^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) .. SPDX-License-Identifier: GPL-2.0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) =========
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) IP Sysctl
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) =========
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) /proc/sys/net/ipv4/* Variables
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) ==============================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) ip_forward - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) - 0 - disabled (default)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) - not 0 - enabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) Forward Packets between interfaces.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) This variable is special, its change resets all configuration
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) parameters to their default state (RFC1122 for hosts, RFC1812
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) for routers)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) ip_default_ttl - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) Default value of TTL field (Time To Live) for outgoing (but not
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) forwarded) IP packets. Should be between 1 and 255 inclusive.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) Default: 64 (as recommended by RFC1700)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) ip_no_pmtu_disc - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) Disable Path MTU Discovery. If enabled in mode 1 and a
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) fragmentation-required ICMP is received, the PMTU to this
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) destination will be set to min_pmtu (see below). You will need
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) to raise min_pmtu to the smallest interface MTU on your system
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) manually if you want to avoid locally generated fragments.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) In mode 2 incoming Path MTU Discovery messages will be
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) discarded. Outgoing frames are handled the same as in mode 1,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) implicitly setting IP_PMTUDISC_DONT on every created socket.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36) Mode 3 is a hardened pmtu discover mode. The kernel will only
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) accept fragmentation-needed errors if the underlying protocol
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) can verify them besides a plain socket lookup. Current
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39) protocols for which pmtu events will be honored are TCP, SCTP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) and DCCP as they verify e.g. the sequence number or the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41) association. This mode should not be enabled globally but is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) only intended to secure e.g. name servers in namespaces where
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) TCP path mtu must still work but path MTU information of other
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44) protocols should be discarded. If enabled globally this mode
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) could break other protocols.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47) Possible values: 0-3
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49) Default: FALSE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) min_pmtu - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52) default 552 - minimum discovered Path MTU
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54) ip_forward_use_pmtu - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 55) By default we don't trust protocol path MTUs while forwarding
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 56) because they could be easily forged and can lead to unwanted
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 57) fragmentation by the router.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 58) You only need to enable this if you have user-space software
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 59) which tries to discover path mtus by itself and depends on the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 60) kernel honoring this information. This is normally not the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 61) case.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 62)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 63) Default: 0 (disabled)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 64)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 65) Possible values:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 66)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 67) - 0 - disabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 68) - 1 - enabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 69)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 70) fwmark_reflect - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 71) Controls the fwmark of kernel-generated IPv4 reply packets that are not
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 72) associated with a socket for example, TCP RSTs or ICMP echo replies).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 73) If unset, these packets have a fwmark of zero. If set, they have the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 74) fwmark of the packet they are replying to.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 75)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 76) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 77)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 78) fib_multipath_use_neigh - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 79) Use status of existing neighbor entry when determining nexthop for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 80) multipath routes. If disabled, neighbor information is not used and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 81) packets could be directed to a failed nexthop. Only valid for kernels
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 82) built with CONFIG_IP_ROUTE_MULTIPATH enabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 83)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 84) Default: 0 (disabled)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 85)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 86) Possible values:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 87)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 88) - 0 - disabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 89) - 1 - enabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 90)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 91) fib_multipath_hash_policy - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 92) Controls which hash policy to use for multipath routes. Only valid
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 93) for kernels built with CONFIG_IP_ROUTE_MULTIPATH enabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 94)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 95) Default: 0 (Layer 3)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 96)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 97) Possible values:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 98)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 99) - 0 - Layer 3
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100) - 1 - Layer 4
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101) - 2 - Layer 3 or inner Layer 3 if present
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 103) fib_sync_mem - UNSIGNED INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 104) Amount of dirty memory from fib entries that can be backlogged before
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 105) synchronize_rcu is forced.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 106)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 107) Default: 512kB Minimum: 64kB Maximum: 64MB
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 108)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 109) ip_forward_update_priority - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 110) Whether to update SKB priority from "TOS" field in IPv4 header after it
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 111) is forwarded. The new SKB priority is mapped from TOS field value
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 112) according to an rt_tos2priority table (see e.g. man tc-prio).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 113)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 114) Default: 1 (Update priority.)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 115)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 116) Possible values:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 117)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 118) - 0 - Do not update priority.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 119) - 1 - Update priority.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 120)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 121) route/max_size - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 122) Maximum number of routes allowed in the kernel. Increase
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 123) this when using large numbers of interfaces and/or routes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 124)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 125) From linux kernel 3.6 onwards, this is deprecated for ipv4
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 126) as route cache is no longer used.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 127)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 128) neigh/default/gc_thresh1 - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 129) Minimum number of entries to keep. Garbage collector will not
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 130) purge entries if there are fewer than this number.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 131)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 132) Default: 128
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 133)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 134) neigh/default/gc_thresh2 - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 135) Threshold when garbage collector becomes more aggressive about
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 136) purging entries. Entries older than 5 seconds will be cleared
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 137) when over this number.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 138)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 139) Default: 512
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 140)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 141) neigh/default/gc_thresh3 - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 142) Maximum number of non-PERMANENT neighbor entries allowed. Increase
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 143) this when using large numbers of interfaces and when communicating
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 144) with large numbers of directly-connected peers.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 145)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 146) Default: 1024
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 147)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 148) neigh/default/unres_qlen_bytes - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 149) The maximum number of bytes which may be used by packets
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 150) queued for each unresolved address by other network layers.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 151) (added in linux 3.3)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 152)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 153) Setting negative value is meaningless and will return error.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 154)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 155) Default: SK_WMEM_MAX, (same as net.core.wmem_default).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 156)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 157) Exact value depends on architecture and kernel options,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 158) but should be enough to allow queuing 256 packets
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 159) of medium size.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 160)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 161) neigh/default/unres_qlen - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 162) The maximum number of packets which may be queued for each
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 163) unresolved address by other network layers.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 164)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 165) (deprecated in linux 3.3) : use unres_qlen_bytes instead.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 166)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 167) Prior to linux 3.3, the default value is 3 which may cause
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 168) unexpected packet loss. The current default value is calculated
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 169) according to default value of unres_qlen_bytes and true size of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 170) packet.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 171)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 172) Default: 101
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 173)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 174) mtu_expires - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 175) Time, in seconds, that cached PMTU information is kept.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 176)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 177) min_adv_mss - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 178) The advertised MSS depends on the first hop route MTU, but will
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 179) never be lower than this setting.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 180)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 181) IP Fragmentation:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 182)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 183) ipfrag_high_thresh - LONG INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 184) Maximum memory used to reassemble IP fragments.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 185)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 186) ipfrag_low_thresh - LONG INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 187) (Obsolete since linux-4.17)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 188) Maximum memory used to reassemble IP fragments before the kernel
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 189) begins to remove incomplete fragment queues to free up resources.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 190) The kernel still accepts new fragments for defragmentation.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 191)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 192) ipfrag_time - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 193) Time in seconds to keep an IP fragment in memory.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 194)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 195) ipfrag_max_dist - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 196) ipfrag_max_dist is a non-negative integer value which defines the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 197) maximum "disorder" which is allowed among fragments which share a
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 198) common IP source address. Note that reordering of packets is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 199) not unusual, but if a large number of fragments arrive from a source
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 200) IP address while a particular fragment queue remains incomplete, it
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 201) probably indicates that one or more fragments belonging to that queue
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 202) have been lost. When ipfrag_max_dist is positive, an additional check
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 203) is done on fragments before they are added to a reassembly queue - if
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 204) ipfrag_max_dist (or more) fragments have arrived from a particular IP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 205) address between additions to any IP fragment queue using that source
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 206) address, it's presumed that one or more fragments in the queue are
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 207) lost. The existing fragment queue will be dropped, and a new one
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 208) started. An ipfrag_max_dist value of zero disables this check.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 209)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 210) Using a very small value, e.g. 1 or 2, for ipfrag_max_dist can
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 211) result in unnecessarily dropping fragment queues when normal
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 212) reordering of packets occurs, which could lead to poor application
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 213) performance. Using a very large value, e.g. 50000, increases the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 214) likelihood of incorrectly reassembling IP fragments that originate
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 215) from different IP datagrams, which could result in data corruption.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 216) Default: 64
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 217)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 218) INET peer storage
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 219) =================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 220)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 221) inet_peer_threshold - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 222) The approximate size of the storage. Starting from this threshold
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 223) entries will be thrown aggressively. This threshold also determines
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 224) entries' time-to-live and time intervals between garbage collection
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 225) passes. More entries, less time-to-live, less GC interval.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 226)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 227) inet_peer_minttl - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 228) Minimum time-to-live of entries. Should be enough to cover fragment
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 229) time-to-live on the reassembling side. This minimum time-to-live is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 230) guaranteed if the pool size is less than inet_peer_threshold.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 231) Measured in seconds.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 232)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 233) inet_peer_maxttl - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 234) Maximum time-to-live of entries. Unused entries will expire after
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 235) this period of time if there is no memory pressure on the pool (i.e.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 236) when the number of entries in the pool is very small).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 237) Measured in seconds.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 238)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 239) TCP variables
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 240) =============
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 241)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 242) somaxconn - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 243) Limit of socket listen() backlog, known in userspace as SOMAXCONN.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 244) Defaults to 4096. (Was 128 before linux-5.4)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 245) See also tcp_max_syn_backlog for additional tuning for TCP sockets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 246)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 247) tcp_abort_on_overflow - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 248) If listening service is too slow to accept new connections,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 249) reset them. Default state is FALSE. It means that if overflow
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 250) occurred due to a burst, connection will recover. Enable this
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 251) option _only_ if you are really sure that listening daemon
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 252) cannot be tuned to accept connections faster. Enabling this
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 253) option can harm clients of your server.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 254)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 255) tcp_adv_win_scale - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 256) Count buffering overhead as bytes/2^tcp_adv_win_scale
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 257) (if tcp_adv_win_scale > 0) or bytes-bytes/2^(-tcp_adv_win_scale),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 258) if it is <= 0.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 259)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 260) Possible values are [-31, 31], inclusive.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 261)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 262) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 263)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 264) tcp_allowed_congestion_control - STRING
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 265) Show/set the congestion control choices available to non-privileged
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 266) processes. The list is a subset of those listed in
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 267) tcp_available_congestion_control.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 268)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 269) Default is "reno" and the default setting (tcp_congestion_control).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 270)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 271) tcp_app_win - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 272) Reserve max(window/2^tcp_app_win, mss) of window for application
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 273) buffer. Value 0 is special, it means that nothing is reserved.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 274)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 275) Default: 31
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 276)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 277) tcp_autocorking - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 278) Enable TCP auto corking :
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 279) When applications do consecutive small write()/sendmsg() system calls,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 280) we try to coalesce these small writes as much as possible, to lower
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 281) total amount of sent packets. This is done if at least one prior
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 282) packet for the flow is waiting in Qdisc queues or device transmit
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 283) queue. Applications can still use TCP_CORK for optimal behavior
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 284) when they know how/when to uncork their sockets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 285)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 286) Default : 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 287)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 288) tcp_available_congestion_control - STRING
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 289) Shows the available congestion control choices that are registered.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 290) More congestion control algorithms may be available as modules,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 291) but not loaded.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 292)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 293) tcp_base_mss - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 294) The initial value of search_low to be used by the packetization layer
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 295) Path MTU discovery (MTU probing). If MTU probing is enabled,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 296) this is the initial MSS used by the connection.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 297)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 298) tcp_mtu_probe_floor - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 299) If MTU probing is enabled this caps the minimum MSS used for search_low
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 300) for the connection.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 301)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 302) Default : 48
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 303)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 304) tcp_min_snd_mss - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 305) TCP SYN and SYNACK messages usually advertise an ADVMSS option,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 306) as described in RFC 1122 and RFC 6691.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 307)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 308) If this ADVMSS option is smaller than tcp_min_snd_mss,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 309) it is silently capped to tcp_min_snd_mss.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 310)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 311) Default : 48 (at least 8 bytes of payload per segment)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 312)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 313) tcp_congestion_control - STRING
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 314) Set the congestion control algorithm to be used for new
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 315) connections. The algorithm "reno" is always available, but
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 316) additional choices may be available based on kernel configuration.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 317) Default is set as part of kernel configuration.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 318) For passive connections, the listener congestion control choice
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 319) is inherited.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 320)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 321) [see setsockopt(listenfd, SOL_TCP, TCP_CONGESTION, "name" ...) ]
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 322)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 323) tcp_dsack - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 324) Allows TCP to send "duplicate" SACKs.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 325)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 326) tcp_early_retrans - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 327) Tail loss probe (TLP) converts RTOs occurring due to tail
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 328) losses into fast recovery (draft-ietf-tcpm-rack). Note that
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 329) TLP requires RACK to function properly (see tcp_recovery below)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 330)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 331) Possible values:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 332)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 333) - 0 disables TLP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 334) - 3 or 4 enables TLP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 335)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 336) Default: 3
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 337)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 338) tcp_ecn - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 339) Control use of Explicit Congestion Notification (ECN) by TCP.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 340) ECN is used only when both ends of the TCP connection indicate
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 341) support for it. This feature is useful in avoiding losses due
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 342) to congestion by allowing supporting routers to signal
