]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/ipv4/sysctl_net_ipv4.c
[I/OAT]: Make sk_eat_skb I/OAT aware.
[net-next-2.6.git] / net / ipv4 / sysctl_net_ipv4.c
CommitLineData
1da177e4
LT
1/*
2 * sysctl_net_ipv4.c: sysctl interface to net IPV4 subsystem.
3 *
4 * $Id: sysctl_net_ipv4.c,v 1.50 2001/10/20 00:00:11 davem Exp $
5 *
6 * Begun April 1, 1996, Mike Shaver.
7 * Added /proc/sys/net/ipv4 directory entry (empty =) ). [MS]
8 */
9
10#include <linux/mm.h>
11#include <linux/module.h>
12#include <linux/sysctl.h>
13#include <linux/config.h>
20380731 14#include <linux/igmp.h>
14c85021 15#include <linux/inetdevice.h>
1da177e4 16#include <net/snmp.h>
20380731 17#include <net/icmp.h>
1da177e4
LT
18#include <net/ip.h>
19#include <net/route.h>
20#include <net/tcp.h>
21
22/* From af_inet.c */
23extern int sysctl_ip_nonlocal_bind;
24
1da177e4 25#ifdef CONFIG_SYSCTL
89cee8b1 26static int zero;
1da177e4
LT
27static int tcp_retr1_max = 255;
28static int ip_local_port_range_min[] = { 1, 1 };
29static int ip_local_port_range_max[] = { 65535, 65535 };
30#endif
31
32struct ipv4_config ipv4_config;
33
1da177e4
LT
34#ifdef CONFIG_SYSCTL
35
36static
37int ipv4_sysctl_forward(ctl_table *ctl, int write, struct file * filp,
38 void __user *buffer, size_t *lenp, loff_t *ppos)
39{
40 int val = ipv4_devconf.forwarding;
41 int ret;
42
43 ret = proc_dointvec(ctl, write, filp, buffer, lenp, ppos);
44
45 if (write && ipv4_devconf.forwarding != val)
46 inet_forward_change();
47
48 return ret;
49}
50
51static int ipv4_sysctl_forward_strategy(ctl_table *table,
52 int __user *name, int nlen,
53 void __user *oldval, size_t __user *oldlenp,
54 void __user *newval, size_t newlen,
55 void **context)
56{
57 int *valp = table->data;
58 int new;
59
60 if (!newval || !newlen)
61 return 0;
62
63 if (newlen != sizeof(int))
64 return -EINVAL;
65
66 if (get_user(new, (int __user *)newval))
67 return -EFAULT;
68
69 if (new == *valp)
70 return 0;
71
72 if (oldval && oldlenp) {
73 size_t len;
74
75 if (get_user(len, oldlenp))
76 return -EFAULT;
77
78 if (len) {
79 if (len > table->maxlen)
80 len = table->maxlen;
81 if (copy_to_user(oldval, valp, len))
82 return -EFAULT;
83 if (put_user(len, oldlenp))
84 return -EFAULT;
85 }
86 }
87
88 *valp = new;
89 inet_forward_change();
90 return 1;
91}
92
317a76f9
SH
93static int proc_tcp_congestion_control(ctl_table *ctl, int write, struct file * filp,
94 void __user *buffer, size_t *lenp, loff_t *ppos)
95{
96 char val[TCP_CA_NAME_MAX];
97 ctl_table tbl = {
98 .data = val,
99 .maxlen = TCP_CA_NAME_MAX,
100 };
101 int ret;
102
103 tcp_get_default_congestion_control(val);
104
