]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/ipv4/sysctl_net_ipv4.c
[PATCH] sysctl: remove some OPs
[net-next-2.6.git] / net / ipv4 / sysctl_net_ipv4.c
CommitLineData
1da177e4
LT
1/*
2 * sysctl_net_ipv4.c: sysctl interface to net IPV4 subsystem.
3 *
4 * $Id: sysctl_net_ipv4.c,v 1.50 2001/10/20 00:00:11 davem Exp $
5 *
6 * Begun April 1, 1996, Mike Shaver.
7 * Added /proc/sys/net/ipv4 directory entry (empty =) ). [MS]
8 */
9
10#include <linux/mm.h>
11#include <linux/module.h>
12#include <linux/sysctl.h>
20380731 13#include <linux/igmp.h>
14c85021 14#include <linux/inetdevice.h>
1da177e4 15#include <net/snmp.h>
20380731 16#include <net/icmp.h>
1da177e4
LT
17#include <net/ip.h>
18#include <net/route.h>
19#include <net/tcp.h>
446fda4f 20#include <net/cipso_ipv4.h>
1da177e4
LT
21
22/* From af_inet.c */
23extern int sysctl_ip_nonlocal_bind;
24
1da177e4 25#ifdef CONFIG_SYSCTL
89cee8b1 26static int zero;
1da177e4
LT
27static int tcp_retr1_max = 255;
28static int ip_local_port_range_min[] = { 1, 1 };
29static int ip_local_port_range_max[] = { 65535, 65535 };
30#endif
31
32struct ipv4_config ipv4_config;
33
1da177e4
LT
34#ifdef CONFIG_SYSCTL
35
36static
37int ipv4_sysctl_forward(ctl_table *ctl, int write, struct file * filp,
38 void __user *buffer, size_t *lenp, loff_t *ppos)
39{
40 int val = ipv4_devconf.forwarding;
41 int ret;
42
43 ret = proc_dointvec(ctl, write, filp, buffer, lenp, ppos);
44
45 if (write && ipv4_devconf.forwarding != val)
46 inet_forward_change();
47
48 return ret;
49}
50
51static int ipv4_sysctl_forward_strategy(ctl_table *table,
52 int __user *name, int nlen,
53 void __user *oldval, size_t __user *oldlenp,
54 void __user *newval, size_t newlen,
55 void **context)
56{
57 int *valp = table->data;
58 int new;
59
60 if (!newval || !newlen)
61 return 0;
62
63 if (newlen != sizeof(int))
64 return -EINVAL;
65
66 if (get_user(new, (int __user *)newval))
67 return -EFAULT;
68
69 if (new == *valp)
70 return 0;
71
72 if (oldval && oldlenp) {
73 size_t len;
74
75 if (get_user(len, oldlenp))
76 return -EFAULT;
77
78 if (len) {
79 if (len > table->maxlen)
80 len = table->maxlen;
81 if (copy_to_user(oldval, valp, len))
82 return -EFAULT;
83 if (put_user(len, oldlenp))
84 return -EFAULT;
85 }
86 }
87
88 *valp = new;
89 inet_forward_change();
90 return 1;
91}
92
317a76f9
SH
93static int proc_tcp_congestion_control(ctl_table *ctl, int write, struct file * filp,
94 void __user *buffer, size_t *lenp, loff_t *ppos)
95{
96 char val[TCP_CA_NAME_MAX];
97 ctl_table tbl = {
98 .data = val,
99 .maxlen = TCP_CA_NAME_MAX,
100 };
101 int ret;
102
103 tcp_get_default_congestion_control(val);
104
105 ret = proc_dostring(&tbl, write, filp, buffer, lenp, ppos);
106 if (write && ret == 0)
