Home
last modified time | relevance | path

Searched full:sysctl (Results 1 – 25 of 651) sorted by relevance

12345678910>>...27

/linux-6.12.1/tools/testing/selftests/net/packetdrill/
Ddefaults.sh10 sysctl -q net.ipv4.tcp_rmem="4096 540000 $((15*1024*1024))"
11 sysctl -q net.ipv4.tcp_wmem="4096 $((256*1024)) 4194304"
14 sysctl -q net.ipv4.tcp_timestamps=1
17 sysctl -q net.ipv4.tcp_syn_retries=5
18 sysctl -q net.ipv4.tcp_synack_retries=5
21 sysctl -q net.ipv4.tcp_frto=2
24 sysctl -q net.ipv4.tcp_sack=1
27 sysctl -q net.ipv4.tcp_dsack=1
30 sysctl -q net.ipv4.tcp_fack=0
33 sysctl -q net.ipv4.tcp_reordering=3
[all …]
Dset_sysctls.py4 """Sets sysctl values and writes a file that restores them.
22 # Open file for restoring sysctl values
27 sysctl = a.split('=') variable
28 # sysctl[0] contains the proc-file name, sysctl[1] the new value
31 cur_val = subprocess.check_output(['cat', sysctl[0]], universal_newlines=True)
32 print('echo "%s" > %s' % (cur_val.strip(), sysctl[0]), file=restore_file)
35 cmd = 'echo "%s" > %s' % (sysctl[1], sysctl[0])
/linux-6.12.1/net/ipv6/
Dsysctl_net_ipv6.c3 * sysctl_net_ipv6.c: sysctl interface to net IPV6 subsystem.
6 * YOSHIFUJI Hideaki @USAGI: added icmp sysctl table.
10 #include <linux/sysctl.h>
40 ipv6.sysctl.multipath_hash_policy); in proc_rt6_multipath_hash_policy()
56 ipv6.sysctl.multipath_hash_fields); in proc_rt6_multipath_hash_fields()
67 .data = &init_net.ipv6.sysctl.bindv6only,
74 .data = &init_net.ipv6.sysctl.anycast_src_echo_reply,
81 .data = &init_net.ipv6.sysctl.flowlabel_consistency,
88 .data = &init_net.ipv6.sysctl.auto_flowlabels,
96 .data = &init_net.ipv6.sysctl.fwmark_reflect,
[all …]
/linux-6.12.1/Documentation/bpf/
Dprog_cgroup_sysctl.rst8 provides cgroup-bpf hook for sysctl.
11 process inside that cgroup tries to read from or write to sysctl knob in proc.
30 * ``write`` indicates whether sysctl value is being read (``0``) or written
33 * ``file_pos`` indicates file position sysctl is being accessed at, read
35 position in sysctl proc file ``read(2)`` will be reading from or ``write(2)``
37 whole sysctl value by ``bpf_sysctl_set_new_value()`` on ``write(2)`` even
39 value to the field can be used to access part of sysctl value starting from
40 specified ``file_pos``. Not all sysctl support access with ``file_pos !=
41 0``, e.g. writes to numeric sysctl entries must always be at file position
42 ``0``. See also ``kernel.sysctl_writes_strict`` sysctl.
