Lines Matching +full:can +full:- +full:disable
1 .. SPDX-License-Identifier: GPL-2.0
10 ip_forward - BOOLEAN
11 - 0 - disabled (default)
12 - not 0 - enabled
20 ip_default_ttl - INTEGER
25 ip_no_pmtu_disc - INTEGER
26 Disable Path MTU Discovery. If enabled in mode 1 and a
27 fragmentation-required ICMP is received, the PMTU to this
37 accept fragmentation-needed errors if the underlying protocol
38 can verify them besides a plain socket lookup. Current
47 Possible values: 0-3
51 min_pmtu - INTEGER
52 default 552 - minimum discovered Path MTU
54 ip_forward_use_pmtu - BOOLEAN
56 because they could be easily forged and can lead to unwanted
58 You only need to enable this if you have user-space software
67 - 0 - disabled
68 - 1 - enabled
70 fwmark_reflect - BOOLEAN
71 Controls the fwmark of kernel-generated IPv4 reply packets that are not
78 fib_multipath_use_neigh - BOOLEAN
88 - 0 - disabled
89 - 1 - enabled
91 fib_multipath_hash_policy - INTEGER
99 - 0 - Layer 3
100 - 1 - Layer 4
101 - 2 - Layer 3 or inner Layer 3 if present
102 - 3 - Custom multipath hash. Fields used for multipath hash calculation
105 fib_multipath_hash_fields - UNSIGNED INTEGER
132 fib_sync_mem - UNSIGNED INTEGER
133 Amount of dirty memory from fib entries that can be backlogged before
138 ip_forward_update_priority - INTEGER
141 according to an rt_tos2priority table (see e.g. man tc-prio).
147 - 0 - Do not update priority.
148 - 1 - Update priority.
150 route/max_size - INTEGER
157 neigh/default/gc_thresh1 - INTEGER
163 neigh/default/gc_thresh2 - INTEGER
170 neigh/default/gc_thresh3 - INTEGER
171 Maximum number of non-PERMANENT neighbor entries allowed. Increase
173 with large numbers of directly-connected peers.
177 neigh/default/unres_qlen_bytes - INTEGER
190 neigh/default/unres_qlen - INTEGER
203 mtu_expires - INTEGER
206 min_adv_mss - INTEGER
210 fib_notify_on_flag_change - INTEGER
219 trapping packets can be "promoted" to perform decapsulation following
221 The notifications will indicate to user-space the state of the route.
227 - 0 - Do not emit notifications.
228 - 1 - Emit notifications.
229 - 2 - Emit notifications only for RTM_F_OFFLOAD_FAILED flag change.
233 ipfrag_high_thresh - LONG INTEGER
236 ipfrag_low_thresh - LONG INTEGER
237 (Obsolete since linux-4.17)
242 ipfrag_time - INTEGER
245 ipfrag_max_dist - INTEGER
246 ipfrag_max_dist is a non-negative integer value which defines the
253 is done on fragments before they are added to a reassembly queue - if
260 Using a very small value, e.g. 1 or 2, for ipfrag_max_dist can
271 inet_peer_threshold - INTEGER
274 entries' time-to-live and time intervals between garbage collection
275 passes. More entries, less time-to-live, less GC interval.
277 inet_peer_minttl - INTEGER
278 Minimum time-to-live of entries. Should be enough to cover fragment
279 time-to-live on the reassembling side. This minimum time-to-live is
283 inet_peer_maxttl - INTEGER
284 Maximum time-to-live of entries. Unused entries will expire after
292 somaxconn - INTEGER
294 Defaults to 4096. (Was 128 before linux-5.4)
297 tcp_abort_on_overflow - BOOLEAN
303 option can harm clients of your server.
305 tcp_adv_win_scale - INTEGER
307 (if tcp_adv_win_scale > 0) or bytes-bytes/2^(-tcp_adv_win_scale),
310 Possible values are [-31, 31], inclusive.
314 tcp_allowed_congestion_control - STRING
315 Show/set the congestion control choices available to non-privileged
321 tcp_app_win - INTEGER
327 tcp_autocorking - BOOLEAN
333 queue. Applications can still use TCP_CORK for optimal behavior
338 tcp_available_congestion_control - STRING
343 tcp_base_mss - INTEGER
348 tcp_mtu_probe_floor - INTEGER
354 tcp_min_snd_mss - INTEGER
363 tcp_congestion_control - STRING
373 tcp_dsack - BOOLEAN
376 tcp_early_retrans - INTEGER
378 losses into fast recovery (draft-ietf-tcpm-rack). Note that
383 - 0 disables TLP
384 - 3 or 4 enables TLP
388 tcp_ecn - INTEGER
398 0 Disable ECN. Neither initiate nor accept ECN.
