Lines Matching +full:mixed +full:- +full:burst
1 .. SPDX-License-Identifier: GPL-2.0
10 ip_forward - BOOLEAN
11 - 0 - disabled (default)
12 - not 0 - enabled
20 ip_default_ttl - INTEGER
25 ip_no_pmtu_disc - INTEGER
27 fragmentation-required ICMP is received, the PMTU to this
37 accept fragmentation-needed errors if the underlying protocol
47 Possible values: 0-3
51 min_pmtu - INTEGER
52 default 552 - minimum discovered Path MTU
54 ip_forward_use_pmtu - BOOLEAN
58 You only need to enable this if you have user-space software
67 - 0 - disabled
68 - 1 - enabled
70 fwmark_reflect - BOOLEAN
71 Controls the fwmark of kernel-generated IPv4 reply packets that are not
78 fib_multipath_use_neigh - BOOLEAN
88 - 0 - disabled
89 - 1 - enabled
91 fib_multipath_hash_policy - INTEGER
99 - 0 - Layer 3
100 - 1 - Layer 4
101 - 2 - Layer 3 or inner Layer 3 if present
103 fib_sync_mem - UNSIGNED INTEGER
109 ip_forward_update_priority - INTEGER
112 according to an rt_tos2priority table (see e.g. man tc-prio).
118 - 0 - Do not update priority.
119 - 1 - Update priority.
121 route/max_size - INTEGER
128 neigh/default/gc_thresh1 - INTEGER
134 neigh/default/gc_thresh2 - INTEGER
141 neigh/default/gc_thresh3 - INTEGER
142 Maximum number of non-PERMANENT neighbor entries allowed. Increase
144 with large numbers of directly-connected peers.
148 neigh/default/unres_qlen_bytes - INTEGER
161 neigh/default/unres_qlen - INTEGER
174 mtu_expires - INTEGER
177 min_adv_mss - INTEGER
183 ipfrag_high_thresh - LONG INTEGER
186 ipfrag_low_thresh - LONG INTEGER
187 (Obsolete since linux-4.17)
192 ipfrag_time - INTEGER
195 ipfrag_max_dist - INTEGER
196 ipfrag_max_dist is a non-negative integer value which defines the
203 is done on fragments before they are added to a reassembly queue - if
221 inet_peer_threshold - INTEGER
224 entries' time-to-live and time intervals between garbage collection
225 passes. More entries, less time-to-live, less GC interval.