105 ret = proc_dostring(&tbl, write, filp, buffer, lenp, ppos);
106 if (write && ret == 0)
107 ret = tcp_set_default_congestion_control(val);
108 return ret;
109}
110
20380731
ACM
111static int sysctl_tcp_congestion_control(ctl_table *table, int __user *name,
112 int nlen, void __user *oldval,
113 size_t __user *oldlenp,
114 void __user *newval, size_t newlen,
115 void **context)
317a76f9
SH
116{
117 char val[TCP_CA_NAME_MAX];
118 ctl_table tbl = {
119 .data = val,
120 .maxlen = TCP_CA_NAME_MAX,
121 };
122 int ret;
123
124 tcp_get_default_congestion_control(val);
125 ret = sysctl_string(&tbl, name, nlen, oldval, oldlenp, newval, newlen,
126 context);
127 if (ret == 0 && newval && newlen)
128 ret = tcp_set_default_congestion_control(val);
129 return ret;
130}
131
132
1da177e4
LT
133ctl_table ipv4_table[] = {
134 {
135 .ctl_name = NET_IPV4_TCP_TIMESTAMPS,
136 .procname = "tcp_timestamps",
137 .data = &sysctl_tcp_timestamps,
138 .maxlen = sizeof(int),
139 .mode = 0644,
140 .proc_handler = &proc_dointvec
141 },
142 {
143 .ctl_name = NET_IPV4_TCP_WINDOW_SCALING,
144 .procname = "tcp_window_scaling",
145 .data = &sysctl_tcp_window_scaling,
146 .maxlen = sizeof(int),
147 .mode = 0644,
148 .proc_handler = &proc_dointvec
149 },
150 {
151 .ctl_name = NET_IPV4_TCP_SACK,
152 .procname = "tcp_sack",
153 .data = &sysctl_tcp_sack,
154 .maxlen = sizeof(int),
155 .mode = 0644,
156 .proc_handler = &proc_dointvec
157 },
158 {
159 .ctl_name = NET_IPV4_TCP_RETRANS_COLLAPSE,
160 .procname = "tcp_retrans_collapse",
161 .data = &sysctl_tcp_retrans_collapse,
162 .maxlen = sizeof(int),
163 .mode = 0644,
164 .proc_handler = &proc_dointvec
165 },
166 {
167 .ctl_name = NET_IPV4_FORWARD,
168 .procname = "ip_forward",
169 .data = &ipv4_devconf.forwarding,
170 .maxlen = sizeof(int),
171 .mode = 0644,
172 .proc_handler = &ipv4_sysctl_forward,
173 .strategy = &ipv4_sysctl_forward_strategy
174 },
175 {
176 .ctl_name = NET_IPV4_DEFAULT_TTL,
177 .procname = "ip_default_ttl",
178 .data = &sysctl_ip_default_ttl,
179 .maxlen = sizeof(int),
180 .mode = 0644,
181 .proc_handler = &ipv4_doint_and_flush,
182 .strategy = &ipv4_doint_and_flush_strategy,
183 },
184 {
185 .ctl_name = NET_IPV4_AUTOCONFIG,
186 .procname = "ip_autoconfig",
187 .data = &ipv4_config.autoconfig,
188 .maxlen = sizeof(int),
189 .mode = 0644,
190 .proc_handler = &proc_dointvec
191 },
192 {
193 .ctl_name = NET_IPV4_NO_PMTU_DISC,
194 .procname = "ip_no_pmtu_disc",
195 .data = &ipv4_config.no_pmtu_disc,
196 .maxlen = sizeof(int),
197 .mode = 0644,
198 .proc_handler = &proc_dointvec
199 },
200 {
201 .ctl_name = NET_IPV4_NONLOCAL_BIND,