407 tcp_ecn_fallback - BOOLEAN
409 back to non-ECN. Currently, this knob implements the fallback
417 tcp_fack - BOOLEAN
420 tcp_fin_timeout - INTEGER
424 valid "receive only" state for an un-orphaned connection, an
432 tcp_frto - INTEGER
433 Enables Forward RTO-Recovery (F-RTO) defined in RFC5682.
434 F-RTO is an enhanced recovery algorithm for TCP retransmission
436 RTT fluctuates (e.g., wireless). F-RTO is sender-side only
439 By default it's enabled with a non-zero value. 0 disables F-RTO.
441 tcp_fwmark_accept - BOOLEAN
452 tcp_invalid_ratelimit - INTEGER
457 (a) out-of-window sequence number,
458 (b) out-of-window acknowledgment number, or
461 This can help mitigate simple "ack loop" DoS attacks, wherein
462 a buggy or malicious middlebox or man-in-the-middle can
468 Using 0 disables rate-limiting of dupacks in response to
474 tcp_keepalive_time - INTEGER
478 tcp_keepalive_probes - INTEGER
482 tcp_keepalive_intvl - INTEGER
488 tcp_l3mdev_accept - BOOLEAN
498 tcp_low_latency - BOOLEAN
501 tcp_max_orphans - INTEGER
513 tcp_max_syn_backlog - INTEGER
517 This is a per-listener limit.
527 tcp_max_tw_buckets - INTEGER
529 If this number is exceeded time-wait socket is immediately destroyed
535 tcp_mem - vector of 3 INTEGERs: min, pressure, max
549 tcp_min_rtt_wlen - INTEGER
556 Possible values: 0 - 86400 (1 day)
560 tcp_moderate_rcvbuf - BOOLEAN
561 If set, TCP performs receive buffer auto-tuning, attempting to
566 tcp_mtu_probing - INTEGER
567 Controls TCP Packetization-Layer Path MTU Discovery. Takes three
570 - 0 - Disabled
571 - 1 - Disabled by default, enabled when an ICMP black hole detected
572 - 2 - Always enabled, use initial MSS of tcp_base_mss.
574 tcp_probe_interval - UNSIGNED INTEGER
575 Controls how often to start TCP Packetization-Layer Path MTU
579 tcp_probe_threshold - INTEGER
580 Controls when TCP Packetization-Layer Path MTU Discovery probing
584 tcp_no_metrics_save - BOOLEAN
587 near future can use these to set initial conditions. Usually, this
592 tcp_no_ssthresh_metrics_save - BOOLEAN
597 tcp_orphan_retries - INTEGER
608 tcp_recovery - INTEGER
624 tcp_reordering - INTEGER
626 TCP stack can then dynamically adjust flow reordering level
631 tcp_max_reordering - INTEGER
638 tcp_retrans_collapse - BOOLEAN
639 Bug-to-bug compatibility with some broken printers.
643 tcp_retries1 - INTEGER
652 tcp_retries2 - INTEGER
667 tcp_rfc1337 - BOOLEAN
674 tcp_rmem - vector of 3 INTEGERs: min, default, max
693 tcp_sack - BOOLEAN
696 tcp_comp_sack_delay_ns - LONG INTEGER
703 tcp_comp_sack_slack_ns - LONG INTEGER
711 tcp_comp_sack_nr - INTEGER
712 Max number of SACK that can be compressed.
717 tcp_slow_start_after_idle - BOOLEAN
725 tcp_stdurg - BOOLEAN
732 tcp_synack_retries - INTEGER
739 tcp_syncookies - INTEGER
754 to use TCP extensions, can result in serious degradation
761 network connections you can set this knob to 2 to enable
764 tcp_migrate_req - BOOLEAN
766 the initial SYN packet is received during the three-way handshake.
767 When a listener is closed, in-flight request sockets during the
785 disable this option.
789 tcp_fastopen - INTEGER
800 the option value being the length of the syn-data backlog.
808 application before 3-way handshake finishes.