227 inet_peer_minttl - INTEGER
228 Minimum time-to-live of entries. Should be enough to cover fragment
229 time-to-live on the reassembling side. This minimum time-to-live is
233 inet_peer_maxttl - INTEGER
234 Maximum time-to-live of entries. Unused entries will expire after
242 somaxconn - INTEGER
244 Defaults to 4096. (Was 128 before linux-5.4)
247 tcp_abort_on_overflow - BOOLEAN
250 occurred due to a burst, connection will recover. Enable this
255 tcp_adv_win_scale - INTEGER
257 (if tcp_adv_win_scale > 0) or bytes-bytes/2^(-tcp_adv_win_scale),
260 Possible values are [-31, 31], inclusive.
264 tcp_allowed_congestion_control - STRING
265 Show/set the congestion control choices available to non-privileged
271 tcp_app_win - INTEGER
277 tcp_autocorking - BOOLEAN
288 tcp_available_congestion_control - STRING
293 tcp_base_mss - INTEGER
298 tcp_mtu_probe_floor - INTEGER
304 tcp_min_snd_mss - INTEGER
313 tcp_congestion_control - STRING
323 tcp_dsack - BOOLEAN
326 tcp_early_retrans - INTEGER
328 losses into fast recovery (draft-ietf-tcpm-rack). Note that
333 - 0 disables TLP
334 - 3 or 4 enables TLP
338 tcp_ecn - INTEGER
357 tcp_ecn_fallback - BOOLEAN
359 back to non-ECN. Currently, this knob implements the fallback
367 tcp_fack - BOOLEAN
370 tcp_fin_timeout - INTEGER
374 valid "receive only" state for an un-orphaned connection, an
382 tcp_frto - INTEGER
383 Enables Forward RTO-Recovery (F-RTO) defined in RFC5682.
384 F-RTO is an enhanced recovery algorithm for TCP retransmission
386 RTT fluctuates (e.g., wireless). F-RTO is sender-side only
389 By default it's enabled with a non-zero value. 0 disables F-RTO.
391 tcp_fwmark_accept - BOOLEAN
402 tcp_invalid_ratelimit - INTEGER
407 (a) out-of-window sequence number,
408 (b) out-of-window acknowledgment number, or
412 a buggy or malicious middlebox or man-in-the-middle can
418 Using 0 disables rate-limiting of dupacks in response to
424 tcp_keepalive_time - INTEGER
428 tcp_keepalive_probes - INTEGER
432 tcp_keepalive_intvl - INTEGER
438 tcp_l3mdev_accept - BOOLEAN
448 tcp_low_latency - BOOLEAN
451 tcp_max_orphans - INTEGER
463 tcp_max_syn_backlog - INTEGER
467 This is a per-listener limit.
477 tcp_max_tw_buckets - INTEGER
479 If this number is exceeded time-wait socket is immediately destroyed
485 tcp_mem - vector of 3 INTEGERs: min, pressure, max
499 tcp_min_rtt_wlen - INTEGER
506 Possible values: 0 - 86400 (1 day)
510 tcp_moderate_rcvbuf - BOOLEAN
511 If set, TCP performs receive buffer auto-tuning, attempting to
516 tcp_mtu_probing - INTEGER
517 Controls TCP Packetization-Layer Path MTU Discovery. Takes three
520 - 0 - Disabled
521 - 1 - Disabled by default, enabled when an ICMP black hole detected
522 - 2 - Always enabled, use initial MSS of tcp_base_mss.
524 tcp_probe_interval - UNSIGNED INTEGER
525 Controls how often to start TCP Packetization-Layer Path MTU
529 tcp_probe_threshold - INTEGER
530 Controls when TCP Packetization-Layer Path MTU Discovery probing
534 tcp_no_metrics_save - BOOLEAN
542 tcp_no_ssthresh_metrics_save - BOOLEAN
547 tcp_orphan_retries - INTEGER
558 tcp_recovery - INTEGER
574 tcp_reordering - INTEGER
581 tcp_max_reordering - INTEGER
588 tcp_retrans_collapse - BOOLEAN
589 Bug-to-bug compatibility with some broken printers.
593 tcp_retries1 - INTEGER
602 tcp_retries2 - INTEGER
617 tcp_rfc1337 - BOOLEAN
624 tcp_rmem - vector of 3 INTEGERs: min, default, max
644 tcp_sack - BOOLEAN
647 tcp_comp_sack_delay_ns - LONG INTEGER
654 tcp_comp_sack_slack_ns - LONG INTEGER
662 tcp_comp_sack_nr - INTEGER
668 tcp_slow_start_after_idle - BOOLEAN
676 tcp_stdurg - BOOLEAN
683 tcp_synack_retries - INTEGER
690 tcp_syncookies - INTEGER
715 tcp_fastopen - INTEGER
726 the option value being the length of the syn-data backlog.
734 application before 3-way handshake finishes.
737 0x200 (server) accept data-in-SYN w/o any cookie option present.
747 tcp_fastopen_blackhole_timeout_sec - INTEGER
751 get detected right after Fastopen is re-enabled and will reset to
757 tcp_fastopen_key - list of comma separated 32-digit hexadecimal INTEGERs
768 per-socket keys will be used instead of any keys that are specified via
771 A key is specified as 4 8-digit hexadecimal integers which are separated
772 by a '-' as: xxxxxxxx-xxxxxxxx-xxxxxxxx-xxxxxxxx. Leading zeros may be
777 tcp_syn_retries - INTEGER
784 tcp_timestamps - INTEGER
787 - 0: Disabled.
788 - 1: Enable timestamps as defined in RFC1323 and use random offset for
790 - 2: Like 1, but without random offsets.
