xref: /openbmc/linux/Documentation/networking/ipvs-sysctl.rst (revision 7ae9fb1b7ecbb5d85d07857943f677fd1a559b18)
182a07bf3SMauro Carvalho Chehab.. SPDX-License-Identifier: GPL-2.0
282a07bf3SMauro Carvalho Chehab
382a07bf3SMauro Carvalho Chehab===========
482a07bf3SMauro Carvalho ChehabIPvs-sysctl
582a07bf3SMauro Carvalho Chehab===========
682a07bf3SMauro Carvalho Chehab
782a07bf3SMauro Carvalho Chehab/proc/sys/net/ipv4/vs/* Variables:
882a07bf3SMauro Carvalho Chehab==================================
982a07bf3SMauro Carvalho Chehab
1082a07bf3SMauro Carvalho Chehabam_droprate - INTEGER
1182a07bf3SMauro Carvalho Chehab	default 10
1282a07bf3SMauro Carvalho Chehab
1382a07bf3SMauro Carvalho Chehab	It sets the always mode drop rate, which is used in the mode 3
1482a07bf3SMauro Carvalho Chehab	of the drop_rate defense.
1582a07bf3SMauro Carvalho Chehab
1682a07bf3SMauro Carvalho Chehabamemthresh - INTEGER
1782a07bf3SMauro Carvalho Chehab	default 1024
1882a07bf3SMauro Carvalho Chehab
1982a07bf3SMauro Carvalho Chehab	It sets the available memory threshold (in pages), which is
2082a07bf3SMauro Carvalho Chehab	used in the automatic modes of defense. When there is no
2182a07bf3SMauro Carvalho Chehab	enough available memory, the respective strategy will be
2282a07bf3SMauro Carvalho Chehab	enabled and the variable is automatically set to 2, otherwise
2382a07bf3SMauro Carvalho Chehab	the strategy is disabled and the variable is  set  to 1.
2482a07bf3SMauro Carvalho Chehab
2582a07bf3SMauro Carvalho Chehabbackup_only - BOOLEAN
2682a07bf3SMauro Carvalho Chehab	- 0 - disabled (default)
2782a07bf3SMauro Carvalho Chehab	- not 0 - enabled
2882a07bf3SMauro Carvalho Chehab
2982a07bf3SMauro Carvalho Chehab	If set, disable the director function while the server is
3082a07bf3SMauro Carvalho Chehab	in backup mode to avoid packet loops for DR/TUN methods.
3182a07bf3SMauro Carvalho Chehab
3282a07bf3SMauro Carvalho Chehabconn_reuse_mode - INTEGER
3382a07bf3SMauro Carvalho Chehab	1 - default
3482a07bf3SMauro Carvalho Chehab
3582a07bf3SMauro Carvalho Chehab	Controls how ipvs will deal with connections that are detected
3682a07bf3SMauro Carvalho Chehab	port reuse. It is a bitmap, with the values being:
3782a07bf3SMauro Carvalho Chehab
3882a07bf3SMauro Carvalho Chehab	0: disable any special handling on port reuse. The new
3982a07bf3SMauro Carvalho Chehab	connection will be delivered to the same real server that was
40c95c0783Syangxingwu	servicing the previous connection.
4182a07bf3SMauro Carvalho Chehab
4282a07bf3SMauro Carvalho Chehab	bit 1: enable rescheduling of new connections when it is safe.
4382a07bf3SMauro Carvalho Chehab	That is, whenever expire_nodest_conn and for TCP sockets, when
4482a07bf3SMauro Carvalho Chehab	the connection is in TIME_WAIT state (which is only possible if
4582a07bf3SMauro Carvalho Chehab	you use NAT mode).
4682a07bf3SMauro Carvalho Chehab
4782a07bf3SMauro Carvalho Chehab	bit 2: it is bit 1 plus, for TCP connections, when connections
4882a07bf3SMauro Carvalho Chehab	are in FIN_WAIT state, as this is the last state seen by load
4982a07bf3SMauro Carvalho Chehab	balancer in Direct Routing mode. This bit helps on adding new
5082a07bf3SMauro Carvalho Chehab	real servers to a very busy cluster.
5182a07bf3SMauro Carvalho Chehab
5282a07bf3SMauro Carvalho Chehabconntrack - BOOLEAN
5382a07bf3SMauro Carvalho Chehab	- 0 - disabled (default)
5482a07bf3SMauro Carvalho Chehab	- not 0 - enabled
5582a07bf3SMauro Carvalho Chehab
5682a07bf3SMauro Carvalho Chehab	If set, maintain connection tracking entries for
5782a07bf3SMauro Carvalho Chehab	connections handled by IPVS.
