m68k: use KBUILD_DEFCONFIG
[linux-2.6/verdex.git] / net / ipv4 / sysctl_net_ipv4.c
blob88286f35d1e266ec6aad248c5328d17891cdcc0c
1 /*
2 * sysctl_net_ipv4.c: sysctl interface to net IPV4 subsystem.
4 * $Id: sysctl_net_ipv4.c,v 1.50 2001/10/20 00:00:11 davem Exp $
6 * Begun April 1, 1996, Mike Shaver.
7 * Added /proc/sys/net/ipv4 directory entry (empty =) ). [MS]
8 */
10 #include <linux/mm.h>
11 #include <linux/module.h>
12 #include <linux/sysctl.h>
13 #include <linux/igmp.h>
14 #include <linux/inetdevice.h>
15 #include <linux/seqlock.h>
16 #include <linux/init.h>
17 #include <net/snmp.h>
18 #include <net/icmp.h>
19 #include <net/ip.h>
20 #include <net/route.h>
21 #include <net/tcp.h>
22 #include <net/udp.h>
23 #include <net/cipso_ipv4.h>
24 #include <net/inet_frag.h>
26 static int zero;
27 static int tcp_retr1_max = 255;
28 static int ip_local_port_range_min[] = { 1, 1 };
29 static int ip_local_port_range_max[] = { 65535, 65535 };
31 extern seqlock_t sysctl_port_range_lock;
32 extern int sysctl_local_port_range[2];
34 /* Update system visible IP port range */
35 static void set_local_port_range(int range[2])
37 write_seqlock(&sysctl_port_range_lock);
38 sysctl_local_port_range[0] = range[0];
39 sysctl_local_port_range[1] = range[1];
40 write_sequnlock(&sysctl_port_range_lock);
43 /* Validate changes from /proc interface. */
44 static int ipv4_local_port_range(ctl_table *table, int write, struct file *filp,
45 void __user *buffer,
46 size_t *lenp, loff_t *ppos)
48 int ret;
49 int range[2] = { sysctl_local_port_range[0],
50 sysctl_local_port_range[1] };
51 ctl_table tmp = {
52 .data = &range,
53 .maxlen = sizeof(range),
54 .mode = table->mode,
55 .extra1 = &ip_local_port_range_min,
56 .extra2 = &ip_local_port_range_max,
59 ret = proc_dointvec_minmax(&tmp, write, filp, buffer, lenp, ppos);
61 if (write && ret == 0) {
62 if (range[1] < range[0])
63 ret = -EINVAL;
64 else
65 set_local_port_range(range);
68 return ret;
71 /* Validate changes from sysctl interface. */
72 static int ipv4_sysctl_local_port_range(ctl_table *table, int __user *name,
73 int nlen, void __user *oldval,
74 size_t __user *oldlenp,
75 void __user *newval, size_t newlen)
77 int ret;
78 int range[2] = { sysctl_local_port_range[0],
79 sysctl_local_port_range[1] };
80 ctl_table tmp = {
81 .data = &range,
82 .maxlen = sizeof(range),
83 .mode = table->mode,
84 .extra1 = &ip_local_port_range_min,
85 .extra2 = &ip_local_port_range_max,
88 ret = sysctl_intvec(&tmp, name, nlen, oldval, oldlenp, newval, newlen);
89 if (ret == 0 && newval && newlen) {
90 if (range[1] < range[0])
91 ret = -EINVAL;
92 else
93 set_local_port_range(range);
95 return ret;
99 static int proc_tcp_congestion_control(ctl_table *ctl, int write, struct file * filp,
100 void __user *buffer, size_t *lenp, loff_t *ppos)
102 char val[TCP_CA_NAME_MAX];
103 ctl_table tbl = {
104 .data = val,
105 .maxlen = TCP_CA_NAME_MAX,
107 int ret;
109 tcp_get_default_congestion_control(val);