107 ret = tcp_set_default_congestion_control(val);
108 return ret;
109}
110
20380731
ACM
111static int sysctl_tcp_congestion_control(ctl_table *table, int __user *name,
112 int nlen, void __user *oldval,
113 size_t __user *oldlenp,
114 void __user *newval, size_t newlen,
115 void **context)
317a76f9
SH
116{
117 char val[TCP_CA_NAME_MAX];
118 ctl_table tbl = {
119 .data = val,
120 .maxlen = TCP_CA_NAME_MAX,
121 };
122 int ret;
123
124 tcp_get_default_congestion_control(val);
125 ret = sysctl_string(&tbl, name, nlen, oldval, oldlenp, newval, newlen,
126 context);
127 if (ret == 0 && newval && newlen)
128 ret = tcp_set_default_congestion_control(val);
129 return ret;
130}
131
3ff825b2
SH
132static int proc_tcp_available_congestion_control(ctl_table *ctl,
133 int write, struct file * filp,
134 void __user *buffer, size_t *lenp,
135 loff_t *ppos)
136{
137 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX, };
138 int ret;
139
140 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
141 if (!tbl.data)
142 return -ENOMEM;
143 tcp_get_available_congestion_control(tbl.data, TCP_CA_BUF_MAX);
144 ret = proc_dostring(&tbl, write, filp, buffer, lenp, ppos);
145 kfree(tbl.data);
146 return ret;
147}
148
ce7bc3bf
SH
149static int proc_allowed_congestion_control(ctl_table *ctl,
150 int write, struct file * filp,
151 void __user *buffer, size_t *lenp,
152 loff_t *ppos)
153{
154 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX };
155 int ret;
156
157 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
158 if (!tbl.data)
159 return -ENOMEM;
160
161 tcp_get_allowed_congestion_control(tbl.data, tbl.maxlen);
162 ret = proc_dostring(&tbl, write, filp, buffer, lenp, ppos);
163 if (write && ret == 0)
164 ret = tcp_set_allowed_congestion_control(tbl.data);
165 kfree(tbl.data);
166 return ret;
167}
168
169static int strategy_allowed_congestion_control(ctl_table *table, int __user *name,
170 int nlen, void __user *oldval,
171 size_t __user *oldlenp,
172 void __user *newval, size_t newlen,
173 void **context)
174{
175 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX };
176 int ret;
177
178 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
179 if (!tbl.data)
180 return -ENOMEM;
181
182 tcp_get_available_congestion_control(tbl.data, tbl.maxlen);
183 ret = sysctl_string(&tbl, name, nlen, oldval, oldlenp, newval, newlen,
184 context);
185 if (ret == 0 && newval && newlen)
186 ret = tcp_set_allowed_congestion_control(tbl.data);
187 kfree(tbl.data);
188
189 return ret;
190
191}
192
1da177e4
LT
193ctl_table ipv4_table[] = {
194 {
195 .ctl_name = NET_IPV4_TCP_TIMESTAMPS,
196 .procname = "tcp_timestamps",
197 .data = &sysctl_tcp_timestamps,
198 .maxlen = sizeof(int),
199 .mode = 0644,
200 .proc_handler = &proc_dointvec