5882a07bf3SMauro Carvalho Chehab
5982a07bf3SMauro Carvalho Chehab	This should be enabled if connections handled by IPVS are to be
6082a07bf3SMauro Carvalho Chehab	also handled by stateful firewall rules. That is, iptables rules
6182a07bf3SMauro Carvalho Chehab	that make use of connection tracking.  It is a performance
6282a07bf3SMauro Carvalho Chehab	optimisation to disable this setting otherwise.
6382a07bf3SMauro Carvalho Chehab
6482a07bf3SMauro Carvalho Chehab	Connections handled by the IPVS FTP application module
6582a07bf3SMauro Carvalho Chehab	will have connection tracking entries regardless of this setting.
6682a07bf3SMauro Carvalho Chehab
6782a07bf3SMauro Carvalho Chehab	Only available when IPVS is compiled with CONFIG_IP_VS_NFCT enabled.
6882a07bf3SMauro Carvalho Chehab
6982a07bf3SMauro Carvalho Chehabcache_bypass - BOOLEAN
7082a07bf3SMauro Carvalho Chehab	- 0 - disabled (default)
7182a07bf3SMauro Carvalho Chehab	- not 0 - enabled
7282a07bf3SMauro Carvalho Chehab
7382a07bf3SMauro Carvalho Chehab	If it is enabled, forward packets to the original destination
7482a07bf3SMauro Carvalho Chehab	directly when no cache server is available and destination
7582a07bf3SMauro Carvalho Chehab	address is not local (iph->daddr is RTN_UNICAST). It is mostly
7682a07bf3SMauro Carvalho Chehab	used in transparent web cache cluster.
7782a07bf3SMauro Carvalho Chehab
7882a07bf3SMauro Carvalho Chehabdebug_level - INTEGER
7982a07bf3SMauro Carvalho Chehab	- 0          - transmission error messages (default)
8082a07bf3SMauro Carvalho Chehab	- 1          - non-fatal error messages
8182a07bf3SMauro Carvalho Chehab	- 2          - configuration
8282a07bf3SMauro Carvalho Chehab	- 3          - destination trash
8382a07bf3SMauro Carvalho Chehab	- 4          - drop entry
8482a07bf3SMauro Carvalho Chehab	- 5          - service lookup
8582a07bf3SMauro Carvalho Chehab	- 6          - scheduling
8682a07bf3SMauro Carvalho Chehab	- 7          - connection new/expire, lookup and synchronization
8782a07bf3SMauro Carvalho Chehab	- 8          - state transition
8882a07bf3SMauro Carvalho Chehab	- 9          - binding destination, template checks and applications
8982a07bf3SMauro Carvalho Chehab	- 10         - IPVS packet transmission
9082a07bf3SMauro Carvalho Chehab	- 11         - IPVS packet handling (ip_vs_in/ip_vs_out)
9182a07bf3SMauro Carvalho Chehab	- 12 or more - packet traversal
9282a07bf3SMauro Carvalho Chehab
9382a07bf3SMauro Carvalho Chehab	Only available when IPVS is compiled with CONFIG_IP_VS_DEBUG enabled.
9482a07bf3SMauro Carvalho Chehab
9582a07bf3SMauro Carvalho Chehab	Higher debugging levels include the messages for lower debugging
9682a07bf3SMauro Carvalho Chehab	levels, so setting debug level 2, includes level 0, 1 and 2
9782a07bf3SMauro Carvalho Chehab	messages. Thus, logging becomes more and more verbose the higher
9882a07bf3SMauro Carvalho Chehab	the level.
9982a07bf3SMauro Carvalho Chehab
10082a07bf3SMauro Carvalho Chehabdrop_entry - INTEGER
10182a07bf3SMauro Carvalho Chehab	- 0  - disabled (default)
10282a07bf3SMauro Carvalho Chehab
10382a07bf3SMauro Carvalho Chehab	The drop_entry defense is to randomly drop entries in the
10482a07bf3SMauro Carvalho Chehab	connection hash table, just in order to collect back some
10582a07bf3SMauro Carvalho Chehab	memory for new connections. In the current code, the
10682a07bf3SMauro Carvalho Chehab	drop_entry procedure can be activated every second, then it
10782a07bf3SMauro Carvalho Chehab	randomly scans 1/32 of the whole and drops entries that are in
10882a07bf3SMauro Carvalho Chehab	the SYN-RECV/SYNACK state, which should be effective against
10982a07bf3SMauro Carvalho Chehab	syn-flooding attack.