111 ret = proc_dostring(&tbl, write, filp, buffer, lenp, ppos);
112 if (write && ret == 0)
113 ret = tcp_set_default_congestion_control(val);
114 return ret;
117 static int sysctl_tcp_congestion_control(ctl_table *table, int __user *name,
118 int nlen, void __user *oldval,
119 size_t __user *oldlenp,
120 void __user *newval, size_t newlen)
122 char val[TCP_CA_NAME_MAX];
123 ctl_table tbl = {
124 .data = val,
125 .maxlen = TCP_CA_NAME_MAX,
127 int ret;
129 tcp_get_default_congestion_control(val);
130 ret = sysctl_string(&tbl, name, nlen, oldval, oldlenp, newval, newlen);
131 if (ret == 1 && newval && newlen)
132 ret = tcp_set_default_congestion_control(val);
133 return ret;
136 static int proc_tcp_available_congestion_control(ctl_table *ctl,
137 int write, struct file * filp,
138 void __user *buffer, size_t *lenp,
139 loff_t *ppos)
141 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX, };
142 int ret;
144 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
145 if (!tbl.data)
146 return -ENOMEM;
147 tcp_get_available_congestion_control(tbl.data, TCP_CA_BUF_MAX);
148 ret = proc_dostring(&tbl, write, filp, buffer, lenp, ppos);
149 kfree(tbl.data);
150 return ret;
153 static int proc_allowed_congestion_control(ctl_table *ctl,
154 int write, struct file * filp,
155 void __user *buffer, size_t *lenp,
156 loff_t *ppos)
158 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX };
159 int ret;
161 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
162 if (!tbl.data)
163 return -ENOMEM;
165 tcp_get_allowed_congestion_control(tbl.data, tbl.maxlen);
166 ret = proc_dostring(&tbl, write, filp, buffer, lenp, ppos);
167 if (write && ret == 0)
168 ret = tcp_set_allowed_congestion_control(tbl.data);
169 kfree(tbl.data);
170 return ret;
173 static int strategy_allowed_congestion_control(ctl_table *table, int __user *name,
174 int nlen, void __user *oldval,
175 size_t __user *oldlenp,
176 void __user *newval,
177 size_t newlen)
179 ctl_table tbl = { .maxlen = TCP_CA_BUF_MAX };
180 int ret;
182 tbl.data = kmalloc(tbl.maxlen, GFP_USER);
183 if (!tbl.data)
184 return -ENOMEM;
186 tcp_get_available_congestion_control(tbl.data, tbl.maxlen);
187 ret = sysctl_string(&tbl, name, nlen, oldval, oldlenp, newval, newlen);
188 if (ret == 1 && newval && newlen)
189 ret = tcp_set_allowed_congestion_control(tbl.data);
190 kfree(tbl.data);
192 return ret;
196 static struct ctl_table ipv4_table[] = {
198 .ctl_name = NET_IPV4_TCP_TIMESTAMPS,
199 .procname = "tcp_timestamps",
200 .data = &sysctl_tcp_timestamps,
201 .maxlen = sizeof(int),
202 .mode = 0644,
203 .proc_handler = &proc_dointvec
206 .ctl_name = NET_IPV4_TCP_WINDOW_SCALING,
207 .procname = "tcp_window_scaling",
208 .data = &sysctl_tcp_window_scaling,
209 .maxlen = sizeof(int),
210 .mode = 0644,
211 .proc_handler = &proc_dointvec
214 .ctl_name = NET_IPV4_TCP_SACK,
215 .procname = "tcp_sack",
216 .data = &sysctl_tcp_sack,
217 .maxlen = sizeof(int),
218 .mode = 0644,
219 .proc_handler = &proc_dointvec