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 343) congestion before having to drop packets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 344)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 345) Possible values are:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 346)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 347) = =====================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 348) 0 Disable ECN. Neither initiate nor accept ECN.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 349) 1 Enable ECN when requested by incoming connections and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 350) also request ECN on outgoing connection attempts.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 351) 2 Enable ECN when requested by incoming connections
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 352) but do not request ECN on outgoing connections.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 353) = =====================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 354)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 355) Default: 2
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 356)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 357) tcp_ecn_fallback - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 358) If the kernel detects that ECN connection misbehaves, enable fall
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 359) back to non-ECN. Currently, this knob implements the fallback
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 360) from RFC3168, section 6.1.1.1., but we reserve that in future,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 361) additional detection mechanisms could be implemented under this
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 362) knob. The value is not used, if tcp_ecn or per route (or congestion
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 363) control) ECN settings are disabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 364)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 365) Default: 1 (fallback enabled)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 366)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 367) tcp_fack - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 368) This is a legacy option, it has no effect anymore.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 369)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 370) tcp_fin_timeout - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 371) The length of time an orphaned (no longer referenced by any
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 372) application) connection will remain in the FIN_WAIT_2 state
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 373) before it is aborted at the local end. While a perfectly
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 374) valid "receive only" state for an un-orphaned connection, an
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 375) orphaned connection in FIN_WAIT_2 state could otherwise wait
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 376) forever for the remote to close its end of the connection.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 377)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 378) Cf. tcp_max_orphans
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 379)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 380) Default: 60 seconds
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 381)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 382) tcp_frto - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 383) Enables Forward RTO-Recovery (F-RTO) defined in RFC5682.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 384) F-RTO is an enhanced recovery algorithm for TCP retransmission
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 385) timeouts. It is particularly beneficial in networks where the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 386) RTT fluctuates (e.g., wireless). F-RTO is sender-side only
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 387) modification. It does not require any support from the peer.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 388)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 389) By default it's enabled with a non-zero value. 0 disables F-RTO.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 390)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 391) tcp_fwmark_accept - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 392) If set, incoming connections to listening sockets that do not have a
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 393) socket mark will set the mark of the accepting socket to the fwmark of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 394) the incoming SYN packet. This will cause all packets on that connection
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 395) (starting from the first SYNACK) to be sent with that fwmark. The
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 396) listening socket's mark is unchanged. Listening sockets that already
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 397) have a fwmark set via setsockopt(SOL_SOCKET, SO_MARK, ...) are
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 398) unaffected.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 399)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 400) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 401)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 402) tcp_invalid_ratelimit - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 403) Limit the maximal rate for sending duplicate acknowledgments
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 404) in response to incoming TCP packets that are for an existing
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 405) connection but that are invalid due to any of these reasons:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 406)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 407) (a) out-of-window sequence number,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 408) (b) out-of-window acknowledgment number, or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 409) (c) PAWS (Protection Against Wrapped Sequence numbers) check failure
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 410)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 411) This can help mitigate simple "ack loop" DoS attacks, wherein
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 412) a buggy or malicious middlebox or man-in-the-middle can
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 413) rewrite TCP header fields in manner that causes each endpoint
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 414) to think that the other is sending invalid TCP segments, thus
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 415) causing each side to send an unterminating stream of duplicate
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 416) acknowledgments for invalid segments.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 417)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 418) Using 0 disables rate-limiting of dupacks in response to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 419) invalid segments; otherwise this value specifies the minimal
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 420) space between sending such dupacks, in milliseconds.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 421)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 422) Default: 500 (milliseconds).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 423)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 424) tcp_keepalive_time - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 425) How often TCP sends out keepalive messages when keepalive is enabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 426) Default: 2hours.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 427)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 428) tcp_keepalive_probes - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 429) How many keepalive probes TCP sends out, until it decides that the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 430) connection is broken. Default value: 9.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 431)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 432) tcp_keepalive_intvl - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 433) How frequently the probes are send out. Multiplied by
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 434) tcp_keepalive_probes it is time to kill not responding connection,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 435) after probes started. Default value: 75sec i.e. connection
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 436) will be aborted after ~11 minutes of retries.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 437)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 438) tcp_l3mdev_accept - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 439) Enables child sockets to inherit the L3 master device index.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 440) Enabling this option allows a "global" listen socket to work
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 441) across L3 master domains (e.g., VRFs) with connected sockets
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 442) derived from the listen socket to be bound to the L3 domain in
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 443) which the packets originated. Only valid when the kernel was
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 444) compiled with CONFIG_NET_L3_MASTER_DEV.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 445)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 446) Default: 0 (disabled)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 447)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 448) tcp_low_latency - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 449) This is a legacy option, it has no effect anymore.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 450)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 451) tcp_max_orphans - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 452) Maximal number of TCP sockets not attached to any user file handle,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 453) held by system. If this number is exceeded orphaned connections are
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 454) reset immediately and warning is printed. This limit exists
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 455) only to prevent simple DoS attacks, you _must_ not rely on this
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 456) or lower the limit artificially, but rather increase it
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 457) (probably, after increasing installed memory),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 458) if network conditions require more than default value,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 459) and tune network services to linger and kill such states
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 460) more aggressively. Let me to remind again: each orphan eats
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 461) up to ~64K of unswappable memory.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 462)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 463) tcp_max_syn_backlog - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 464) Maximal number of remembered connection requests (SYN_RECV),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 465) which have not received an acknowledgment from connecting client.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 466)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 467) This is a per-listener limit.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 468)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 469) The minimal value is 128 for low memory machines, and it will
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 470) increase in proportion to the memory of machine.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 471)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 472) If server suffers from overload, try increasing this number.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 473)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 474) Remember to also check /proc/sys/net/core/somaxconn
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 475) A SYN_RECV request socket consumes about 304 bytes of memory.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 476)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 477) tcp_max_tw_buckets - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 478) Maximal number of timewait sockets held by system simultaneously.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 479) If this number is exceeded time-wait socket is immediately destroyed
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 480) and warning is printed. This limit exists only to prevent
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 481) simple DoS attacks, you _must_ not lower the limit artificially,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 482) but rather increase it (probably, after increasing installed memory),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 483) if network conditions require more than default value.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 484)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 485) tcp_mem - vector of 3 INTEGERs: min, pressure, max
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 486) min: below this number of pages TCP is not bothered about its
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 487) memory appetite.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 488)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 489) pressure: when amount of memory allocated by TCP exceeds this number
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 490) of pages, TCP moderates its memory consumption and enters memory
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 491) pressure mode, which is exited when memory consumption falls
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 492) under "min".
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 493)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 494) max: number of pages allowed for queueing by all TCP sockets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 495)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 496) Defaults are calculated at boot time from amount of available
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 497) memory.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 498)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 499) tcp_min_rtt_wlen - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 500) The window length of the windowed min filter to track the minimum RTT.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 501) A shorter window lets a flow more quickly pick up new (higher)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 502) minimum RTT when it is moved to a longer path (e.g., due to traffic
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 503) engineering). A longer window makes the filter more resistant to RTT
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 504) inflations such as transient congestion. The unit is seconds.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 505)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 506) Possible values: 0 - 86400 (1 day)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 507)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 508) Default: 300
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 509)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 510) tcp_moderate_rcvbuf - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 511) If set, TCP performs receive buffer auto-tuning, attempting to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 512) automatically size the buffer (no greater than tcp_rmem[2]) to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 513) match the size required by the path for full throughput. Enabled by
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 514) default.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 515)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 516) tcp_mtu_probing - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 517) Controls TCP Packetization-Layer Path MTU Discovery. Takes three
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 518) values:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 519)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 520) - 0 - Disabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 521) - 1 - Disabled by default, enabled when an ICMP black hole detected
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 522) - 2 - Always enabled, use initial MSS of tcp_base_mss.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 523)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 524) tcp_probe_interval - UNSIGNED INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 525) Controls how often to start TCP Packetization-Layer Path MTU
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 526) Discovery reprobe. The default is reprobing every 10 minutes as
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 527) per RFC4821.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 528)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 529) tcp_probe_threshold - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 530) Controls when TCP Packetization-Layer Path MTU Discovery probing
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 531) will stop in respect to the width of search range in bytes. Default
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 532) is 8 bytes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 533)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 534) tcp_no_metrics_save - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 535) By default, TCP saves various connection metrics in the route cache
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 536) when the connection closes, so that connections established in the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 537) near future can use these to set initial conditions. Usually, this
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 538) increases overall performance, but may sometimes cause performance
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 539) degradation. If set, TCP will not cache metrics on closing
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 540) connections.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 541)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 542) tcp_no_ssthresh_metrics_save - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 543) Controls whether TCP saves ssthresh metrics in the route cache.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 544)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 545) Default is 1, which disables ssthresh metrics.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 546)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 547) tcp_orphan_retries - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 548) This value influences the timeout of a locally closed TCP connection,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 549) when RTO retransmissions remain unacknowledged.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 550) See tcp_retries2 for more details.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 551)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 552) The default value is 8.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 553)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 554) If your machine is a loaded WEB server,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 555) you should think about lowering this value, such sockets
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 556) may consume significant resources. Cf. tcp_max_orphans.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 557)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 558) tcp_recovery - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 559) This value is a bitmap to enable various experimental loss recovery
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 560) features.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 561)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 562) ========= =============================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 563) RACK: 0x1 enables the RACK loss detection for fast detection of lost
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 564) retransmissions and tail drops. It also subsumes and disables
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 565) RFC6675 recovery for SACK connections.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 566)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 567) RACK: 0x2 makes RACK's reordering window static (min_rtt/4).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 568)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 569) RACK: 0x4 disables RACK's DUPACK threshold heuristic
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 570) ========= =============================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 571)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 572) Default: 0x1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 573)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 574) tcp_reordering - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 575) Initial reordering level of packets in a TCP stream.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 576) TCP stack can then dynamically adjust flow reordering level
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 577) between this initial value and tcp_max_reordering
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 578)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 579) Default: 3
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 580)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 581) tcp_max_reordering - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 582) Maximal reordering level of packets in a TCP stream.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 583) 300 is a fairly conservative value, but you might increase it
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 584) if paths are using per packet load balancing (like bonding rr mode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 585)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 586) Default: 300
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 587)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 588) tcp_retrans_collapse - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 589) Bug-to-bug compatibility with some broken printers.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 590) On retransmit try to send bigger packets to work around bugs in
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 591) certain TCP stacks.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 592)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 593) tcp_retries1 - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 594) This value influences the time, after which TCP decides, that
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 595) something is wrong due to unacknowledged RTO retransmissions,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 596) and reports this suspicion to the network layer.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 597) See tcp_retries2 for more details.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 598)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 599) RFC 1122 recommends at least 3 retransmissions, which is the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 600) default.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 601)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 602) tcp_retries2 - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 603) This value influences the timeout of an alive TCP connection,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 604) when RTO retransmissions remain unacknowledged.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 605) Given a value of N, a hypothetical TCP connection following
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 606) exponential backoff with an initial RTO of TCP_RTO_MIN would
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 607) retransmit N times before killing the connection at the (N+1)th RTO.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 608)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 609) The default value of 15 yields a hypothetical timeout of 924.6
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 610) seconds and is a lower bound for the effective timeout.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 611) TCP will effectively time out at the first RTO which exceeds the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 612) hypothetical timeout.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 613)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 614) RFC 1122 recommends at least 100 seconds for the timeout,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 615) which corresponds to a value of at least 8.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 616)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 617) tcp_rfc1337 - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 618) If set, the TCP stack behaves conforming to RFC1337. If unset,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 619) we are not conforming to RFC, but prevent TCP TIME_WAIT
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 620) assassination.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 621)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 622) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 623)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 624) tcp_rmem - vector of 3 INTEGERs: min, default, max
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 625) min: Minimal size of receive buffer used by TCP sockets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 626) It is guaranteed to each TCP socket, even under moderate memory
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 627) pressure.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 628)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 629) Default: 4K
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 630)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 631) default: initial size of receive buffer used by TCP sockets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 632) This value overrides net.core.rmem_default used by other protocols.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 633) Default: 131072 bytes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 634) This value results in initial window of 65535.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 635)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 636) max: maximal size of receive buffer allowed for automatically
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 637) selected receiver buffers for TCP socket. This value does not override
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 638) net.core.rmem_max. Calling setsockopt() with SO_RCVBUF disables
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 639) automatic tuning of that socket's receive buffer size, in which
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 640) case this value is ignored.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 641) Default: between 131072 and 6MB, depending on RAM size.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 642)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 643) tcp_sack - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 644) Enable select acknowledgments (SACKS).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 645)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 646) tcp_comp_sack_delay_ns - LONG INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 647) TCP tries to reduce number of SACK sent, using a timer
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 648) based on 5% of SRTT, capped by this sysctl, in nano seconds.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 649) The default is 1ms, based on TSO autosizing period.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 650)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 651) Default : 1,000,000 ns (1 ms)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 652)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 653) tcp_comp_sack_slack_ns - LONG INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 654) This sysctl control the slack used when arming the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 655) timer used by SACK compression. This gives extra time
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 656) for small RTT flows, and reduces system overhead by allowing
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 657) opportunistic reduction of timer interrupts.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 658)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 659) Default : 100,000 ns (100 us)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 660)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 661) tcp_comp_sack_nr - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 662) Max number of SACK that can be compressed.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 663) Using 0 disables SACK compression.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 664)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 665) Default : 44