202 .procname = "ip_nonlocal_bind",
203 .data = &sysctl_ip_nonlocal_bind,
204 .maxlen = sizeof(int),
205 .mode = 0644,
206 .proc_handler = &proc_dointvec
207 },
208 {
209 .ctl_name = NET_IPV4_TCP_SYN_RETRIES,
210 .procname = "tcp_syn_retries",
211 .data = &sysctl_tcp_syn_retries,
212 .maxlen = sizeof(int),
213 .mode = 0644,
214 .proc_handler = &proc_dointvec
215 },
216 {
217 .ctl_name = NET_TCP_SYNACK_RETRIES,
218 .procname = "tcp_synack_retries",
219 .data = &sysctl_tcp_synack_retries,
220 .maxlen = sizeof(int),
221 .mode = 0644,
222 .proc_handler = &proc_dointvec
223 },
224 {
225 .ctl_name = NET_TCP_MAX_ORPHANS,
226 .procname = "tcp_max_orphans",
227 .data = &sysctl_tcp_max_orphans,
228 .maxlen = sizeof(int),
229 .mode = 0644,
230 .proc_handler = &proc_dointvec
231 },
232 {
233 .ctl_name = NET_TCP_MAX_TW_BUCKETS,
234 .procname = "tcp_max_tw_buckets",
295ff7ed 235 .data = &tcp_death_row.sysctl_max_tw_buckets,
1da177e4
LT
236 .maxlen = sizeof(int),
237 .mode = 0644,
238 .proc_handler = &proc_dointvec
239 },
240 {
241 .ctl_name = NET_IPV4_IPFRAG_HIGH_THRESH,
242 .procname = "ipfrag_high_thresh",
243 .data = &sysctl_ipfrag_high_thresh,
244 .maxlen = sizeof(int),
245 .mode = 0644,
246 .proc_handler = &proc_dointvec
247 },
248 {
249 .ctl_name = NET_IPV4_IPFRAG_LOW_THRESH,
250 .procname = "ipfrag_low_thresh",
251 .data = &sysctl_ipfrag_low_thresh,
252 .maxlen = sizeof(int),
253 .mode = 0644,
254 .proc_handler = &proc_dointvec
255 },
256 {
257 .ctl_name = NET_IPV4_DYNADDR,
258 .procname = "ip_dynaddr",
259 .data = &sysctl_ip_dynaddr,
260 .maxlen = sizeof(int),
261 .mode = 0644,
262 .proc_handler = &proc_dointvec
263 },
264 {
265 .ctl_name = NET_IPV4_IPFRAG_TIME,
266 .procname = "ipfrag_time",
267 .data = &sysctl_ipfrag_time,
268 .maxlen = sizeof(int),
269 .mode = 0644,
270 .proc_handler = &proc_dointvec_jiffies,
271 .strategy = &sysctl_jiffies
272 },
273 {
274 .ctl_name = NET_IPV4_TCP_KEEPALIVE_TIME,
275 .procname = "tcp_keepalive_time",
276 .data = &sysctl_tcp_keepalive_time,
277 .maxlen = sizeof(int),
278 .mode = 0644,
279 .proc_handler = &proc_dointvec_jiffies,
280 .strategy = &sysctl_jiffies
281 },
282 {
283 .ctl_name = NET_IPV4_TCP_KEEPALIVE_PROBES,
284 .procname = "tcp_keepalive_probes",
285 .data = &sysctl_tcp_keepalive_probes,
286 .maxlen = sizeof(int),
287 .mode = 0644,
288 .proc_handler = &proc_dointvec
289 },
290 {
291 .ctl_name = NET_IPV4_TCP_KEEPALIVE_INTVL,
292 .procname = "tcp_keepalive_intvl",
293 .data = &sysctl_tcp_keepalive_intvl,
294 .maxlen = sizeof(int),
295 .mode = 0644,
296 .proc_handler = &proc_dointvec_jiffies,
297 .strategy = &sysctl_jiffies
298 },
299 {