811 0x200 (server) accept data-in-SYN w/o any cookie option present.
821 tcp_fastopen_blackhole_timeout_sec - INTEGER
822 Initial time period in second to disable Fastopen on active TCP sockets
825 get detected right after Fastopen is re-enabled and will reset to
827 0 to disable the blackhole detection.
831 tcp_fastopen_key - list of comma separated 32-digit hexadecimal INTEGERs
842 per-socket keys will be used instead of any keys that are specified via
845 A key is specified as 4 8-digit hexadecimal integers which are separated
846 by a '-' as: xxxxxxxx-xxxxxxxx-xxxxxxxx-xxxxxxxx. Leading zeros may be
851 tcp_syn_retries - INTEGER
858 tcp_timestamps - INTEGER
861 - 0: Disabled.
862 - 1: Enable timestamps as defined in RFC1323 and use random offset for
864 - 2: Like 1, but without random offsets.
868 tcp_min_tso_segs - INTEGER
871 Since linux-3.12, TCP does an automatic sizing of TSO frames,
879 tcp_pacing_ss_ratio - INTEGER
880 sk->sk_pacing_rate is set by TCP stack using a ratio applied
883 to let TCP probe for bigger speeds, assuming cwnd can be
888 tcp_pacing_ca_ratio - INTEGER
889 sk->sk_pacing_rate is set by TCP stack using a ratio applied
896 tcp_tso_win_divisor - INTEGER
898 can be consumed by a single TSO frame.
904 tcp_tw_reuse - INTEGER
905 Enable reuse of TIME-WAIT sockets for new connections when it is
908 - 0 - disable
909 - 1 - global enable
910 - 2 - enable for loopback traffic only
917 tcp_window_scaling - BOOLEAN
920 tcp_wmem - vector of 3 INTEGERs: min, default, max
941 tcp_notsent_lowat - UNSIGNED INTEGER
942 A TCP socket can control the amount of unsent bytes in its write queue,
954 tcp_workaround_signed_windows - BOOLEAN
962 tcp_thin_linear_timeouts - BOOLEAN
969 non-aggressive thin streams, often found to be time-dependent.
971 Documentation/networking/tcp-thin.rst
975 tcp_limit_output_bytes - INTEGER
978 gets losses notifications. With SNDBUF autotuning, this can
987 tcp_challenge_ack_limit - INTEGER
989 in RFC 5961 (Improving TCP's Robustness to Blind In-Window Attacks)
992 tcp_rx_skb_cache - BOOLEAN
1003 udp_l3mdev_accept - BOOLEAN
1012 udp_mem - vector of 3 INTEGERs: min, pressure, max
1025 udp_rmem_min - INTEGER
1032 udp_wmem_min - INTEGER
1042 raw_l3mdev_accept - BOOLEAN
1054 cipso_cache_enable - BOOLEAN
1058 invalidated when required when means you can safely toggle this on and
1063 cipso_cache_bucket_size - INTEGER
1067 more CIPSO label mappings that can be cached. When the number of
1073 cipso_rbm_optfmt - BOOLEAN
1077 categories in order to make the packet data 32-bit aligned.
1081 cipso_rbm_structvalid - BOOLEAN
1094 ip_local_port_range - 2 INTEGERS
1103 ip_local_reserved_ports - list of comma separated ranges
1104 Specify the ports which are reserved for known third-party
1110 list of ranges (e.g. "1,2-4,10-10" for ports 1, 2, 3, 4 and
1120 You can reserve ports which are not in the current
1136 ip_unprivileged_port_start - INTEGER
1137 This is a per-namespace sysctl. It defines the first
1140 To disable all privileged ports, set this to 0. They must not
1145 ip_nonlocal_bind - BOOLEAN
1146 If set, allows processes to bind() to non-local IP addresses,
1147 which can be quite useful - but may break some applications.
1151 ip_autobind_reuse - BOOLEAN
1160 ip_dynaddr - BOOLEAN
1161 If set non-zero, enables support for dynamic addresses.
1162 If set to a non-zero value larger than 1, a kernel log
1168 ip_early_demux - BOOLEAN
1174 reduces overall throughput, in such case you should disable it.