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 666)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 667) tcp_slow_start_after_idle - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 668) If set, provide RFC2861 behavior and time out the congestion
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 669) window after an idle period. An idle period is defined at
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 670) the current RTO. If unset, the congestion window will not
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 671) be timed out after an idle period.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 672)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 673) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 674)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 675) tcp_stdurg - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 676) Use the Host requirements interpretation of the TCP urgent pointer field.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 677) Most hosts use the older BSD interpretation, so if you turn this on
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 678) Linux might not communicate correctly with them.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 679)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 680) Default: FALSE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 681)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 682) tcp_synack_retries - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 683) Number of times SYNACKs for a passive TCP connection attempt will
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 684) be retransmitted. Should not be higher than 255. Default value
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 685) is 5, which corresponds to 31seconds till the last retransmission
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 686) with the current initial RTO of 1second. With this the final timeout
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 687) for a passive TCP connection will happen after 63seconds.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 688)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 689) tcp_syncookies - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 690) Only valid when the kernel was compiled with CONFIG_SYN_COOKIES
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 691) Send out syncookies when the syn backlog queue of a socket
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 692) overflows. This is to prevent against the common 'SYN flood attack'
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 693) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 694)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 695) Note, that syncookies is fallback facility.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 696) It MUST NOT be used to help highly loaded servers to stand
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 697) against legal connection rate. If you see SYN flood warnings
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 698) in your logs, but investigation shows that they occur
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 699) because of overload with legal connections, you should tune
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 700) another parameters until this warning disappear.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 701) See: tcp_max_syn_backlog, tcp_synack_retries, tcp_abort_on_overflow.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 702)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 703) syncookies seriously violate TCP protocol, do not allow
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 704) to use TCP extensions, can result in serious degradation
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 705) of some services (f.e. SMTP relaying), visible not by you,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 706) but your clients and relays, contacting you. While you see
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 707) SYN flood warnings in logs not being really flooded, your server
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 708) is seriously misconfigured.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 709)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 710) If you want to test which effects syncookies have to your
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 711) network connections you can set this knob to 2 to enable
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 712) unconditionally generation of syncookies.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 713)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 714) tcp_fastopen - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 715) Enable TCP Fast Open (RFC7413) to send and accept data in the opening
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 716) SYN packet.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 717)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 718) The client support is enabled by flag 0x1 (on by default). The client
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 719) then must use sendmsg() or sendto() with the MSG_FASTOPEN flag,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 720) rather than connect() to send data in SYN.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 721)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 722) The server support is enabled by flag 0x2 (off by default). Then
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 723) either enable for all listeners with another flag (0x400) or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 724) enable individual listeners via TCP_FASTOPEN socket option with
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 725) the option value being the length of the syn-data backlog.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 726)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 727) The values (bitmap) are
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 728)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 729) ===== ======== ======================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 730) 0x1 (client) enables sending data in the opening SYN on the client.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 731) 0x2 (server) enables the server support, i.e., allowing data in
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 732) a SYN packet to be accepted and passed to the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 733) application before 3-way handshake finishes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 734) 0x4 (client) send data in the opening SYN regardless of cookie
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 735) availability and without a cookie option.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 736) 0x200 (server) accept data-in-SYN w/o any cookie option present.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 737) 0x400 (server) enable all listeners to support Fast Open by
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 738) default without explicit TCP_FASTOPEN socket option.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 739) ===== ======== ======================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 740)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 741) Default: 0x1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 742)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 743) Note that additional client or server features are only
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 744) effective if the basic support (0x1 and 0x2) are enabled respectively.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 745)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 746) tcp_fastopen_blackhole_timeout_sec - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 747) Initial time period in second to disable Fastopen on active TCP sockets
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 748) when a TFO firewall blackhole issue happens.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 749) This time period will grow exponentially when more blackhole issues
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 750) get detected right after Fastopen is re-enabled and will reset to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 751) initial value when the blackhole issue goes away.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 752) 0 to disable the blackhole detection.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 753)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 754) By default, it is set to 0 (feature is disabled).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 755)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 756) tcp_fastopen_key - list of comma separated 32-digit hexadecimal INTEGERs
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 757) The list consists of a primary key and an optional backup key. The
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 758) primary key is used for both creating and validating cookies, while the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 759) optional backup key is only used for validating cookies. The purpose of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 760) the backup key is to maximize TFO validation when keys are rotated.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 761)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 762) A randomly chosen primary key may be configured by the kernel if
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 763) the tcp_fastopen sysctl is set to 0x400 (see above), or if the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 764) TCP_FASTOPEN setsockopt() optname is set and a key has not been
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 765) previously configured via sysctl. If keys are configured via
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 766) setsockopt() by using the TCP_FASTOPEN_KEY optname, then those
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 767) per-socket keys will be used instead of any keys that are specified via
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 768) sysctl.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 769)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 770) A key is specified as 4 8-digit hexadecimal integers which are separated
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 771) by a '-' as: xxxxxxxx-xxxxxxxx-xxxxxxxx-xxxxxxxx. Leading zeros may be
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 772) omitted. A primary and a backup key may be specified by separating them
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 773) by a comma. If only one key is specified, it becomes the primary key and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 774) any previously configured backup keys are removed.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 775)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 776) tcp_syn_retries - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 777) Number of times initial SYNs for an active TCP connection attempt
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 778) will be retransmitted. Should not be higher than 127. Default value
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 779) is 6, which corresponds to 63seconds till the last retransmission
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 780) with the current initial RTO of 1second. With this the final timeout
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 781) for an active TCP connection attempt will happen after 127seconds.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 782)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 783) tcp_timestamps - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 784) Enable timestamps as defined in RFC1323.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 785)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 786) - 0: Disabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 787) - 1: Enable timestamps as defined in RFC1323 and use random offset for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 788) each connection rather than only using the current time.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 789) - 2: Like 1, but without random offsets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 790)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 791) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 792)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 793) tcp_min_tso_segs - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 794) Minimal number of segments per TSO frame.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 795)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 796) Since linux-3.12, TCP does an automatic sizing of TSO frames,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 797) depending on flow rate, instead of filling 64Kbytes packets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 798) For specific usages, it's possible to force TCP to build big
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 799) TSO frames. Note that TCP stack might split too big TSO packets
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 800) if available window is too small.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 801)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 802) Default: 2
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 803)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 804) tcp_pacing_ss_ratio - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 805) sk->sk_pacing_rate is set by TCP stack using a ratio applied
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 806) to current rate. (current_rate = cwnd * mss / srtt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 807) If TCP is in slow start, tcp_pacing_ss_ratio is applied
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 808) to let TCP probe for bigger speeds, assuming cwnd can be
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 809) doubled every other RTT.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 810)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 811) Default: 200
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 812)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 813) tcp_pacing_ca_ratio - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 814) sk->sk_pacing_rate is set by TCP stack using a ratio applied
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 815) to current rate. (current_rate = cwnd * mss / srtt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 816) If TCP is in congestion avoidance phase, tcp_pacing_ca_ratio
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 817) is applied to conservatively probe for bigger throughput.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 818)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 819) Default: 120
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 820)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 821) tcp_tso_win_divisor - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 822) This allows control over what percentage of the congestion window
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 823) can be consumed by a single TSO frame.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 824) The setting of this parameter is a choice between burstiness and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 825) building larger TSO frames.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 826)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 827) Default: 3
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 828)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 829) tcp_tw_reuse - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 830) Enable reuse of TIME-WAIT sockets for new connections when it is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 831) safe from protocol viewpoint.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 832)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 833) - 0 - disable
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 834) - 1 - global enable
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 835) - 2 - enable for loopback traffic only
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 836)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 837) It should not be changed without advice/request of technical
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 838) experts.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 839)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 840) Default: 2
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 841)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 842) tcp_window_scaling - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 843) Enable window scaling as defined in RFC1323.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 844)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 845) tcp_wmem - vector of 3 INTEGERs: min, default, max
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 846) min: Amount of memory reserved for send buffers for TCP sockets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 847) Each TCP socket has rights to use it due to fact of its birth.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 848)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 849) Default: 4K
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 850)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 851) default: initial size of send buffer used by TCP sockets. This
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 852) value overrides net.core.wmem_default used by other protocols.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 853)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 854) It is usually lower than net.core.wmem_default.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 855)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 856) Default: 16K
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 857)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 858) max: Maximal amount of memory allowed for automatically tuned
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 859) send buffers for TCP sockets. This value does not override
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 860) net.core.wmem_max. Calling setsockopt() with SO_SNDBUF disables
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 861) automatic tuning of that socket's send buffer size, in which case
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 862) this value is ignored.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 863)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 864) Default: between 64K and 4MB, depending on RAM size.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 865)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 866) tcp_notsent_lowat - UNSIGNED INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 867) A TCP socket can control the amount of unsent bytes in its write queue,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 868) thanks to TCP_NOTSENT_LOWAT socket option. poll()/select()/epoll()
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 869) reports POLLOUT events if the amount of unsent bytes is below a per
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 870) socket value, and if the write queue is not full. sendmsg() will
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 871) also not add new buffers if the limit is hit.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 872)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 873) This global variable controls the amount of unsent data for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 874) sockets not using TCP_NOTSENT_LOWAT. For these sockets, a change
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 875) to the global variable has immediate effect.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 876)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 877) Default: UINT_MAX (0xFFFFFFFF)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 878)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 879) tcp_workaround_signed_windows - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 880) If set, assume no receipt of a window scaling option means the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 881) remote TCP is broken and treats the window as a signed quantity.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 882) If unset, assume the remote TCP is not broken even if we do
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 883) not receive a window scaling option from them.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 884)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 885) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 886)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 887) tcp_thin_linear_timeouts - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 888) Enable dynamic triggering of linear timeouts for thin streams.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 889) If set, a check is performed upon retransmission by timeout to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 890) determine if the stream is thin (less than 4 packets in flight).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 891) As long as the stream is found to be thin, up to 6 linear
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 892) timeouts may be performed before exponential backoff mode is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 893) initiated. This improves retransmission latency for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 894) non-aggressive thin streams, often found to be time-dependent.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 895) For more information on thin streams, see
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 896) Documentation/networking/tcp-thin.rst
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 897)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 898) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 899)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 900) tcp_limit_output_bytes - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 901) Controls TCP Small Queue limit per tcp socket.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 902) TCP bulk sender tends to increase packets in flight until it
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 903) gets losses notifications. With SNDBUF autotuning, this can
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 904) result in a large amount of packets queued on the local machine
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 905) (e.g.: qdiscs, CPU backlog, or device) hurting latency of other
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 906) flows, for typical pfifo_fast qdiscs. tcp_limit_output_bytes
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 907) limits the number of bytes on qdisc or device to reduce artificial
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 908) RTT/cwnd and reduce bufferbloat.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 909)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 910) Default: 1048576 (16 * 65536)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 911)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 912) tcp_challenge_ack_limit - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 913) Limits number of Challenge ACK sent per second, as recommended
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 914) in RFC 5961 (Improving TCP's Robustness to Blind In-Window Attacks)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 915) Default: 1000
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 916)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 917) tcp_rx_skb_cache - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 918) Controls a per TCP socket cache of one skb, that might help
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 919) performance of some workloads. This might be dangerous
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 920) on systems with a lot of TCP sockets, since it increases
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 921) memory usage.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 922)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 923) Default: 0 (disabled)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 924)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 925) UDP variables
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 926) =============
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 927)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 928) udp_l3mdev_accept - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 929) Enabling this option allows a "global" bound socket to work
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 930) across L3 master domains (e.g., VRFs) with packets capable of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 931) being received regardless of the L3 domain in which they
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 932) originated. Only valid when the kernel was compiled with
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 933) CONFIG_NET_L3_MASTER_DEV.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 934)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 935) Default: 0 (disabled)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 936)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 937) udp_mem - vector of 3 INTEGERs: min, pressure, max
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 938) Number of pages allowed for queueing by all UDP sockets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 939)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 940) min: Below this number of pages UDP is not bothered about its
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 941) memory appetite. When amount of memory allocated by UDP exceeds
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 942) this number, UDP starts to moderate memory usage.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 943)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 944) pressure: This value was introduced to follow format of tcp_mem.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 945)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 946) max: Number of pages allowed for queueing by all UDP sockets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 947)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 948) Default is calculated at boot time from amount of available memory.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 949)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 950) udp_rmem_min - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 951) Minimal size of receive buffer used by UDP sockets in moderation.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 952) Each UDP socket is able to use the size for receiving data, even if
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 953) total pages of UDP sockets exceed udp_mem pressure. The unit is byte.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 954)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 955) Default: 4K
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 956)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 957) udp_wmem_min - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 958) Minimal size of send buffer used by UDP sockets in moderation.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 959) Each UDP socket is able to use the size for sending data, even if
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 960) total pages of UDP sockets exceed udp_mem pressure. The unit is byte.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 961)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 962) Default: 4K
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 963)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 964) RAW variables
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 965) =============
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 966)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 967) raw_l3mdev_accept - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 968) Enabling this option allows a "global" bound socket to work
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 969) across L3 master domains (e.g., VRFs) with packets capable of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 970) being received regardless of the L3 domain in which they
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 971) originated. Only valid when the kernel was compiled with
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 972) CONFIG_NET_L3_MASTER_DEV.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 973)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 974) Default: 1 (enabled)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 975)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 976) CIPSOv4 Variables
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 977) =================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 978)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 979) cipso_cache_enable - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 980) If set, enable additions to and lookups from the CIPSO label mapping
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 981) cache. If unset, additions are ignored and lookups always result in a
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 982) miss. However, regardless of the setting the cache is still
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 983) invalidated when required when means you can safely toggle this on and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 984) off and the cache will always be "safe".
