/linux-6.12.1/tools/testing/selftests/net/packetdrill/ |
D | defaults.sh | 10 sysctl -q net.ipv4.tcp_rmem="4096 540000 $((15*1024*1024))" 11 sysctl -q net.ipv4.tcp_wmem="4096 $((256*1024)) 4194304" 14 sysctl -q net.ipv4.tcp_timestamps=1 17 sysctl -q net.ipv4.tcp_syn_retries=5 18 sysctl -q net.ipv4.tcp_synack_retries=5 21 sysctl -q net.ipv4.tcp_frto=2 24 sysctl -q net.ipv4.tcp_sack=1 27 sysctl -q net.ipv4.tcp_dsack=1 30 sysctl -q net.ipv4.tcp_fack=0 33 sysctl -q net.ipv4.tcp_reordering=3 [all …]
|
D | set_sysctls.py | 4 """Sets sysctl values and writes a file that restores them. 22 # Open file for restoring sysctl values 27 sysctl = a.split('=') variable 28 # sysctl[0] contains the proc-file name, sysctl[1] the new value 31 cur_val = subprocess.check_output(['cat', sysctl[0]], universal_newlines=True) 32 print('echo "%s" > %s' % (cur_val.strip(), sysctl[0]), file=restore_file) 35 cmd = 'echo "%s" > %s' % (sysctl[1], sysctl[0])
|
/linux-6.12.1/net/ipv6/ |
D | sysctl_net_ipv6.c | 3 * sysctl_net_ipv6.c: sysctl interface to net IPV6 subsystem. 6 * YOSHIFUJI Hideaki @USAGI: added icmp sysctl table. 10 #include <linux/sysctl.h> 40 ipv6.sysctl.multipath_hash_policy); in proc_rt6_multipath_hash_policy() 56 ipv6.sysctl.multipath_hash_fields); in proc_rt6_multipath_hash_fields() 67 .data = &init_net.ipv6.sysctl.bindv6only, 74 .data = &init_net.ipv6.sysctl.anycast_src_echo_reply, 81 .data = &init_net.ipv6.sysctl.flowlabel_consistency, 88 .data = &init_net.ipv6.sysctl.auto_flowlabels, 96 .data = &init_net.ipv6.sysctl.fwmark_reflect, [all …]
|
/linux-6.12.1/Documentation/bpf/ |
D | prog_cgroup_sysctl.rst | 8 provides cgroup-bpf hook for sysctl. 11 process inside that cgroup tries to read from or write to sysctl knob in proc. 30 * ``write`` indicates whether sysctl value is being read (``0``) or written 33 * ``file_pos`` indicates file position sysctl is being accessed at, read 35 position in sysctl proc file ``read(2)`` will be reading from or ``write(2)`` 37 whole sysctl value by ``bpf_sysctl_set_new_value()`` on ``write(2)`` even 39 value to the field can be used to access part of sysctl value starting from 40 specified ``file_pos``. Not all sysctl support access with ``file_pos != 41 0``, e.g. writes to numeric sysctl entries must always be at file position 42 ``0``. See also ``kernel.sysctl_writes_strict`` sysctl. [all …]
|
/linux-6.12.1/tools/testing/selftests/net/netfilter/ |
D | nft_nat_zones.sh | 34 v4gc1=$(sysctl -n net.ipv4.neigh.default.gc_thresh1 2>/dev/null) 35 v4gc2=$(sysctl -n net.ipv4.neigh.default.gc_thresh2 2>/dev/null) 36 v4gc3=$(sysctl -n net.ipv4.neigh.default.gc_thresh3 2>/dev/null) 37 v6gc1=$(sysctl -n net.ipv6.neigh.default.gc_thresh1 2>/dev/null) 38 v6gc2=$(sysctl -n net.ipv6.neigh.default.gc_thresh2 2>/dev/null) 39 v6gc3=$(sysctl -n net.ipv6.neigh.default.gc_thresh3 2>/dev/null) 45 sysctl -q net.ipv4.neigh.default.gc_thresh1="$v4gc1" 2>/dev/null 46 sysctl -q net.ipv4.neigh.default.gc_thresh2="$v4gc2" 2>/dev/null 47 sysctl -q net.ipv4.neigh.default.gc_thresh3="$v4gc3" 2>/dev/null 48 sysctl -q net.ipv6.neigh.default.gc_thresh1="$v6gc1" 2>/dev/null [all …]
|