1178 ping_group_range - 2 INTEGERS
1185 tcp_early_demux - BOOLEAN
1190 udp_early_demux - BOOLEAN
1191 Enable early demux for connected UDP sockets. Disable this if
1196 icmp_echo_ignore_all - BOOLEAN
1197 If set non-zero, then the kernel will ignore all ICMP ECHO
1202 icmp_echo_enable_probe - BOOLEAN
1208 icmp_echo_ignore_broadcasts - BOOLEAN
1209 If set non-zero, then the kernel will ignore all ICMP ECHO and
1214 icmp_ratelimit - INTEGER
1217 0 to disable any limiting,
1224 icmp_msgs_per_sec - INTEGER
1232 icmp_msgs_burst - INTEGER
1239 icmp_ratemask - INTEGER
1266 icmp_ignore_bogus_error_responses - BOOLEAN
1274 icmp_errors_use_inbound_ifaddr - BOOLEAN
1279 If non-zero, the message will be sent with the primary address of
1282 a router. And it can make debugging complicated network layouts
1286 then the primary address of the first non-loopback interface that
1291 igmp_max_memberships - INTEGER
1292 Change the maximum number of multicast groups we can subscribe to.
1296 report in a single datagram (i.e. the report can't span multiple
1301 report entries you can fit into a single datagram of 65535 bytes.
1303 M = 65536-sizeof (ip header)/(sizeof(Group record))
1308 (65536-24) / 12 = 5459
1313 igmp_max_msf - INTEGER
1319 igmp_qrv - INTEGER
1326 force_igmp_version - INTEGER
1327 - 0 - (default) No enforcement of a IGMP version, IGMPv1/v2 fallback
1330 - 1 - Enforce to use IGMP version 1. Will also reply IGMPv1 report if
1332 - 2 - Enforce to use IGMP version 2. Will fallback to IGMPv1 if receive
1334 - 3 - Enforce to use IGMP version 3. The same react with default 0.
1350 log_martians - BOOLEAN
1356 accept_redirects - BOOLEAN
1360 - both conf/{all,interface}/accept_redirects are TRUE in the case
1365 - at least one of conf/{all,interface}/accept_redirects is TRUE in the
1372 - TRUE (host)
1373 - FALSE (router)
1375 forwarding - BOOLEAN
1377 received _on_ this interface can be forwarded.
1379 mc_forwarding - BOOLEAN
1385 medium_id - INTEGER
1387 are attached to. Two devices can have different id values when
1390 to its medium, value of -1 means that medium is not known.
1396 proxy_arp - BOOLEAN
1403 proxy_arp_pvlan - BOOLEAN
1421 Hewlett-Packard call it Source-Port filtering or port-isolation.
1422 Ericsson call it MAC-Forced Forwarding (RFC Draft).
1424 shared_media - BOOLEAN
1434 secure_redirects - BOOLEAN
1447 send_redirects - BOOLEAN
1456 bootp_relay - BOOLEAN
1467 accept_source_route - BOOLEAN
1474 - TRUE (router)
1475 - FALSE (host)
1477 accept_local - BOOLEAN
1479 suitable routing, this can be used to direct packets between two
1483 route_localnet - BOOLEAN
1489 rp_filter - INTEGER
1490 - 0 - No source validation.
1491 - 1 - Strict mode as defined in RFC3704 Strict Reverse Path
1495 - 2 - Loose mode as defined in RFC3704 Loose Reverse Path
1510 src_valid_mark - BOOLEAN
1511 - 0 - The fwmark of the packet is not included in reverse path
1516 - 1 - The fwmark of the packet is included in reverse path route
1529 arp_filter - BOOLEAN
1530 - 1 - Allows you to have multiple network interfaces on the same
1537 - 0 - (default) The kernel can respond to arp requests with addresses
1541 particular interfaces. Only for more complex setups like load-
1548 arp_announce - INTEGER
1553 - 0 - (default) Use any local address, configured on any interface
1554 - 1 - Try to avoid local addresses that are not in the target's
1563 - 2 - Always use the best local address for this target.