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 985)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 986) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 987)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 988) cipso_cache_bucket_size - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 989) The CIPSO label cache consists of a fixed size hash table with each
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 990) hash bucket containing a number of cache entries. This variable limits
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 991) the number of entries in each hash bucket; the larger the value the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 992) more CIPSO label mappings that can be cached. When the number of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 993) entries in a given hash bucket reaches this limit adding new entries
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 994) causes the oldest entry in the bucket to be removed to make room.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 995)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 996) Default: 10
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 997)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 998) cipso_rbm_optfmt - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 999) Enable the "Optimized Tag 1 Format" as defined in section 3.4.2.6 of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1000) the CIPSO draft specification (see Documentation/netlabel for details).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1001) This means that when set the CIPSO tag will be padded with empty
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1002) categories in order to make the packet data 32-bit aligned.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1003)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1004) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1005)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1006) cipso_rbm_structvalid - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1007) If set, do a very strict check of the CIPSO option when
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1008) ip_options_compile() is called. If unset, relax the checks done during
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1009) ip_options_compile(). Either way is "safe" as errors are caught else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1010) where in the CIPSO processing code but setting this to 0 (False) should
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1011) result in less work (i.e. it should be faster) but could cause problems
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1012) with other implementations that require strict checking.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1013)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1014) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1015)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1016) IP Variables
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1017) ============
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1018)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1019) ip_local_port_range - 2 INTEGERS
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1020) Defines the local port range that is used by TCP and UDP to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1021) choose the local port. The first number is the first, the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1022) second the last local port number.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1023) If possible, it is better these numbers have different parity
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1024) (one even and one odd value).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1025) Must be greater than or equal to ip_unprivileged_port_start.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1026) The default values are 32768 and 60999 respectively.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1027)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1028) ip_local_reserved_ports - list of comma separated ranges
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1029) Specify the ports which are reserved for known third-party
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1030) applications. These ports will not be used by automatic port
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1031) assignments (e.g. when calling connect() or bind() with port
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1032) number 0). Explicit port allocation behavior is unchanged.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1033)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1034) The format used for both input and output is a comma separated
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1035) list of ranges (e.g. "1,2-4,10-10" for ports 1, 2, 3, 4 and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1036) 10). Writing to the file will clear all previously reserved
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1037) ports and update the current list with the one given in the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1038) input.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1039)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1040) Note that ip_local_port_range and ip_local_reserved_ports
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1041) settings are independent and both are considered by the kernel
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1042) when determining which ports are available for automatic port
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1043) assignments.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1044)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1045) You can reserve ports which are not in the current
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1046) ip_local_port_range, e.g.::
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1047)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1048) $ cat /proc/sys/net/ipv4/ip_local_port_range
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1049) 32000 60999
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1050) $ cat /proc/sys/net/ipv4/ip_local_reserved_ports
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1051) 8080,9148
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1052)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1053) although this is redundant. However such a setting is useful
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1054) if later the port range is changed to a value that will
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1055) include the reserved ports.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1056)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1057) Default: Empty
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1058)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1059) ip_local_unbindable_ports - list of comma separated ranges
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1060) Specify the ports which are not directly bind()able.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1061)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1062) Usually you would use this to block the use of ports which
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1063) are invalid due to something outside of the control of the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1064) kernel. For example a port stolen by the nic for serial
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1065) console, remote power management or debugging.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1066)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1067) There's a relatively high chance you will also want to list
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1068) these ports in 'ip_local_reserved_ports' to prevent autobinding.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1069)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1070) Default: Empty
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1071)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1072) ip_unprivileged_port_start - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1073) This is a per-namespace sysctl. It defines the first
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1074) unprivileged port in the network namespace. Privileged ports
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1075) require root or CAP_NET_BIND_SERVICE in order to bind to them.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1076) To disable all privileged ports, set this to 0. They must not
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1077) overlap with the ip_local_port_range.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1078)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1079) Default: 1024
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1080)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1081) ip_nonlocal_bind - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1082) If set, allows processes to bind() to non-local IP addresses,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1083) which can be quite useful - but may break some applications.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1084)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1085) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1086)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1087) ip_autobind_reuse - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1088) By default, bind() does not select the ports automatically even if
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1089) the new socket and all sockets bound to the port have SO_REUSEADDR.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1090) ip_autobind_reuse allows bind() to reuse the port and this is useful
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1091) when you use bind()+connect(), but may break some applications.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1092) The preferred solution is to use IP_BIND_ADDRESS_NO_PORT and this
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1093) option should only be set by experts.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1094) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1095)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1096) ip_dynaddr - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1097) If set non-zero, enables support for dynamic addresses.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1098) If set to a non-zero value larger than 1, a kernel log
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1099) message will be printed when dynamic address rewriting
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1100) occurs.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1101)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1102) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1103)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1104) ip_early_demux - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1105) Optimize input packet processing down to one demux for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1106) certain kinds of local sockets. Currently we only do this
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1107) for established TCP and connected UDP sockets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1108)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1109) It may add an additional cost for pure routing workloads that
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1110) reduces overall throughput, in such case you should disable it.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1111)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1112) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1113)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1114) ping_group_range - 2 INTEGERS
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1115) Restrict ICMP_PROTO datagram sockets to users in the group range.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1116) The default is "1 0", meaning, that nobody (not even root) may
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1117) create ping sockets. Setting it to "100 100" would grant permissions
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1118) to the single group. "0 4294967295" would enable it for the world, "100
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1119) 4294967295" would enable it for the users, but not daemons.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1120)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1121) tcp_early_demux - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1122) Enable early demux for established TCP sockets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1123)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1124) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1125)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1126) udp_early_demux - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1127) Enable early demux for connected UDP sockets. Disable this if
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1128) your system could experience more unconnected load.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1129)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1130) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1131)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1132) icmp_echo_ignore_all - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1133) If set non-zero, then the kernel will ignore all ICMP ECHO
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1134) requests sent to it.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1135)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1136) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1137)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1138) icmp_echo_ignore_broadcasts - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1139) If set non-zero, then the kernel will ignore all ICMP ECHO and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1140) TIMESTAMP requests sent to it via broadcast/multicast.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1141)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1142) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1143)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1144) icmp_ratelimit - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1145) Limit the maximal rates for sending ICMP packets whose type matches
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1146) icmp_ratemask (see below) to specific targets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1147) 0 to disable any limiting,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1148) otherwise the minimal space between responses in milliseconds.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1149) Note that another sysctl, icmp_msgs_per_sec limits the number
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1150) of ICMP packets sent on all targets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1151)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1152) Default: 1000
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1153)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1154) icmp_msgs_per_sec - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1155) Limit maximal number of ICMP packets sent per second from this host.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1156) Only messages whose type matches icmp_ratemask (see below) are
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1157) controlled by this limit. For security reasons, the precise count
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1158) of messages per second is randomized.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1159)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1160) Default: 1000
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1161)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1162) icmp_msgs_burst - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1163) icmp_msgs_per_sec controls number of ICMP packets sent per second,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1164) while icmp_msgs_burst controls the burst size of these packets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1165) For security reasons, the precise burst size is randomized.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1166)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1167) Default: 50
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1168)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1169) icmp_ratemask - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1170) Mask made of ICMP types for which rates are being limited.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1171)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1172) Significant bits: IHGFEDCBA9876543210
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1173)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1174) Default mask: 0000001100000011000 (6168)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1175)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1176) Bit definitions (see include/linux/icmp.h):
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1177)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1178) = =========================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1179) 0 Echo Reply
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1180) 3 Destination Unreachable [1]_
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1181) 4 Source Quench [1]_
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1182) 5 Redirect
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1183) 8 Echo Request
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1184) B Time Exceeded [1]_
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1185) C Parameter Problem [1]_
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1186) D Timestamp Request
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1187) E Timestamp Reply
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1188) F Info Request
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1189) G Info Reply
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1190) H Address Mask Request
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1191) I Address Mask Reply
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1192) = =========================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1193)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1194) .. [1] These are rate limited by default (see default mask above)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1195)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1196) icmp_ignore_bogus_error_responses - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1197) Some routers violate RFC1122 by sending bogus responses to broadcast
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1198) frames. Such violations are normally logged via a kernel warning.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1199) If this is set to TRUE, the kernel will not give such warnings, which
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1200) will avoid log file clutter.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1201)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1202) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1203)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1204) icmp_errors_use_inbound_ifaddr - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1205)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1206) If zero, icmp error messages are sent with the primary address of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1207) the exiting interface.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1208)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1209) If non-zero, the message will be sent with the primary address of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1210) the interface that received the packet that caused the icmp error.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1211) This is the behaviour network many administrators will expect from
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1212) a router. And it can make debugging complicated network layouts
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1213) much easier.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1214)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1215) Note that if no primary address exists for the interface selected,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1216) then the primary address of the first non-loopback interface that
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1217) has one will be used regardless of this setting.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1218)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1219) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1220)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1221) igmp_max_memberships - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1222) Change the maximum number of multicast groups we can subscribe to.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1223) Default: 20
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1224)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1225) Theoretical maximum value is bounded by having to send a membership
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1226) report in a single datagram (i.e. the report can't span multiple
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1227) datagrams, or risk confusing the switch and leaving groups you don't
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1228) intend to).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1229)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1230) The number of supported groups 'M' is bounded by the number of group
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1231) report entries you can fit into a single datagram of 65535 bytes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1232)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1233) M = 65536-sizeof (ip header)/(sizeof(Group record))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1234)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1235) Group records are variable length, with a minimum of 12 bytes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1236) So net.ipv4.igmp_max_memberships should not be set higher than:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1237)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1238) (65536-24) / 12 = 5459
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1239)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1240) The value 5459 assumes no IP header options, so in practice
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1241) this number may be lower.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1242)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1243) igmp_max_msf - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1244) Maximum number of addresses allowed in the source filter list for a
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1245) multicast group.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1246)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1247) Default: 10
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1248)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1249) igmp_qrv - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1250) Controls the IGMP query robustness variable (see RFC2236 8.1).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1251)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1252) Default: 2 (as specified by RFC2236 8.1)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1253)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1254) Minimum: 1 (as specified by RFC6636 4.5)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1255)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1256) force_igmp_version - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1257) - 0 - (default) No enforcement of a IGMP version, IGMPv1/v2 fallback
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1258) allowed. Will back to IGMPv3 mode again if all IGMPv1/v2 Querier
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1259) Present timer expires.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1260) - 1 - Enforce to use IGMP version 1. Will also reply IGMPv1 report if
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1261) receive IGMPv2/v3 query.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1262) - 2 - Enforce to use IGMP version 2. Will fallback to IGMPv1 if receive
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1263) IGMPv1 query message. Will reply report if receive IGMPv3 query.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1264) - 3 - Enforce to use IGMP version 3. The same react with default 0.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1265)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1266) .. note::
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1267)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1268) this is not the same with force_mld_version because IGMPv3 RFC3376
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1269) Security Considerations does not have clear description that we could
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1270) ignore other version messages completely as MLDv2 RFC3810. So make
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1271) this value as default 0 is recommended.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1272)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1273) ``conf/interface/*``
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1274) changes special settings per interface (where
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1275) interface" is the name of your network interface)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1276)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1277) ``conf/all/*``
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1278) is special, changes the settings for all interfaces
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1279)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1280) log_martians - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1281) Log packets with impossible addresses to kernel log.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1282) log_martians for the interface will be enabled if at least one of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1283) conf/{all,interface}/log_martians is set to TRUE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1284) it will be disabled otherwise
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1285)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1286) accept_redirects - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1287) Accept ICMP redirect messages.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1288) accept_redirects for the interface will be enabled if:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1289)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1290) - both conf/{all,interface}/accept_redirects are TRUE in the case
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1291) forwarding for the interface is enabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1292)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1293) or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1294)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1295) - at least one of conf/{all,interface}/accept_redirects is TRUE in the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1296) case forwarding for the interface is disabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1297)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1298) accept_redirects for the interface will be disabled otherwise
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1299)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1300) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1301)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1302) - TRUE (host)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1303) - FALSE (router)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1304)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1305) forwarding - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1306) Enable IP forwarding on this interface. This controls whether packets