222 .ctl_name = NET_IPV4_TCP_RETRANS_COLLAPSE,
223 .procname = "tcp_retrans_collapse",
224 .data = &sysctl_tcp_retrans_collapse,
225 .maxlen = sizeof(int),
226 .mode = 0644,
227 .proc_handler = &proc_dointvec
230 .ctl_name = NET_IPV4_DEFAULT_TTL,
231 .procname = "ip_default_ttl",
232 .data = &sysctl_ip_default_ttl,
233 .maxlen = sizeof(int),
234 .mode = 0644,
235 .proc_handler = &ipv4_doint_and_flush,
236 .strategy = &ipv4_doint_and_flush_strategy,
239 .ctl_name = NET_IPV4_NO_PMTU_DISC,
240 .procname = "ip_no_pmtu_disc",
241 .data = &ipv4_config.no_pmtu_disc,
242 .maxlen = sizeof(int),
243 .mode = 0644,
244 .proc_handler = &proc_dointvec
247 .ctl_name = NET_IPV4_NONLOCAL_BIND,
248 .procname = "ip_nonlocal_bind",
249 .data = &sysctl_ip_nonlocal_bind,
250 .maxlen = sizeof(int),
251 .mode = 0644,
252 .proc_handler = &proc_dointvec
255 .ctl_name = NET_IPV4_TCP_SYN_RETRIES,
256 .procname = "tcp_syn_retries",
257 .data = &sysctl_tcp_syn_retries,
258 .maxlen = sizeof(int),
259 .mode = 0644,
260 .proc_handler = &proc_dointvec
263 .ctl_name = NET_TCP_SYNACK_RETRIES,
264 .procname = "tcp_synack_retries",
265 .data = &sysctl_tcp_synack_retries,
266 .maxlen = sizeof(int),
267 .mode = 0644,
268 .proc_handler = &proc_dointvec
271 .ctl_name = NET_TCP_MAX_ORPHANS,
272 .procname = "tcp_max_orphans",
273 .data = &sysctl_tcp_max_orphans,
274 .maxlen = sizeof(int),
275 .mode = 0644,
276 .proc_handler = &proc_dointvec
279 .ctl_name = NET_TCP_MAX_TW_BUCKETS,
280 .procname = "tcp_max_tw_buckets",
281 .data = &tcp_death_row.sysctl_max_tw_buckets,
282 .maxlen = sizeof(int),
283 .mode = 0644,
284 .proc_handler = &proc_dointvec
287 .ctl_name = NET_IPV4_DYNADDR,
288 .procname = "ip_dynaddr",
289 .data = &sysctl_ip_dynaddr,
290 .maxlen = sizeof(int),
291 .mode = 0644,
292 .proc_handler = &proc_dointvec
295 .ctl_name = NET_IPV4_TCP_KEEPALIVE_TIME,
296 .procname = "tcp_keepalive_time",
297 .data = &sysctl_tcp_keepalive_time,
298 .maxlen = sizeof(int),
299 .mode = 0644,
300 .proc_handler = &proc_dointvec_jiffies,
301 .strategy = &sysctl_jiffies
304 .ctl_name = NET_IPV4_TCP_KEEPALIVE_PROBES,
305 .procname = "tcp_keepalive_probes",
306 .data = &sysctl_tcp_keepalive_probes,
307 .maxlen = sizeof(int),
308 .mode = 0644,
309 .proc_handler = &proc_dointvec
312 .ctl_name = NET_IPV4_TCP_KEEPALIVE_INTVL,
313 .procname = "tcp_keepalive_intvl",
314 .data = &sysctl_tcp_keepalive_intvl,
315 .maxlen = sizeof(int),
316 .mode = 0644,
317 .proc_handler = &proc_dointvec_jiffies,
318 .strategy = &sysctl_jiffies
321 .ctl_name = NET_IPV4_TCP_RETRIES1,
322 .procname = "tcp_retries1",
323 .data = &sysctl_tcp_retries1,
324 .maxlen = sizeof(int),
325 .mode = 0644,
326 .proc_handler = &proc_dointvec_minmax,
327 .strategy = &sysctl_intvec,
328 .extra2 = &tcp_retr1_max
331 .ctl_name = NET_IPV4_TCP_RETRIES2,
332 .procname = "tcp_retries2",
333 .data = &sysctl_tcp_retries2,
334 .maxlen = sizeof(int),
335 .mode = 0644,
336 .proc_handler = &proc_dointvec
339 .ctl_name = NET_IPV4_TCP_FIN_TIMEOUT,