1580 arp_ignore - INTEGER
1584 - 0 - (default): reply for any local target IP address, configured
1586 - 1 - reply only if the target IP address is local address
1588 - 2 - reply only if the target IP address is local address
1591 - 3 - do not reply for local addresses configured with scope host,
1593 - 4-7 - reserved
1594 - 8 - do not reply for all local addresses
1599 arp_notify - BOOLEAN
1608 arp_accept - BOOLEAN
1612 - 0 - don't create new entries in the ARP table
1613 - 1 - create new entries in the ARP table
1622 mcast_solicit - INTEGER
1627 ucast_solicit - INTEGER
1631 app_solicit - INTEGER
1636 mcast_resolicit - INTEGER
1640 disable_policy - BOOLEAN
1641 Disable IPSEC policy (SPD) for this interface
1643 disable_xfrm - BOOLEAN
1644 Disable IPSEC encryption on this interface, whatever the policy
1646 igmpv2_unsolicited_report_interval - INTEGER
1652 igmpv3_unsolicited_report_interval - INTEGER
1658 ignore_routes_with_linkdown - BOOLEAN
1661 promote_secondaries - BOOLEAN
1666 drop_unicast_in_l2_multicast - BOOLEAN
1667 Drop any unicast IP packets that are received in link-layer
1675 drop_gratuitous_arp - BOOLEAN
1683 tag - INTEGER
1684 Allows you to write a number, which can be used as required.
1688 xfrm4_gc_thresh - INTEGER
1689 (Obsolete since linux-4.14)
1694 igmp_link_local_mcast_reports - BOOLEAN
1705 - Andi Kleen
1707 - Nicolas Delon
1719 bindv6only - BOOLEAN
1724 - TRUE: disable IPv4-mapped address feature
1725 - FALSE: enable IPv4-mapped address feature
1729 flowlabel_consistency - BOOLEAN
1731 You have to disable it to use IPV6_FL_F_REFLECT flag on the
1734 - TRUE: enabled
1735 - FALSE: disabled
1739 auto_flowlabels - INTEGER
1747 1 automatic flow labels are enabled by default, they can be
1758 flowlabel_state_ranges - BOOLEAN
1759 Split the flow label number space into two ranges. 0-0x7FFFF is
1760 reserved for the IPv6 flow manager facility, 0x80000-0xFFFFF
1763 - TRUE: enabled
1764 - FALSE: disabled
1768 flowlabel_reflect - INTEGER
1772 https://tools.ietf.org/html/draft-wang-6man-flow-label-reflection-01
1776 - 1: enabled for established flows
1779 in "tcp: change IPv6 flow-label upon receiving spurious retransmission"
1782 - 2: enabled for TCP RESET packets (no active listener)
1786 - 4: enabled for ICMPv6 echo reply messages.
1790 fib_multipath_hash_policy - INTEGER
1797 - 0 - Layer 3 (source and destination addresses plus flow label)
1798 - 1 - Layer 4 (standard 5-tuple)
1799 - 2 - Layer 3 or inner Layer 3 if present
1800 - 3 - Custom multipath hash. Fields used for multipath hash calculation
1803 fib_multipath_hash_fields - UNSIGNED INTEGER
1830 anycast_src_echo_reply - BOOLEAN
1834 - TRUE: enabled
1835 - FALSE: disabled
1839 idgen_delay - INTEGER
1846 idgen_retries - INTEGER
1852 mld_qrv - INTEGER
1859 max_dst_opts_number - INTEGER
1860 Maximum number of non-padding TLVs allowed in a Destination
1867 max_hbh_opts_number - INTEGER
1868 Maximum number of non-padding TLVs allowed in a Hop-by-Hop
1875 max_dst_opts_length - INTEGER
1881 max_hbh_length - INTEGER
1882 Maximum length allowed for a Hop-by-Hop options extension
1887 skip_notify_on_dev_down - BOOLEAN
1896 nexthop_compat_mode - BOOLEAN
1903 understands the new API, this sysctl can be disabled to achieve full
1908 fib_notify_on_flag_change - INTEGER
1917 trapping packets can be "promoted" to perform decapsulation following
1919 The notifications will indicate to user-space the state of the route.
1925 - 0 - Do not emit notifications.
1926 - 1 - Emit notifications.
1927 - 2 - Emit notifications only for RTM_F_OFFLOAD_FAILED flag change.
1929 ioam6_id - INTEGER
1937 ioam6_id_wide - LONG INTEGER
1939 total. Can be different from ioam6_id.
1948 ip6frag_high_thresh - INTEGER
1954 ip6frag_low_thresh - INTEGER
1957 ip6frag_time - INTEGER
1961 Change the interface-specific default settings.
1967 Change all the interface-specific settings.
1971 conf/all/disable_ipv6 - BOOLEAN
1973 setting and also all per-interface ``disable_ipv6`` settings to the same
1977 whether IPv6 support is enabled or disabled. Returned value can be 1
1981 conf/all/forwarding - BOOLEAN
1992 proxy_ndp - BOOLEAN
1995 fwmark_reflect - BOOLEAN
1996 Controls the fwmark of kernel-generated IPv6 reply packets that are not
2009 accept_ra - INTEGER
2028 - enabled if local forwarding is disabled.