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1307) received _on_ this interface can be forwarded.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1308)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1309) mc_forwarding - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1310) Do multicast routing. The kernel needs to be compiled with CONFIG_MROUTE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1311) and a multicast routing daemon is required.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1312) conf/all/mc_forwarding must also be set to TRUE to enable multicast
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1313) routing for the interface
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1314)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1315) medium_id - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1316) Integer value used to differentiate the devices by the medium they
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1317) are attached to. Two devices can have different id values when
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1318) the broadcast packets are received only on one of them.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1319) The default value 0 means that the device is the only interface
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1320) to its medium, value of -1 means that medium is not known.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1321)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1322) Currently, it is used to change the proxy_arp behavior:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1323) the proxy_arp feature is enabled for packets forwarded between
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1324) two devices attached to different media.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1325)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1326) proxy_arp - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1327) Do proxy arp.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1328)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1329) proxy_arp for the interface will be enabled if at least one of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1330) conf/{all,interface}/proxy_arp is set to TRUE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1331) it will be disabled otherwise
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1332)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1333) proxy_arp_pvlan - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1334) Private VLAN proxy arp.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1335)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1336) Basically allow proxy arp replies back to the same interface
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1337) (from which the ARP request/solicitation was received).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1338)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1339) This is done to support (ethernet) switch features, like RFC
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1340) 3069, where the individual ports are NOT allowed to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1341) communicate with each other, but they are allowed to talk to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1342) the upstream router. As described in RFC 3069, it is possible
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1343) to allow these hosts to communicate through the upstream
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1344) router by proxy_arp'ing. Don't need to be used together with
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1345) proxy_arp.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1346)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1347) This technology is known by different names:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1348)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1349) In RFC 3069 it is called VLAN Aggregation.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1350) Cisco and Allied Telesyn call it Private VLAN.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1351) Hewlett-Packard call it Source-Port filtering or port-isolation.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1352) Ericsson call it MAC-Forced Forwarding (RFC Draft).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1353)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1354) shared_media - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1355) Send(router) or accept(host) RFC1620 shared media redirects.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1356) Overrides secure_redirects.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1357)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1358) shared_media for the interface will be enabled if at least one of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1359) conf/{all,interface}/shared_media is set to TRUE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1360) it will be disabled otherwise
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1361)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1362) default TRUE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1363)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1364) secure_redirects - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1365) Accept ICMP redirect messages only to gateways listed in the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1366) interface's current gateway list. Even if disabled, RFC1122 redirect
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1367) rules still apply.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1368)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1369) Overridden by shared_media.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1370)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1371) secure_redirects for the interface will be enabled if at least one of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1372) conf/{all,interface}/secure_redirects is set to TRUE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1373) it will be disabled otherwise
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1374)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1375) default TRUE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1376)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1377) send_redirects - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1378) Send redirects, if router.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1379)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1380) send_redirects for the interface will be enabled if at least one of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1381) conf/{all,interface}/send_redirects is set to TRUE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1382) it will be disabled otherwise
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1383)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1384) Default: TRUE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1385)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1386) bootp_relay - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1387) Accept packets with source address 0.b.c.d destined
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1388) not to this host as local ones. It is supposed, that
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1389) BOOTP relay daemon will catch and forward such packets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1390) conf/all/bootp_relay must also be set to TRUE to enable BOOTP relay
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1391) for the interface
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1392)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1393) default FALSE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1394)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1395) Not Implemented Yet.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1396)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1397) accept_source_route - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1398) Accept packets with SRR option.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1399) conf/all/accept_source_route must also be set to TRUE to accept packets
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1400) with SRR option on the interface
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1401)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1402) default
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1403)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1404) - TRUE (router)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1405) - FALSE (host)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1406)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1407) accept_local - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1408) Accept packets with local source addresses. In combination with
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1409) suitable routing, this can be used to direct packets between two
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1410) local interfaces over the wire and have them accepted properly.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1411) default FALSE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1412)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1413) route_localnet - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1414) Do not consider loopback addresses as martian source or destination
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1415) while routing. This enables the use of 127/8 for local routing purposes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1416)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1417) default FALSE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1418)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1419) rp_filter - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1420) - 0 - No source validation.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1421) - 1 - Strict mode as defined in RFC3704 Strict Reverse Path
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1422) Each incoming packet is tested against the FIB and if the interface
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1423) is not the best reverse path the packet check will fail.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1424) By default failed packets are discarded.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1425) - 2 - Loose mode as defined in RFC3704 Loose Reverse Path
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1426) Each incoming packet's source address is also tested against the FIB
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1427) and if the source address is not reachable via any interface
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1428) the packet check will fail.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1429)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1430) Current recommended practice in RFC3704 is to enable strict mode
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1431) to prevent IP spoofing from DDos attacks. If using asymmetric routing
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1432) or other complicated routing, then loose mode is recommended.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1433)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1434) The max value from conf/{all,interface}/rp_filter is used
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1435) when doing source validation on the {interface}.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1436)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1437) Default value is 0. Note that some distributions enable it
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1438) in startup scripts.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1439)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1440) arp_filter - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1441) - 1 - Allows you to have multiple network interfaces on the same
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1442) subnet, and have the ARPs for each interface be answered
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1443) based on whether or not the kernel would route a packet from
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1444) the ARP'd IP out that interface (therefore you must use source
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1445) based routing for this to work). In other words it allows control
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1446) of which cards (usually 1) will respond to an arp request.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1447)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1448) - 0 - (default) The kernel can respond to arp requests with addresses
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1449) from other interfaces. This may seem wrong but it usually makes
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1450) sense, because it increases the chance of successful communication.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1451) IP addresses are owned by the complete host on Linux, not by
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1452) particular interfaces. Only for more complex setups like load-
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1453) balancing, does this behaviour cause problems.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1454)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1455) arp_filter for the interface will be enabled if at least one of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1456) conf/{all,interface}/arp_filter is set to TRUE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1457) it will be disabled otherwise
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1458)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1459) arp_announce - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1460) Define different restriction levels for announcing the local
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1461) source IP address from IP packets in ARP requests sent on
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1462) interface:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1463)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1464) - 0 - (default) Use any local address, configured on any interface
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1465) - 1 - Try to avoid local addresses that are not in the target's
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1466) subnet for this interface. This mode is useful when target
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1467) hosts reachable via this interface require the source IP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1468) address in ARP requests to be part of their logical network
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1469) configured on the receiving interface. When we generate the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1470) request we will check all our subnets that include the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1471) target IP and will preserve the source address if it is from
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1472) such subnet. If there is no such subnet we select source
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1473) address according to the rules for level 2.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1474) - 2 - Always use the best local address for this target.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1475) In this mode we ignore the source address in the IP packet
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1476) and try to select local address that we prefer for talks with
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1477) the target host. Such local address is selected by looking
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1478) for primary IP addresses on all our subnets on the outgoing
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1479) interface that include the target IP address. If no suitable
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1480) local address is found we select the first local address
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1481) we have on the outgoing interface or on all other interfaces,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1482) with the hope we will receive reply for our request and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1483) even sometimes no matter the source IP address we announce.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1484)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1485) The max value from conf/{all,interface}/arp_announce is used.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1486)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1487) Increasing the restriction level gives more chance for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1488) receiving answer from the resolved target while decreasing
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1489) the level announces more valid sender's information.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1490)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1491) arp_ignore - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1492) Define different modes for sending replies in response to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1493) received ARP requests that resolve local target IP addresses:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1494)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1495) - 0 - (default): reply for any local target IP address, configured
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1496) on any interface
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1497) - 1 - reply only if the target IP address is local address
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1498) configured on the incoming interface
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1499) - 2 - reply only if the target IP address is local address
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1500) configured on the incoming interface and both with the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1501) sender's IP address are part from same subnet on this interface
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1502) - 3 - do not reply for local addresses configured with scope host,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1503) only resolutions for global and link addresses are replied
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1504) - 4-7 - reserved
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1505) - 8 - do not reply for all local addresses
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1506)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1507) The max value from conf/{all,interface}/arp_ignore is used
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1508) when ARP request is received on the {interface}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1509)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1510) arp_notify - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1511) Define mode for notification of address and device changes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1512)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1513) == ==========================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1514) 0 (default): do nothing
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1515) 1 Generate gratuitous arp requests when device is brought up
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1516) or hardware address changes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1517) == ==========================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1518)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1519) arp_accept - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1520) Define behavior for gratuitous ARP frames who's IP is not
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1521) already present in the ARP table:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1522)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1523) - 0 - don't create new entries in the ARP table
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1524) - 1 - create new entries in the ARP table
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1525)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1526) Both replies and requests type gratuitous arp will trigger the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1527) ARP table to be updated, if this setting is on.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1528)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1529) If the ARP table already contains the IP address of the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1530) gratuitous arp frame, the arp table will be updated regardless
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1531) if this setting is on or off.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1532)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1533) mcast_solicit - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1534) The maximum number of multicast probes in INCOMPLETE state,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1535) when the associated hardware address is unknown. Defaults
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1536) to 3.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1537)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1538) ucast_solicit - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1539) The maximum number of unicast probes in PROBE state, when
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1540) the hardware address is being reconfirmed. Defaults to 3.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1541)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1542) app_solicit - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1543) The maximum number of probes to send to the user space ARP daemon
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1544) via netlink before dropping back to multicast probes (see
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1545) mcast_resolicit). Defaults to 0.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1546)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1547) mcast_resolicit - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1548) The maximum number of multicast probes after unicast and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1549) app probes in PROBE state. Defaults to 0.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1550)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1551) disable_policy - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1552) Disable IPSEC policy (SPD) for this interface
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1553)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1554) disable_xfrm - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1555) Disable IPSEC encryption on this interface, whatever the policy
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1556)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1557) igmpv2_unsolicited_report_interval - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1558) The interval in milliseconds in which the next unsolicited
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1559) IGMPv1 or IGMPv2 report retransmit will take place.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1560)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1561) Default: 10000 (10 seconds)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1562)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1563) igmpv3_unsolicited_report_interval - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1564) The interval in milliseconds in which the next unsolicited
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1565) IGMPv3 report retransmit will take place.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1566)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1567) Default: 1000 (1 seconds)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1568)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1569) promote_secondaries - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1570) When a primary IP address is removed from this interface
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1571) promote a corresponding secondary IP address instead of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1572) removing all the corresponding secondary IP addresses.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1573)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1574) drop_unicast_in_l2_multicast - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1575) Drop any unicast IP packets that are received in link-layer
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1576) multicast (or broadcast) frames.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1577)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1578) This behavior (for multicast) is actually a SHOULD in RFC
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1579) 1122, but is disabled by default for compatibility reasons.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1580)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1581) Default: off (0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1582)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1583) drop_gratuitous_arp - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1584) Drop all gratuitous ARP frames, for example if there's a known
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1585) good ARP proxy on the network and such frames need not be used
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1586) (or in the case of 802.11, must not be used to prevent attacks.)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1587)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1588) Default: off (0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1589)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1590)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1591) tag - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1592) Allows you to write a number, which can be used as required.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1593)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1594) Default value is 0.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1595)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1596) xfrm4_gc_thresh - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1597) (Obsolete since linux-4.14)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1598) The threshold at which we will start garbage collecting for IPv4
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1599) destination cache entries. At twice this value the system will
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1600) refuse new allocations.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1601)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1602) igmp_link_local_mcast_reports - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1603) Enable IGMP reports for link local multicast groups in the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1604) 224.0.0.X range.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1605)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1606) Default TRUE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1607)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1608) Alexey Kuznetsov.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1609) kuznet@ms2.inr.ac.ru
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1610)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1611) Updated by:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1612)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1613) - Andi Kleen
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1614) ak@muc.de
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1615) - Nicolas Delon
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1616) delon.nicolas@wanadoo.fr
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1617)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1618)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1619)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1620)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1621) /proc/sys/net/ipv6/* Variables
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1622) ==============================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1623)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1624) IPv6 has no global variables such as tcp_*. tcp_* settings under ipv4/ also
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1625) apply to IPv6 [XXX?].
