dwww Home | Manual pages | Find package

tcp(7)                 Miscellaneous Information Manual                 tcp(7)

NAME
       tcp - TCP protocol

SYNOPSIS
       #include <sys/socket.h>
       #include <netinet/in.h>
       #include <netinet/tcp.h>

       tcp_socket = socket(AF_INET, SOCK_STREAM, 0);

DESCRIPTION
       This  is  an  implementation  of  the  TCP protocol defined in RFC 793,
       RFC 1122 and RFC 2001 with the NewReno and SACK  extensions.   It  pro-
       vides  a  reliable, stream-oriented, full-duplex connection between two
       sockets on top of ip(7), for both v4 and v6 versions.   TCP  guarantees
       that the data arrives in order and retransmits lost packets.  It gener-
       ates and checks a per-packet checksum  to  catch  transmission  errors.
       TCP does not preserve record boundaries.

       A  newly  created  TCP socket has no remote or local address and is not
       fully specified.  To create an outgoing TCP connection  use  connect(2)
       to establish a connection to another TCP socket.  To receive new incom-
       ing connections, first bind(2) the socket to a local address  and  port
       and  then  call  listen(2)  to put the socket into the listening state.
       After that a new socket for each incoming connection  can  be  accepted
       using  accept(2).   A socket which has had accept(2) or connect(2) suc-
       cessfully called on it is fully specified and may transmit data.   Data
       cannot be transmitted on listening or not yet connected sockets.

       Linux supports RFC 1323 TCP high performance extensions.  These include
       Protection Against Wrapped Sequence Numbers (PAWS), Window Scaling  and
       Timestamps.   Window scaling allows the use of large (> 64 kB) TCP win-
       dows in order to support links with high latency or bandwidth.  To make
       use of them, the send and receive buffer sizes must be increased.  They
       can  be  set  globally   with   the   /proc/sys/net/ipv4/tcp_wmem   and
       /proc/sys/net/ipv4/tcp_rmem  files,  or  on individual sockets by using
       the SO_SNDBUF and SO_RCVBUF socket options with the setsockopt(2) call.

       The maximum sizes for socket buffers declared  via  the  SO_SNDBUF  and
       SO_RCVBUF    mechanisms    are   limited   by   the   values   in   the
       /proc/sys/net/core/rmem_max  and   /proc/sys/net/core/wmem_max   files.
       Note that TCP actually allocates twice the size of the buffer requested
       in the setsockopt(2) call, and so a succeeding getsockopt(2) call  will
       not  return  the  same size of buffer as requested in the setsockopt(2)
       call.  TCP uses the extra space for administrative purposes and  inter-
       nal  kernel  structures,  and  the /proc file values reflect the larger
       sizes compared to the actual TCP windows.  On  individual  connections,
       the socket buffer size must be set prior to the listen(2) or connect(2)
       calls in order to have it take effect.  See socket(7) for more informa-
       tion.

       TCP  supports  urgent data.  Urgent data is used to signal the receiver
       that some important message is part of the  data  stream  and  that  it
       should  be  processed as soon as possible.  To send urgent data specify
       the MSG_OOB option to send(2).  When urgent data is received, the  ker-
       nel sends a SIGURG signal to the process or process group that has been
       set as the socket "owner" using the SIOCSPGRP or FIOSETOWN  ioctls  (or
       the POSIX.1-specified fcntl(2) F_SETOWN operation).  When the SO_OOBIN-
       LINE socket option is enabled, urgent data is put into the normal  data
       stream  (a program can test for its location using the SIOCATMARK ioctl
       described below), otherwise it can be received only  when  the  MSG_OOB
       flag is set for recv(2) or recvmsg(2).

       When out-of-band data is present, select(2) indicates the file descrip-
       tor as having an exceptional condition and poll (2) indicates a POLLPRI
       event.

       Linux  2.4  introduced  a number of changes for improved throughput and
       scaling, as well as enhanced functionality.  Some of these features in-
       clude  support for zero-copy sendfile(2), Explicit Congestion Notifica-
       tion, new management of TIME_WAIT sockets,  keep-alive  socket  options
       and support for Duplicate SACK extensions.

   Address formats
       TCP  is built on top of IP (see ip(7)).  The address formats defined by
       ip(7) apply to TCP.  TCP supports  point-to-point  communication  only;
       broadcasting and multicasting are not supported.

   /proc interfaces
       System-wide  TCP parameter settings can be accessed by files in the di-
       rectory /proc/sys/net/ipv4/.  In addition,  most  IP  /proc  interfaces
       also  apply  to TCP; see ip(7).  Variables described as Boolean take an
       integer value, with a nonzero value ("true") meaning  that  the  corre-
       sponding option is enabled, and a zero value ("false") meaning that the
       option is disabled.

       tcp_abc (Integer; default: 0; Linux 2.6.15 to Linux 3.8)
              Control the Appropriate Byte Count (ABC), defined in  RFC  3465.
              ABC  is  a  way  of increasing the congestion window (cwnd) more
              slowly in response to partial acknowledgements.  Possible values
              are:

              0      increase cwnd once per acknowledgement (no ABC)

              1      increase cwnd once per acknowledgement of full sized seg-
                     ment

              2      allow increase cwnd by two if acknowledgement is  of  two
                     segments to compensate for delayed acknowledgements.

       tcp_abort_on_overflow (Boolean; default: disabled; since Linux 2.4)
              Enable  resetting  connections  if  the listening service is too
              slow and unable to keep up and accept them.  It  means  that  if
              overflow  occurred  due to a burst, the connection will recover.
              Enable this option only if you are really sure that the  listen-
              ing  daemon  cannot  be tuned to accept connections faster.  En-
              abling this option can harm the clients of your server.

       tcp_adv_win_scale (integer; default: 2; since Linux 2.4)
              Count  buffering  overhead  as   bytes/2^tcp_adv_win_scale,   if
              tcp_adv_win_scale      is      greater      than      0;      or
              bytes-bytes/2^(-tcp_adv_win_scale), if tcp_adv_win_scale is less
              than or equal to zero.