201 },
202 {
203 .ctl_name = NET_IPV4_TCP_WINDOW_SCALING,
204 .procname = "tcp_window_scaling",
205 .data = &sysctl_tcp_window_scaling,
206 .maxlen = sizeof(int),
207 .mode = 0644,
208 .proc_handler = &proc_dointvec
209 },
210 {
211 .ctl_name = NET_IPV4_TCP_SACK,
212 .procname = "tcp_sack",
213 .data = &sysctl_tcp_sack,
214 .maxlen = sizeof(int),
215 .mode = 0644,
216 .proc_handler = &proc_dointvec
217 },
218 {
219 .ctl_name = NET_IPV4_TCP_RETRANS_COLLAPSE,
220 .procname = "tcp_retrans_collapse",
221 .data = &sysctl_tcp_retrans_collapse,
222 .maxlen = sizeof(int),
223 .mode = 0644,
224 .proc_handler = &proc_dointvec
225 },
226 {
227 .ctl_name = NET_IPV4_FORWARD,
228 .procname = "ip_forward",
229 .data = &ipv4_devconf.forwarding,
230 .maxlen = sizeof(int),
231 .mode = 0644,
232 .proc_handler = &ipv4_sysctl_forward,
233 .strategy = &ipv4_sysctl_forward_strategy
234 },
235 {
236 .ctl_name = NET_IPV4_DEFAULT_TTL,
237 .procname = "ip_default_ttl",
238 .data = &sysctl_ip_default_ttl,
239 .maxlen = sizeof(int),
240 .mode = 0644,
241 .proc_handler = &ipv4_doint_and_flush,
242 .strategy = &ipv4_doint_and_flush_strategy,
243 },
1da177e4
LT
244 {
245 .ctl_name = NET_IPV4_NO_PMTU_DISC,
246 .procname = "ip_no_pmtu_disc",
247 .data = &ipv4_config.no_pmtu_disc,
248 .maxlen = sizeof(int),
249 .mode = 0644,
250 .proc_handler = &proc_dointvec
251 },
252 {
253 .ctl_name = NET_IPV4_NONLOCAL_BIND,
254 .procname = "ip_nonlocal_bind",
255 .data = &sysctl_ip_nonlocal_bind,
256 .maxlen = sizeof(int),
257 .mode = 0644,
258 .proc_handler = &proc_dointvec
259 },
260 {
261 .ctl_name = NET_IPV4_TCP_SYN_RETRIES,
262 .procname = "tcp_syn_retries",
263 .data = &sysctl_tcp_syn_retries,
264 .maxlen = sizeof(int),
265 .mode = 0644,
266 .proc_handler = &proc_dointvec
267 },
268 {
269 .ctl_name = NET_TCP_SYNACK_RETRIES,
270 .procname = "tcp_synack_retries",
271 .data = &sysctl_tcp_synack_retries,
272 .maxlen = sizeof(int),
273 .mode = 0644,
274 .proc_handler = &proc_dointvec
275 },
276 {
277 .ctl_name = NET_TCP_MAX_ORPHANS,
278 .procname = "tcp_max_orphans",
279 .data = &sysctl_tcp_max_orphans,
280 .maxlen = sizeof(int),
281 .mode = 0644,
282 .proc_handler = &proc_dointvec
283 },
284 {
285 .ctl_name = NET_TCP_MAX_TW_BUCKETS,
286 .procname = "tcp_max_tw_buckets",
295ff7ed 287 .data = &tcp_death_row.sysctl_max_tw_buckets,
1da177e4
LT
288 .maxlen = sizeof(int),
289 .mode = 0644,
290 .proc_handler = &proc_dointvec
291 },
292 {
293 .ctl_name = NET_IPV4_IPFRAG_HIGH_THRESH,
294 .procname = "ipfrag_high_thresh",
295 .data = &sysctl_ipfrag_high_thresh,
296 .maxlen = sizeof(int),
297 .mode = 0644,
298 .proc_handler = &proc_dointvec
299 },
300 {
301 .ctl_name = NET_IPV4_IPFRAG_LOW_THRESH,
302 .procname = "ipfrag_low_thresh",