2029 - disabled if local forwarding is enabled.
2031 accept_ra_defrtr - BOOLEAN
2036 - enabled if accept_ra is enabled.
2037 - disabled if accept_ra is disabled.
2039 ra_defrtr_metric - UNSIGNED INTEGER
2049 accept_ra_from_local - BOOLEAN
2050 Accept RA with source-address that is found on local machine
2053 Default is to NOT accept these as it may be an un-intended
2058 - enabled if accept_ra_from_local is enabled
2060 - disabled if accept_ra_from_local is disabled
2063 accept_ra_min_hop_limit - INTEGER
2071 accept_ra_pinfo - BOOLEAN
2076 - enabled if accept_ra is enabled.
2077 - disabled if accept_ra is disabled.
2079 accept_ra_rt_info_min_plen - INTEGER
2088 * -1 if accept_ra_rtr_pref is disabled.
2090 accept_ra_rt_info_max_plen - INTEGER
2099 * -1 if accept_ra_rtr_pref is disabled.
2101 accept_ra_rtr_pref - BOOLEAN
2106 - enabled if accept_ra is enabled.
2107 - disabled if accept_ra is disabled.
2109 accept_ra_mtu - BOOLEAN
2115 - enabled if accept_ra is enabled.
2116 - disabled if accept_ra is disabled.
2118 accept_redirects - BOOLEAN
2123 - enabled if local forwarding is disabled.
2124 - disabled if local forwarding is enabled.
2126 accept_source_route - INTEGER
2129 - >= 0: Accept only routing header type 2.
2130 - < 0: Do not accept routing header.
2134 autoconf - BOOLEAN
2140 - enabled if accept_ra_pinfo is enabled.
2141 - disabled if accept_ra_pinfo is disabled.
2143 dad_transmits - INTEGER
2148 forwarding - INTEGER
2149 Configure interface-specific Host/Router behaviour.
2158 - 0 Forwarding disabled
2159 - 1 Forwarding enabled
2185 hop_limit - INTEGER
2190 mtu - INTEGER
2195 ip_nonlocal_bind - BOOLEAN
2196 If set, allows processes to bind() to non-local IPv6 addresses,
2197 which can be quite useful - but may break some applications.
2201 router_probe_interval - INTEGER
2207 router_solicitation_delay - INTEGER
2213 router_solicitation_interval - INTEGER
2218 router_solicitations - INTEGER
2224 use_oif_addrs_only - BOOLEAN
2231 use_tempaddr - INTEGER
2234 * <= 0 : disable Privacy Extensions
2243 * -1 (for point-to-point devices and loopback devices)
2245 temp_valid_lft - INTEGER
2250 temp_prefered_lft - INTEGER
2255 keep_addr_on_down - INTEGER
2265 max_desync_factor - INTEGER
2273 regen_max_retry - INTEGER
2279 max_addresses - INTEGER
2287 disable_ipv6 - BOOLEAN
2288 Disable IPv6 operation. If accept_dad is set to 2, this value
2289 will be dynamically set to TRUE if DAD fails for the link-local
2295 it will dynamically create a link-local address on the given
2303 accept_dad - INTEGER
2307 0 Disable DAD
2309 2 Enable DAD, and disable IPv6 operation if MAC-based duplicate
2310 link-local address has been found.
