aboutsummaryrefslogtreecommitdiffstats
path: root/Documentation/networking/ip-sysctl.txt
diff options
context:
space:
mode:
authorStephen Hemminger <shemminger@vyatta.com>2008-07-10 19:50:26 -0400
committerDavid S. Miller <davem@davemloft.net>2008-07-10 19:50:26 -0400
commit4edc2f3416438a05b83a677ae7b1a78b3ca22bb9 (patch)
tree31c440259d1b88dd0b3fef07f01f3cb177b69209 /Documentation/networking/ip-sysctl.txt
parent53025f5efd5a1c14fca75c479b11d97d9dd958a5 (diff)
ip: sysctl documentation cleanup
Reduced version of the spelling cleanup patch. Take out the confusing language in tcp_frto, and organize the undocumented values. Signed-off-by: Stephen Hemminger <shemminger@vyatta.com> Acked-by: Randy Dunlap <rdunlap@xenotime.net> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'Documentation/networking/ip-sysctl.txt')
-rw-r--r--Documentation/networking/ip-sysctl.txt60
1 files changed, 29 insertions, 31 deletions
diff --git a/Documentation/networking/ip-sysctl.txt b/Documentation/networking/ip-sysctl.txt
index dc04fdd6af34..946b66e1b652 100644
--- a/Documentation/networking/ip-sysctl.txt
+++ b/Documentation/networking/ip-sysctl.txt
@@ -148,9 +148,9 @@ tcp_available_congestion_control - STRING
148 but not loaded. 148 but not loaded.
149 149
150tcp_base_mss - INTEGER 150tcp_base_mss - INTEGER
151 The initial value of search_low to be used by Packetization Layer 151 The initial value of search_low to be used by the packetization layer
152 Path MTU Discovery (MTU probing). If MTU probing is enabled, 152 Path MTU discovery (MTU probing). If MTU probing is enabled,
153 this is the inital MSS used by the connection. 153 this is the initial MSS used by the connection.
154 154
155tcp_congestion_control - STRING 155tcp_congestion_control - STRING
156 Set the congestion control algorithm to be used for new 156 Set the congestion control algorithm to be used for new
@@ -185,10 +185,9 @@ tcp_frto - INTEGER
185 timeouts. It is particularly beneficial in wireless environments 185 timeouts. It is particularly beneficial in wireless environments
186 where packet loss is typically due to random radio interference 186 where packet loss is typically due to random radio interference
187 rather than intermediate router congestion. F-RTO is sender-side 187 rather than intermediate router congestion. F-RTO is sender-side
188 only modification. Therefore it does not require any support from 188 only modification. Therefore it does not require any support from
189 the peer, but in a typical case, however, where wireless link is 189 the peer.
190 the local access link and most of the data flows downlink, the 190
191 faraway servers should have F-RTO enabled to take advantage of it.
192 If set to 1, basic version is enabled. 2 enables SACK enhanced 191 If set to 1, basic version is enabled. 2 enables SACK enhanced
193 F-RTO if flow uses SACK. The basic version can be used also when 192 F-RTO if flow uses SACK. The basic version can be used also when
194 SACK is in use though scenario(s) with it exists where F-RTO 193 SACK is in use though scenario(s) with it exists where F-RTO
@@ -276,7 +275,7 @@ tcp_mem - vector of 3 INTEGERs: min, pressure, max
276 memory. 275 memory.
277 276
278tcp_moderate_rcvbuf - BOOLEAN 277tcp_moderate_rcvbuf - BOOLEAN
279 If set, TCP performs receive buffer autotuning, attempting to 278 If set, TCP performs receive buffer auto-tuning, attempting to
280 automatically size the buffer (no greater than tcp_rmem[2]) to 279 automatically size the buffer (no greater than tcp_rmem[2]) to
281 match the size required by the path for full throughput. Enabled by 280 match the size required by the path for full throughput. Enabled by
282 default. 281 default.