303 .data = &sysctl_ipfrag_low_thresh,
304 .maxlen = sizeof(int),
305 .mode = 0644,
306 .proc_handler = &proc_dointvec
307 },
308 {
309 .ctl_name = NET_IPV4_DYNADDR,
310 .procname = "ip_dynaddr",
311 .data = &sysctl_ip_dynaddr,
312 .maxlen = sizeof(int),
313 .mode = 0644,
314 .proc_handler = &proc_dointvec
315 },
316 {
317 .ctl_name = NET_IPV4_IPFRAG_TIME,
318 .procname = "ipfrag_time",
319 .data = &sysctl_ipfrag_time,
320 .maxlen = sizeof(int),
321 .mode = 0644,
322 .proc_handler = &proc_dointvec_jiffies,
323 .strategy = &sysctl_jiffies
324 },
325 {
326 .ctl_name = NET_IPV4_TCP_KEEPALIVE_TIME,
327 .procname = "tcp_keepalive_time",
328 .data = &sysctl_tcp_keepalive_time,
329 .maxlen = sizeof(int),
330 .mode = 0644,
331 .proc_handler = &proc_dointvec_jiffies,
332 .strategy = &sysctl_jiffies
333 },
334 {
335 .ctl_name = NET_IPV4_TCP_KEEPALIVE_PROBES,
336 .procname = "tcp_keepalive_probes",
337 .data = &sysctl_tcp_keepalive_probes,
338 .maxlen = sizeof(int),
339 .mode = 0644,
340 .proc_handler = &proc_dointvec
341 },
342 {
343 .ctl_name = NET_IPV4_TCP_KEEPALIVE_INTVL,
344 .procname = "tcp_keepalive_intvl",
345 .data = &sysctl_tcp_keepalive_intvl,
346 .maxlen = sizeof(int),
347 .mode = 0644,
348 .proc_handler = &proc_dointvec_jiffies,
349 .strategy = &sysctl_jiffies
350 },
351 {
352 .ctl_name = NET_IPV4_TCP_RETRIES1,
353 .procname = "tcp_retries1",
354 .data = &sysctl_tcp_retries1,
355 .maxlen = sizeof(int),
356 .mode = 0644,
357 .proc_handler = &proc_dointvec_minmax,
358 .strategy = &sysctl_intvec,
359 .extra2 = &tcp_retr1_max
360 },
361 {
362 .ctl_name = NET_IPV4_TCP_RETRIES2,
363 .procname = "tcp_retries2",
364 .data = &sysctl_tcp_retries2,
365 .maxlen = sizeof(int),
366 .mode = 0644,
367 .proc_handler = &proc_dointvec
368 },
369 {
370 .ctl_name = NET_IPV4_TCP_FIN_TIMEOUT,
371 .procname = "tcp_fin_timeout",
372 .data = &sysctl_tcp_fin_timeout,
373 .maxlen = sizeof(int),
374 .mode = 0644,
375 .proc_handler = &proc_dointvec_jiffies,
376 .strategy = &sysctl_jiffies
377 },
378#ifdef CONFIG_SYN_COOKIES
379 {
380 .ctl_name = NET_TCP_SYNCOOKIES,
381 .procname = "tcp_syncookies",
382 .data = &sysctl_tcp_syncookies,
383 .maxlen = sizeof(int),
384 .mode = 0644,
385 .proc_handler = &proc_dointvec
386 },
387#endif
388 {
389 .ctl_name = NET_TCP_TW_RECYCLE,
390 .procname = "tcp_tw_recycle",
295ff7ed 391 .data = &tcp_death_row.sysctl_tw_recycle,
1da177e4
LT
392 .maxlen = sizeof(int),
393 .mode = 0644,
394 .proc_handler = &proc_dointvec
395 },
396 {
397 .ctl_name = NET_TCP_ABORT_ON_OVERFLOW,
398 .procname = "tcp_abort_on_overflow",
399 .data = &sysctl_tcp_abort_on_overflow,
400 .maxlen = sizeof(int),
401 .mode = 0644,
402 .proc_handler = &proc_dointvec
403 },
404 {
405 .ctl_name = NET_TCP_STDURG,
406 .procname = "tcp_stdurg",