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1626)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1627) bindv6only - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1628) Default value for IPV6_V6ONLY socket option,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1629) which restricts use of the IPv6 socket to IPv6 communication
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1630) only.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1631)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1632) - TRUE: disable IPv4-mapped address feature
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1633) - FALSE: enable IPv4-mapped address feature
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1634)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1635) Default: FALSE (as specified in RFC3493)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1636)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1637) flowlabel_consistency - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1638) Protect the consistency (and unicity) of flow label.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1639) You have to disable it to use IPV6_FL_F_REFLECT flag on the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1640) flow label manager.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1641)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1642) - TRUE: enabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1643) - FALSE: disabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1644)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1645) Default: TRUE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1646)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1647) auto_flowlabels - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1648) Automatically generate flow labels based on a flow hash of the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1649) packet. This allows intermediate devices, such as routers, to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1650) identify packet flows for mechanisms like Equal Cost Multipath
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1651) Routing (see RFC 6438).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1652)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1653) = ===========================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1654) 0 automatic flow labels are completely disabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1655) 1 automatic flow labels are enabled by default, they can be
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1656) disabled on a per socket basis using the IPV6_AUTOFLOWLABEL
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1657) socket option
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1658) 2 automatic flow labels are allowed, they may be enabled on a
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1659) per socket basis using the IPV6_AUTOFLOWLABEL socket option
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1660) 3 automatic flow labels are enabled and enforced, they cannot
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1661) be disabled by the socket option
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1662) = ===========================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1663)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1664) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1665)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1666) flowlabel_state_ranges - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1667) Split the flow label number space into two ranges. 0-0x7FFFF is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1668) reserved for the IPv6 flow manager facility, 0x80000-0xFFFFF
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1669) is reserved for stateless flow labels as described in RFC6437.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1670)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1671) - TRUE: enabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1672) - FALSE: disabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1673)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1674) Default: true
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1675)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1676) flowlabel_reflect - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1677) Control flow label reflection. Needed for Path MTU
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1678) Discovery to work with Equal Cost Multipath Routing in anycast
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1679) environments. See RFC 7690 and:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1680) https://tools.ietf.org/html/draft-wang-6man-flow-label-reflection-01
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1681)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1682) This is a bitmask.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1683)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1684) - 1: enabled for established flows
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1685)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1686) Note that this prevents automatic flowlabel changes, as done
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1687) in "tcp: change IPv6 flow-label upon receiving spurious retransmission"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1688) and "tcp: Change txhash on every SYN and RTO retransmit"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1689)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1690) - 2: enabled for TCP RESET packets (no active listener)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1691) If set, a RST packet sent in response to a SYN packet on a closed
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1692) port will reflect the incoming flow label.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1693)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1694) - 4: enabled for ICMPv6 echo reply messages.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1695)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1696) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1697)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1698) fib_multipath_hash_policy - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1699) Controls which hash policy to use for multipath routes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1700)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1701) Default: 0 (Layer 3)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1702)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1703) Possible values:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1704)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1705) - 0 - Layer 3 (source and destination addresses plus flow label)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1706) - 1 - Layer 4 (standard 5-tuple)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1707) - 2 - Layer 3 or inner Layer 3 if present
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1708)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1709) anycast_src_echo_reply - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1710) Controls the use of anycast addresses as source addresses for ICMPv6
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1711) echo reply
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1712)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1713) - TRUE: enabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1714) - FALSE: disabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1715)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1716) Default: FALSE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1717)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1718) idgen_delay - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1719) Controls the delay in seconds after which time to retry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1720) privacy stable address generation if a DAD conflict is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1721) detected.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1722)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1723) Default: 1 (as specified in RFC7217)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1724)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1725) idgen_retries - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1726) Controls the number of retries to generate a stable privacy
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1727) address if a DAD conflict is detected.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1728)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1729) Default: 3 (as specified in RFC7217)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1730)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1731) mld_qrv - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1732) Controls the MLD query robustness variable (see RFC3810 9.1).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1733)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1734) Default: 2 (as specified by RFC3810 9.1)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1735)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1736) Minimum: 1 (as specified by RFC6636 4.5)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1737)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1738) max_dst_opts_number - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1739) Maximum number of non-padding TLVs allowed in a Destination
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1740) options extension header. If this value is less than zero
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1741) then unknown options are disallowed and the number of known
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1742) TLVs allowed is the absolute value of this number.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1743)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1744) Default: 8
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1745)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1746) max_hbh_opts_number - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1747) Maximum number of non-padding TLVs allowed in a Hop-by-Hop
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1748) options extension header. If this value is less than zero
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1749) then unknown options are disallowed and the number of known
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1750) TLVs allowed is the absolute value of this number.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1751)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1752) Default: 8
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1753)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1754) max_dst_opts_length - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1755) Maximum length allowed for a Destination options extension
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1756) header.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1757)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1758) Default: INT_MAX (unlimited)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1759)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1760) max_hbh_length - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1761) Maximum length allowed for a Hop-by-Hop options extension
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1762) header.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1763)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1764) Default: INT_MAX (unlimited)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1765)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1766) skip_notify_on_dev_down - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1767) Controls whether an RTM_DELROUTE message is generated for routes
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1768) removed when a device is taken down or deleted. IPv4 does not
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1769) generate this message; IPv6 does by default. Setting this sysctl
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1770) to true skips the message, making IPv4 and IPv6 on par in relying
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1771) on userspace caches to track link events and evict routes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1772)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1773) Default: false (generate message)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1774)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1775) nexthop_compat_mode - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1776) New nexthop API provides a means for managing nexthops independent of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1777) prefixes. Backwards compatibilty with old route format is enabled by
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1778) default which means route dumps and notifications contain the new
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1779) nexthop attribute but also the full, expanded nexthop definition.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1780) Further, updates or deletes of a nexthop configuration generate route
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1781) notifications for each fib entry using the nexthop. Once a system
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1782) understands the new API, this sysctl can be disabled to achieve full
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1783) performance benefits of the new API by disabling the nexthop expansion
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1784) and extraneous notifications.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1785) Default: true (backward compat mode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1786)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1787) IPv6 Fragmentation:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1788)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1789) ip6frag_high_thresh - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1790) Maximum memory used to reassemble IPv6 fragments. When
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1791) ip6frag_high_thresh bytes of memory is allocated for this purpose,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1792) the fragment handler will toss packets until ip6frag_low_thresh
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1793) is reached.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1794)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1795) ip6frag_low_thresh - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1796) See ip6frag_high_thresh
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1797)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1798) ip6frag_time - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1799) Time in seconds to keep an IPv6 fragment in memory.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1800)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1801) IPv6 Segment Routing:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1802)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1803) seg6_flowlabel - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1804) Controls the behaviour of computing the flowlabel of outer
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1805) IPv6 header in case of SR T.encaps
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1806)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1807) == =======================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1808) -1 set flowlabel to zero.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1809) 0 copy flowlabel from Inner packet in case of Inner IPv6
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1810) (Set flowlabel to 0 in case IPv4/L2)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1811) 1 Compute the flowlabel using seg6_make_flowlabel()
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1812) == =======================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1813)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1814) Default is 0.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1815)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1816) ``conf/default/*``:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1817) Change the interface-specific default settings.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1818)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1819)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1820) ``conf/all/*``:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1821) Change all the interface-specific settings.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1822)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1823) [XXX: Other special features than forwarding?]
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1824)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1825) conf/all/forwarding - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1826) Enable global IPv6 forwarding between all interfaces.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1827)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1828) IPv4 and IPv6 work differently here; e.g. netfilter must be used
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1829) to control which interfaces may forward packets and which not.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1830)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1831) This also sets all interfaces' Host/Router setting
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1832) 'forwarding' to the specified value. See below for details.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1833)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1834) This referred to as global forwarding.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1835)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1836) proxy_ndp - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1837) Do proxy ndp.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1838)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1839) fwmark_reflect - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1840) Controls the fwmark of kernel-generated IPv6 reply packets that are not
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1841) associated with a socket for example, TCP RSTs or ICMPv6 echo replies).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1842) If unset, these packets have a fwmark of zero. If set, they have the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1843) fwmark of the packet they are replying to.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1844)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1845) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1846)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1847) ``conf/interface/*``:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1848) Change special settings per interface.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1849)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1850) The functional behaviour for certain settings is different
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1851) depending on whether local forwarding is enabled or not.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1852)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1853) accept_ra - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1854) Accept Router Advertisements; autoconfigure using them.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1855)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1856) It also determines whether or not to transmit Router
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1857) Solicitations. If and only if the functional setting is to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1858) accept Router Advertisements, Router Solicitations will be
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1859) transmitted.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1860)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1861) Possible values are:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1862)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1863) == ===========================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1864) 0 Do not accept Router Advertisements.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1865) 1 Accept Router Advertisements if forwarding is disabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1866) 2 Overrule forwarding behaviour. Accept Router Advertisements
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1867) even if forwarding is enabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1868) == ===========================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1869)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1870) Functional default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1871)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1872) - enabled if local forwarding is disabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1873) - disabled if local forwarding is enabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1874)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1875) accept_ra_defrtr - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1876) Learn default router in Router Advertisement.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1877)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1878) Functional default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1879)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1880) - enabled if accept_ra is enabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1881) - disabled if accept_ra is disabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1882)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1883) accept_ra_from_local - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1884) Accept RA with source-address that is found on local machine
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1885) if the RA is otherwise proper and able to be accepted.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1886)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1887) Default is to NOT accept these as it may be an un-intended
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1888) network loop.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1889)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1890) Functional default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1891)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1892) - enabled if accept_ra_from_local is enabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1893) on a specific interface.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1894) - disabled if accept_ra_from_local is disabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1895) on a specific interface.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1896)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1897) accept_ra_min_hop_limit - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1898) Minimum hop limit Information in Router Advertisement.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1899)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1900) Hop limit Information in Router Advertisement less than this
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1901) variable shall be ignored.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1902)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1903) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1904)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1905) accept_ra_pinfo - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1906) Learn Prefix Information in Router Advertisement.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1907)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1908) Functional default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1909)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1910) - enabled if accept_ra is enabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1911) - disabled if accept_ra is disabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1912)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1913) accept_ra_rt_info_min_plen - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1914) Minimum prefix length of Route Information in RA.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1915)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1916) Route Information w/ prefix smaller than this variable shall
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1917) be ignored.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1918)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1919) Functional default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1920)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1921) * 0 if accept_ra_rtr_pref is enabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1922) * -1 if accept_ra_rtr_pref is disabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1923)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1924) accept_ra_rt_info_max_plen - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1925) Maximum prefix length of Route Information in RA.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1926)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1927) Route Information w/ prefix larger than this variable shall
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1928) be ignored.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1929)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1930) Functional default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1931)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1932) * 0 if accept_ra_rtr_pref is enabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1933) * -1 if accept_ra_rtr_pref is disabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1934)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1935) accept_ra_rtr_pref - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1936) Accept Router Preference in RA.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1937)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1938) Functional default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1939)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1940) - enabled if accept_ra is enabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1941) - disabled if accept_ra is disabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1942)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1943) accept_ra_mtu - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1944) Apply the MTU value specified in RA option 5 (RFC4861). If
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1945) disabled, the MTU specified in the RA will be ignored.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1946)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1947) Functional default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1948)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1949) - enabled if accept_ra is enabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1950) - disabled if accept_ra is disabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1951)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1952) accept_redirects - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1953) Accept Redirects.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1954)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1955) Functional default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1956)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1957) - enabled if local forwarding is disabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1958) - disabled if local forwarding is enabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1959)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1960) accept_source_route - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1961) Accept source routing (routing extension header).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1962)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1963) - >= 0: Accept only routing header type 2.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1964) - < 0: Do not accept routing header.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1965)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1966) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1967)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1968) autoconf - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1969) Autoconfigure addresses using Prefix Information in Router
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1970) Advertisements.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1971)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1972) Functional default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1973)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1974) - enabled if accept_ra_pinfo is enabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1975) - disabled if accept_ra_pinfo is disabled.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1976)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1977) dad_transmits - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1978) The amount of Duplicate Address Detection probes to send.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1979)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1980) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1981)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1982) forwarding - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1983) Configure interface-specific Host/Router behaviour.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1984)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1985) .. note::