11082a07bf3SMauro Carvalho Chehab
11182a07bf3SMauro Carvalho Chehab	The valid values of drop_entry are from 0 to 3, where 0 means
11282a07bf3SMauro Carvalho Chehab	that this strategy is always disabled, 1 and 2 mean automatic
11382a07bf3SMauro Carvalho Chehab	modes (when there is no enough available memory, the strategy
11482a07bf3SMauro Carvalho Chehab	is enabled and the variable is automatically set to 2,
11582a07bf3SMauro Carvalho Chehab	otherwise the strategy is disabled and the variable is set to
116474112d5SRandy Dunlap	1), and 3 means that the strategy is always enabled.
11782a07bf3SMauro Carvalho Chehab
11882a07bf3SMauro Carvalho Chehabdrop_packet - INTEGER
11982a07bf3SMauro Carvalho Chehab	- 0  - disabled (default)
12082a07bf3SMauro Carvalho Chehab
12182a07bf3SMauro Carvalho Chehab	The drop_packet defense is designed to drop 1/rate packets
12282a07bf3SMauro Carvalho Chehab	before forwarding them to real servers. If the rate is 1, then
12382a07bf3SMauro Carvalho Chehab	drop all the incoming packets.
12482a07bf3SMauro Carvalho Chehab
12582a07bf3SMauro Carvalho Chehab	The value definition is the same as that of the drop_entry. In
12682a07bf3SMauro Carvalho Chehab	the automatic mode, the rate is determined by the follow
12782a07bf3SMauro Carvalho Chehab	formula: rate = amemthresh / (amemthresh - available_memory)
12882a07bf3SMauro Carvalho Chehab	when available memory is less than the available memory
12982a07bf3SMauro Carvalho Chehab	threshold. When the mode 3 is set, the always mode drop rate
13082a07bf3SMauro Carvalho Chehab	is controlled by the /proc/sys/net/ipv4/vs/am_droprate.
13182a07bf3SMauro Carvalho Chehab
132f0be83d5SJulian Anastasovest_cpulist - CPULIST
133f0be83d5SJulian Anastasov	Allowed	CPUs for estimation kthreads
134f0be83d5SJulian Anastasov
135f0be83d5SJulian Anastasov	Syntax: standard cpulist format
136f0be83d5SJulian Anastasov	empty list - stop kthread tasks and estimation
137f0be83d5SJulian Anastasov	default - the system's housekeeping CPUs for kthreads
138f0be83d5SJulian Anastasov
139f0be83d5SJulian Anastasov	Example:
140f0be83d5SJulian Anastasov	"all": all possible CPUs
141f0be83d5SJulian Anastasov	"0-N": all possible CPUs, N denotes last CPU number
142f0be83d5SJulian Anastasov	"0,1-N:1/2": first and all CPUs with odd number
143f0be83d5SJulian Anastasov	"": empty list
144f0be83d5SJulian Anastasov
145f0be83d5SJulian Anastasovest_nice - INTEGER
146f0be83d5SJulian Anastasov	default 0
147f0be83d5SJulian Anastasov	Valid range: -20 (more favorable) .. 19 (less favorable)
148f0be83d5SJulian Anastasov
149f0be83d5SJulian Anastasov	Niceness value to use for the estimation kthreads (scheduling
150f0be83d5SJulian Anastasov	priority)
151f0be83d5SJulian Anastasov
15282a07bf3SMauro Carvalho Chehabexpire_nodest_conn - BOOLEAN
15382a07bf3SMauro Carvalho Chehab	- 0 - disabled (default)
15482a07bf3SMauro Carvalho Chehab	- not 0 - enabled
15582a07bf3SMauro Carvalho Chehab
15682a07bf3SMauro Carvalho Chehab	The default value is 0, the load balancer will silently drop
15782a07bf3SMauro Carvalho Chehab	packets when its destination server is not available. It may
15882a07bf3SMauro Carvalho Chehab	be useful, when user-space monitoring program deletes the
15982a07bf3SMauro Carvalho Chehab	destination server (because of server overload or wrong
16082a07bf3SMauro Carvalho Chehab	detection) and add back the server later, and the connections
16182a07bf3SMauro Carvalho Chehab	to the server can continue.