              The  socket  receive buffer space is shared between the applica-
              tion and kernel.  TCP maintains part of the buffer  as  the  TCP
              window, this is the size of the receive window advertised to the
              other end.  The rest of the space is used as  the  "application"
              buffer, used to isolate the network from scheduling and applica-
              tion latencies.  The tcp_adv_win_scale default value  of  2  im-
              plies  that  the  space  used  for the application buffer is one
              fourth that of the total.

       tcp_allowed_congestion_control (String; default: see text; since  Linux
       2.4.20)
              Show/set  the  congestion control algorithm choices available to
              unprivileged processes (see the description of  the  TCP_CONGES-
              TION  socket  option).   The  items in the list are separated by
              white space and terminated by a newline character.  The list  is
              a  subset  of  those listed in tcp_available_congestion_control.
              The default value for this list is "reno" plus the default  set-
              ting of tcp_congestion_control.

       tcp_autocorking (Boolean; default: enabled; since Linux 3.14)
              If  this  option  is enabled, the kernel tries to coalesce small
              writes (from consecutive write(2) and sendmsg(2) calls) as  much
              as possible, in order to decrease the total number of sent pack-
              ets.  Coalescing is done if at least one prior  packet  for  the
              flow  is  waiting in Qdisc queues or device transmit queue.  Ap-
              plications can still use the TCP_CORK socket  option  to  obtain
              optimal  behavior  when they know how/when to uncork their sock-
              ets.

       tcp_available_congestion_control  (String;   read-only;   since   Linux
       2.4.20)
              Show a list of the congestion-control algorithms that are regis-
              tered.  The items in the list are separated by white  space  and
              terminated  by a newline character.  This list is a limiting set
              for the list in  tcp_allowed_congestion_control.   More  conges-
              tion-control  algorithms  may  be  available as modules, but not
              loaded.

       tcp_app_win (integer; default: 31; since Linux 2.4)
              This variable defines how many bytes of the TCP window  are  re-
              served for buffering overhead.

              A maximum of (window/2^tcp_app_win, mss) bytes in the window are
              reserved for the application buffer.  A value of 0 implies  that
              no amount is reserved.

       tcp_base_mss (Integer; default: 512; since Linux 2.6.17)
              The  initial value of search_low to be used by the packetization
              layer Path MTU discovery (MTU probing).  If MTU probing  is  en-
              abled, this is the initial MSS used by the connection.

       tcp_bic  (Boolean;  default:  disabled;  Linux  2.4.27/2.6.6  to  Linux
       2.6.13)
              Enable BIC TCP  congestion  control  algorithm.   BIC-TCP  is  a
              sender-side-only change that ensures a linear RTT fairness under
              large windows while offering both scalability and  bounded  TCP-
              friendliness.  The protocol combines two schemes called additive
              increase and binary search increase.  When the congestion window
              is  large, additive increase with a large increment ensures lin-
              ear RTT fairness as well as good scalability.  Under small  con-
              gestion  windows,  binary search increase provides TCP friendli-
              ness.

       tcp_bic_low_window (integer; default: 14; Linux 2.4.27/2.6.6  to  Linux
       2.6.13)
              Set  the  threshold  window (in packets) where BIC TCP starts to
              adjust the congestion window.  Below this threshold BIC TCP  be-
              haves the same as the default TCP Reno.

       tcp_bic_fast_convergence (Boolean; default: enabled; Linux 2.4.27/2.6.6
       to Linux 2.6.13)
              Force BIC TCP to more quickly respond to changes  in  congestion
              window.   Allows  two  flows sharing the same connection to con-
              verge more rapidly.

       tcp_congestion_control (String; default: see text; since Linux 2.4.13)
              Set the default congestion-control algorithm to be used for  new
              connections.   The algorithm "reno" is always available, but ad-
              ditional choices may be available depending on kernel configura-
              tion.   The default value for this file is set as part of kernel
              configuration.

       tcp_dma_copybreak (integer; default: 4096; since Linux 2.6.24)
              Lower limit, in bytes, of the size of socket reads that will  be
              offloaded  to a DMA copy engine, if one is present in the system
              and the kernel was configured with the CONFIG_NET_DMA option.

       tcp_dsack (Boolean; default: enabled; since Linux 2.4)
              Enable RFC 2883 TCP Duplicate SACK support.

       tcp_fastopen (Bitmask; default: 0x1; since Linux 3.7)
              Enables RFC 7413 Fast Open support.  The flag is used as a  bit-
              map with the following values:

              0x1    Enables client side Fast Open support

              0x2    Enables server side Fast Open support

              0x4    Allows  client  side to transmit data in SYN without Fast
                     Open option

              0x200  Allows server side to accept SYN data without  Fast  Open
                     option

              0x400  Enables  Fast  Open on all listeners without TCP_FASTOPEN
                     socket option

       tcp_fastopen_key (since Linux 3.7)
              Set server side RFC 7413 Fast Open key  to  generate  Fast  Open
              cookie when server side Fast Open support is enabled.

       tcp_ecn (Integer; default: see below; since Linux 2.4)
              Enable RFC 3168 Explicit Congestion Notification.

              This file can have one of the following values:

              0      Disable  ECN.  Neither initiate nor accept ECN.  This was
                     the default up to and including Linux 2.6.30.

              1      Enable ECN when requested  by  incoming  connections  and
                     also request ECN on outgoing connection attempts.