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1986)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1987) It is recommended to have the same setting on all
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1988) interfaces; mixed router/host scenarios are rather uncommon.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1989)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1990) Possible values are:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1991)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1992) - 0 Forwarding disabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1993) - 1 Forwarding enabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1994)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1995) **FALSE (0)**:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1996)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1997) By default, Host behaviour is assumed. This means:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1998)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1999) 1. IsRouter flag is not set in Neighbour Advertisements.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2000) 2. If accept_ra is TRUE (default), transmit Router
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2001) Solicitations.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2002) 3. If accept_ra is TRUE (default), accept Router
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2003) Advertisements (and do autoconfiguration).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2004) 4. If accept_redirects is TRUE (default), accept Redirects.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2005)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2006) **TRUE (1)**:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2007)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2008) If local forwarding is enabled, Router behaviour is assumed.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2009) This means exactly the reverse from the above:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2010)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2011) 1. IsRouter flag is set in Neighbour Advertisements.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2012) 2. Router Solicitations are not sent unless accept_ra is 2.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2013) 3. Router Advertisements are ignored unless accept_ra is 2.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2014) 4. Redirects are ignored.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2015)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2016) Default: 0 (disabled) if global forwarding is disabled (default),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2017) otherwise 1 (enabled).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2018)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2019) hop_limit - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2020) Default Hop Limit to set.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2021)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2022) Default: 64
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2023)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2024) mtu - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2025) Default Maximum Transfer Unit
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2026)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2027) Default: 1280 (IPv6 required minimum)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2028)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2029) ip_nonlocal_bind - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2030) If set, allows processes to bind() to non-local IPv6 addresses,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2031) which can be quite useful - but may break some applications.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2032)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2033) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2034)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2035) router_probe_interval - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2036) Minimum interval (in seconds) between Router Probing described
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2037) in RFC4191.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2038)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2039) Default: 60
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2040)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2041) router_solicitation_delay - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2042) Number of seconds to wait after interface is brought up
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2043) before sending Router Solicitations.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2044)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2045) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2046)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2047) router_solicitation_interval - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2048) Number of seconds to wait between Router Solicitations.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2049)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2050) Default: 4
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2051)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2052) router_solicitations - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2053) Number of Router Solicitations to send until assuming no
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2054) routers are present.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2055)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2056) Default: 3
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2057)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2058) use_oif_addrs_only - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2059) When enabled, the candidate source addresses for destinations
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2060) routed via this interface are restricted to the set of addresses
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2061) configured on this interface (vis. RFC 6724, section 4).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2062)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2063) Default: false
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2064)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2065) use_tempaddr - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2066) Preference for Privacy Extensions (RFC3041).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2067)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2068) * <= 0 : disable Privacy Extensions
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2069) * == 1 : enable Privacy Extensions, but prefer public
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2070) addresses over temporary addresses.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2071) * > 1 : enable Privacy Extensions and prefer temporary
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2072) addresses over public addresses.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2073)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2074) Default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2075)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2076) * 0 (for most devices)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2077) * -1 (for point-to-point devices and loopback devices)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2078)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2079) temp_valid_lft - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2080) valid lifetime (in seconds) for temporary addresses.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2081)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2082) Default: 172800 (2 days)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2083)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2084) temp_prefered_lft - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2085) Preferred lifetime (in seconds) for temporary addresses.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2086)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2087) Default: 86400 (1 day)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2088)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2089) keep_addr_on_down - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2090) Keep all IPv6 addresses on an interface down event. If set static
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2091) global addresses with no expiration time are not flushed.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2092)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2093) * >0 : enabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2094) * 0 : system default
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2095) * <0 : disabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2096)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2097) Default: 0 (addresses are removed)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2098)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2099) max_desync_factor - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2100) Maximum value for DESYNC_FACTOR, which is a random value
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2101) that ensures that clients don't synchronize with each
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2102) other and generate new addresses at exactly the same time.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2103) value is in seconds.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2104)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2105) Default: 600
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2106)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2107) regen_max_retry - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2108) Number of attempts before give up attempting to generate
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2109) valid temporary addresses.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2110)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2111) Default: 5
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2112)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2113) max_addresses - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2114) Maximum number of autoconfigured addresses per interface. Setting
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2115) to zero disables the limitation. It is not recommended to set this
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2116) value too large (or to zero) because it would be an easy way to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2117) crash the kernel by allowing too many addresses to be created.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2118)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2119) Default: 16
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2120)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2121) disable_ipv6 - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2122) Disable IPv6 operation. If accept_dad is set to 2, this value
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2123) will be dynamically set to TRUE if DAD fails for the link-local
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2124) address.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2125)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2126) Default: FALSE (enable IPv6 operation)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2127)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2128) When this value is changed from 1 to 0 (IPv6 is being enabled),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2129) it will dynamically create a link-local address on the given
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2130) interface and start Duplicate Address Detection, if necessary.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2131)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2132) When this value is changed from 0 to 1 (IPv6 is being disabled),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2133) it will dynamically delete all addresses and routes on the given
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2134) interface. From now on it will not possible to add addresses/routes
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2135) to the selected interface.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2136)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2137) accept_dad - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2138) Whether to accept DAD (Duplicate Address Detection).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2139)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2140) == ==============================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2141) 0 Disable DAD
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2142) 1 Enable DAD (default)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2143) 2 Enable DAD, and disable IPv6 operation if MAC-based duplicate
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2144) link-local address has been found.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2145) == ==============================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2146)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2147) DAD operation and mode on a given interface will be selected according
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2148) to the maximum value of conf/{all,interface}/accept_dad.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2149)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2150) force_tllao - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2151) Enable sending the target link-layer address option even when
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2152) responding to a unicast neighbor solicitation.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2153)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2154) Default: FALSE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2155)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2156) Quoting from RFC 2461, section 4.4, Target link-layer address:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2157)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2158) "The option MUST be included for multicast solicitations in order to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2159) avoid infinite Neighbor Solicitation "recursion" when the peer node
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2160) does not have a cache entry to return a Neighbor Advertisements
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2161) message. When responding to unicast solicitations, the option can be
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2162) omitted since the sender of the solicitation has the correct link-
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2163) layer address; otherwise it would not have be able to send the unicast
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2164) solicitation in the first place. However, including the link-layer
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2165) address in this case adds little overhead and eliminates a potential
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2166) race condition where the sender deletes the cached link-layer address
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2167) prior to receiving a response to a previous solicitation."
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2168)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2169) ndisc_notify - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2170) Define mode for notification of address and device changes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2171)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2172) * 0 - (default): do nothing
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2173) * 1 - Generate unsolicited neighbour advertisements when device is brought
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2174) up or hardware address changes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2175)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2176) ndisc_tclass - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2177) The IPv6 Traffic Class to use by default when sending IPv6 Neighbor
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2178) Discovery (Router Solicitation, Router Advertisement, Neighbor
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2179) Solicitation, Neighbor Advertisement, Redirect) messages.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2180) These 8 bits can be interpreted as 6 high order bits holding the DSCP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2181) value and 2 low order bits representing ECN (which you probably want
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2182) to leave cleared).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2183)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2184) * 0 - (default)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2185)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2186) mldv1_unsolicited_report_interval - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2187) The interval in milliseconds in which the next unsolicited
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2188) MLDv1 report retransmit will take place.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2189)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2190) Default: 10000 (10 seconds)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2191)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2192) mldv2_unsolicited_report_interval - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2193) The interval in milliseconds in which the next unsolicited
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2194) MLDv2 report retransmit will take place.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2195)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2196) Default: 1000 (1 second)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2197)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2198) force_mld_version - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2199) * 0 - (default) No enforcement of a MLD version, MLDv1 fallback allowed
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2200) * 1 - Enforce to use MLD version 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2201) * 2 - Enforce to use MLD version 2
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2202)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2203) suppress_frag_ndisc - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2204) Control RFC 6980 (Security Implications of IPv6 Fragmentation
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2205) with IPv6 Neighbor Discovery) behavior:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2206)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2207) * 1 - (default) discard fragmented neighbor discovery packets
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2208) * 0 - allow fragmented neighbor discovery packets
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2209)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2210) optimistic_dad - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2211) Whether to perform Optimistic Duplicate Address Detection (RFC 4429).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2212)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2213) * 0: disabled (default)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2214) * 1: enabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2215)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2216) Optimistic Duplicate Address Detection for the interface will be enabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2217) if at least one of conf/{all,interface}/optimistic_dad is set to 1,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2218) it will be disabled otherwise.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2219)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2220) use_optimistic - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2221) If enabled, do not classify optimistic addresses as deprecated during
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2222) source address selection. Preferred addresses will still be chosen
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2223) before optimistic addresses, subject to other ranking in the source
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2224) address selection algorithm.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2225)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2226) * 0: disabled (default)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2227) * 1: enabled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2228)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2229) This will be enabled if at least one of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2230) conf/{all,interface}/use_optimistic is set to 1, disabled otherwise.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2231)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2232) stable_secret - IPv6 address
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2233) This IPv6 address will be used as a secret to generate IPv6
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2234) addresses for link-local addresses and autoconfigured
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2235) ones. All addresses generated after setting this secret will
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2236) be stable privacy ones by default. This can be changed via the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2237) addrgenmode ip-link. conf/default/stable_secret is used as the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2238) secret for the namespace, the interface specific ones can
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2239) overwrite that. Writes to conf/all/stable_secret are refused.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2240)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2241) It is recommended to generate this secret during installation
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2242) of a system and keep it stable after that.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2243)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2244) By default the stable secret is unset.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2245)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2246) addr_gen_mode - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2247) Defines how link-local and autoconf addresses are generated.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2248)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2249) = =================================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2250) 0 generate address based on EUI64 (default)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2251) 1 do no generate a link-local address, use EUI64 for addresses
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2252) generated from autoconf
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2253) 2 generate stable privacy addresses, using the secret from
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2254) stable_secret (RFC7217)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2255) 3 generate stable privacy addresses, using a random secret if unset
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2256) = =================================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2257)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2258) drop_unicast_in_l2_multicast - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2259) Drop any unicast IPv6 packets that are received in link-layer
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2260) multicast (or broadcast) frames.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2261)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2262) By default this is turned off.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2263)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2264) drop_unsolicited_na - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2265) Drop all unsolicited neighbor advertisements, for example if there's
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2266) a known good NA proxy on the network and such frames need not be used
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2267) (or in the case of 802.11, must not be used to prevent attacks.)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2268)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2269) By default this is turned off.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2270)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2271) enhanced_dad - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2272) Include a nonce option in the IPv6 neighbor solicitation messages used for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2273) duplicate address detection per RFC7527. A received DAD NS will only signal
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2274) a duplicate address if the nonce is different. This avoids any false
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2275) detection of duplicates due to loopback of the NS messages that we send.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2276) The nonce option will be sent on an interface unless both of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2277) conf/{all,interface}/enhanced_dad are set to FALSE.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2278)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2279) Default: TRUE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2280)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2281) ``icmp/*``:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2282) ===========
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2283)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2284) ratelimit - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2285) Limit the maximal rates for sending ICMPv6 messages.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2286)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2287) 0 to disable any limiting,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2288) otherwise the minimal space between responses in milliseconds.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2289)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2290) Default: 1000
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2291)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2292) ratemask - list of comma separated ranges
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2293) For ICMPv6 message types matching the ranges in the ratemask, limit
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2294) the sending of the message according to ratelimit parameter.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2295)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2296) The format used for both input and output is a comma separated
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2297) list of ranges (e.g. "0-127,129" for ICMPv6 message type 0 to 127 and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2298) 129). Writing to the file will clear all previous ranges of ICMPv6
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2299) message types and update the current list with the input.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2300)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2301) Refer to: https://www.iana.org/assignments/icmpv6-parameters/icmpv6-parameters.xhtml
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2302) for numerical values of ICMPv6 message types, e.g. echo request is 128
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2303) and echo reply is 129.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2304)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2305) Default: 0-1,3-127 (rate limit ICMPv6 errors except Packet Too Big)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2306)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2307) echo_ignore_all - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2308) If set non-zero, then the kernel will ignore all ICMP ECHO
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2309) requests sent to it over the IPv6 protocol.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2310)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2311) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2312)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2313) echo_ignore_multicast - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2314) If set non-zero, then the kernel will ignore all ICMP ECHO
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2315) requests sent to it over the IPv6 protocol via multicast.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2316)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2317) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2318)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2319) echo_ignore_anycast - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2320) If set non-zero, then the kernel will ignore all ICMP ECHO
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2321) requests sent to it over the IPv6 protocol destined to anycast address.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2322)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2323) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2324)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2325) xfrm6_gc_thresh - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2326) (Obsolete since linux-4.14)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2327) The threshold at which we will start garbage collecting for IPv6
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2328) destination cache entries. At twice this value the system will