794 tcp_min_tso_segs - INTEGER
797 Since linux-3.12, TCP does an automatic sizing of TSO frames,
805 tcp_pacing_ss_ratio - INTEGER
806 sk->sk_pacing_rate is set by TCP stack using a ratio applied
814 tcp_pacing_ca_ratio - INTEGER
815 sk->sk_pacing_rate is set by TCP stack using a ratio applied
822 tcp_tso_win_divisor - INTEGER
830 tcp_tw_reuse - INTEGER
831 Enable reuse of TIME-WAIT sockets for new connections when it is
834 - 0 - disable
835 - 1 - global enable
836 - 2 - enable for loopback traffic only
843 tcp_window_scaling - BOOLEAN
846 tcp_wmem - vector of 3 INTEGERs: min, default, max
867 tcp_notsent_lowat - UNSIGNED INTEGER
880 tcp_workaround_signed_windows - BOOLEAN
888 tcp_thin_linear_timeouts - BOOLEAN
895 non-aggressive thin streams, often found to be time-dependent.
897 Documentation/networking/tcp-thin.rst
901 tcp_limit_output_bytes - INTEGER
913 tcp_challenge_ack_limit - INTEGER
915 in RFC 5961 (Improving TCP's Robustness to Blind In-Window Attacks)
918 tcp_rx_skb_cache - BOOLEAN
929 udp_l3mdev_accept - BOOLEAN
938 udp_mem - vector of 3 INTEGERs: min, pressure, max
951 udp_rmem_min - INTEGER
958 udp_wmem_min - INTEGER
968 raw_l3mdev_accept - BOOLEAN
980 cipso_cache_enable - BOOLEAN
989 cipso_cache_bucket_size - INTEGER
999 cipso_rbm_optfmt - BOOLEAN
1003 categories in order to make the packet data 32-bit aligned.
1007 cipso_rbm_structvalid - BOOLEAN
1020 ip_local_port_range - 2 INTEGERS
1029 ip_local_reserved_ports - list of comma separated ranges
1030 Specify the ports which are reserved for known third-party
1036 list of ranges (e.g. "1,2-4,10-10" for ports 1, 2, 3, 4 and
1060 ip_unprivileged_port_start - INTEGER
1061 This is a per-namespace sysctl. It defines the first
1069 ip_nonlocal_bind - BOOLEAN
1070 If set, allows processes to bind() to non-local IP addresses,
1071 which can be quite useful - but may break some applications.
1075 ip_autobind_reuse - BOOLEAN
1084 ip_dynaddr - BOOLEAN
1085 If set non-zero, enables support for dynamic addresses.
1086 If set to a non-zero value larger than 1, a kernel log
1092 ip_early_demux - BOOLEAN
1102 ping_group_range - 2 INTEGERS
1109 tcp_early_demux - BOOLEAN
1114 udp_early_demux - BOOLEAN
1120 icmp_echo_ignore_all - BOOLEAN
1121 If set non-zero, then the kernel will ignore all ICMP ECHO
1126 icmp_echo_ignore_broadcasts - BOOLEAN
1127 If set non-zero, then the kernel will ignore all ICMP ECHO and
1132 icmp_ratelimit - INTEGER
1142 icmp_msgs_per_sec - INTEGER
1150 icmp_msgs_burst - INTEGER
1152 while icmp_msgs_burst controls the burst size of these packets.
1153 For security reasons, the precise burst size is randomized.
1157 icmp_ratemask - INTEGER
1184 icmp_ignore_bogus_error_responses - BOOLEAN
1192 icmp_errors_use_inbound_ifaddr - BOOLEAN
1197 If non-zero, the message will be sent with the primary address of
1204 then the primary address of the first non-loopback interface that
1209 igmp_max_memberships - INTEGER
1221 M = 65536-sizeof (ip header)/(sizeof(Group record))
1226 (65536-24) / 12 = 5459
1231 igmp_max_msf - INTEGER
1237 igmp_qrv - INTEGER
1244 force_igmp_version - INTEGER
1245 - 0 - (default) No enforcement of a IGMP version, IGMPv1/v2 fallback
1248 - 1 - Enforce to use IGMP version 1. Will also reply IGMPv1 report if
1250 - 2 - Enforce to use IGMP version 2. Will fallback to IGMPv1 if receive
1252 - 3 - Enforce to use IGMP version 3. The same react with default 0.