340 .procname = "tcp_fin_timeout",
341 .data = &sysctl_tcp_fin_timeout,
342 .maxlen = sizeof(int),
343 .mode = 0644,
344 .proc_handler = &proc_dointvec_jiffies,
345 .strategy = &sysctl_jiffies
347 #ifdef CONFIG_SYN_COOKIES
349 .ctl_name = NET_TCP_SYNCOOKIES,
350 .procname = "tcp_syncookies",
351 .data = &sysctl_tcp_syncookies,
352 .maxlen = sizeof(int),
353 .mode = 0644,
354 .proc_handler = &proc_dointvec
356 #endif
358 .ctl_name = NET_TCP_TW_RECYCLE,
359 .procname = "tcp_tw_recycle",
360 .data = &tcp_death_row.sysctl_tw_recycle,
361 .maxlen = sizeof(int),
362 .mode = 0644,
363 .proc_handler = &proc_dointvec
366 .ctl_name = NET_TCP_ABORT_ON_OVERFLOW,
367 .procname = "tcp_abort_on_overflow",
368 .data = &sysctl_tcp_abort_on_overflow,
369 .maxlen = sizeof(int),
370 .mode = 0644,
371 .proc_handler = &proc_dointvec
374 .ctl_name = NET_TCP_STDURG,
375 .procname = "tcp_stdurg",
376 .data = &sysctl_tcp_stdurg,
377 .maxlen = sizeof(int),
378 .mode = 0644,
379 .proc_handler = &proc_dointvec
382 .ctl_name = NET_TCP_RFC1337,
383 .procname = "tcp_rfc1337",
384 .data = &sysctl_tcp_rfc1337,
385 .maxlen = sizeof(int),
386 .mode = 0644,
387 .proc_handler = &proc_dointvec
390 .ctl_name = NET_TCP_MAX_SYN_BACKLOG,
391 .procname = "tcp_max_syn_backlog",
392 .data = &sysctl_max_syn_backlog,
393 .maxlen = sizeof(int),
394 .mode = 0644,
395 .proc_handler = &proc_dointvec
398 .ctl_name = NET_IPV4_LOCAL_PORT_RANGE,
399 .procname = "ip_local_port_range",
400 .data = &sysctl_local_port_range,
401 .maxlen = sizeof(sysctl_local_port_range),
402 .mode = 0644,
403 .proc_handler = &ipv4_local_port_range,
404 .strategy = &ipv4_sysctl_local_port_range,
407 .ctl_name = NET_IPV4_ICMP_ECHO_IGNORE_ALL,
408 .procname = "icmp_echo_ignore_all",
409 .data = &sysctl_icmp_echo_ignore_all,
410 .maxlen = sizeof(int),
411 .mode = 0644,
412 .proc_handler = &proc_dointvec
415 .ctl_name = NET_IPV4_ICMP_ECHO_IGNORE_BROADCASTS,
416 .procname = "icmp_echo_ignore_broadcasts",
417 .data = &sysctl_icmp_echo_ignore_broadcasts,
418 .maxlen = sizeof(int),
419 .mode = 0644,
420 .proc_handler = &proc_dointvec
423 .ctl_name = NET_IPV4_ICMP_IGNORE_BOGUS_ERROR_RESPONSES,
424 .procname = "icmp_ignore_bogus_error_responses",
425 .data = &sysctl_icmp_ignore_bogus_error_responses,
426 .maxlen = sizeof(int),
427 .mode = 0644,
428 .proc_handler = &proc_dointvec
431 .ctl_name = NET_IPV4_ICMP_ERRORS_USE_INBOUND_IFADDR,
432 .procname = "icmp_errors_use_inbound_ifaddr",
433 .data = &sysctl_icmp_errors_use_inbound_ifaddr,
434 .maxlen = sizeof(int),
435 .mode = 0644,
436 .proc_handler = &proc_dointvec
439 .ctl_name = NET_IPV4_ROUTE,
440 .procname = "route",
441 .maxlen = 0,
442 .mode = 0555,
443 .child = ipv4_route_table
445 #ifdef CONFIG_IP_MULTICAST
447 .ctl_name = NET_IPV4_IGMP_MAX_MEMBERSHIPS,
448 .procname = "igmp_max_memberships",
449 .data = &sysctl_igmp_max_memberships,
450 .maxlen = sizeof(int),
451 .mode = 0644,
452 .proc_handler = &proc_dointvec
455 #endif
457 .ctl_name = NET_IPV4_IGMP_MAX_MSF,