              2      Enable ECN when requested by incoming connections, but do
                     not request ECN on outgoing connections.  This  value  is
                     supported, and is the default, since Linux 2.6.31.

              When  enabled,  connectivity  to  some destinations could be af-
              fected due to older, misbehaving middle boxes  along  the  path,
              causing  connections  to be dropped.  However, to facilitate and
              encourage deployment with option 1,  and  to  work  around  such
              buggy  equipment,  the  tcp_ecn_fallback  option has been intro-
              duced.

       tcp_ecn_fallback (Boolean; default: enabled; since Linux 4.1)
              Enable RFC 3168, Section 6.1.1.1. fallback.  When enabled,  out-
              going  ECN-setup  SYNs  that  time out within the normal SYN re-
              transmission timeout will be resent with CWR and ECE cleared.

       tcp_fack (Boolean; default: enabled; since Linux 2.2)
              Enable TCP Forward Acknowledgement support.

       tcp_fin_timeout (integer; default: 60; since Linux 2.2)
              This specifies how many seconds to wait for a final  FIN  packet
              before the socket is forcibly closed.  This is strictly a viola-
              tion of the TCP specification, but required to  prevent  denial-
              of-service attacks.  In Linux 2.2, the default value was 180.

       tcp_frto (integer; default: see below; since Linux 2.4.21/2.6)
              Enable F-RTO, an enhanced recovery algorithm for TCP retransmis-
              sion timeouts (RTOs).  It is particularly beneficial in wireless
              environments  where packet loss is typically due to random radio
              interference rather than intermediate  router  congestion.   See
              RFC 4138 for more details.

              This file can have one of the following values:

              0      Disabled.  This was the default up to and including Linux
                     2.6.23.

              1      The basic version F-RTO algorithm is enabled.

              2      Enable SACK-enhanced F-RTO if flow uses SACK.  The  basic
                     version  can  be  used also when SACK is in use though in
                     that case scenario(s) exists where F-RTO interacts  badly
                     with  the  packet  counting of the SACK-enabled TCP flow.
                     This value is the default since Linux 2.6.24.

              Before Linux 2.6.22, this parameter was a  Boolean  value,  sup-
              porting just values 0 and 1 above.

       tcp_frto_response (integer; default: 0; since Linux 2.6.22)
              When  F-RTO  has  detected that a TCP retransmission timeout was
              spurious (i.e., the timeout would have been avoided had TCP  set
              a  longer  retransmission timeout), TCP has several options con-
              cerning what to do next.  Possible values are:

              0      Rate halving based; a smooth and  conservative  response,
                     results in halved congestion window (cwnd) and slow-start
                     threshold (ssthresh) after one RTT.

              1      Very conservative response; not recommended because  even
                     though  being valid, it interacts poorly with the rest of
                     Linux TCP; halves cwnd and ssthresh immediately.

              2      Aggressive response; undoes  congestion-control  measures
                     that are now known to be unnecessary (ignoring the possi-
                     bility of a lost retransmission that would require TCP to
                     be  more cautious); cwnd and ssthresh are restored to the
                     values prior to timeout.

       tcp_keepalive_intvl (integer; default: 75; since Linux 2.4)
              The number of seconds between TCP keep-alive probes.

       tcp_keepalive_probes (integer; default: 9; since Linux 2.2)
              The maximum number of TCP keep-alive probes to send before  giv-
              ing  up  and  killing  the connection if no response is obtained
              from the other end.

       tcp_keepalive_time (integer; default: 7200; since Linux 2.2)
              The number of seconds a connection needs to be idle  before  TCP
              begins sending out keep-alive probes.  Keep-alives are sent only
              when the SO_KEEPALIVE socket option  is  enabled.   The  default
              value  is  7200 seconds (2 hours).  An idle connection is termi-
              nated after approximately an additional 11 minutes (9 probes  an
              interval of 75 seconds apart) when keep-alive is enabled.

              Note that underlying connection tracking mechanisms and applica-
              tion timeouts may be much shorter.

       tcp_low_latency (Boolean; default: disabled;  since  Linux  2.4.21/2.6;
       obsolete since Linux 4.14)
              If  enabled, the TCP stack makes decisions that prefer lower la-
              tency as opposed to higher throughput.  It this option  is  dis-
              abled,  then  higher  throughput is preferred.  An example of an
              application where this default should be changed would be a  Be-
              owulf  compute  cluster.   Since Linux 4.14, this file still ex-
              ists, but its value is ignored.

       tcp_max_orphans (integer; default: see below; since Linux 2.4)
              The maximum number of orphaned (not attached to  any  user  file
              handle)  TCP sockets allowed in the system.  When this number is
              exceeded, the orphaned connection is  reset  and  a  warning  is
              printed.   This  limit  exists only to prevent simple denial-of-
              service attacks.  Lowering this limit is not recommended.   Net-
              work  conditions might require you to increase the number of or-
              phans allowed, but note that each orphan can eat up to ~64 kB of
              unswappable  memory.   The default initial value is set equal to
              the kernel parameter NR_FILE.  This initial default is  adjusted
              depending on the memory in the system.

       tcp_max_syn_backlog (integer; default: see below; since Linux 2.2)
              The  maximum  number  of  queued  connection requests which have
              still  not  received  an  acknowledgement  from  the  connecting
              client.  If this number is exceeded, the kernel will begin drop-
              ping requests.  The default value of 256 is  increased  to  1024
              when the memory present in the system is adequate or greater (>=
              128 MB), and reduced to 128 for those systems with very low mem-
              ory (<= 32 MB).