16282a07bf3SMauro Carvalho Chehab
16382a07bf3SMauro Carvalho Chehab	If this feature is enabled, the load balancer will expire the
16482a07bf3SMauro Carvalho Chehab	connection immediately when a packet arrives and its
16582a07bf3SMauro Carvalho Chehab	destination server is not available, then the client program
16682a07bf3SMauro Carvalho Chehab	will be notified that the connection is closed. This is
16782a07bf3SMauro Carvalho Chehab	equivalent to the feature some people requires to flush
16882a07bf3SMauro Carvalho Chehab	connections when its destination is not available.
16982a07bf3SMauro Carvalho Chehab
17082a07bf3SMauro Carvalho Chehabexpire_quiescent_template - BOOLEAN
17182a07bf3SMauro Carvalho Chehab	- 0 - disabled (default)
17282a07bf3SMauro Carvalho Chehab	- not 0 - enabled
17382a07bf3SMauro Carvalho Chehab
17482a07bf3SMauro Carvalho Chehab	When set to a non-zero value, the load balancer will expire
17582a07bf3SMauro Carvalho Chehab	persistent templates when the destination server is quiescent.
17682a07bf3SMauro Carvalho Chehab	This may be useful, when a user makes a destination server
17782a07bf3SMauro Carvalho Chehab	quiescent by setting its weight to 0 and it is desired that
17882a07bf3SMauro Carvalho Chehab	subsequent otherwise persistent connections are sent to a
17982a07bf3SMauro Carvalho Chehab	different destination server.  By default new persistent
18082a07bf3SMauro Carvalho Chehab	connections are allowed to quiescent destination servers.
18182a07bf3SMauro Carvalho Chehab
18282a07bf3SMauro Carvalho Chehab	If this feature is enabled, the load balancer will expire the
18382a07bf3SMauro Carvalho Chehab	persistence template if it is to be used to schedule a new
18482a07bf3SMauro Carvalho Chehab	connection and the destination server is quiescent.
18582a07bf3SMauro Carvalho Chehab
18682a07bf3SMauro Carvalho Chehabignore_tunneled - BOOLEAN
18782a07bf3SMauro Carvalho Chehab	- 0 - disabled (default)
18882a07bf3SMauro Carvalho Chehab	- not 0 - enabled
18982a07bf3SMauro Carvalho Chehab
19082a07bf3SMauro Carvalho Chehab	If set, ipvs will set the ipvs_property on all packets which are of
19182a07bf3SMauro Carvalho Chehab	unrecognized protocols.  This prevents us from routing tunneled
19282a07bf3SMauro Carvalho Chehab	protocols like ipip, which is useful to prevent rescheduling
19382a07bf3SMauro Carvalho Chehab	packets that have been tunneled to the ipvs host (i.e. to prevent
19482a07bf3SMauro Carvalho Chehab	ipvs routing loops when ipvs is also acting as a real server).
19582a07bf3SMauro Carvalho Chehab
19682a07bf3SMauro Carvalho Chehabnat_icmp_send - BOOLEAN
19782a07bf3SMauro Carvalho Chehab	- 0 - disabled (default)
19882a07bf3SMauro Carvalho Chehab	- not 0 - enabled
19982a07bf3SMauro Carvalho Chehab
20082a07bf3SMauro Carvalho Chehab	It controls sending icmp error messages (ICMP_DEST_UNREACH)
20182a07bf3SMauro Carvalho Chehab	for VS/NAT when the load balancer receives packets from real
20282a07bf3SMauro Carvalho Chehab	servers but the connection entries don't exist.
20382a07bf3SMauro Carvalho Chehab
20482a07bf3SMauro Carvalho Chehabpmtu_disc - BOOLEAN
20582a07bf3SMauro Carvalho Chehab	- 0 - disabled
20682a07bf3SMauro Carvalho Chehab	- not 0 - enabled (default)
20782a07bf3SMauro Carvalho Chehab
20882a07bf3SMauro Carvalho Chehab	By default, reject with FRAG_NEEDED all DF packets that exceed
20982a07bf3SMauro Carvalho Chehab	the PMTU, irrespective of the forwarding method. For TUN method
21082a07bf3SMauro Carvalho Chehab	the flag can be disabled to fragment such packets.