407 .data = &sysctl_tcp_stdurg,
408 .maxlen = sizeof(int),
409 .mode = 0644,
410 .proc_handler = &proc_dointvec
411 },
412 {
413 .ctl_name = NET_TCP_RFC1337,
414 .procname = "tcp_rfc1337",
415 .data = &sysctl_tcp_rfc1337,
416 .maxlen = sizeof(int),
417 .mode = 0644,
418 .proc_handler = &proc_dointvec
419 },
420 {
421 .ctl_name = NET_TCP_MAX_SYN_BACKLOG,
422 .procname = "tcp_max_syn_backlog",
423 .data = &sysctl_max_syn_backlog,
424 .maxlen = sizeof(int),
425 .mode = 0644,
426 .proc_handler = &proc_dointvec
427 },
428 {
429 .ctl_name = NET_IPV4_LOCAL_PORT_RANGE,
430 .procname = "ip_local_port_range",
431 .data = &sysctl_local_port_range,
432 .maxlen = sizeof(sysctl_local_port_range),
433 .mode = 0644,
434 .proc_handler = &proc_dointvec_minmax,
435 .strategy = &sysctl_intvec,
436 .extra1 = ip_local_port_range_min,
437 .extra2 = ip_local_port_range_max
438 },
439 {
440 .ctl_name = NET_IPV4_ICMP_ECHO_IGNORE_ALL,
441 .procname = "icmp_echo_ignore_all",
442 .data = &sysctl_icmp_echo_ignore_all,
443 .maxlen = sizeof(int),
444 .mode = 0644,
445 .proc_handler = &proc_dointvec
446 },
447 {
448 .ctl_name = NET_IPV4_ICMP_ECHO_IGNORE_BROADCASTS,
449 .procname = "icmp_echo_ignore_broadcasts",
450 .data = &sysctl_icmp_echo_ignore_broadcasts,
451 .maxlen = sizeof(int),
452 .mode = 0644,
453 .proc_handler = &proc_dointvec
454 },
455 {
456 .ctl_name = NET_IPV4_ICMP_IGNORE_BOGUS_ERROR_RESPONSES,
457 .procname = "icmp_ignore_bogus_error_responses",
458 .data = &sysctl_icmp_ignore_bogus_error_responses,
459 .maxlen = sizeof(int),
460 .mode = 0644,
461 .proc_handler = &proc_dointvec
462 },
1c2fb7f9
S
463 {
464 .ctl_name = NET_IPV4_ICMP_ERRORS_USE_INBOUND_IFADDR,
465 .procname = "icmp_errors_use_inbound_ifaddr",
466 .data = &sysctl_icmp_errors_use_inbound_ifaddr,
467 .maxlen = sizeof(int),
468 .mode = 0644,
469 .proc_handler = &proc_dointvec
470 },
1da177e4
LT
471 {
472 .ctl_name = NET_IPV4_ROUTE,
473 .procname = "route",
474 .maxlen = 0,
475 .mode = 0555,
476 .child = ipv4_route_table
477 },
478#ifdef CONFIG_IP_MULTICAST
479 {
480 .ctl_name = NET_IPV4_IGMP_MAX_MEMBERSHIPS,
481 .procname = "igmp_max_memberships",
482 .data = &sysctl_igmp_max_memberships,
483 .maxlen = sizeof(int),
484 .mode = 0644,
485 .proc_handler = &proc_dointvec
486 },
487
488#endif
489 {
490 .ctl_name = NET_IPV4_IGMP_MAX_MSF,
491 .procname = "igmp_max_msf",
492 .data = &sysctl_igmp_max_msf,
493 .maxlen = sizeof(int),
494 .mode = 0644,
495 .proc_handler = &proc_dointvec
496 },
497 {
498 .ctl_name = NET_IPV4_INET_PEER_THRESHOLD,
499 .procname = "inet_peer_threshold",
500 .data = &inet_peer_threshold,
501 .maxlen = sizeof(int),
502 .mode = 0644,
503 .proc_handler = &proc_dointvec
504 },
505 {
506 .ctl_name = NET_IPV4_INET_PEER_MINTTL,
