From patchwork Fri Feb 17 06:34:01 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Hangbin Liu X-Patchwork-Id: 729021 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 3vPjtr4Dt6z9s85 for ; Fri, 17 Feb 2017 17:35:00 +1100 (AEDT) Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b="D8Sp4CY8"; dkim-atps=neutral Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755678AbdBQGex (ORCPT ); Fri, 17 Feb 2017 01:34:53 -0500 Received: from mail-pf0-f195.google.com ([209.85.192.195]:36709 "EHLO mail-pf0-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755649AbdBQGev (ORCPT ); Fri, 17 Feb 2017 01:34:51 -0500 Received: by mail-pf0-f195.google.com with SMTP id 19so3387001pfo.3; Thu, 16 Feb 2017 22:34:45 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=m7WWMPAekvct4dLcBsKEZJosAc6yKgS/kDarnWeMpCk=; b=D8Sp4CY8rZVBAR+krHslHkReXHuv1KyZqwN7779TmP+DunsdFksKKc8rNsF3CTP/c0 ODTRmPN6Sdh5BYpp+OsbMFhggAWDYNV/i0+2t+nnZfflYhyzYKAmSa7uxxQ/W8XyEPob CUnt/dPkqYHVEWK/DwiVVE3qOv1I60WwLm5MlagE+fehDu+heV+/7OQmoPiZtX8FkUxx lY4YexWrDeil9YIcuuqsO9pjry6SZdmFsJpJiUGhUC5mwdMF71sfhGU0qa86tNQC2lzd PBbaYTC4gEN4gqnzWJvCq6QV2APb5Z2xzYwGI0QWyxb01N2HcuuTxGNUQEZbPSb+/jjX 7l9Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=m7WWMPAekvct4dLcBsKEZJosAc6yKgS/kDarnWeMpCk=; b=HyhD5luyeT9MBhjqvhbUyDKkCiqAxBDflREkkA6fAgl++JqhojzzKDWtKTACBCi8Ni l+K6IJZOOSakgDU5gd/URdA64f0USjHfpWRc+vmPqo2utPolC0jaOYzjY7Jk/XRMwg6N JV/VuZRFLfhLoxIOR8C0bm65xjDrLyn9Pr9LQ1e5uvTtk37oBgsv4LIQMYTj7vkbDIRv uUseyjSPb0zsWt3LJIWp0MnyJcYSKKaGaTWA932O3oia4yhAUdou07y49sT2YhpGYkVM J2+1m9JmvXpVOgVyXgVNCszaB9xSLaXoh3SjsEQCGbuNQztW277hHBGgETa+WBkA985/ 4QjA== X-Gm-Message-State: AMke39mRQdXi3tR7l0gta9E57cjNjCxb/3ehP/XAwcBY6FKRQoXiY/71+N5KFjeIEY6izw== X-Received: by 10.99.116.22 with SMTP id p22mr8130094pgc.161.1487313285190; Thu, 16 Feb 2017 22:34:45 -0800 (PST) Received: from leo.usersys.redhat.com ([209.132.188.80]) by smtp.gmail.com with ESMTPSA id y21sm17126663pgh.52.2017.02.16.22.34.42 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 16 Feb 2017 22:34:44 -0800 (PST) From: Hangbin Liu To: lvs-devel@vger.kernel.org Cc: Simon Horman , netdev@vger.kernel.org, Marcelo Ricardo Leitner , Hangbin Liu Subject: [PATCH net 4/4] ipvs: Document sysctl pmtu_disc Date: Fri, 17 Feb 2017 14:34:01 +0800 Message-Id: <1487313241-11361-5-git-send-email-liuhangbin@gmail.com> X-Mailer: git-send-email 2.5.5 In-Reply-To: <1487313241-11361-1-git-send-email-liuhangbin@gmail.com> References: <1487313241-11361-1-git-send-email-liuhangbin@gmail.com> Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Document sysctl pmtu_disc based on commit 3654e61137db ("ipvs: add pmtu_disc option to disable IP DF for TUN packets"). Signed-off-by: Hangbin Liu --- Documentation/networking/ipvs-sysctl.txt | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/Documentation/networking/ipvs-sysctl.txt b/Documentation/networking/ipvs-sysctl.txt index e4d9235..fb65d4a 100644 --- a/Documentation/networking/ipvs-sysctl.txt +++ b/Documentation/networking/ipvs-sysctl.txt @@ -175,6 +175,15 @@ nat_icmp_send - BOOLEAN for VS/NAT when the load balancer receives packets from real servers but the connection entries don't exist. +pmtu_disc - BOOLEAN + 0 - disabled + not 0 - enabled (default) + + When enabled PMTU discovery(default) and received packets larger than + the next MTU, we will send back FRAG_NEEDED message and drop the + incoming packet. But if users prefer to fragment regardless of DF bit + other than drop the packet, they can disable it. + secure_tcp - INTEGER 0 - disabled (default)