1268 log_martians - BOOLEAN
1274 accept_redirects - BOOLEAN
1278 - both conf/{all,interface}/accept_redirects are TRUE in the case
1283 - at least one of conf/{all,interface}/accept_redirects is TRUE in the
1290 - TRUE (host)
1291 - FALSE (router)
1293 forwarding - BOOLEAN
1297 mc_forwarding - BOOLEAN
1303 medium_id - INTEGER
1308 to its medium, value of -1 means that medium is not known.
1314 proxy_arp - BOOLEAN
1321 proxy_arp_pvlan - BOOLEAN
1339 Hewlett-Packard call it Source-Port filtering or port-isolation.
1340 Ericsson call it MAC-Forced Forwarding (RFC Draft).
1342 shared_media - BOOLEAN
1352 secure_redirects - BOOLEAN
1365 send_redirects - BOOLEAN
1374 bootp_relay - BOOLEAN
1385 accept_source_route - BOOLEAN
1392 - TRUE (router)
1393 - FALSE (host)
1395 accept_local - BOOLEAN
1401 route_localnet - BOOLEAN
1407 rp_filter - INTEGER
1408 - 0 - No source validation.
1409 - 1 - Strict mode as defined in RFC3704 Strict Reverse Path
1413 - 2 - Loose mode as defined in RFC3704 Loose Reverse Path
1428 arp_filter - BOOLEAN
1429 - 1 - Allows you to have multiple network interfaces on the same
1436 - 0 - (default) The kernel can respond to arp requests with addresses
1440 particular interfaces. Only for more complex setups like load-
1447 arp_announce - INTEGER
1452 - 0 - (default) Use any local address, configured on any interface
1453 - 1 - Try to avoid local addresses that are not in the target's
1462 - 2 - Always use the best local address for this target.
1479 arp_ignore - INTEGER
1483 - 0 - (default): reply for any local target IP address, configured
1485 - 1 - reply only if the target IP address is local address
1487 - 2 - reply only if the target IP address is local address
1490 - 3 - do not reply for local addresses configured with scope host,
1492 - 4-7 - reserved
1493 - 8 - do not reply for all local addresses
1498 arp_notify - BOOLEAN
1507 arp_accept - BOOLEAN
1511 - 0 - don't create new entries in the ARP table
1512 - 1 - create new entries in the ARP table
1521 mcast_solicit - INTEGER
1526 ucast_solicit - INTEGER
1530 app_solicit - INTEGER
1535 mcast_resolicit - INTEGER
1539 disable_policy - BOOLEAN
1542 disable_xfrm - BOOLEAN
1545 igmpv2_unsolicited_report_interval - INTEGER
1551 igmpv3_unsolicited_report_interval - INTEGER
1557 promote_secondaries - BOOLEAN
1562 drop_unicast_in_l2_multicast - BOOLEAN
1563 Drop any unicast IP packets that are received in link-layer
1571 drop_gratuitous_arp - BOOLEAN
1579 tag - INTEGER
1584 xfrm4_gc_thresh - INTEGER
1585 (Obsolete since linux-4.14)
1590 igmp_link_local_mcast_reports - BOOLEAN
1601 - Andi Kleen
1603 - Nicolas Delon
1615 bindv6only - BOOLEAN
1620 - TRUE: disable IPv4-mapped address feature
1621 - FALSE: enable IPv4-mapped address feature
1625 flowlabel_consistency - BOOLEAN
1630 - TRUE: enabled
1631 - FALSE: disabled
1635 auto_flowlabels - INTEGER
1654 flowlabel_state_ranges - BOOLEAN
1655 Split the flow label number space into two ranges. 0-0x7FFFF is
1656 reserved for the IPv6 flow manager facility, 0x80000-0xFFFFF
1659 - TRUE: enabled
1660 - FALSE: disabled
1664 flowlabel_reflect - INTEGER
1668 https://tools.ietf.org/html/draft-wang-6man-flow-label-reflection-01
1672 - 1: enabled for established flows
1675 in "tcp: change IPv6 flow-label upon receiving spurious retransmission"
1678 - 2: enabled for TCP RESET packets (no active listener)
1682 - 4: enabled for ICMPv6 echo reply messages.