458 .procname = "igmp_max_msf",
459 .data = &sysctl_igmp_max_msf,
460 .maxlen = sizeof(int),
461 .mode = 0644,
462 .proc_handler = &proc_dointvec
465 .ctl_name = NET_IPV4_INET_PEER_THRESHOLD,
466 .procname = "inet_peer_threshold",
467 .data = &inet_peer_threshold,
468 .maxlen = sizeof(int),
469 .mode = 0644,
470 .proc_handler = &proc_dointvec
473 .ctl_name = NET_IPV4_INET_PEER_MINTTL,
474 .procname = "inet_peer_minttl",
475 .data = &inet_peer_minttl,
476 .maxlen = sizeof(int),
477 .mode = 0644,
478 .proc_handler = &proc_dointvec_jiffies,
479 .strategy = &sysctl_jiffies
482 .ctl_name = NET_IPV4_INET_PEER_MAXTTL,
483 .procname = "inet_peer_maxttl",
484 .data = &inet_peer_maxttl,
485 .maxlen = sizeof(int),
486 .mode = 0644,
487 .proc_handler = &proc_dointvec_jiffies,
488 .strategy = &sysctl_jiffies
491 .ctl_name = NET_IPV4_INET_PEER_GC_MINTIME,
492 .procname = "inet_peer_gc_mintime",
493 .data = &inet_peer_gc_mintime,
494 .maxlen = sizeof(int),
495 .mode = 0644,
496 .proc_handler = &proc_dointvec_jiffies,
497 .strategy = &sysctl_jiffies
500 .ctl_name = NET_IPV4_INET_PEER_GC_MAXTIME,
501 .procname = "inet_peer_gc_maxtime",
502 .data = &inet_peer_gc_maxtime,
503 .maxlen = sizeof(int),
504 .mode = 0644,
505 .proc_handler = &proc_dointvec_jiffies,
506 .strategy = &sysctl_jiffies
509 .ctl_name = NET_TCP_ORPHAN_RETRIES,
510 .procname = "tcp_orphan_retries",
511 .data = &sysctl_tcp_orphan_retries,
512 .maxlen = sizeof(int),
513 .mode = 0644,
514 .proc_handler = &proc_dointvec
517 .ctl_name = NET_TCP_FACK,
518 .procname = "tcp_fack",
519 .data = &sysctl_tcp_fack,
520 .maxlen = sizeof(int),
521 .mode = 0644,
522 .proc_handler = &proc_dointvec
525 .ctl_name = NET_TCP_REORDERING,
526 .procname = "tcp_reordering",
527 .data = &sysctl_tcp_reordering,
528 .maxlen = sizeof(int),
529 .mode = 0644,
530 .proc_handler = &proc_dointvec
533 .ctl_name = NET_TCP_ECN,
534 .procname = "tcp_ecn",
535 .data = &sysctl_tcp_ecn,
536 .maxlen = sizeof(int),
537 .mode = 0644,
538 .proc_handler = &proc_dointvec
541 .ctl_name = NET_TCP_DSACK,
542 .procname = "tcp_dsack",
543 .data = &sysctl_tcp_dsack,
544 .maxlen = sizeof(int),
545 .mode = 0644,
546 .proc_handler = &proc_dointvec
549 .ctl_name = NET_TCP_MEM,
550 .procname = "tcp_mem",
551 .data = &sysctl_tcp_mem,
552 .maxlen = sizeof(sysctl_tcp_mem),
553 .mode = 0644,
554 .proc_handler = &proc_dointvec
557 .ctl_name = NET_TCP_WMEM,
558 .procname = "tcp_wmem",
559 .data = &sysctl_tcp_wmem,
560 .maxlen = sizeof(sysctl_tcp_wmem),
561 .mode = 0644,
562 .proc_handler = &proc_dointvec
565 .ctl_name = NET_TCP_RMEM,
566 .procname = "tcp_rmem",
567 .data = &sysctl_tcp_rmem,
568 .maxlen = sizeof(sysctl_tcp_rmem),
569 .mode = 0644,
570 .proc_handler = &proc_dointvec
573 .ctl_name = NET_TCP_APP_WIN,
574 .procname = "tcp_app_win",
575 .data = &sysctl_tcp_app_win,
576 .maxlen = sizeof(int),
577 .mode = 0644,
578 .proc_handler = &proc_dointvec
581 .ctl_name = NET_TCP_ADV_WIN_SCALE,
582 .procname = "tcp_adv_win_scale",