2316 force_tllao - BOOLEAN
2317 Enable sending the target link-layer address option even when
2322 Quoting from RFC 2461, section 4.4, Target link-layer address:
2327 message. When responding to unicast solicitations, the option can be
2328 omitted since the sender of the solicitation has the correct link-
2330 solicitation in the first place. However, including the link-layer
2332 race condition where the sender deletes the cached link-layer address
2335 ndisc_notify - BOOLEAN
2338 * 0 - (default): do nothing
2339 * 1 - Generate unsolicited neighbour advertisements when device is brought
2342 ndisc_tclass - INTEGER
2346 These 8 bits can be interpreted as 6 high order bits holding the DSCP
2350 * 0 - (default)
2352 mldv1_unsolicited_report_interval - INTEGER
2358 mldv2_unsolicited_report_interval - INTEGER
2364 force_mld_version - INTEGER
2365 * 0 - (default) No enforcement of a MLD version, MLDv1 fallback allowed
2366 * 1 - Enforce to use MLD version 1
2367 * 2 - Enforce to use MLD version 2
2369 suppress_frag_ndisc - INTEGER
2373 * 1 - (default) discard fragmented neighbor discovery packets
2374 * 0 - allow fragmented neighbor discovery packets
2376 optimistic_dad - BOOLEAN
2386 use_optimistic - BOOLEAN
2398 stable_secret - IPv6 address
2400 addresses for link-local addresses and autoconfigured
2402 be stable privacy ones by default. This can be changed via the
2403 addrgenmode ip-link. conf/default/stable_secret is used as the
2404 secret for the namespace, the interface specific ones can
2412 addr_gen_mode - INTEGER
2413 Defines how link-local and autoconf addresses are generated.
2417 1 do no generate a link-local address, use EUI64 for addresses
2424 drop_unicast_in_l2_multicast - BOOLEAN
2425 Drop any unicast IPv6 packets that are received in link-layer
2430 drop_unsolicited_na - BOOLEAN
2437 enhanced_dad - BOOLEAN
2450 ratelimit - INTEGER
2453 0 to disable any limiting,
2458 ratemask - list of comma separated ranges
2463 list of ranges (e.g. "0-127,129" for ICMPv6 message type 0 to 127 and
2467 Refer to: https://www.iana.org/assignments/icmpv6-parameters/icmpv6-parameters.xhtml
2471 Default: 0-1,3-127 (rate limit ICMPv6 errors except Packet Too Big)
2473 echo_ignore_all - BOOLEAN
2474 If set non-zero, then the kernel will ignore all ICMP ECHO
2479 echo_ignore_multicast - BOOLEAN
2480 If set non-zero, then the kernel will ignore all ICMP ECHO
2485 echo_ignore_anycast - BOOLEAN
2486 If set non-zero, then the kernel will ignore all ICMP ECHO
2491 xfrm6_gc_thresh - INTEGER
2492 (Obsolete since linux-4.14)
2500 YOSHIFUJI Hideaki / USAGI Project <yoshfuji@linux-ipv6.org>
2506 bridge-nf-call-arptables - BOOLEAN
2507 - 1 : pass bridged ARP traffic to arptables' FORWARD chain.
2508 - 0 : disable this.
2512 bridge-nf-call-iptables - BOOLEAN
2513 - 1 : pass bridged IPv4 traffic to iptables' chains.
2514 - 0 : disable this.
2518 bridge-nf-call-ip6tables - BOOLEAN
2519 - 1 : pass bridged IPv6 traffic to ip6tables' chains.
2520 - 0 : disable this.
2524 bridge-nf-filter-vlan-tagged - BOOLEAN
2525 - 1 : pass bridged vlan-tagged ARP/IP/IPv6 traffic to {arp,ip,ip6}tables.
2526 - 0 : disable this.
2530 bridge-nf-filter-pppoe-tagged - BOOLEAN
2531 - 1 : pass bridged pppoe-tagged IP/IPv6 traffic to {ip,ip6}tables.
2532 - 0 : disable this.
2536 bridge-nf-pass-vlan-input-dev - BOOLEAN
2537 - 1: if bridge-nf-filter-vlan-tagged is enabled, try to find a vlan
2539 vlan. This allows use of e.g. "iptables -i br0.1" and makes the
2540 REDIRECT target work with vlan-on-top-of-bridge interfaces. When no
2544 - 0: disable bridge netfilter vlan interface lookup.
2551 addip_enable - BOOLEAN
2552 Enable or disable extension of Dynamic Address Reconfiguration
2553 (ADD-IP) functionality specified in RFC5061. This extension provides
2559 0: Disable extension.
2563 pf_enable - INTEGER
2564 Enable or disable pf (pf is short for potentially failed) state. A value
2566 both pf_enable and pf_retrans > path_max_retrans can disable pf state.
2567 Since pf_retrans and path_max_retrans can be changed by userspace
2568 application, sometimes user expects to disable pf state by the value of
2572 and disable pf state. See:
2573 https://datatracker.ietf.org/doc/draft-ietf-tsvwg-sctp-failover for
2578 0: Disable pf.