1686 fib_multipath_hash_policy - INTEGER
1693 - 0 - Layer 3 (source and destination addresses plus flow label)
1694 - 1 - Layer 4 (standard 5-tuple)
1695 - 2 - Layer 3 or inner Layer 3 if present
1697 anycast_src_echo_reply - BOOLEAN
1701 - TRUE: enabled
1702 - FALSE: disabled
1706 idgen_delay - INTEGER
1713 idgen_retries - INTEGER
1719 mld_qrv - INTEGER
1726 max_dst_opts_number - INTEGER
1727 Maximum number of non-padding TLVs allowed in a Destination
1734 max_hbh_opts_number - INTEGER
1735 Maximum number of non-padding TLVs allowed in a Hop-by-Hop
1742 max_dst_opts_length - INTEGER
1748 max_hbh_length - INTEGER
1749 Maximum length allowed for a Hop-by-Hop options extension
1754 skip_notify_on_dev_down - BOOLEAN
1763 nexthop_compat_mode - BOOLEAN
1777 ip6frag_high_thresh - INTEGER
1783 ip6frag_low_thresh - INTEGER
1786 ip6frag_time - INTEGER
1791 seg6_flowlabel - INTEGER
1796 -1 set flowlabel to zero.
1805 Change the interface-specific default settings.
1809 Change all the interface-specific settings.
1813 conf/all/forwarding - BOOLEAN
1824 proxy_ndp - BOOLEAN
1827 fwmark_reflect - BOOLEAN
1828 Controls the fwmark of kernel-generated IPv6 reply packets that are not
1841 accept_ra - INTEGER
1860 - enabled if local forwarding is disabled.
1861 - disabled if local forwarding is enabled.
1863 accept_ra_defrtr - BOOLEAN
1868 - enabled if accept_ra is enabled.
1869 - disabled if accept_ra is disabled.
1871 accept_ra_from_local - BOOLEAN
1872 Accept RA with source-address that is found on local machine
1875 Default is to NOT accept these as it may be an un-intended
1880 - enabled if accept_ra_from_local is enabled
1882 - disabled if accept_ra_from_local is disabled
1885 accept_ra_min_hop_limit - INTEGER
1893 accept_ra_pinfo - BOOLEAN
1898 - enabled if accept_ra is enabled.
1899 - disabled if accept_ra is disabled.
1901 accept_ra_rt_info_min_plen - INTEGER
1910 * -1 if accept_ra_rtr_pref is disabled.
1912 accept_ra_rt_info_max_plen - INTEGER
1921 * -1 if accept_ra_rtr_pref is disabled.
1923 accept_ra_rtr_pref - BOOLEAN
1928 - enabled if accept_ra is enabled.
1929 - disabled if accept_ra is disabled.
1931 accept_ra_mtu - BOOLEAN
1937 - enabled if accept_ra is enabled.
1938 - disabled if accept_ra is disabled.
1940 accept_redirects - BOOLEAN
1945 - enabled if local forwarding is disabled.
1946 - disabled if local forwarding is enabled.
1948 accept_source_route - INTEGER
1951 - >= 0: Accept only routing header type 2.
1952 - < 0: Do not accept routing header.
1956 autoconf - BOOLEAN
1962 - enabled if accept_ra_pinfo is enabled.
1963 - disabled if accept_ra_pinfo is disabled.
1965 dad_transmits - INTEGER
1970 forwarding - INTEGER
1971 Configure interface-specific Host/Router behaviour.
1976 interfaces; mixed router/host scenarios are rather uncommon.
1980 - 0 Forwarding disabled
1981 - 1 Forwarding enabled
2007 hop_limit - INTEGER
2012 mtu - INTEGER
2017 ip_nonlocal_bind - BOOLEAN
2018 If set, allows processes to bind() to non-local IPv6 addresses,
2019 which can be quite useful - but may break some applications.