[all …]
/linux-6.12.1/tools/testing/selftests/net/netfilter/
Dnft_nat_zones.sh34 v4gc1=$(sysctl -n net.ipv4.neigh.default.gc_thresh1 2>/dev/null)
35 v4gc2=$(sysctl -n net.ipv4.neigh.default.gc_thresh2 2>/dev/null)
36 v4gc3=$(sysctl -n net.ipv4.neigh.default.gc_thresh3 2>/dev/null)
37 v6gc1=$(sysctl -n net.ipv6.neigh.default.gc_thresh1 2>/dev/null)
38 v6gc2=$(sysctl -n net.ipv6.neigh.default.gc_thresh2 2>/dev/null)
39 v6gc3=$(sysctl -n net.ipv6.neigh.default.gc_thresh3 2>/dev/null)
45 sysctl -q net.ipv4.neigh.default.gc_thresh1="$v4gc1" 2>/dev/null
46 sysctl -q net.ipv4.neigh.default.gc_thresh2="$v4gc2" 2>/dev/null
47 sysctl -q net.ipv4.neigh.default.gc_thresh3="$v4gc3" 2>/dev/null
48 sysctl -q net.ipv6.neigh.default.gc_thresh1="$v6gc1" 2>/dev/null
[all …]
Dipvs.sh124 ip netns exec "${ns1}" sysctl -qw net.ipv4.ip_forward=1
130 ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.all.arp_ignore=1
131 ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.all.arp_announce=2
133 ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.all.rp_filter=0
134 ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.veth21.rp_filter=0
143 ip netns exec "${ns1}" sysctl -qw net.ipv4.ip_forward=1
159 ip netns exec "${ns1}" sysctl -qw net.ipv4.ip_forward=0
160 ip netns exec "${ns1}" sysctl -qw net.ipv4.conf.all.send_redirects=0
161 ip netns exec "${ns1}" sysctl -qw net.ipv4.conf.default.send_redirects=0
168 ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.all.arp_ignore=1
[all …]
Dnft_fib.sh13 log_netns=$(sysctl -n net.netfilter.nf_log_all_netns)
19 [ "$log_netns" -eq 0 ] && sysctl -q net.netfilter.nf_log_all_netns=$log_netns
33 sysctl -q net.netfilter.nf_log_all_netns=1
154 ip netns exec "$nsrouter" sysctl net.ipv6.conf.all.forwarding=1 > /dev/null
155 ip netns exec "$nsrouter" sysctl net.ipv4.conf.veth0.forwarding=1 > /dev/null
156 ip netns exec "$nsrouter" sysctl net.ipv4.conf.veth1.forwarding=1 > /dev/null
157 ip netns exec "$nsrouter" sysctl net.ipv4.conf.all.rp_filter=0 > /dev/null
158 ip netns exec "$nsrouter" sysctl net.ipv4.conf.veth0.rp_filter=0 > /dev/null
/linux-6.12.1/Documentation/networking/
Dindex.rst64 ioam6-sysctl
67 ip-sysctl
70 ipvs-sysctl
76 mpls-sysctl
78 mptcp-sysctl
86 netfilter-sysctl
89 nf_conntrack-sysctl
109 seg6-sysctl
111 smc-sysctl
Dmptcp-sysctl.rst16 sysctl.
29 This is a per-namespace sysctl.
52 per-namespace sysctl.
63 sysctl.
71 per-namespace sysctl.
85 This is a per-namespace sysctl.
96 sysctl.
108 This is a per-namespace sysctl.
/linux-6.12.1/tools/testing/selftests/net/
Dip_defrag.sh17 ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_high_thresh=9000000 >/dev/null 2>&1
18 ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_low_thresh=7000000 >/dev/null 2>&1
19 ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_time=1 >/dev/null 2>&1
21 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_high_thresh=9000000 >/dev/null 2>&1
22 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_low_thresh=7000000 >/dev/null 2>&1
23 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_time=1 >/dev/null 2>&1
25 …ip netns exec "${NETNS}" sysctl -w net.netfilter.nf_conntrack_frag6_high_thresh=9000000 >/dev/null…
26 …ip netns exec "${NETNS}" sysctl -w net.netfilter.nf_conntrack_frag6_low_thresh=7000000 >/dev/null…
27 ip netns exec "${NETNS}" sysctl -w net.netfilter.nf_conntrack_frag6_timeout=1 >/dev/null 2>&1
30 ip netns exec "${NETNS}" sysctl -w net.ipv6.route.max_size=65536 >/dev/null 2>&1
Dipv6_flowlabel.sh15 sh -c 'sysctl -q -w net.ipv6.auto_flowlabels=0 && ./ipv6_flowlabel -l 1'
19 sh -c 'sysctl -q -w net.ipv6.auto_flowlabels=1 && ./ipv6_flowlabel -l 1'
23 sh -c 'sysctl -q -w net.ipv6.flowlabel_reflect=4 && \