D | ipvs.sh | 124 ip netns exec "${ns1}" sysctl -qw net.ipv4.ip_forward=1 130 ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.all.arp_ignore=1 131 ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.all.arp_announce=2 133 ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.all.rp_filter=0 134 ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.veth21.rp_filter=0 143 ip netns exec "${ns1}" sysctl -qw net.ipv4.ip_forward=1 159 ip netns exec "${ns1}" sysctl -qw net.ipv4.ip_forward=0 160 ip netns exec "${ns1}" sysctl -qw net.ipv4.conf.all.send_redirects=0 161 ip netns exec "${ns1}" sysctl -qw net.ipv4.conf.default.send_redirects=0 168 ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.all.arp_ignore=1 [all …]
|
D | nft_fib.sh | 13 log_netns=$(sysctl -n net.netfilter.nf_log_all_netns) 19 [ "$log_netns" -eq 0 ] && sysctl -q net.netfilter.nf_log_all_netns=$log_netns 33 sysctl -q net.netfilter.nf_log_all_netns=1 154 ip netns exec "$nsrouter" sysctl net.ipv6.conf.all.forwarding=1 > /dev/null 155 ip netns exec "$nsrouter" sysctl net.ipv4.conf.veth0.forwarding=1 > /dev/null 156 ip netns exec "$nsrouter" sysctl net.ipv4.conf.veth1.forwarding=1 > /dev/null 157 ip netns exec "$nsrouter" sysctl net.ipv4.conf.all.rp_filter=0 > /dev/null 158 ip netns exec "$nsrouter" sysctl net.ipv4.conf.veth0.rp_filter=0 > /dev/null
|
/linux-6.12.1/Documentation/networking/ |
D | index.rst | 64 ioam6-sysctl 67 ip-sysctl 70 ipvs-sysctl 76 mpls-sysctl 78 mptcp-sysctl 86 netfilter-sysctl 89 nf_conntrack-sysctl 109 seg6-sysctl 111 smc-sysctl
|
D | mptcp-sysctl.rst | 16 sysctl. 29 This is a per-namespace sysctl. 52 per-namespace sysctl. 63 sysctl. 71 per-namespace sysctl. 85 This is a per-namespace sysctl. 96 sysctl. 108 This is a per-namespace sysctl.
|
/linux-6.12.1/tools/testing/selftests/net/ |
D | ip_defrag.sh | 17 ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_high_thresh=9000000 >/dev/null 2>&1 18 ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_low_thresh=7000000 >/dev/null 2>&1 19 ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_time=1 >/dev/null 2>&1 21 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_high_thresh=9000000 >/dev/null 2>&1 22 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_low_thresh=7000000 >/dev/null 2>&1 23 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_time=1 >/dev/null 2>&1 25 …ip netns exec "${NETNS}" sysctl -w net.netfilter.nf_conntrack_frag6_high_thresh=9000000 >/dev/null… 26 …ip netns exec "${NETNS}" sysctl -w net.netfilter.nf_conntrack_frag6_low_thresh=7000000 >/dev/null… 27 ip netns exec "${NETNS}" sysctl -w net.netfilter.nf_conntrack_frag6_timeout=1 >/dev/null 2>&1 30 ip netns exec "${NETNS}" sysctl -w net.ipv6.route.max_size=65536 >/dev/null 2>&1
|
D | ipv6_flowlabel.sh | 15 sh -c 'sysctl -q -w net.ipv6.auto_flowlabels=0 && ./ipv6_flowlabel -l 1' 19 sh -c 'sysctl -q -w net.ipv6.auto_flowlabels=1 && ./ipv6_flowlabel -l 1' 23 sh -c 'sysctl -q -w net.ipv6.flowlabel_reflect=4 && \ 24 sysctl -q -w net.ipv4.ping_group_range="0 2147483647" && \ 33 sh -c 'sysctl -q -w net.ipv6.flowlabel_reflect=4 && \ 34 sysctl -q -w net.ipv4.ping_group_range="0 2147483647" && \
|
D | route_localnet.sh | 16 sysctl -w net.ipv4.conf.veth0.route_localnet=1 17 ip netns exec "${PEER_NS}" sysctl -w net.ipv4.conf.veth1.route_localnet=1 42 sysctl -w net.ipv4.conf.veth0.arp_announce=2 43 ip netns exec "${PEER_NS}" sysctl -w net.ipv4.conf.veth1.arp_announce=2 59 sysctl -w net.ipv4.conf.veth0.arp_ignore=3 60 ip netns exec "${PEER_NS}" sysctl -w net.ipv4.conf.veth1.arp_ignore=3
|