2023 router_probe_interval - INTEGER
2029 router_solicitation_delay - INTEGER
2035 router_solicitation_interval - INTEGER
2040 router_solicitations - INTEGER
2046 use_oif_addrs_only - BOOLEAN
2053 use_tempaddr - INTEGER
2065 * -1 (for point-to-point devices and loopback devices)
2067 temp_valid_lft - INTEGER
2072 temp_prefered_lft - INTEGER
2077 keep_addr_on_down - INTEGER
2087 max_desync_factor - INTEGER
2095 regen_max_retry - INTEGER
2101 max_addresses - INTEGER
2109 disable_ipv6 - BOOLEAN
2111 will be dynamically set to TRUE if DAD fails for the link-local
2117 it will dynamically create a link-local address on the given
2125 accept_dad - INTEGER
2131 2 Enable DAD, and disable IPv6 operation if MAC-based duplicate
2132 link-local address has been found.
2138 force_tllao - BOOLEAN
2139 Enable sending the target link-layer address option even when
2144 Quoting from RFC 2461, section 4.4, Target link-layer address:
2150 omitted since the sender of the solicitation has the correct link-
2152 solicitation in the first place. However, including the link-layer
2154 race condition where the sender deletes the cached link-layer address
2157 ndisc_notify - BOOLEAN
2160 * 0 - (default): do nothing
2161 * 1 - Generate unsolicited neighbour advertisements when device is brought
2164 ndisc_tclass - INTEGER
2172 * 0 - (default)
2174 mldv1_unsolicited_report_interval - INTEGER
2180 mldv2_unsolicited_report_interval - INTEGER
2186 force_mld_version - INTEGER
2187 * 0 - (default) No enforcement of a MLD version, MLDv1 fallback allowed
2188 * 1 - Enforce to use MLD version 1
2189 * 2 - Enforce to use MLD version 2
2191 suppress_frag_ndisc - INTEGER
2195 * 1 - (default) discard fragmented neighbor discovery packets
2196 * 0 - allow fragmented neighbor discovery packets
2198 optimistic_dad - BOOLEAN
2208 use_optimistic - BOOLEAN
2220 stable_secret - IPv6 address
2222 addresses for link-local addresses and autoconfigured
2225 addrgenmode ip-link. conf/default/stable_secret is used as the
2234 addr_gen_mode - INTEGER
2235 Defines how link-local and autoconf addresses are generated.
2239 1 do no generate a link-local address, use EUI64 for addresses
2246 drop_unicast_in_l2_multicast - BOOLEAN
2247 Drop any unicast IPv6 packets that are received in link-layer
2252 drop_unsolicited_na - BOOLEAN
2259 enhanced_dad - BOOLEAN
2272 ratelimit - INTEGER
2280 ratemask - list of comma separated ranges
2285 list of ranges (e.g. "0-127,129" for ICMPv6 message type 0 to 127 and
2289 Refer to: https://www.iana.org/assignments/icmpv6-parameters/icmpv6-parameters.xhtml
2293 Default: 0-1,3-127 (rate limit ICMPv6 errors except Packet Too Big)
2295 echo_ignore_all - BOOLEAN
2296 If set non-zero, then the kernel will ignore all ICMP ECHO
2301 echo_ignore_multicast - BOOLEAN
2302 If set non-zero, then the kernel will ignore all ICMP ECHO
2307 echo_ignore_anycast - BOOLEAN
2308 If set non-zero, then the kernel will ignore all ICMP ECHO
2313 xfrm6_gc_thresh - INTEGER
2314 (Obsolete since linux-4.14)
2322 YOSHIFUJI Hideaki / USAGI Project <yoshfuji@linux-ipv6.org>
2328 bridge-nf-call-arptables - BOOLEAN
2329 - 1 : pass bridged ARP traffic to arptables' FORWARD chain.
2330 - 0 : disable this.
2334 bridge-nf-call-iptables - BOOLEAN
2335 - 1 : pass bridged IPv4 traffic to iptables' chains.
2336 - 0 : disable this.
2340 bridge-nf-call-ip6tables - BOOLEAN
2341 - 1 : pass bridged IPv6 traffic to ip6tables' chains.