507 .procname = "inet_peer_minttl",
508 .data = &inet_peer_minttl,
509 .maxlen = sizeof(int),
510 .mode = 0644,
511 .proc_handler = &proc_dointvec_jiffies,
512 .strategy = &sysctl_jiffies
513 },
514 {
515 .ctl_name = NET_IPV4_INET_PEER_MAXTTL,
516 .procname = "inet_peer_maxttl",
517 .data = &inet_peer_maxttl,
518 .maxlen = sizeof(int),
519 .mode = 0644,
520 .proc_handler = &proc_dointvec_jiffies,
521 .strategy = &sysctl_jiffies
522 },
523 {
524 .ctl_name = NET_IPV4_INET_PEER_GC_MINTIME,
525 .procname = "inet_peer_gc_mintime",
526 .data = &inet_peer_gc_mintime,
527 .maxlen = sizeof(int),
528 .mode = 0644,
529 .proc_handler = &proc_dointvec_jiffies,
530 .strategy = &sysctl_jiffies
531 },
532 {
533 .ctl_name = NET_IPV4_INET_PEER_GC_MAXTIME,
534 .procname = "inet_peer_gc_maxtime",
535 .data = &inet_peer_gc_maxtime,
536 .maxlen = sizeof(int),
537 .mode = 0644,
538 .proc_handler = &proc_dointvec_jiffies,
539 .strategy = &sysctl_jiffies
540 },
541 {
542 .ctl_name = NET_TCP_ORPHAN_RETRIES,
543 .procname = "tcp_orphan_retries",
544 .data = &sysctl_tcp_orphan_retries,
545 .maxlen = sizeof(int),
546 .mode = 0644,
547 .proc_handler = &proc_dointvec
548 },
549 {
550 .ctl_name = NET_TCP_FACK,
551 .procname = "tcp_fack",
552 .data = &sysctl_tcp_fack,
553 .maxlen = sizeof(int),
554 .mode = 0644,
555 .proc_handler = &proc_dointvec
556 },
557 {
558 .ctl_name = NET_TCP_REORDERING,
559 .procname = "tcp_reordering",
560 .data = &sysctl_tcp_reordering,
561 .maxlen = sizeof(int),
562 .mode = 0644,
563 .proc_handler = &proc_dointvec
564 },
565 {
566 .ctl_name = NET_TCP_ECN,
567 .procname = "tcp_ecn",
568 .data = &sysctl_tcp_ecn,
569 .maxlen = sizeof(int),
570 .mode = 0644,
571 .proc_handler = &proc_dointvec
572 },
573 {
574 .ctl_name = NET_TCP_DSACK,
575 .procname = "tcp_dsack",
576 .data = &sysctl_tcp_dsack,
577 .maxlen = sizeof(int),
578 .mode = 0644,
579 .proc_handler = &proc_dointvec
580 },
581 {
582 .ctl_name = NET_TCP_MEM,
583 .procname = "tcp_mem",
584 .data = &sysctl_tcp_mem,
585 .maxlen = sizeof(sysctl_tcp_mem),
586 .mode = 0644,
587 .proc_handler = &proc_dointvec
588 },
589 {
590 .ctl_name = NET_TCP_WMEM,
591 .procname = "tcp_wmem",
592 .data = &sysctl_tcp_wmem,
593 .maxlen = sizeof(sysctl_tcp_wmem),
594 .mode = 0644,
595 .proc_handler = &proc_dointvec
596 },
597 {
598 .ctl_name = NET_TCP_RMEM,
599 .procname = "tcp_rmem",
600 .data = &sysctl_tcp_rmem,
601 .maxlen = sizeof(sysctl_tcp_rmem),
602 .mode = 0644,
603 .proc_handler = &proc_dointvec
604 },
605 {
606 .ctl_name = NET_TCP_APP_WIN,
607 .procname = "tcp_app_win",
608 .data = &sysctl_tcp_app_win,
609 .maxlen = sizeof(int),
610 .mode = 0644,
611 .proc_handler = &proc_dointvec
612 },
613 {
614 .ctl_name = NET_TCP_ADV_WIN_SCALE,
615 .procname = "tcp_adv_win_scale",