300 .ctl_name = NET_IPV4_TCP_RETRIES1,
301 .procname = "tcp_retries1",
302 .data = &sysctl_tcp_retries1,
303 .maxlen = sizeof(int),
304 .mode = 0644,
305 .proc_handler = &proc_dointvec_minmax,
306 .strategy = &sysctl_intvec,
307 .extra2 = &tcp_retr1_max
308 },
309 {
310 .ctl_name = NET_IPV4_TCP_RETRIES2,
311 .procname = "tcp_retries2",
312 .data = &sysctl_tcp_retries2,
313 .maxlen = sizeof(int),
314 .mode = 0644,
315 .proc_handler = &proc_dointvec
316 },
317 {
318 .ctl_name = NET_IPV4_TCP_FIN_TIMEOUT,
319 .procname = "tcp_fin_timeout",
320 .data = &sysctl_tcp_fin_timeout,
321 .maxlen = sizeof(int),
322 .mode = 0644,
323 .proc_handler = &proc_dointvec_jiffies,
324 .strategy = &sysctl_jiffies
325 },
326#ifdef CONFIG_SYN_COOKIES
327 {
328 .ctl_name = NET_TCP_SYNCOOKIES,
329 .procname = "tcp_syncookies",
330 .data = &sysctl_tcp_syncookies,
331 .maxlen = sizeof(int),
332 .mode = 0644,
333 .proc_handler = &proc_dointvec
334 },
335#endif
336 {
337 .ctl_name = NET_TCP_TW_RECYCLE,
338 .procname = "tcp_tw_recycle",
295ff7ed 339 .data = &tcp_death_row.sysctl_tw_recycle,
1da177e4
LT
340 .maxlen = sizeof(int),
341 .mode = 0644,
342 .proc_handler = &proc_dointvec
343 },
344 {
345 .ctl_name = NET_TCP_ABORT_ON_OVERFLOW,
346 .procname = "tcp_abort_on_overflow",
347 .data = &sysctl_tcp_abort_on_overflow,
348 .maxlen = sizeof(int),
349 .mode = 0644,
350 .proc_handler = &proc_dointvec
351 },
352 {
353 .ctl_name = NET_TCP_STDURG,
354 .procname = "tcp_stdurg",
355 .data = &sysctl_tcp_stdurg,
356 .maxlen = sizeof(int),
357 .mode = 0644,
358 .proc_handler = &proc_dointvec
359 },
360 {
361 .ctl_name = NET_TCP_RFC1337,
362 .procname = "tcp_rfc1337",
363 .data = &sysctl_tcp_rfc1337,
364 .maxlen = sizeof(int),
365 .mode = 0644,
366 .proc_handler = &proc_dointvec
367 },
368 {
369 .ctl_name = NET_TCP_MAX_SYN_BACKLOG,
370 .procname = "tcp_max_syn_backlog",
371 .data = &sysctl_max_syn_backlog,
372 .maxlen = sizeof(int),
373 .mode = 0644,
374 .proc_handler = &proc_dointvec
375 },
376 {
377 .ctl_name = NET_IPV4_LOCAL_PORT_RANGE,
378 .procname = "ip_local_port_range",
379 .data = &sysctl_local_port_range,
380 .maxlen = sizeof(sysctl_local_port_range),
381 .mode = 0644,
382 .proc_handler = &proc_dointvec_minmax,
383 .strategy = &sysctl_intvec,
384 .extra1 = ip_local_port_range_min,
385 .extra2 = ip_local_port_range_max
386 },
387 {
388 .ctl_name = NET_IPV4_ICMP_ECHO_IGNORE_ALL,
389 .procname = "icmp_echo_ignore_all",
390 .data = &sysctl_icmp_echo_ignore_all,
391 .maxlen = sizeof(int),
392 .mode = 0644,
393 .proc_handler = &proc_dointvec
394 },
395 {
396 .ctl_name = NET_IPV4_ICMP_ECHO_IGNORE_BROADCASTS,