D | arp_ndisc_evict_nocarrier.sh | 4 # Tests sysctl options {arp,ndisc}_evict_nocarrier={0,1} 7 # an entry in the ARP/ND table. Depending on the test set sysctl option to 28 sysctl -w net.ipv6.conf.veth1.ndisc_evict_nocarrier=1 >/dev/null 2>&1 29 sysctl -w net.ipv6.conf.all.ndisc_evict_nocarrier=1 >/dev/null 2>&1 43 ip netns exec ${me} sysctl -w $1 >/dev/null 2>&1 70 sysctl -w "$1" >/dev/null 2>&1 91 sysctl -w net.ipv4.conf.veth0.arp_evict_nocarrier=1 >/dev/null 2>&1 92 sysctl -w net.ipv4.conf.all.arp_evict_nocarrier=1 >/dev/null 2>&1
|
/linux-6.12.1/samples/bpf/ |
D | tc_l2_redirect.sh | 49 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.all.rp_filter=0 50 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.ipt2.rp_filter=0 54 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.all.rp_filter=0 55 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.ip6t2.rp_filter=0 66 sysctl -q -w net.ipv4.conf.all.rp_filter=0 67 sysctl -q -w net.ipv6.conf.all.forwarding=1 68 sysctl -q -w net.ipv6.conf.all.disable_ipv6=0 80 sysctl -q -w net.ipv4.conf.all.rp_filter=$RP_FILTER 81 sysctl -q -w net.ipv6.conf.all.forwarding=$IPV6_FORWARDING 82 sysctl -q -w net.ipv6.conf.all.disable_ipv6=$IPV6_DISABLED [all …]
|
/linux-6.12.1/tools/testing/selftests/bpf/ |
D | test_sysctl.c | 33 const char *sysctl; member 48 .descr = "sysctl wrong attach_type", 54 .sysctl = "kernel/ostype", 59 .descr = "sysctl:read allow all", 65 .sysctl = "kernel/ostype", 70 .descr = "sysctl:read deny all", 76 .sysctl = "kernel/ostype", 81 .descr = "ctx:write sysctl:read read ok", 97 .sysctl = "kernel/ostype", 102 .descr = "ctx:write sysctl:write read ok", [all …]
|
D | test_kmod.sh | 28 sysctl -w net.core.bpf_jit_enable=$1 2>&1 > /dev/null 29 sysctl -w net.core.bpf_jit_harden=$2 2>&1 > /dev/null 56 JE=`sysctl -n net.core.bpf_jit_enable` 57 JH=`sysctl -n net.core.bpf_jit_harden` 62 sysctl -w net.core.bpf_jit_enable=$JE 2>&1 > /dev/null 63 sysctl -w net.core.bpf_jit_harden=$JH 2>&1 > /dev/null
|
/linux-6.12.1/tools/testing/selftests/sysctl/ |
D | sysctl.sh | 5 # This performs a series tests against the proc sysctl interface. 10 TEST_NAME="sysctl" 48 if [ -z $SYSCTL ]; then 49 SYSCTL="/proc/sys/debug/test_sysctl" 112 if [ ! -d $SYSCTL ]; then 219 echo "== Testing sysctl behavior against ${TARGET} ==" 232 echo -n "Checking sysctl is not set to test value ... " 240 echo -n "Writing sysctl from shell ... " 249 echo -n "Resetting sysctl to original value ... " 262 echo -n "Writing entire sysctl in single write ... " [all …]
|
/linux-6.12.1/tools/testing/selftests/net/netfilter/packetdrill/ |
D | common.sh | 7 sysctl -q net.netfilter.nf_conntrack_log_invalid=6 13 sysctl -q net.ipv4.tcp_rmem="4096 540000 $((15*1024*1024))" 14 sysctl -q net.ipv4.tcp_wmem="4096 $((256*1024)) 4194304" 17 sysctl -q net.ipv4.tcp_congestion_control=cubic 20 sysctl -q net.ipv4.tcp_slow_start_after_idle=0 23 sysctl -q net.ipv4.tcp_ecn=0 25 sysctl -q net.ipv4.tcp_notsent_lowat=4294967295 > /dev/null 2>&1
|
/linux-6.12.1/fs/proc/ |
D | proc_sysctl.c | 6 #include <linux/sysctl.h> 41 * register_sysctl_mount_point() - registers a sysctl mount point 171 pr_err("sysctl duplicate entry: "); in insert_entry() 416 * some sysctl variables are readonly even to root. 464 ei->sysctl = head; in proc_sys_make_inode() 503 struct ctl_table_header *head = PROC_I(inode)->sysctl; in grab_header() 562 * At this point we know that the sysctl was not unregistered in proc_sys_call_handler() 629 /* sysctl was unregistered */ in proc_sys_open() 649 /* sysctl was unregistered */ in proc_sys_poll() 791 * sysctl entries that are not writeable, in proc_sys_permission() [all …]