616 .data = &sysctl_tcp_adv_win_scale,
617 .maxlen = sizeof(int),
618 .mode = 0644,
619 .proc_handler = &proc_dointvec
620 },
621 {
622 .ctl_name = NET_IPV4_ICMP_RATELIMIT,
623 .procname = "icmp_ratelimit",
624 .data = &sysctl_icmp_ratelimit,
625 .maxlen = sizeof(int),
626 .mode = 0644,
627 .proc_handler = &proc_dointvec
628 },
629 {
630 .ctl_name = NET_IPV4_ICMP_RATEMASK,
631 .procname = "icmp_ratemask",
632 .data = &sysctl_icmp_ratemask,
633 .maxlen = sizeof(int),
634 .mode = 0644,
635 .proc_handler = &proc_dointvec
636 },
637 {
638 .ctl_name = NET_TCP_TW_REUSE,
639 .procname = "tcp_tw_reuse",
640 .data = &sysctl_tcp_tw_reuse,
641 .maxlen = sizeof(int),
642 .mode = 0644,
643 .proc_handler = &proc_dointvec
644 },
645 {
646 .ctl_name = NET_TCP_FRTO,
647 .procname = "tcp_frto",
648 .data = &sysctl_tcp_frto,
649 .maxlen = sizeof(int),
650 .mode = 0644,
651 .proc_handler = &proc_dointvec
652 },
653 {
654 .ctl_name = NET_TCP_LOW_LATENCY,
655 .procname = "tcp_low_latency",
656 .data = &sysctl_tcp_low_latency,
657 .maxlen = sizeof(int),
658 .mode = 0644,
659 .proc_handler = &proc_dointvec
660 },
661 {
662 .ctl_name = NET_IPV4_IPFRAG_SECRET_INTERVAL,
663 .procname = "ipfrag_secret_interval",
664 .data = &sysctl_ipfrag_secret_interval,
665 .maxlen = sizeof(int),
666 .mode = 0644,
667 .proc_handler = &proc_dointvec_jiffies,
668 .strategy = &sysctl_jiffies
669 },
89cee8b1
HX
670 {
671 .ctl_name = NET_IPV4_IPFRAG_MAX_DIST,
672 .procname = "ipfrag_max_dist",
673 .data = &sysctl_ipfrag_max_dist,
674 .maxlen = sizeof(int),
675 .mode = 0644,
676 .proc_handler = &proc_dointvec_minmax,
677 .extra1 = &zero
678 },
1da177e4
LT
679 {
680 .ctl_name = NET_TCP_NO_METRICS_SAVE,
681 .procname = "tcp_no_metrics_save",
682 .data = &sysctl_tcp_nometrics_save,
683 .maxlen = sizeof(int),
684 .mode = 0644,
685 .proc_handler = &proc_dointvec,
686 },
1da177e4
LT
687 {
688 .ctl_name = NET_TCP_MODERATE_RCVBUF,
689 .procname = "tcp_moderate_rcvbuf",
690 .data = &sysctl_tcp_moderate_rcvbuf,
691 .maxlen = sizeof(int),
692 .mode = 0644,
693 .proc_handler = &proc_dointvec,
694 },
695 {
696 .ctl_name = NET_TCP_TSO_WIN_DIVISOR,
697 .procname = "tcp_tso_win_divisor",
698 .data = &sysctl_tcp_tso_win_divisor,
699 .maxlen = sizeof(int),
700 .mode = 0644,
701 .proc_handler = &proc_dointvec,
702 },
703 {
317a76f9
SH
704 .ctl_name = NET_TCP_CONG_CONTROL,
705 .procname = "tcp_congestion_control",
1da177e4 706 .mode = 0644,
317a76f9
SH
707 .maxlen = TCP_CA_NAME_MAX,
708 .proc_handler = &proc_tcp_congestion_control,
709 .strategy = &sysctl_tcp_congestion_control,
1da177e4 710 },
9772efb9
SH
711 {
712 .ctl_name = NET_TCP_ABC,
713 .procname = "tcp_abc",
714 .data = &sysctl_tcp_abc,
715 .maxlen = sizeof(int),
716 .mode = 0644,