397 .procname = "icmp_echo_ignore_broadcasts",
398 .data = &sysctl_icmp_echo_ignore_broadcasts,
399 .maxlen = sizeof(int),
400 .mode = 0644,
401 .proc_handler = &proc_dointvec
402 },
403 {
404 .ctl_name = NET_IPV4_ICMP_IGNORE_BOGUS_ERROR_RESPONSES,
405 .procname = "icmp_ignore_bogus_error_responses",
406 .data = &sysctl_icmp_ignore_bogus_error_responses,
407 .maxlen = sizeof(int),
408 .mode = 0644,
409 .proc_handler = &proc_dointvec
410 },
1c2fb7f9
S
411 {
412 .ctl_name = NET_IPV4_ICMP_ERRORS_USE_INBOUND_IFADDR,
413 .procname = "icmp_errors_use_inbound_ifaddr",
414 .data = &sysctl_icmp_errors_use_inbound_ifaddr,
415 .maxlen = sizeof(int),
416 .mode = 0644,
417 .proc_handler = &proc_dointvec
418 },
1da177e4
LT
419 {
420 .ctl_name = NET_IPV4_ROUTE,
421 .procname = "route",
422 .maxlen = 0,
423 .mode = 0555,
424 .child = ipv4_route_table
425 },
426#ifdef CONFIG_IP_MULTICAST
427 {
428 .ctl_name = NET_IPV4_IGMP_MAX_MEMBERSHIPS,
429 .procname = "igmp_max_memberships",
430 .data = &sysctl_igmp_max_memberships,
431 .maxlen = sizeof(int),
432 .mode = 0644,
433 .proc_handler = &proc_dointvec
434 },
435
436#endif
437 {
438 .ctl_name = NET_IPV4_IGMP_MAX_MSF,
439 .procname = "igmp_max_msf",
440 .data = &sysctl_igmp_max_msf,
441 .maxlen = sizeof(int),
442 .mode = 0644,
443 .proc_handler = &proc_dointvec
444 },
445 {
446 .ctl_name = NET_IPV4_INET_PEER_THRESHOLD,
447 .procname = "inet_peer_threshold",
448 .data = &inet_peer_threshold,
449 .maxlen = sizeof(int),
450 .mode = 0644,
451 .proc_handler = &proc_dointvec
452 },
453 {
454 .ctl_name = NET_IPV4_INET_PEER_MINTTL,
455 .procname = "inet_peer_minttl",
456 .data = &inet_peer_minttl,
457 .maxlen = sizeof(int),
458 .mode = 0644,
459 .proc_handler = &proc_dointvec_jiffies,
460 .strategy = &sysctl_jiffies
461 },
462 {
463 .ctl_name = NET_IPV4_INET_PEER_MAXTTL,
464 .procname = "inet_peer_maxttl",
465 .data = &inet_peer_maxttl,
466 .maxlen = sizeof(int),
467 .mode = 0644,
468 .proc_handler = &proc_dointvec_jiffies,
469 .strategy = &sysctl_jiffies
470 },
471 {
472 .ctl_name = NET_IPV4_INET_PEER_GC_MINTIME,
473 .procname = "inet_peer_gc_mintime",
474 .data = &inet_peer_gc_mintime,
475 .maxlen = sizeof(int),
476 .mode = 0644,
477 .proc_handler = &proc_dointvec_jiffies,
478 .strategy = &sysctl_jiffies
479 },
480 {
481 .ctl_name = NET_IPV4_INET_PEER_GC_MAXTIME,
482 .procname = "inet_peer_gc_maxtime",
483 .data = &inet_peer_gc_maxtime,
484 .maxlen = sizeof(int),
485 .mode = 0644,
486 .proc_handler = &proc_dointvec_jiffies,
487 .strategy = &sysctl_jiffies
488 },
489 {
490 .ctl_name = NET_TCP_ORPHAN_RETRIES,
491 .procname = "tcp_orphan_retries",
492 .data = &sysctl_tcp_orphan_retries,