|
/linux-6.12.1/drivers/phy/ralink/ |
D | phy-ralink-usb.c | 58 struct regmap *sysctl; member 97 regmap_update_bits(phy->sysctl, RT_SYSC_REG_CLKCFG1, in ralink_usb_phy_power_on() 101 regmap_update_bits(phy->sysctl, RT_SYSC_REG_SYSCFG1, in ralink_usb_phy_power_on() 119 regmap_read(phy->sysctl, RT_SYSC_REG_USB_PHY_CFG, &t); in ralink_usb_phy_power_on() 135 regmap_update_bits(phy->sysctl, RT_SYSC_REG_CLKCFG1, in ralink_usb_phy_power_off() 183 phy->sysctl = syscon_regmap_lookup_by_phandle(dev->of_node, "ralink,sysctl"); in ralink_usb_phy_probe() 184 if (IS_ERR(phy->sysctl)) { in ralink_usb_phy_probe() 185 dev_err(dev, "failed to get sysctl registers\n"); in ralink_usb_phy_probe() 186 return PTR_ERR(phy->sysctl); in ralink_usb_phy_probe()
|
/linux-6.12.1/tools/testing/selftests/net/mptcp/ |
D | mptcp_connect.sh | 188 ip netns exec "$ns2" sysctl -q net.ipv4.ip_forward=1 189 ip netns exec "$ns2" sysctl -q net.ipv6.conf.all.forwarding=1 200 ip netns exec "$ns3" sysctl -q net.ipv4.ip_forward=1 201 ip netns exec "$ns3" sysctl -q net.ipv6.conf.all.forwarding=1 211 ip netns exec $i sysctl -q net.mptcp.checksum_enabled=1 261 print_larger_title "New MPTCP socket can be blocked via sysctl" 264 if ! ip netns exec ${disabled_ns} sysctl net.mptcp >/dev/null; then 265 mptcp_lib_pr_fail "not able to list net.mptcp sysctl knobs" 266 mptcp_lib_result_fail "not able to list net.mptcp sysctl knobs" 272 if [ "$(ip netns exec ${disabled_ns} sysctl net.mptcp.enabled | awk '{ print $3 }')" -ne 1 ]; then [all …]
|
/linux-6.12.1/Documentation/networking/device_drivers/ethernet/chelsio/ |
D | cxgb.rst | 127 sysctl -w net.ipv4.tcp_timestamps=0 131 sysctl -w net.ipv4.tcp_sack=0 135 sysctl -w net.ipv4.tcp_max_syn_backlog=3000 139 sysctl -w net.core.rmem_max=1024000 143 sysctl -w net.core.wmem_max=1024000 151 sysctl -w net.core.rmem_default=524287 155 sysctl -w net.core.wmem_default=524287 159 sysctl -w net.core.optmem_max=524287 163 sysctl -w net.core.netdev_max_backlog=300000 167 sysctl -w net.ipv4.tcp_rmem="10000000 10000000 10000000" [all …]
|
/linux-6.12.1/Documentation/devicetree/bindings/mfd/ |
D | canaan,k210-sysctl.yaml | 4 $id: http://devicetree.org/schemas/mfd/canaan,k210-sysctl.yaml# 20 - const: canaan,k210-sysctl 84 sysctl: syscon@50440000 { 85 compatible = "canaan,k210-sysctl", 104 regmap = <&sysctl>;
|
/linux-6.12.1/arch/arm64/kernel/ |
D | armv8_deprecated.c | 12 #include <linux/sysctl.h> 55 /* sysctl for this emulation */ 56 struct ctl_table sysctl; member 537 struct ctl_table *sysctl; in register_insn_emulation() local 562 sysctl = &insn->sysctl; in register_insn_emulation() 564 sysctl->mode = 0644; in register_insn_emulation() 565 sysctl->maxlen = sizeof(int); in register_insn_emulation() 567 sysctl->procname = insn->name; in register_insn_emulation() 568 sysctl->data = &insn->current_mode; in register_insn_emulation() 569 sysctl->extra1 = &insn->min; in register_insn_emulation() [all …]
|
/linux-6.12.1/Documentation/userspace-api/ |
D | mfd_noexec.rst | 33 - Add a new pid namespace sysctl: vm.memfd_noexec to help applications in 54 Sysctl: 56 ``pid namespaced sysctl vm.memfd_noexec`` 58 The new pid namespaced sysctl vm.memfd_noexec has 3 values: 71 The sysctl allows finer control of memfd_create for old software that
|