              Before  Linux  2.6.20, it was recommended that if this needed to
              be increased above 1024, the  size  of  the  SYNACK  hash  table
              (TCP_SYNQ_HSIZE) in include/net/tcp.h should be modified to keep

                  TCP_SYNQ_HSIZE * 16 <= tcp_max_syn_backlog

              and the kernel should be recompiled.  In Linux 2.6.20, the fixed
              sized TCP_SYNQ_HSIZE was removed in favor of dynamic sizing.

       tcp_max_tw_buckets (integer; default: see below; since Linux 2.4)
              The maximum number of sockets in TIME_WAIT state allowed in  the
              system.  This limit exists only to prevent simple denial-of-ser-
              vice attacks.  The default value of NR_FILE*2  is  adjusted  de-
              pending  on  the  memory  in  the system.  If this number is ex-
              ceeded, the socket is closed and a warning is printed.

       tcp_moderate_rcvbuf   (Boolean;   default:   enabled;    since    Linux
       2.4.17/2.6.7)
              If  enabled, TCP performs receive buffer auto-tuning, attempting
              to automatically size the buffer (no greater  than  tcp_rmem[2])
              to match the size required by the path for full throughput.

       tcp_mem (since Linux 2.4)
              This  is  a  vector of 3 integers: [low, pressure, high].  These
              bounds, measured in units of the system page size, are  used  by
              TCP  to  track its memory usage.  The defaults are calculated at
              boot time from the amount of available memory.   (TCP  can  only
              use  low  memory  for  this,  which  is  limited  to  around 900
              megabytes on 32-bit systems.  64-bit systems do not suffer  this
              limitation.)

              low    TCP  doesn't regulate its memory allocation when the num-
                     ber of pages it has allocated globally is below this num-
                     ber.

              pressure
                     When  the  amount of memory allocated by TCP exceeds this
                     number of pages, TCP moderates  its  memory  consumption.
                     This  memory  pressure state is exited once the number of
                     pages allocated falls below the low mark.

              high   The maximum number of pages, globally, that TCP will  al-
                     locate.  This value overrides any other limits imposed by
                     the kernel.

       tcp_mtu_probing (integer; default: 0; since Linux 2.6.17)
              This parameter controls TCP Packetization-Layer Path MTU Discov-
              ery.  The following values may be assigned to the file:

              0      Disabled

              1      Disabled  by default, enabled when an ICMP black hole de-
                     tected

              2      Always enabled, use initial MSS of tcp_base_mss.

       tcp_no_metrics_save (Boolean; default: disabled; since Linux 2.6.6)
              By default, TCP saves various connection metrics  in  the  route
              cache  when  the  connection  closes, so that connections estab-
              lished in the near future can use these to  set  initial  condi-
              tions.   Usually, this increases overall performance, but it may
              sometimes cause performance degradation.  If tcp_no_metrics_save
              is enabled, TCP will not cache metrics on closing connections.

       tcp_orphan_retries (integer; default: 8; since Linux 2.4)
              The  maximum number of attempts made to probe the other end of a
              connection which has been closed by our end.

       tcp_reordering (integer; default: 3; since Linux 2.4)
              The maximum a packet can be reordered in  a  TCP  packet  stream
              without  TCP assuming packet loss and going into slow start.  It
              is not advisable to change this number.  This is  a  packet  re-
              ordering  detection metric designed to minimize unnecessary back
              off and retransmits provoked by reordering of packets on a  con-
              nection.

       tcp_retrans_collapse (Boolean; default: enabled; since Linux 2.2)
              Try to send full-sized packets during retransmit.

       tcp_retries1 (integer; default: 3; since Linux 2.2)
              The  number  of times TCP will attempt to retransmit a packet on
              an established connection normally, without the extra effort  of
              getting the network layers involved.  Once we exceed this number
              of retransmits, we first have the network layer update the route
              if  possible before each new retransmit.  The default is the RFC
              specified minimum of 3.

       tcp_retries2 (integer; default: 15; since Linux 2.2)
              The maximum number of times a TCP packet is retransmitted in es-
              tablished  state  before  giving  up.   The default value is 15,
              which corresponds to a duration of approximately between  13  to
              30  minutes,  depending  on  the  retransmission  timeout.   The
              RFC 1122 specified minimum limit of  100  seconds  is  typically
              deemed too short.

       tcp_rfc1337 (Boolean; default: disabled; since Linux 2.2)
              Enable TCP behavior conformant with RFC 1337.  When disabled, if
              a RST is received in TIME_WAIT state, we close the socket  imme-
              diately without waiting for the end of the TIME_WAIT period.

       tcp_rmem (since Linux 2.4)
              This  is a vector of 3 integers: [min, default, max].  These pa-
              rameters are used by TCP to regulate receive buffer sizes.   TCP
              dynamically  adjusts the size of the receive buffer from the de-
              faults listed below, in the range of these values, depending  on
              memory available in the system.

              min    minimum  size  of  the  receive  buffer  used by each TCP
                     socket.  The default value is the system page size.   (On
                     Linux   2.4,  the  default  value  is  4 kB,  lowered  to
                     PAGE_SIZE bytes in low-memory systems.)   This  value  is
                     used  to ensure that in memory pressure mode, allocations
                     below this size will still succeed.  This is not used  to
                     bound  the  size  of  the  receive  buffer declared using
                     SO_RCVBUF on a socket.

              default
                     the default size of the receive buffer for a TCP  socket.
                     This  value  overwrites  the  initial default buffer size
                     from the generic global net.core.rmem_default defined for
                     all  protocols.   The  default value is 87380 bytes.  (On
                     Linux 2.4, this will be lowered to  43689  in  low-memory
                     systems.)   If  larger  receive buffer sizes are desired,
                     this value should be increased (to affect  all  sockets).
                     To   employ  large  TCP  windows,  the  net.ipv4.tcp_win-
                     dow_scaling must be enabled (default).