@@ -360,7 +359,7 @@ tcp_slow_start_after_idle - BOOLEAN
360 Default: 1 359 Default: 1
361 360
362tcp_stdurg - BOOLEAN 361tcp_stdurg - BOOLEAN
363 Use the Host requirements interpretation of the TCP urg pointer field. 362 Use the Host requirements interpretation of the TCP urgent pointer field.
364 Most hosts use the older BSD interpretation, so if you turn this on 363 Most hosts use the older BSD interpretation, so if you turn this on
365 Linux might not communicate correctly with them. 364 Linux might not communicate correctly with them.
366 Default: FALSE 365 Default: FALSE
@@ -373,12 +372,12 @@ tcp_synack_retries - INTEGER
373tcp_syncookies - BOOLEAN 372tcp_syncookies - BOOLEAN
374 Only valid when the kernel was compiled with CONFIG_SYNCOOKIES 373 Only valid when the kernel was compiled with CONFIG_SYNCOOKIES
375 Send out syncookies when the syn backlog queue of a socket 374 Send out syncookies when the syn backlog queue of a socket
376 overflows. This is to prevent against the common 'syn flood attack' 375 overflows. This is to prevent against the common 'SYN flood attack'
377 Default: FALSE 376 Default: FALSE
378 377
379 Note, that syncookies is fallback facility. 378 Note, that syncookies is fallback facility.
380 It MUST NOT be used to help highly loaded servers to stand 379 It MUST NOT be used to help highly loaded servers to stand
381 against legal connection rate. If you see synflood warnings 380 against legal connection rate. If you see SYN flood warnings
382 in your logs, but investigation shows that they occur 381 in your logs, but investigation shows that they occur
383 because of overload with legal connections, you should tune 382 because of overload with legal connections, you should tune
384 another parameters until this warning disappear. 383 another parameters until this warning disappear.
@@ -388,7 +387,7 @@ tcp_syncookies - BOOLEAN
388 to use TCP extensions, can result in serious degradation 387 to use TCP extensions, can result in serious degradation
389 of some services (f.e. SMTP relaying), visible not by you, 388 of some services (f.e. SMTP relaying), visible not by you,
390 but your clients and relays, contacting you. While you see 389 but your clients and relays, contacting you. While you see
391 synflood warnings in logs not being really flooded, your server 390 SYN flood warnings in logs not being really flooded, your server
392 is seriously misconfigured. 391 is seriously misconfigured.
393 392
394tcp_syn_retries - INTEGER 393tcp_syn_retries - INTEGER
@@ -1236,22 +1235,21 @@ sctp_wmem - vector of 3 INTEGERs: min, default, max
1236 1235
1237UNDOCUMENTED: 1236UNDOCUMENTED:
1238 1237
1239dev_weight FIXME 1238/proc/sys/net/core/*
1240discovery_slots FIXME 1239 dev_weight FIXME
1241discovery_timeout FIXME 1240
1242fast_poll_increase FIXME 1241/proc/sys/net/unix/*
1243ip6_queue_maxlen FIXME 1242 max_dgram_qlen FIXME
1244lap_keepalive_time FIXME 1243
1245lo_cong FIXME 1244/proc/sys/net/irda/*
1246max_baud_rate FIXME 1245 fast_poll_increase FIXME
1247max_dgram_qlen FIXME 1246 warn_noreply_time FIXME
1248max_noreply_time FIXME 1247 discovery_slots FIXME
1249max_tx_data_size FIXME 1248 slot_timeout FIXME
1250max_tx_window FIXME 1249 max_baud_rate FIXME
1251min_tx_turn_time FIXME 1250 discovery_timeout FIXME
1252mod_cong FIXME 1251 lap_keepalive_time FIXME
1253no_cong FIXME 1252 max_noreply_time FIXME
1254no_cong_thresh FIXME 1253 max_tx_data_size FIXME
1255slot_timeout FIXME 1254 max_tx_window FIXME
1256warn_noreply_time FIXME 1255 min_tx_turn_time FIXME
1257