717 .proc_handler = &proc_dointvec,
718 },
5d424d5a
JH
719 {
720 .ctl_name = NET_TCP_MTU_PROBING,
721 .procname = "tcp_mtu_probing",
722 .data = &sysctl_tcp_mtu_probing,
723 .maxlen = sizeof(int),
724 .mode = 0644,
725 .proc_handler = &proc_dointvec,
726 },
727 {
728 .ctl_name = NET_TCP_BASE_MSS,
729 .procname = "tcp_base_mss",
730 .data = &sysctl_tcp_base_mss,
731 .maxlen = sizeof(int),
732 .mode = 0644,
733 .proc_handler = &proc_dointvec,
734 },
15d99e02
RJ
735 {
736 .ctl_name = NET_IPV4_TCP_WORKAROUND_SIGNED_WINDOWS,
737 .procname = "tcp_workaround_signed_windows",
738 .data = &sysctl_tcp_workaround_signed_windows,
739 .maxlen = sizeof(int),
740 .mode = 0644,
741 .proc_handler = &proc_dointvec
742 },
95937825
CL
743#ifdef CONFIG_NET_DMA
744 {
745 .ctl_name = NET_TCP_DMA_COPYBREAK,
746 .procname = "tcp_dma_copybreak",
747 .data = &sysctl_tcp_dma_copybreak,
748 .maxlen = sizeof(int),
749 .mode = 0644,
750 .proc_handler = &proc_dointvec
751 },
752#endif
35089bb2
DM
753 {
754 .ctl_name = NET_TCP_SLOW_START_AFTER_IDLE,
755 .procname = "tcp_slow_start_after_idle",
756 .data = &sysctl_tcp_slow_start_after_idle,
757 .maxlen = sizeof(int),
758 .mode = 0644,
759 .proc_handler = &proc_dointvec
760 },
446fda4f
PM
761#ifdef CONFIG_NETLABEL
762 {
763 .ctl_name = NET_CIPSOV4_CACHE_ENABLE,
764 .procname = "cipso_cache_enable",
765 .data = &cipso_v4_cache_enabled,
766 .maxlen = sizeof(int),
767 .mode = 0644,
768 .proc_handler = &proc_dointvec,
769 },
770 {
771 .ctl_name = NET_CIPSOV4_CACHE_BUCKET_SIZE,
772 .procname = "cipso_cache_bucket_size",
773 .data = &cipso_v4_cache_bucketsize,
774 .maxlen = sizeof(int),
775 .mode = 0644,
776 .proc_handler = &proc_dointvec,
777 },
778 {
779 .ctl_name = NET_CIPSOV4_RBM_OPTFMT,
780 .procname = "cipso_rbm_optfmt",
781 .data = &cipso_v4_rbm_optfmt,
782 .maxlen = sizeof(int),
783 .mode = 0644,
784 .proc_handler = &proc_dointvec,
785 },
786 {
787 .ctl_name = NET_CIPSOV4_RBM_STRICTVALID,
788 .procname = "cipso_rbm_strictvalid",
789 .data = &cipso_v4_rbm_strictvalid,
790 .maxlen = sizeof(int),
791 .mode = 0644,
792 .proc_handler = &proc_dointvec,
793 },
794#endif /* CONFIG_NETLABEL */
3ff825b2
SH
795 {
796 .ctl_name = NET_TCP_AVAIL_CONG_CONTROL,
797 .procname = "tcp_available_congestion_control",
798 .maxlen = TCP_CA_BUF_MAX,
799 .mode = 0444,
800 .proc_handler = &proc_tcp_available_congestion_control,
801 },
ce7bc3bf
SH
802 {
803 .ctl_name = NET_TCP_ALLOWED_CONG_CONTROL,
804 .procname = "tcp_allowed_congestion_control",
805 .maxlen = TCP_CA_BUF_MAX,
806 .mode = 0644,
807 .proc_handler = &proc_allowed_congestion_control,
808 .strategy = &strategy_allowed_congestion_control,
809 },
1da177e4
LT
810 { .ctl_name = 0 }
811};
812
813#endif /* CONFIG_SYSCTL */
814
815EXPORT_SYMBOL(ipv4_config);