              max    the maximum size of the receive buffer used by  each  TCP
                     socket.    This   value  does  not  override  the  global
                     net.core.rmem_max.  This is not used to limit the size of
                     the  receive buffer declared using SO_RCVBUF on a socket.
                     The default value is calculated using the formula

                         max(87380, min(4 MB, tcp_mem[1]*PAGE_SIZE/128))

                     (On Linux 2.4, the default is 87380*2 bytes,  lowered  to
                     87380 in low-memory systems).

       tcp_sack (Boolean; default: enabled; since Linux 2.2)
              Enable RFC 2018 TCP Selective Acknowledgements.

       tcp_slow_start_after_idle   (Boolean;  default:  enabled;  since  Linux
       2.6.18)
              If enabled, provide RFC 2861 behavior and time out  the  conges-
              tion  window after an idle period.  An idle period is defined as
              the current RTO (retransmission timeout).  If disabled, the con-
              gestion window will not be timed out after an idle period.

       tcp_stdurg (Boolean; default: disabled; since Linux 2.2)
              If  this option is enabled, then use the RFC 1122 interpretation
              of the TCP urgent-pointer field.  According to this  interpreta-
              tion, the urgent pointer points to the last byte of urgent data.
              If this option is disabled, then use the  BSD-compatible  inter-
              pretation  of  the  urgent pointer: the urgent pointer points to
              the first byte after the urgent data.  Enabling this option  may
              lead to interoperability problems.

       tcp_syn_retries (integer; default: 6; since Linux 2.2)
              The  maximum number of times initial SYNs for an active TCP con-
              nection attempt will be retransmitted.  This value should not be
              higher  than  255.  The default value is 6, which corresponds to
              retrying for up to approximately 127 seconds.  Before Linux 3.7,
              the  default value was 5, which (in conjunction with calculation
              based on other kernel parameters) corresponded to  approximately
              180 seconds.

       tcp_synack_retries (integer; default: 5; since Linux 2.2)
              The  maximum number of times a SYN/ACK segment for a passive TCP
              connection will be retransmitted.  This  number  should  not  be
              higher than 255.

       tcp_syncookies (integer; default: 1; since Linux 2.2)
              Enable  TCP  syncookies.   The kernel must be compiled with CON-
              FIG_SYN_COOKIES.  The syncookies feature attempts to  protect  a
              socket  from  a SYN flood attack.  This should be used as a last
              resort, if at all.  This is a violation of the TCP protocol, and
              conflicts  with  other  areas of TCP such as TCP extensions.  It
              can cause problems for clients and relays.   It  is  not  recom-
              mended  as a tuning mechanism for heavily loaded servers to help
              with overloaded or misconfigured  conditions.   For  recommended
              alternatives  see  tcp_max_syn_backlog,  tcp_synack_retries, and
              tcp_abort_on_overflow.  Set to one of the following values:

              0      Disable TCP syncookies.

              1      Send out syncookies when  the  syn  backlog  queue  of  a
                     socket overflows.

              2      (since  Linux  3.12) Send out syncookies unconditionally.
                     This can be useful for network testing.

       tcp_timestamps (integer; default: 1; since Linux 2.2)
              Set to one of the following values to enable or disable RFC 1323
              TCP timestamps:

              0      Disable timestamps.

              1      Enable  timestamps  as  defined in RFC1323 and use random
                     offset for each connection rather  than  only  using  the
                     current time.

              2      As  for the value 1, but without random offsets.  Setting
                     tcp_timestamps to this value is  meaningful  since  Linux
                     4.10.

       tcp_tso_win_divisor (integer; default: 3; since Linux 2.6.9)
              This parameter controls what percentage of the congestion window
              can be consumed by  a  single  TCP  Segmentation  Offload  (TSO)
              frame.   The  setting  of  this  parameter is a tradeoff between
              burstiness and building larger TSO frames.

       tcp_tw_recycle (Boolean; default: disabled; Linux 2.4 to Linux 4.11)
              Enable fast recycling of TIME_WAIT sockets.  Enabling  this  op-
              tion  is  not recommended as the remote IP may not use monotoni-
              cally increasing timestamps (devices behind  NAT,  devices  with
              per-connection  timestamp offsets).  See RFC 1323 (PAWS) and RFC
              6191.

       tcp_tw_reuse (Boolean; default: disabled; since Linux 2.4.19/2.6)
              Allow to reuse TIME_WAIT sockets for new connections when it  is
              safe  from protocol viewpoint.  It should not be changed without
              advice/request of technical experts.

       tcp_vegas_cong_avoid (Boolean; default: disabled; Linux  2.2  to  Linux
       2.6.13)
              Enable TCP Vegas congestion avoidance algorithm.  TCP Vegas is a
              sender-side-only change to TCP that  anticipates  the  onset  of
              congestion  by  estimating the bandwidth.  TCP Vegas adjusts the
              sending rate by modifying  the  congestion  window.   TCP  Vegas
              should  provide less packet loss, but it is not as aggressive as
              TCP Reno.

       tcp_westwood (Boolean; default: disabled; Linux 2.4.26/2.6.3  to  Linux
       2.6.13)
              Enable  TCP  Westwood+  congestion control algorithm.  TCP West-
              wood+ is a sender-side-only modification of the TCP Reno  proto-
              col  stack that optimizes the performance of TCP congestion con-
              trol.  It is based on end-to-end  bandwidth  estimation  to  set
              congestion  window  and  slow start threshold after a congestion
              episode.  Using this estimation, TCP Westwood+ adaptively sets a
              slow  start  threshold  and a congestion window which takes into
              account the bandwidth used at the  time  congestion  is  experi-
              enced.   TCP Westwood+ significantly increases fairness with re-
              spect to TCP Reno in wired networks and throughput over wireless
              links.