493 .maxlen = sizeof(int),
494 .mode = 0644,
495 .proc_handler = &proc_dointvec
496 },
497 {
498 .ctl_name = NET_TCP_FACK,
499 .procname = "tcp_fack",
500 .data = &sysctl_tcp_fack,
501 .maxlen = sizeof(int),
502 .mode = 0644,
503 .proc_handler = &proc_dointvec
504 },
505 {
506 .ctl_name = NET_TCP_REORDERING,
507 .procname = "tcp_reordering",
508 .data = &sysctl_tcp_reordering,
509 .maxlen = sizeof(int),
510 .mode = 0644,
511 .proc_handler = &proc_dointvec
512 },
513 {
514 .ctl_name = NET_TCP_ECN,
515 .procname = "tcp_ecn",
516 .data = &sysctl_tcp_ecn,
517 .maxlen = sizeof(int),
518 .mode = 0644,
519 .proc_handler = &proc_dointvec
520 },
521 {
522 .ctl_name = NET_TCP_DSACK,
523 .procname = "tcp_dsack",
524 .data = &sysctl_tcp_dsack,
525 .maxlen = sizeof(int),
526 .mode = 0644,
527 .proc_handler = &proc_dointvec
528 },
529 {
530 .ctl_name = NET_TCP_MEM,
531 .procname = "tcp_mem",
532 .data = &sysctl_tcp_mem,
533 .maxlen = sizeof(sysctl_tcp_mem),
534 .mode = 0644,
535 .proc_handler = &proc_dointvec
536 },
537 {
538 .ctl_name = NET_TCP_WMEM,
539 .procname = "tcp_wmem",
540 .data = &sysctl_tcp_wmem,
541 .maxlen = sizeof(sysctl_tcp_wmem),
542 .mode = 0644,
543 .proc_handler = &proc_dointvec
544 },
545 {
546 .ctl_name = NET_TCP_RMEM,
547 .procname = "tcp_rmem",
548 .data = &sysctl_tcp_rmem,
549 .maxlen = sizeof(sysctl_tcp_rmem),
550 .mode = 0644,
551 .proc_handler = &proc_dointvec
552 },
553 {
554 .ctl_name = NET_TCP_APP_WIN,
555 .procname = "tcp_app_win",
556 .data = &sysctl_tcp_app_win,
557 .maxlen = sizeof(int),
558 .mode = 0644,
559 .proc_handler = &proc_dointvec
560 },
561 {
562 .ctl_name = NET_TCP_ADV_WIN_SCALE,
563 .procname = "tcp_adv_win_scale",
564 .data = &sysctl_tcp_adv_win_scale,
565 .maxlen = sizeof(int),
566 .mode = 0644,
567 .proc_handler = &proc_dointvec
568 },
569 {
570 .ctl_name = NET_IPV4_ICMP_RATELIMIT,
571 .procname = "icmp_ratelimit",
572 .data = &sysctl_icmp_ratelimit,
573 .maxlen = sizeof(int),
574 .mode = 0644,
575 .proc_handler = &proc_dointvec
576 },
577 {
578 .ctl_name = NET_IPV4_ICMP_RATEMASK,
579 .procname = "icmp_ratemask",
580 .data = &sysctl_icmp_ratemask,
581 .maxlen = sizeof(int),
582 .mode = 0644,
583 .proc_handler = &proc_dointvec
584 },
585 {
586 .ctl_name = NET_TCP_TW_REUSE,
587 .procname = "tcp_tw_reuse",
588 .data = &sysctl_tcp_tw_reuse,
589 .maxlen = sizeof(int),
590 .mode = 0644,
591 .proc_handler = &proc_dointvec
592 },
593 {
594 .ctl_name = NET_TCP_FRTO,
595 .procname = "tcp_frto",
596 .data = &sysctl_tcp_frto,
597 .maxlen = sizeof(int),
598 .mode = 0644,
599 .proc_handler = &proc_dointvec
600 },
601 {