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2329) refuse new allocations.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2330)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2331)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2332) IPv6 Update by:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2333) Pekka Savola <pekkas@netcore.fi>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2334) YOSHIFUJI Hideaki / USAGI Project <yoshfuji@linux-ipv6.org>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2335)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2336)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2337) /proc/sys/net/bridge/* Variables:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2338) =================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2339)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2340) bridge-nf-call-arptables - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2341) - 1 : pass bridged ARP traffic to arptables' FORWARD chain.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2342) - 0 : disable this.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2343)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2344) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2345)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2346) bridge-nf-call-iptables - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2347) - 1 : pass bridged IPv4 traffic to iptables' chains.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2348) - 0 : disable this.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2349)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2350) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2351)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2352) bridge-nf-call-ip6tables - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2353) - 1 : pass bridged IPv6 traffic to ip6tables' chains.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2354) - 0 : disable this.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2355)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2356) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2357)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2358) bridge-nf-filter-vlan-tagged - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2359) - 1 : pass bridged vlan-tagged ARP/IP/IPv6 traffic to {arp,ip,ip6}tables.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2360) - 0 : disable this.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2361)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2362) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2363)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2364) bridge-nf-filter-pppoe-tagged - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2365) - 1 : pass bridged pppoe-tagged IP/IPv6 traffic to {ip,ip6}tables.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2366) - 0 : disable this.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2367)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2368) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2369)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2370) bridge-nf-pass-vlan-input-dev - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2371) - 1: if bridge-nf-filter-vlan-tagged is enabled, try to find a vlan
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2372) interface on the bridge and set the netfilter input device to the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2373) vlan. This allows use of e.g. "iptables -i br0.1" and makes the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2374) REDIRECT target work with vlan-on-top-of-bridge interfaces. When no
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2375) matching vlan interface is found, or this switch is off, the input
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2376) device is set to the bridge interface.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2377)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2378) - 0: disable bridge netfilter vlan interface lookup.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2379)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2380) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2381)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2382) ``proc/sys/net/sctp/*`` Variables:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2383) ==================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2384)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2385) addip_enable - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2386) Enable or disable extension of Dynamic Address Reconfiguration
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2387) (ADD-IP) functionality specified in RFC5061. This extension provides
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2388) the ability to dynamically add and remove new addresses for the SCTP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2389) associations.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2390)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2391) 1: Enable extension.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2392)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2393) 0: Disable extension.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2394)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2395) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2396)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2397) pf_enable - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2398) Enable or disable pf (pf is short for potentially failed) state. A value
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2399) of pf_retrans > path_max_retrans also disables pf state. That is, one of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2400) both pf_enable and pf_retrans > path_max_retrans can disable pf state.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2401) Since pf_retrans and path_max_retrans can be changed by userspace
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2402) application, sometimes user expects to disable pf state by the value of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2403) pf_retrans > path_max_retrans, but occasionally the value of pf_retrans
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2404) or path_max_retrans is changed by the user application, this pf state is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2405) enabled. As such, it is necessary to add this to dynamically enable
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2406) and disable pf state. See:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2407) https://datatracker.ietf.org/doc/draft-ietf-tsvwg-sctp-failover for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2408) details.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2409)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2410) 1: Enable pf.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2411)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2412) 0: Disable pf.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2413)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2414) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2415)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2416) pf_expose - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2417) Unset or enable/disable pf (pf is short for potentially failed) state
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2418) exposure. Applications can control the exposure of the PF path state
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2419) in the SCTP_PEER_ADDR_CHANGE event and the SCTP_GET_PEER_ADDR_INFO
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2420) sockopt. When it's unset, no SCTP_PEER_ADDR_CHANGE event with
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2421) SCTP_ADDR_PF state will be sent and a SCTP_PF-state transport info
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2422) can be got via SCTP_GET_PEER_ADDR_INFO sockopt; When it's enabled,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2423) a SCTP_PEER_ADDR_CHANGE event will be sent for a transport becoming
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2424) SCTP_PF state and a SCTP_PF-state transport info can be got via
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2425) SCTP_GET_PEER_ADDR_INFO sockopt; When it's diabled, no
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2426) SCTP_PEER_ADDR_CHANGE event will be sent and it returns -EACCES when
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2427) trying to get a SCTP_PF-state transport info via SCTP_GET_PEER_ADDR_INFO
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2428) sockopt.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2429)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2430) 0: Unset pf state exposure, Compatible with old applications.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2431)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2432) 1: Disable pf state exposure.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2433)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2434) 2: Enable pf state exposure.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2435)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2436) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2437)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2438) addip_noauth_enable - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2439) Dynamic Address Reconfiguration (ADD-IP) requires the use of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2440) authentication to protect the operations of adding or removing new
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2441) addresses. This requirement is mandated so that unauthorized hosts
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2442) would not be able to hijack associations. However, older
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2443) implementations may not have implemented this requirement while
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2444) allowing the ADD-IP extension. For reasons of interoperability,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2445) we provide this variable to control the enforcement of the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2446) authentication requirement.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2447)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2448) == ===============================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2449) 1 Allow ADD-IP extension to be used without authentication. This
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2450) should only be set in a closed environment for interoperability
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2451) with older implementations.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2452)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2453) 0 Enforce the authentication requirement
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2454) == ===============================================================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2455)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2456) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2457)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2458) auth_enable - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2459) Enable or disable Authenticated Chunks extension. This extension
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2460) provides the ability to send and receive authenticated chunks and is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2461) required for secure operation of Dynamic Address Reconfiguration
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2462) (ADD-IP) extension.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2463)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2464) - 1: Enable this extension.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2465) - 0: Disable this extension.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2466)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2467) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2468)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2469) prsctp_enable - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2470) Enable or disable the Partial Reliability extension (RFC3758) which
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2471) is used to notify peers that a given DATA should no longer be expected.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2472)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2473) - 1: Enable extension
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2474) - 0: Disable
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2475)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2476) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2477)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2478) max_burst - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2479) The limit of the number of new packets that can be initially sent. It
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2480) controls how bursty the generated traffic can be.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2481)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2482) Default: 4
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2483)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2484) association_max_retrans - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2485) Set the maximum number for retransmissions that an association can
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2486) attempt deciding that the remote end is unreachable. If this value
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2487) is exceeded, the association is terminated.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2488)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2489) Default: 10
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2490)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2491) max_init_retransmits - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2492) The maximum number of retransmissions of INIT and COOKIE-ECHO chunks
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2493) that an association will attempt before declaring the destination
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2494) unreachable and terminating.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2495)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2496) Default: 8
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2497)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2498) path_max_retrans - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2499) The maximum number of retransmissions that will be attempted on a given
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2500) path. Once this threshold is exceeded, the path is considered
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2501) unreachable, and new traffic will use a different path when the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2502) association is multihomed.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2503)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2504) Default: 5
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2505)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2506) pf_retrans - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2507) The number of retransmissions that will be attempted on a given path
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2508) before traffic is redirected to an alternate transport (should one
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2509) exist). Note this is distinct from path_max_retrans, as a path that
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2510) passes the pf_retrans threshold can still be used. Its only
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2511) deprioritized when a transmission path is selected by the stack. This
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2512) setting is primarily used to enable fast failover mechanisms without
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2513) having to reduce path_max_retrans to a very low value. See:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2514) http://www.ietf.org/id/draft-nishida-tsvwg-sctp-failover-05.txt
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2515) for details. Note also that a value of pf_retrans > path_max_retrans
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2516) disables this feature. Since both pf_retrans and path_max_retrans can
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2517) be changed by userspace application, a variable pf_enable is used to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2518) disable pf state.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2519)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2520) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2521)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2522) ps_retrans - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2523) Primary.Switchover.Max.Retrans (PSMR), it's a tunable parameter coming
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2524) from section-5 "Primary Path Switchover" in rfc7829. The primary path
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2525) will be changed to another active path when the path error counter on
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2526) the old primary path exceeds PSMR, so that "the SCTP sender is allowed
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2527) to continue data transmission on a new working path even when the old
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2528) primary destination address becomes active again". Note this feature
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2529) is disabled by initializing 'ps_retrans' per netns as 0xffff by default,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2530) and its value can't be less than 'pf_retrans' when changing by sysctl.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2531)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2532) Default: 0xffff
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2533)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2534) rto_initial - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2535) The initial round trip timeout value in milliseconds that will be used
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2536) in calculating round trip times. This is the initial time interval
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2537) for retransmissions.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2538)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2539) Default: 3000
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2540)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2541) rto_max - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2542) The maximum value (in milliseconds) of the round trip timeout. This
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2543) is the largest time interval that can elapse between retransmissions.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2544)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2545) Default: 60000
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2546)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2547) rto_min - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2548) The minimum value (in milliseconds) of the round trip timeout. This
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2549) is the smallest time interval the can elapse between retransmissions.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2550)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2551) Default: 1000
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2552)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2553) hb_interval - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2554) The interval (in milliseconds) between HEARTBEAT chunks. These chunks
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2555) are sent at the specified interval on idle paths to probe the state of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2556) a given path between 2 associations.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2557)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2558) Default: 30000
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2559)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2560) sack_timeout - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2561) The amount of time (in milliseconds) that the implementation will wait
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2562) to send a SACK.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2563)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2564) Default: 200
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2565)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2566) valid_cookie_life - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2567) The default lifetime of the SCTP cookie (in milliseconds). The cookie
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2568) is used during association establishment.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2569)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2570) Default: 60000
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2571)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2572) cookie_preserve_enable - BOOLEAN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2573) Enable or disable the ability to extend the lifetime of the SCTP cookie
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2574) that is used during the establishment phase of SCTP association
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2575)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2576) - 1: Enable cookie lifetime extension.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2577) - 0: Disable
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2578)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2579) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2580)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2581) cookie_hmac_alg - STRING
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2582) Select the hmac algorithm used when generating the cookie value sent by
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2583) a listening sctp socket to a connecting client in the INIT-ACK chunk.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2584) Valid values are:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2585)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2586) * md5
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2587) * sha1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2588) * none
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2589)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2590) Ability to assign md5 or sha1 as the selected alg is predicated on the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2591) configuration of those algorithms at build time (CONFIG_CRYPTO_MD5 and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2592) CONFIG_CRYPTO_SHA1).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2593)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2594) Default: Dependent on configuration. MD5 if available, else SHA1 if
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2595) available, else none.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2596)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2597) rcvbuf_policy - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2598) Determines if the receive buffer is attributed to the socket or to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2599) association. SCTP supports the capability to create multiple
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2600) associations on a single socket. When using this capability, it is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2601) possible that a single stalled association that's buffering a lot
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2602) of data may block other associations from delivering their data by
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2603) consuming all of the receive buffer space. To work around this,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2604) the rcvbuf_policy could be set to attribute the receiver buffer space
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2605) to each association instead of the socket. This prevents the described
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2606) blocking.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2607)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2608) - 1: rcvbuf space is per association
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2609) - 0: rcvbuf space is per socket
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2610)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2611) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2612)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2613) sndbuf_policy - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2614) Similar to rcvbuf_policy above, this applies to send buffer space.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2615)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2616) - 1: Send buffer is tracked per association
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2617) - 0: Send buffer is tracked per socket.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2618)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2619) Default: 0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2620)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2621) sctp_mem - vector of 3 INTEGERs: min, pressure, max
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2622) Number of pages allowed for queueing by all SCTP sockets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2623)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2624) min: Below this number of pages SCTP is not bothered about its
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2625) memory appetite. When amount of memory allocated by SCTP exceeds
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2626) this number, SCTP starts to moderate memory usage.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2627)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2628) pressure: This value was introduced to follow format of tcp_mem.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2629)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2630) max: Number of pages allowed for queueing by all SCTP sockets.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2631)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2632) Default is calculated at boot time from amount of available memory.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2633)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2634) sctp_rmem - vector of 3 INTEGERs: min, default, max
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2635) Only the first value ("min") is used, "default" and "max" are
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2636) ignored.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2637)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2638) min: Minimal size of receive buffer used by SCTP socket.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2639) It is guaranteed to each SCTP socket (but not association) even
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2640) under moderate memory pressure.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2641)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2642) Default: 4K
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2643)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2644) sctp_wmem - vector of 3 INTEGERs: min, default, max
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2645) Currently this tunable has no effect.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2646)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2647) addr_scope_policy - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2648) Control IPv4 address scoping - draft-stewart-tsvwg-sctp-ipv4-00
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2649)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2650) - 0 - Disable IPv4 address scoping
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2651) - 1 - Enable IPv4 address scoping
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2652) - 2 - Follow draft but allow IPv4 private addresses
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2653) - 3 - Follow draft but allow IPv4 link local addresses
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2654)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2655) Default: 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2656)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2657)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2658) ``/proc/sys/net/core/*``
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2659) ========================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2660)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2661) Please see: Documentation/admin-guide/sysctl/net.rst for descriptions of these entries.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2662)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2663)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2664) ``/proc/sys/net/unix/*``
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2665) ========================
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2666)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2667) max_dgram_qlen - INTEGER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2668) The maximum length of dgram socket receive queue
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2669)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2670) Default: 10
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2671)