24 sysctl -q -w net.ipv4.ping_group_range="0 2147483647" && \
33 sh -c 'sysctl -q -w net.ipv6.flowlabel_reflect=4 && \
34 sysctl -q -w net.ipv4.ping_group_range="0 2147483647" && \
Droute_localnet.sh16 sysctl -w net.ipv4.conf.veth0.route_localnet=1
17 ip netns exec "${PEER_NS}" sysctl -w net.ipv4.conf.veth1.route_localnet=1
42 sysctl -w net.ipv4.conf.veth0.arp_announce=2
43 ip netns exec "${PEER_NS}" sysctl -w net.ipv4.conf.veth1.arp_announce=2
59 sysctl -w net.ipv4.conf.veth0.arp_ignore=3
60 ip netns exec "${PEER_NS}" sysctl -w net.ipv4.conf.veth1.arp_ignore=3
Darp_ndisc_evict_nocarrier.sh4 # Tests sysctl options {arp,ndisc}_evict_nocarrier={0,1}
7 # an entry in the ARP/ND table. Depending on the test set sysctl option to
28 sysctl -w net.ipv6.conf.veth1.ndisc_evict_nocarrier=1 >/dev/null 2>&1
29 sysctl -w net.ipv6.conf.all.ndisc_evict_nocarrier=1 >/dev/null 2>&1
43 ip netns exec ${me} sysctl -w $1 >/dev/null 2>&1
70 sysctl -w "$1" >/dev/null 2>&1
91 sysctl -w net.ipv4.conf.veth0.arp_evict_nocarrier=1 >/dev/null 2>&1
92 sysctl -w net.ipv4.conf.all.arp_evict_nocarrier=1 >/dev/null 2>&1
/linux-6.12.1/samples/bpf/
Dtc_l2_redirect.sh49 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.all.rp_filter=0
50 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.ipt2.rp_filter=0
54 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.all.rp_filter=0
55 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.ip6t2.rp_filter=0
66 sysctl -q -w net.ipv4.conf.all.rp_filter=0
67 sysctl -q -w net.ipv6.conf.all.forwarding=1
68 sysctl -q -w net.ipv6.conf.all.disable_ipv6=0
80 sysctl -q -w net.ipv4.conf.all.rp_filter=$RP_FILTER
81 sysctl -q -w net.ipv6.conf.all.forwarding=$IPV6_FORWARDING
82 sysctl -q -w net.ipv6.conf.all.disable_ipv6=$IPV6_DISABLED
[all …]
/linux-6.12.1/tools/testing/selftests/bpf/
Dtest_sysctl.c33 const char *sysctl; member
48 .descr = "sysctl wrong attach_type",
54 .sysctl = "kernel/ostype",
59 .descr = "sysctl:read allow all",
65 .sysctl = "kernel/ostype",
70 .descr = "sysctl:read deny all",
76 .sysctl = "kernel/ostype",
81 .descr = "ctx:write sysctl:read read ok",
97 .sysctl = "kernel/ostype",
102 .descr = "ctx:write sysctl:write read ok",
[all …]
Dtest_kmod.sh28 sysctl -w net.core.bpf_jit_enable=$1 2>&1 > /dev/null
29 sysctl -w net.core.bpf_jit_harden=$2 2>&1 > /dev/null
56 JE=`sysctl -n net.core.bpf_jit_enable`
57 JH=`sysctl -n net.core.bpf_jit_harden`
62 sysctl -w net.core.bpf_jit_enable=$JE 2>&1 > /dev/null
63 sysctl -w net.core.bpf_jit_harden=$JH 2>&1 > /dev/null
/linux-6.12.1/tools/testing/selftests/sysctl/
Dsysctl.sh5 # This performs a series tests against the proc sysctl interface.
10 TEST_NAME="sysctl"
48 if [ -z $SYSCTL ]; then
49 SYSCTL="/proc/sys/debug/test_sysctl"
112 if [ ! -d $SYSCTL ]; then
219 echo "== Testing sysctl behavior against ${TARGET} =="
232 echo -n "Checking sysctl is not set to test value ... "
240 echo -n "Writing sysctl from shell ... "
249 echo -n "Resetting sysctl to original value ... "
262 echo -n "Writing entire sysctl in single write ... "
[all …]
/linux-6.12.1/tools/testing/selftests/net/netfilter/packetdrill/
Dcommon.sh7 sysctl -q net.netfilter.nf_conntrack_log_invalid=6
13 sysctl -q net.ipv4.tcp_rmem="4096 540000 $((15*1024*1024))"
14 sysctl -q net.ipv4.tcp_wmem="4096 $((256*1024)) 4194304"
17 sysctl -q net.ipv4.tcp_congestion_control=cubic
20 sysctl -q net.ipv4.tcp_slow_start_after_idle=0
23 sysctl -q net.ipv4.tcp_ecn=0
25 sysctl -q net.ipv4.tcp_notsent_lowat=4294967295 > /dev/null 2>&1
/linux-6.12.1/fs/proc/
Dproc_sysctl.c6 #include <linux/sysctl.h>
41 * register_sysctl_mount_point() - registers a sysctl mount point
171 pr_err("sysctl duplicate entry: "); in insert_entry()
416 * some sysctl variables are readonly even to root.