2342 - 0 : disable this.
2346 bridge-nf-filter-vlan-tagged - BOOLEAN
2347 - 1 : pass bridged vlan-tagged ARP/IP/IPv6 traffic to {arp,ip,ip6}tables.
2348 - 0 : disable this.
2352 bridge-nf-filter-pppoe-tagged - BOOLEAN
2353 - 1 : pass bridged pppoe-tagged IP/IPv6 traffic to {ip,ip6}tables.
2354 - 0 : disable this.
2358 bridge-nf-pass-vlan-input-dev - BOOLEAN
2359 - 1: if bridge-nf-filter-vlan-tagged is enabled, try to find a vlan
2361 vlan. This allows use of e.g. "iptables -i br0.1" and makes the
2362 REDIRECT target work with vlan-on-top-of-bridge interfaces. When no
2366 - 0: disable bridge netfilter vlan interface lookup.
2373 addip_enable - BOOLEAN
2375 (ADD-IP) functionality specified in RFC5061. This extension provides
2385 pf_enable - INTEGER
2395 https://datatracker.ietf.org/doc/draft-ietf-tsvwg-sctp-failover for
2404 pf_expose - INTEGER
2409 SCTP_ADDR_PF state will be sent and a SCTP_PF-state transport info
2412 SCTP_PF state and a SCTP_PF-state transport info can be got via
2414 SCTP_PEER_ADDR_CHANGE event will be sent and it returns -EACCES when
2415 trying to get a SCTP_PF-state transport info via SCTP_GET_PEER_ADDR_INFO
2426 addip_noauth_enable - BOOLEAN
2427 Dynamic Address Reconfiguration (ADD-IP) requires the use of
2432 allowing the ADD-IP extension. For reasons of interoperability,
2437 1 Allow ADD-IP extension to be used without authentication. This
2446 auth_enable - BOOLEAN
2450 (ADD-IP) extension.
2452 - 1: Enable this extension.
2453 - 0: Disable this extension.
2457 prsctp_enable - BOOLEAN
2461 - 1: Enable extension
2462 - 0: Disable
2466 max_burst - INTEGER
2472 association_max_retrans - INTEGER
2479 max_init_retransmits - INTEGER
2480 The maximum number of retransmissions of INIT and COOKIE-ECHO chunks
2486 path_max_retrans - INTEGER
2494 pf_retrans - INTEGER
2502 http://www.ietf.org/id/draft-nishida-tsvwg-sctp-failover-05.txt
2510 ps_retrans - INTEGER
2512 from section-5 "Primary Path Switchover" in rfc7829. The primary path
2522 rto_initial - INTEGER
2529 rto_max - INTEGER
2535 rto_min - INTEGER
2541 hb_interval - INTEGER
2548 sack_timeout - INTEGER
2554 valid_cookie_life - INTEGER
2560 cookie_preserve_enable - BOOLEAN
2564 - 1: Enable cookie lifetime extension.
2565 - 0: Disable
2569 cookie_hmac_alg - STRING
2571 a listening sctp socket to a connecting client in the INIT-ACK chunk.
2585 rcvbuf_policy - INTEGER
2596 - 1: rcvbuf space is per association
2597 - 0: rcvbuf space is per socket
2601 sndbuf_policy - INTEGER
2604 - 1: Send buffer is tracked per association
2605 - 0: Send buffer is tracked per socket.
2609 sctp_mem - vector of 3 INTEGERs: min, pressure, max
2622 sctp_rmem - vector of 3 INTEGERs: min, default, max
2632 sctp_wmem - vector of 3 INTEGERs: min, default, max
2635 addr_scope_policy - INTEGER
2636 Control IPv4 address scoping - draft-stewart-tsvwg-sctp-ipv4-00
2638 - 0 - Disable IPv4 address scoping
2639 - 1 - Enable IPv4 address scoping
2640 - 2 - Follow draft but allow IPv4 private addresses
2641 - 3 - Follow draft but allow IPv4 link local addresses
2649 Please see: Documentation/admin-guide/sysctl/net.rst for descriptions of these entries.
2655 max_dgram_qlen - INTEGER