       tcp_window_scaling (Boolean; default: enabled; since Linux 2.2)
              Enable RFC 1323 TCP window scaling.  This feature allows the use
              of a large window (> 64 kB) on  a  TCP  connection,  should  the
              other  end support it.  Normally, the 16 bit window length field
              in the TCP header limits the window size to less than 64 kB.  If
              larger  windows  are desired, applications can increase the size
              of their socket buffers and the window scaling  option  will  be
              employed.  If tcp_window_scaling is disabled, TCP will not nego-
              tiate the use of window scaling with the other end  during  con-
              nection setup.

       tcp_wmem (since Linux 2.4)
              This  is a vector of 3 integers: [min, default, max].  These pa-
              rameters are used by TCP to regulate send buffer sizes.  TCP dy-
              namically  adjusts  the size of the send buffer from the default
              values listed below, in the range of these values, depending  on
              memory available.

              min    Minimum  size of the send buffer used by each TCP socket.
                     The default value is the system  page  size.   (On  Linux
                     2.4,  the  default value is 4 kB.)  This value is used to
                     ensure that in memory pressure  mode,  allocations  below
                     this  size will still succeed.  This is not used to bound
                     the size of the send buffer declared using SO_SNDBUF on a
                     socket.

              default
                     The  default  size  of  the send buffer for a TCP socket.
                     This value overwrites the  initial  default  buffer  size
                     from  the  generic global /proc/sys/net/core/wmem_default
                     defined for all protocols.  The default value  is  16 kB.
                     If  larger  send  buffer  sizes  are  desired, this value
                     should be increased (to affect all sockets).   To  employ
                     large   TCP   windows,   the  /proc/sys/net/ipv4/tcp_win-
                     dow_scaling must be set to a nonzero value (default).

              max    The maximum size of the send  buffer  used  by  each  TCP
                     socket.   This  value  does  not  override  the  value in
                     /proc/sys/net/core/wmem_max.  This is not used  to  limit
                     the size of the send buffer declared using SO_SNDBUF on a
                     socket.  The default value is calculated using  the  for-
                     mula

                         max(65536, min(4 MB, tcp_mem[1]*PAGE_SIZE/128))

                     (On Linux 2.4, the default value is 128 kB, lowered 64 kB
                     depending on low-memory systems.)

       tcp_workaround_signed_windows (Boolean; default: disabled; since  Linux
       2.6.26)
              If  enabled,  assume  that no receipt of a window-scaling option
              means that the remote TCP is broken and treats the window  as  a
              signed quantity.  If disabled, assume that the remote TCP is not
              broken even if we do not receive a window  scaling  option  from
              it.

   Socket options
       To  set  or get a TCP socket option, call getsockopt(2) to read or set-
       sockopt(2) to write the option with the option level  argument  set  to
       IPPROTO_TCP.   Unless  otherwise  noted, optval is a pointer to an int.
       In addition, most IPPROTO_IP socket options are valid on  TCP  sockets.
       For more information see ip(7).

       Following  is  a  list  of TCP-specific socket options.  For details of
       some other socket options that are also applicable for TCP sockets, see
       socket(7).

       TCP_CONGESTION (since Linux 2.6.13)
              The  argument  for  this option is a string.  This option allows
              the caller to set the TCP congestion  control  algorithm  to  be
              used,  on  a  per-socket  basis.  Unprivileged processes are re-
              stricted to choosing one of the algorithms  in  tcp_allowed_con-
              gestion_control   (described   above).    Privileged   processes
              (CAP_NET_ADMIN) can choose from any of the available congestion-
              control algorithms (see the description of tcp_available_conges-
              tion_control above).

       TCP_CORK (since Linux 2.2)
              If set, don't send  out  partial  frames.   All  queued  partial
              frames  are sent when the option is cleared again.  This is use-
              ful for prepending headers before calling  sendfile(2),  or  for
              throughput  optimization.   As currently implemented, there is a
              200 millisecond ceiling on the time for which output  is  corked
              by  TCP_CORK.   If  this ceiling is reached, then queued data is
              automatically transmitted.  This option  can  be  combined  with
              TCP_NODELAY  only since Linux 2.5.71.  This option should not be
              used in code intended to be portable.

       TCP_DEFER_ACCEPT (since Linux 2.4)
              Allow a listener to be awakened only when data  arrives  on  the
              socket.   Takes  an  integer value (seconds), this can bound the
              maximum number of attempts TCP will make to complete the connec-
              tion.   This  option  should  not be used in code intended to be
              portable.

       TCP_INFO (since Linux 2.4)
              Used to collect information about this socket.  The  kernel  re-
              turns  a  struct  tcp_info  as  defined  in  the  file  /usr/in-
              clude/linux/tcp.h.  This option should not be used in  code  in-
              tended to be portable.

       TCP_KEEPCNT (since Linux 2.4)
              The  maximum  number  of keepalive probes TCP should send before
              dropping the connection.  This option should not be used in code
              intended to be portable.

       TCP_KEEPIDLE (since Linux 2.4)
              The time (in seconds) the connection needs to remain idle before
              TCP starts  sending  keepalive  probes,  if  the  socket  option
              SO_KEEPALIVE  has  been  set on this socket.  This option should
              not be used in code intended to be portable.

       TCP_KEEPINTVL (since Linux 2.4)
              The time (in seconds) between individual keepalive probes.  This
              option should not be used in code intended to be portable.

       TCP_LINGER2 (since Linux 2.4)
              The  lifetime  of orphaned FIN_WAIT2 state sockets.  This option
              can be used to override the  system-wide  setting  in  the  file
              /proc/sys/net/ipv4/tcp_fin_timeout for this socket.  This is not
              to be confused with the socket(7) level option SO_LINGER.   This
              option should not be used in code intended to be portable.