583 .data = &sysctl_tcp_adv_win_scale,
584 .maxlen = sizeof(int),
585 .mode = 0644,
586 .proc_handler = &proc_dointvec
589 .ctl_name = NET_IPV4_ICMP_RATELIMIT,
590 .procname = "icmp_ratelimit",
591 .data = &sysctl_icmp_ratelimit,
592 .maxlen = sizeof(int),
593 .mode = 0644,
594 .proc_handler = &proc_dointvec
597 .ctl_name = NET_IPV4_ICMP_RATEMASK,
598 .procname = "icmp_ratemask",
599 .data = &sysctl_icmp_ratemask,
600 .maxlen = sizeof(int),
601 .mode = 0644,
602 .proc_handler = &proc_dointvec
605 .ctl_name = NET_TCP_TW_REUSE,
606 .procname = "tcp_tw_reuse",
607 .data = &sysctl_tcp_tw_reuse,
608 .maxlen = sizeof(int),
609 .mode = 0644,
610 .proc_handler = &proc_dointvec
613 .ctl_name = NET_TCP_FRTO,
614 .procname = "tcp_frto",
615 .data = &sysctl_tcp_frto,
616 .maxlen = sizeof(int),
617 .mode = 0644,
618 .proc_handler = &proc_dointvec
621 .ctl_name = NET_TCP_FRTO_RESPONSE,
622 .procname = "tcp_frto_response",
623 .data = &sysctl_tcp_frto_response,
624 .maxlen = sizeof(int),
625 .mode = 0644,
626 .proc_handler = &proc_dointvec
629 .ctl_name = NET_TCP_LOW_LATENCY,
630 .procname = "tcp_low_latency",
631 .data = &sysctl_tcp_low_latency,
632 .maxlen = sizeof(int),
633 .mode = 0644,
634 .proc_handler = &proc_dointvec
637 .ctl_name = NET_TCP_NO_METRICS_SAVE,
638 .procname = "tcp_no_metrics_save",
639 .data = &sysctl_tcp_nometrics_save,
640 .maxlen = sizeof(int),
641 .mode = 0644,
642 .proc_handler = &proc_dointvec,
645 .ctl_name = NET_TCP_MODERATE_RCVBUF,
646 .procname = "tcp_moderate_rcvbuf",
647 .data = &sysctl_tcp_moderate_rcvbuf,
648 .maxlen = sizeof(int),
649 .mode = 0644,
650 .proc_handler = &proc_dointvec,
653 .ctl_name = NET_TCP_TSO_WIN_DIVISOR,
654 .procname = "tcp_tso_win_divisor",
655 .data = &sysctl_tcp_tso_win_divisor,
656 .maxlen = sizeof(int),
657 .mode = 0644,
658 .proc_handler = &proc_dointvec,
661 .ctl_name = NET_TCP_CONG_CONTROL,
662 .procname = "tcp_congestion_control",
663 .mode = 0644,
664 .maxlen = TCP_CA_NAME_MAX,
665 .proc_handler = &proc_tcp_congestion_control,
666 .strategy = &sysctl_tcp_congestion_control,
669 .ctl_name = NET_TCP_ABC,
670 .procname = "tcp_abc",
671 .data = &sysctl_tcp_abc,
672 .maxlen = sizeof(int),
673 .mode = 0644,
674 .proc_handler = &proc_dointvec,
677 .ctl_name = NET_TCP_MTU_PROBING,
678 .procname = "tcp_mtu_probing",
679 .data = &sysctl_tcp_mtu_probing,
680 .maxlen = sizeof(int),
681 .mode = 0644,
682 .proc_handler = &proc_dointvec,
685 .ctl_name = NET_TCP_BASE_MSS,
686 .procname = "tcp_base_mss",
687 .data = &sysctl_tcp_base_mss,
688 .maxlen = sizeof(int),
689 .mode = 0644,
690 .proc_handler = &proc_dointvec,
693 .ctl_name = NET_IPV4_TCP_WORKAROUND_SIGNED_WINDOWS,
694 .procname = "tcp_workaround_signed_windows",
695 .data = &sysctl_tcp_workaround_signed_windows,
696 .maxlen = sizeof(int),
697 .mode = 0644,
698 .proc_handler = &proc_dointvec
700 #ifdef CONFIG_NET_DMA
702 .ctl_name = NET_TCP_DMA_COPYBREAK,
703 .procname = "tcp_dma_copybreak",
704 .data = &sysctl_tcp_dma_copybreak,