464 ei->sysctl = head; in proc_sys_make_inode()
503 struct ctl_table_header *head = PROC_I(inode)->sysctl; in grab_header()
562 * At this point we know that the sysctl was not unregistered in proc_sys_call_handler()
629 /* sysctl was unregistered */ in proc_sys_open()
649 /* sysctl was unregistered */ in proc_sys_poll()
791 * sysctl entries that are not writeable, in proc_sys_permission()
[all …]
/linux-6.12.1/drivers/phy/ralink/
Dphy-ralink-usb.c58 struct regmap *sysctl; member
97 regmap_update_bits(phy->sysctl, RT_SYSC_REG_CLKCFG1, in ralink_usb_phy_power_on()
101 regmap_update_bits(phy->sysctl, RT_SYSC_REG_SYSCFG1, in ralink_usb_phy_power_on()
119 regmap_read(phy->sysctl, RT_SYSC_REG_USB_PHY_CFG, &t); in ralink_usb_phy_power_on()
135 regmap_update_bits(phy->sysctl, RT_SYSC_REG_CLKCFG1, in ralink_usb_phy_power_off()
183 phy->sysctl = syscon_regmap_lookup_by_phandle(dev->of_node, "ralink,sysctl"); in ralink_usb_phy_probe()
184 if (IS_ERR(phy->sysctl)) { in ralink_usb_phy_probe()
185 dev_err(dev, "failed to get sysctl registers\n"); in ralink_usb_phy_probe()
186 return PTR_ERR(phy->sysctl); in ralink_usb_phy_probe()
/linux-6.12.1/tools/testing/selftests/net/mptcp/
Dmptcp_connect.sh188 ip netns exec "$ns2" sysctl -q net.ipv4.ip_forward=1
189 ip netns exec "$ns2" sysctl -q net.ipv6.conf.all.forwarding=1
200 ip netns exec "$ns3" sysctl -q net.ipv4.ip_forward=1
201 ip netns exec "$ns3" sysctl -q net.ipv6.conf.all.forwarding=1
211 ip netns exec $i sysctl -q net.mptcp.checksum_enabled=1
261 print_larger_title "New MPTCP socket can be blocked via sysctl"
264 if ! ip netns exec ${disabled_ns} sysctl net.mptcp >/dev/null; then
265 mptcp_lib_pr_fail "not able to list net.mptcp sysctl knobs"
266 mptcp_lib_result_fail "not able to list net.mptcp sysctl knobs"
272 if [ "$(ip netns exec ${disabled_ns} sysctl net.mptcp.enabled | awk '{ print $3 }')" -ne 1 ]; then
[all …]
/linux-6.12.1/Documentation/networking/device_drivers/ethernet/chelsio/
Dcxgb.rst127 sysctl -w net.ipv4.tcp_timestamps=0
131 sysctl -w net.ipv4.tcp_sack=0
135 sysctl -w net.ipv4.tcp_max_syn_backlog=3000
139 sysctl -w net.core.rmem_max=1024000
143 sysctl -w net.core.wmem_max=1024000
151 sysctl -w net.core.rmem_default=524287
155 sysctl -w net.core.wmem_default=524287
159 sysctl -w net.core.optmem_max=524287
163 sysctl -w net.core.netdev_max_backlog=300000
167 sysctl -w net.ipv4.tcp_rmem="10000000 10000000 10000000"
[all …]
/linux-6.12.1/Documentation/devicetree/bindings/mfd/
Dcanaan,k210-sysctl.yaml4 $id: http://devicetree.org/schemas/mfd/canaan,k210-sysctl.yaml#
20 - const: canaan,k210-sysctl
84 sysctl: syscon@50440000 {
85 compatible = "canaan,k210-sysctl",
104 regmap = <&sysctl>;
/linux-6.12.1/arch/arm64/kernel/
Darmv8_deprecated.c12 #include <linux/sysctl.h>
55 /* sysctl for this emulation */
56 struct ctl_table sysctl; member
537 struct ctl_table *sysctl; in register_insn_emulation() local
562 sysctl = &insn->sysctl; in register_insn_emulation()
564 sysctl->mode = 0644; in register_insn_emulation()
565 sysctl->maxlen = sizeof(int); in register_insn_emulation()
567 sysctl->procname = insn->name; in register_insn_emulation()
568 sysctl->data = &insn->current_mode; in register_insn_emulation()
569 sysctl->extra1 = &insn->min; in register_insn_emulation()
[all …]
/linux-6.12.1/Documentation/userspace-api/
Dmfd_noexec.rst33 - Add a new pid namespace sysctl: vm.memfd_noexec to help applications in
54 Sysctl:
56 ``pid namespaced sysctl vm.memfd_noexec``
58 The new pid namespaced sysctl vm.memfd_noexec has 3 values:
71 The sysctl allows finer control of memfd_create for old software that

12345678910>>...27