       TCP_MAXSEG
              The maximum segment size for outgoing TCP packets.  In Linux 2.2
              and earlier, and in Linux 2.6.28 and later, if  this  option  is
              set  before  connection  establishment,  it also changes the MSS
              value announced to the other end in the initial packet.   Values
              greater  than  the (eventual) interface MTU have no effect.  TCP
              will also impose its minimum and maximum bounds over  the  value
              provided.

       TCP_NODELAY
              If  set,  disable the Nagle algorithm.  This means that segments
              are always sent as soon as possible, even if  there  is  only  a
              small  amount  of  data.   When  not set, data is buffered until
              there is a sufficient amount to send out, thereby  avoiding  the
              frequent  sending  of  small packets, which results in poor uti-
              lization of the network.  This option is overridden by TCP_CORK;
              however, setting this option forces an explicit flush of pending
              output, even if TCP_CORK is currently set.

       TCP_QUICKACK (since Linux 2.4.4)
              Enable quickack mode if set or disable quickack mode if cleared.
              In quickack mode, acks are sent immediately, rather than delayed
              if needed in accordance to normal TCP operation.  This  flag  is
              not  permanent,  it  only  enables  a switch to or from quickack
              mode.  Subsequent operation of the TCP protocol will once  again
              enter/leave  quickack  mode  depending on internal protocol pro-
              cessing and factors such as delayed ack timeouts  occurring  and
              data  transfer.  This option should not be used in code intended
              to be portable.

       TCP_SYNCNT (since Linux 2.4)
              Set the number of SYN retransmits that TCP  should  send  before
              aborting  the  attempt  to connect.  It cannot exceed 255.  This
              option should not be used in code intended to be portable.

       TCP_USER_TIMEOUT (since Linux 2.6.37)
              This option takes an unsigned int  as  an  argument.   When  the
              value is greater than 0, it specifies the maximum amount of time
              in milliseconds that transmitted data may remain unacknowledged,
              or  buffered  data  may remain untransmitted (due to zero window
              size) before TCP will forcibly close the  corresponding  connec-
              tion  and  return  ETIMEDOUT  to the application.  If the option
              value is specified as 0, TCP will use the system default.

              Increasing user timeouts allows a TCP connection to survive  ex-
              tended periods without end-to-end connectivity.  Decreasing user
              timeouts allows applications to  "fail  fast",  if  so  desired.
              Otherwise,  failure  may  take up to 20 minutes with the current
              system defaults in a normal WAN environment.

              This option can be set during any state of a TCP connection, but
              is effective only during the synchronized states of a connection
              (ESTABLISHED, FIN-WAIT-1, FIN-WAIT-2, CLOSE-WAIT,  CLOSING,  and
              LAST-ACK).    Moreover,   when   used  with  the  TCP  keepalive
              (SO_KEEPALIVE) option, TCP_USER_TIMEOUT will override  keepalive
              to  determine  when to close a connection due to keepalive fail-
              ure.

              The option has no effect on when TCP retransmits a  packet,  nor
              when a keepalive probe is sent.

              This  option,  like many others, will be inherited by the socket
              returned by accept(2), if it was set on the listening socket.

              Further details on the user timeout  feature  can  be  found  in
              RFC 793 and RFC 5482 ("TCP User Timeout Option").

       TCP_WINDOW_CLAMP (since Linux 2.4)
              Bound the size of the advertised window to this value.  The ker-
              nel imposes a minimum size of  SOCK_MIN_RCVBUF/2.   This  option
              should not be used in code intended to be portable.

       TCP_FASTOPEN (since Linux 3.6)
              This option enables Fast Open (RFC 7413) on the listener socket.
              The value specifies the maximum length of pending SYNs  (similar
              to  the  backlog argument in listen(2)).  Once enabled, the lis-
              tener socket grants the TCP Fast Open  cookie  on  incoming  SYN
              with TCP Fast Open option.

              More  importantly  it  accepts the data in SYN with a valid Fast
              Open cookie and responds SYN-ACK acknowledging both the data and
              the  SYN sequence.  accept(2) returns a socket that is available
              for read and write when the handshake  has  not  completed  yet.
              Thus  the  data  exchange can commence before the handshake com-
              pletes.  This option requires enabling the  server-side  support
              on  sysctl net.ipv4.tcp_fastopen (see above).  For TCP Fast Open
              client-side    support,    see    send(2)    MSG_FASTOPEN     or
              TCP_FASTOPEN_CONNECT below.

       TCP_FASTOPEN_CONNECT (since Linux 4.11)
              This  option  enables an alternative way to perform Fast Open on
              the active side (client).  When this  option  is  enabled,  con-
              nect(2)  would  behave  differently  depending on if a Fast Open
              cookie is available for the destination.

              If a cookie is not available (i.e. first contact to the destina-
              tion), connect(2) behaves as usual by sending a SYN immediately,
              except the SYN would include an empty Fast Open cookie option to
              solicit a cookie.

              If  a cookie is available, connect(2) would return 0 immediately
              but the SYN transmission is deferred.  A subsequent write(2)  or
              sendmsg(2) would trigger a SYN with data plus cookie in the Fast
              Open option.  In other words, the actual  connect  operation  is
              deferred until data is supplied.

              Note: While this option is designed for convenience, enabling it
              does change the behaviors and certain  system  calls  might  set
              different  errno  values.   With  cookie  present,  write(2)  or
              sendmsg(2) must be called right after  connect(2)  in  order  to
              send  out  SYN+data  to  complete 3WHS and establish connection.
              Calling read(2) right after  connect(2)  without  write(2)  will
              cause the blocking socket to be blocked forever.