602 .ctl_name = NET_TCP_LOW_LATENCY,
603 .procname = "tcp_low_latency",
604 .data = &sysctl_tcp_low_latency,
605 .maxlen = sizeof(int),
606 .mode = 0644,
607 .proc_handler = &proc_dointvec
608 },
609 {
610 .ctl_name = NET_IPV4_IPFRAG_SECRET_INTERVAL,
611 .procname = "ipfrag_secret_interval",
612 .data = &sysctl_ipfrag_secret_interval,
613 .maxlen = sizeof(int),
614 .mode = 0644,
615 .proc_handler = &proc_dointvec_jiffies,
616 .strategy = &sysctl_jiffies
617 },
89cee8b1
HX
618 {
619 .ctl_name = NET_IPV4_IPFRAG_MAX_DIST,
620 .procname = "ipfrag_max_dist",
621 .data = &sysctl_ipfrag_max_dist,
622 .maxlen = sizeof(int),
623 .mode = 0644,
624 .proc_handler = &proc_dointvec_minmax,
625 .extra1 = &zero
626 },
1da177e4
LT
627 {
628 .ctl_name = NET_TCP_NO_METRICS_SAVE,
629 .procname = "tcp_no_metrics_save",
630 .data = &sysctl_tcp_nometrics_save,
631 .maxlen = sizeof(int),
632 .mode = 0644,
633 .proc_handler = &proc_dointvec,
634 },
1da177e4
LT
635 {
636 .ctl_name = NET_TCP_MODERATE_RCVBUF,
637 .procname = "tcp_moderate_rcvbuf",
638 .data = &sysctl_tcp_moderate_rcvbuf,
639 .maxlen = sizeof(int),
640 .mode = 0644,
641 .proc_handler = &proc_dointvec,
642 },
643 {
644 .ctl_name = NET_TCP_TSO_WIN_DIVISOR,
645 .procname = "tcp_tso_win_divisor",
646 .data = &sysctl_tcp_tso_win_divisor,
647 .maxlen = sizeof(int),
648 .mode = 0644,
649 .proc_handler = &proc_dointvec,
650 },
651 {
317a76f9
SH
652 .ctl_name = NET_TCP_CONG_CONTROL,
653 .procname = "tcp_congestion_control",
1da177e4 654 .mode = 0644,
317a76f9
SH
655 .maxlen = TCP_CA_NAME_MAX,
656 .proc_handler = &proc_tcp_congestion_control,
657 .strategy = &sysctl_tcp_congestion_control,
1da177e4 658 },
9772efb9
SH
659 {
660 .ctl_name = NET_TCP_ABC,
661 .procname = "tcp_abc",
662 .data = &sysctl_tcp_abc,
663 .maxlen = sizeof(int),
664 .mode = 0644,
665 .proc_handler = &proc_dointvec,
666 },
5d424d5a
JH
667 {
668 .ctl_name = NET_TCP_MTU_PROBING,
669 .procname = "tcp_mtu_probing",
670 .data = &sysctl_tcp_mtu_probing,
671 .maxlen = sizeof(int),
672 .mode = 0644,
673 .proc_handler = &proc_dointvec,
674 },
675 {
676 .ctl_name = NET_TCP_BASE_MSS,
677 .procname = "tcp_base_mss",
678 .data = &sysctl_tcp_base_mss,
679 .maxlen = sizeof(int),
680 .mode = 0644,
681 .proc_handler = &proc_dointvec,
682 },
15d99e02
RJ
683 {
684 .ctl_name = NET_IPV4_TCP_WORKAROUND_SIGNED_WINDOWS,
685 .procname = "tcp_workaround_signed_windows",
686 .data = &sysctl_tcp_workaround_signed_windows,
687 .maxlen = sizeof(int),
688 .mode = 0644,
689 .proc_handler = &proc_dointvec
690 },
1da177e4
LT
691 { .ctl_name = 0 }
692};
693
694#endif /* CONFIG_SYSCTL */
695
696EXPORT_SYMBOL(ipv4_config);