp_allowed_congestion_control",
876 .maxlen
= TCP_CA_BUF_MAX
,
878 .proc_handler
= &proc_allowed_congestion_control
,
879 .strategy
= &strategy_allowed_congestion_control
,
882 .ctl_name
= NET_TCP_MAX_SSTHRESH
,
883 .procname
= "tcp_max_ssthresh",
884 .data
= &sysctl_tcp_max_ssthresh
,
885 .maxlen
= sizeof(int),
887 .proc_handler
= &proc_dointvec
,
892 #endif /* CONFIG_SYSCTL */
894 EXPORT_SYMBOL(ipv4_config
);