              The  application  should  either set TCP_FASTOPEN_CONNECT socket
              option before  write(2)  or  sendmsg(2),  or  call  write(2)  or
              sendmsg(2)  with  MSG_FASTOPEN flag directly, instead of both on
              the same connection.

              Here is the typical call flow with this new option:

                  s = socket();
                  setsockopt(s, IPPROTO_TCP, TCP_FASTOPEN_CONNECT, 1, ...);
                  connect(s);
                  write(s); /* write() should always follow connect()
                             * in order to trigger SYN to go out. */
                  read(s)/write(s);
                  /* ... */
                  close(s);

   Sockets API
       TCP provides limited support for out-of-band data, in the  form  of  (a
       single  byte  of)  urgent  data.   In Linux this means if the other end
       sends newer out-of-band data the older urgent data is inserted as  nor-
       mal  data  into  the  stream (even when SO_OOBINLINE is not set).  This
       differs from BSD-based stacks.

       Linux uses the BSD compatible  interpretation  of  the  urgent  pointer
       field by default.  This violates RFC 1122, but is required for interop-
       erability   with   other   stacks.    It    can    be    changed    via
       /proc/sys/net/ipv4/tcp_stdurg.

       It  is  possible to peek at out-of-band data using the recv(2) MSG_PEEK
       flag.

       Since Linux 2.4, Linux supports the use of MSG_TRUNC in the flags argu-
       ment  of recv(2) (and recvmsg(2)).  This flag causes the received bytes
       of data to be discarded, rather than passed back in  a  caller-supplied
       buffer.  Since Linux 2.4.4, MSG_TRUNC also has this effect when used in
       conjunction with MSG_OOB to receive out-of-band data.

   Ioctls
       The following ioctl(2) calls return information in value.  The  correct
       syntax is:

              int value;
              error = ioctl(tcp_socket, ioctl_type, &value);

       ioctl_type is one of the following:

       SIOCINQ
              Returns  the amount of queued unread data in the receive buffer.
              The socket must not be in LISTEN state, otherwise an error (EIN-
              VAL) is returned.  SIOCINQ is defined in <linux/sockios.h>.  Al-
              ternatively, you can use the  synonymous  FIONREAD,  defined  in
              <sys/ioctl.h>.

       SIOCATMARK
              Returns true (i.e., value is nonzero) if the inbound data stream
              is at the urgent mark.

              If the SO_OOBINLINE socket option is set, and SIOCATMARK returns
              true,  then the next read from the socket will return the urgent
              data.  If the SO_OOBINLINE socket option is not set, and SIOCAT-
              MARK  returns  true, then the next read from the socket will re-
              turn the bytes following the urgent data (to actually  read  the
              urgent data requires the recv(MSG_OOB) flag).

              Note  that a read never reads across the urgent mark.  If an ap-
              plication is informed of the presence of  urgent  data  via  se-
              lect(2)  (using the exceptfds argument) or through delivery of a
              SIGURG signal, then it can advance up to the mark using  a  loop
              which  repeatedly tests SIOCATMARK and performs a read (request-
              ing any number of bytes) as long as SIOCATMARK returns false.

       SIOCOUTQ
              Returns the amount of unsent data in the socket send queue.  The
              socket  must not be in LISTEN state, otherwise an error (EINVAL)
              is returned.  SIOCOUTQ is defined in <linux/sockios.h>.   Alter-
              natively,  you  can  use  the  synonymous  TIOCOUTQ,  defined in
              <sys/ioctl.h>.

   Error handling
       When a network error occurs, TCP tries to resend  the  packet.   If  it
       doesn't  succeed after some time, either ETIMEDOUT or the last received
       error on this connection is reported.

       Some applications require a quicker error notification.   This  can  be
       enabled  with the IPPROTO_IP level IP_RECVERR socket option.  When this
       option is enabled, all incoming errors are immediately  passed  to  the
       user  program.   Use this option with care — it makes TCP less tolerant
       to routing changes and other normal network conditions.

ERRORS
       EAFNOTSUPPORT
              Passed socket address type in sin_family was not AF_INET.

       EPIPE  The other end closed the socket unexpectedly or a read  is  exe-
              cuted on a shut down socket.

       ETIMEDOUT
              The  other  end didn't acknowledge retransmitted data after some
              time.

       Any errors defined for ip(7) or the generic socket layer  may  also  be
       returned for TCP.

VERSIONS
       Support  for  Explicit  Congestion Notification, zero-copy sendfile(2),
       reordering support and some SACK extensions (DSACK) were introduced  in
       Linux 2.4.  Support for forward acknowledgement (FACK), TIME_WAIT recy-
       cling, and per-connection keepalive socket options were  introduced  in
       Linux 2.3.

BUGS
       Not all errors are documented.

       IPv6 is not described.

SEE ALSO
       accept(2),  bind(2),  connect(2), getsockopt(2), listen(2), recvmsg(2),
       sendfile(2), sendmsg(2), socket(2), ip(7), socket(7)

       The kernel source file Documentation/networking/ip-sysctl.txt.

       RFC 793 for the TCP specification.
       RFC 1122 for the TCP requirements and a description of the Nagle  algo-
       rithm.
       RFC 1323 for TCP timestamp and window scaling options.
       RFC 1337 for a description of TIME_WAIT assassination hazards.
       RFC 3168 for a description of Explicit Congestion Notification.
       RFC 2581 for TCP congestion control algorithms.
       RFC 2018 and RFC 2883 for SACK and extensions to SACK.

Linux man-pages 6.03              2023-02-10                            tcp(7)

Generated by dwww version 1.15 on Sat Jun 1 23:11:37 CEST 2024.