2582 pf_expose - INTEGER
2583 Unset or enable/disable pf (pf is short for potentially failed) state
2584 exposure. Applications can control the exposure of the PF path state
2587 SCTP_ADDR_PF state will be sent and a SCTP_PF-state transport info
2588 can be got via SCTP_GET_PEER_ADDR_INFO sockopt; When it's enabled,
2590 SCTP_PF state and a SCTP_PF-state transport info can be got via
2592 SCTP_PEER_ADDR_CHANGE event will be sent and it returns -EACCES when
2593 trying to get a SCTP_PF-state transport info via SCTP_GET_PEER_ADDR_INFO
2598 1: Disable pf state exposure.
2604 addip_noauth_enable - BOOLEAN
2605 Dynamic Address Reconfiguration (ADD-IP) requires the use of
2610 allowing the ADD-IP extension. For reasons of interoperability,
2615 1 Allow ADD-IP extension to be used without authentication. This
2624 auth_enable - BOOLEAN
2625 Enable or disable Authenticated Chunks extension. This extension
2628 (ADD-IP) extension.
2630 - 1: Enable this extension.
2631 - 0: Disable this extension.
2635 prsctp_enable - BOOLEAN
2636 Enable or disable the Partial Reliability extension (RFC3758) which
2639 - 1: Enable extension
2640 - 0: Disable
2644 max_burst - INTEGER
2645 The limit of the number of new packets that can be initially sent. It
2646 controls how bursty the generated traffic can be.
2650 association_max_retrans - INTEGER
2651 Set the maximum number for retransmissions that an association can
2657 max_init_retransmits - INTEGER
2658 The maximum number of retransmissions of INIT and COOKIE-ECHO chunks
2664 path_max_retrans - INTEGER
2672 pf_retrans - INTEGER
2676 passes the pf_retrans threshold can still be used. Its only
2680 http://www.ietf.org/id/draft-nishida-tsvwg-sctp-failover-05.txt
2682 disables this feature. Since both pf_retrans and path_max_retrans can
2684 disable pf state.
2688 ps_retrans - INTEGER
2690 from section-5 "Primary Path Switchover" in rfc7829. The primary path
2696 and its value can't be less than 'pf_retrans' when changing by sysctl.
2700 rto_initial - INTEGER
2707 rto_max - INTEGER
2709 is the largest time interval that can elapse between retransmissions.
2713 rto_min - INTEGER
2715 is the smallest time interval the can elapse between retransmissions.
2719 hb_interval - INTEGER
2726 sack_timeout - INTEGER
2732 valid_cookie_life - INTEGER
2738 cookie_preserve_enable - BOOLEAN
2739 Enable or disable the ability to extend the lifetime of the SCTP cookie
2742 - 1: Enable cookie lifetime extension.
2743 - 0: Disable
2747 cookie_hmac_alg - STRING
2749 a listening sctp socket to a connecting client in the INIT-ACK chunk.
2763 rcvbuf_policy - INTEGER
2774 - 1: rcvbuf space is per association
2775 - 0: rcvbuf space is per socket
2779 sndbuf_policy - INTEGER
2782 - 1: Send buffer is tracked per association
2783 - 0: Send buffer is tracked per socket.
2787 sctp_mem - vector of 3 INTEGERs: min, pressure, max
2800 sctp_rmem - vector of 3 INTEGERs: min, default, max
2810 sctp_wmem - vector of 3 INTEGERs: min, default, max
2813 addr_scope_policy - INTEGER
2814 Control IPv4 address scoping - draft-stewart-tsvwg-sctp-ipv4-00
2816 - 0 - Disable IPv4 address scoping
2817 - 1 - Enable IPv4 address scoping
2818 - 2 - Follow draft but allow IPv4 private addresses
2819 - 3 - Follow draft but allow IPv4 link local addresses
2823 udp_port - INTEGER
2825 using the IANA-assigned UDP port number 9899 (sctp-tunneling).
2827 This UDP sock is used for processing the incoming UDP-encapsulated
2833 for the outgoing UDP-encapsulated SCTP packets. For the dest port,
2838 encap_port - INTEGER
2842 outgoing UDP-encapsulated SCTP packets by default. Users can also
2854 plpmtud_probe_interval - INTEGER
2870 Please see: Documentation/admin-guide/sysctl/net.rst for descriptions of these entries.
2876 max_dgram_qlen - INTEGER