705 .maxlen = sizeof(int),
706 .mode = 0644,
707 .proc_handler = &proc_dointvec
709 #endif
711 .ctl_name = NET_TCP_SLOW_START_AFTER_IDLE,
712 .procname = "tcp_slow_start_after_idle",
713 .data = &sysctl_tcp_slow_start_after_idle,
714 .maxlen = sizeof(int),
715 .mode = 0644,
716 .proc_handler = &proc_dointvec
718 #ifdef CONFIG_NETLABEL
720 .ctl_name = NET_CIPSOV4_CACHE_ENABLE,
721 .procname = "cipso_cache_enable",
722 .data = &cipso_v4_cache_enabled,
723 .maxlen = sizeof(int),
724 .mode = 0644,
725 .proc_handler = &proc_dointvec,
728 .ctl_name = NET_CIPSOV4_CACHE_BUCKET_SIZE,
729 .procname = "cipso_cache_bucket_size",
730 .data = &cipso_v4_cache_bucketsize,
731 .maxlen = sizeof(int),
732 .mode = 0644,
733 .proc_handler = &proc_dointvec,
736 .ctl_name = NET_CIPSOV4_RBM_OPTFMT,
737 .procname = "cipso_rbm_optfmt",
738 .data = &cipso_v4_rbm_optfmt,
739 .maxlen = sizeof(int),
740 .mode = 0644,
741 .proc_handler = &proc_dointvec,
744 .ctl_name = NET_CIPSOV4_RBM_STRICTVALID,
745 .procname = "cipso_rbm_strictvalid",
746 .data = &cipso_v4_rbm_strictvalid,
747 .maxlen = sizeof(int),
748 .mode = 0644,
749 .proc_handler = &proc_dointvec,
751 #endif /* CONFIG_NETLABEL */
753 .procname = "tcp_available_congestion_control",
754 .maxlen = TCP_CA_BUF_MAX,
755 .mode = 0444,
756 .proc_handler = &proc_tcp_available_congestion_control,
759 .ctl_name = NET_TCP_ALLOWED_CONG_CONTROL,
760 .procname = "tcp_allowed_congestion_control",
761 .maxlen = TCP_CA_BUF_MAX,
762 .mode = 0644,
763 .proc_handler = &proc_allowed_congestion_control,
764 .strategy = &strategy_allowed_congestion_control,
767 .ctl_name = NET_TCP_MAX_SSTHRESH,
768 .procname = "tcp_max_ssthresh",
769 .data = &sysctl_tcp_max_ssthresh,
770 .maxlen = sizeof(int),
771 .mode = 0644,
772 .proc_handler = &proc_dointvec,
775 .ctl_name = CTL_UNNUMBERED,
776 .procname = "udp_mem",
777 .data = &sysctl_udp_mem,
778 .maxlen = sizeof(sysctl_udp_mem),
779 .mode = 0644,
780 .proc_handler = &proc_dointvec_minmax,
781 .strategy = &sysctl_intvec,
782 .extra1 = &zero
785 .ctl_name = CTL_UNNUMBERED,
786 .procname = "udp_rmem_min",
787 .data = &sysctl_udp_rmem_min,
788 .maxlen = sizeof(sysctl_udp_rmem_min),
789 .mode = 0644,
790 .proc_handler = &proc_dointvec_minmax,
791 .strategy = &sysctl_intvec,
792 .extra1 = &zero
795 .ctl_name = CTL_UNNUMBERED,
796 .procname = "udp_wmem_min",
797 .data = &sysctl_udp_wmem_min,
798 .maxlen = sizeof(sysctl_udp_wmem_min),
799 .mode = 0644,
800 .proc_handler = &proc_dointvec_minmax,
801 .strategy = &sysctl_intvec,
802 .extra1 = &zero
804 { .ctl_name = 0 }
807 struct ctl_path net_ipv4_ctl_path[] = {
808 { .procname = "net", .ctl_name = CTL_NET, },
809 { .procname = "ipv4", .ctl_name = NET_IPV4, },
810 { },
812 EXPORT_SYMBOL_GPL(net_ipv4_ctl_path);
814 static __init int sysctl_ipv4_init(void)
816 struct ctl_table_header *hdr;
818 hdr = register_sysctl_paths(net_ipv4_ctl_path, ipv4_table);
819 return hdr == NULL ? -ENOMEM : 0;
822 __initcall(sysctl_ipv4_init);