21182a07bf3SMauro Carvalho Chehab
21282a07bf3SMauro Carvalho Chehabsecure_tcp - INTEGER
21382a07bf3SMauro Carvalho Chehab	- 0  - disabled (default)
21482a07bf3SMauro Carvalho Chehab
21582a07bf3SMauro Carvalho Chehab	The secure_tcp defense is to use a more complicated TCP state
21682a07bf3SMauro Carvalho Chehab	transition table. For VS/NAT, it also delays entering the
21782a07bf3SMauro Carvalho Chehab	TCP ESTABLISHED state until the three way handshake is completed.
21882a07bf3SMauro Carvalho Chehab
21982a07bf3SMauro Carvalho Chehab	The value definition is the same as that of drop_entry and
22082a07bf3SMauro Carvalho Chehab	drop_packet.
22182a07bf3SMauro Carvalho Chehab
22282a07bf3SMauro Carvalho Chehabsync_threshold - vector of 2 INTEGERs: sync_threshold, sync_period
22382a07bf3SMauro Carvalho Chehab	default 3 50
22482a07bf3SMauro Carvalho Chehab
22582a07bf3SMauro Carvalho Chehab	It sets synchronization threshold, which is the minimum number
22682a07bf3SMauro Carvalho Chehab	of incoming packets that a connection needs to receive before
22782a07bf3SMauro Carvalho Chehab	the connection will be synchronized. A connection will be
22882a07bf3SMauro Carvalho Chehab	synchronized, every time the number of its incoming packets
22982a07bf3SMauro Carvalho Chehab	modulus sync_period equals the threshold. The range of the
23082a07bf3SMauro Carvalho Chehab	threshold is from 0 to sync_period.
23182a07bf3SMauro Carvalho Chehab
23282a07bf3SMauro Carvalho Chehab	When sync_period and sync_refresh_period are 0, send sync only
23382a07bf3SMauro Carvalho Chehab	for state changes or only once when pkts matches sync_threshold
23482a07bf3SMauro Carvalho Chehab
23582a07bf3SMauro Carvalho Chehabsync_refresh_period - UNSIGNED INTEGER
23682a07bf3SMauro Carvalho Chehab	default 0
23782a07bf3SMauro Carvalho Chehab
23882a07bf3SMauro Carvalho Chehab	In seconds, difference in reported connection timer that triggers
23982a07bf3SMauro Carvalho Chehab	new sync message. It can be used to avoid sync messages for the
24082a07bf3SMauro Carvalho Chehab	specified period (or half of the connection timeout if it is lower)
24182a07bf3SMauro Carvalho Chehab	if connection state is not changed since last sync.
24282a07bf3SMauro Carvalho Chehab
24382a07bf3SMauro Carvalho Chehab	This is useful for normal connections with high traffic to reduce
24482a07bf3SMauro Carvalho Chehab	sync rate. Additionally, retry sync_retries times with period of
24582a07bf3SMauro Carvalho Chehab	sync_refresh_period/8.
24682a07bf3SMauro Carvalho Chehab
24782a07bf3SMauro Carvalho Chehabsync_retries - INTEGER
24882a07bf3SMauro Carvalho Chehab	default 0
24982a07bf3SMauro Carvalho Chehab
25082a07bf3SMauro Carvalho Chehab	Defines sync retries with period of sync_refresh_period/8. Useful
25182a07bf3SMauro Carvalho Chehab	to protect against loss of sync messages. The range of the
25282a07bf3SMauro Carvalho Chehab	sync_retries is from 0 to 3.
25382a07bf3SMauro Carvalho Chehab
25482a07bf3SMauro Carvalho Chehabsync_qlen_max - UNSIGNED LONG
25582a07bf3SMauro Carvalho Chehab
25682a07bf3SMauro Carvalho Chehab	Hard limit for queued sync messages that are not sent yet. It
25782a07bf3SMauro Carvalho Chehab	defaults to 1/32 of the memory pages but actually represents
25882a07bf3SMauro Carvalho Chehab	number of messages. It will protect us from allocating large
25982a07bf3SMauro Carvalho Chehab	parts of memory when the sending rate is lower than the queuing
26082a07bf3SMauro Carvalho Chehab	rate.
26182a07bf3SMauro Carvalho Chehab
26282a07bf3SMauro Carvalho Chehabsync_sock_size - INTEGER
26382a07bf3SMauro Carvalho Chehab	default 0
26482a07bf3SMauro Carvalho Chehab
26582a07bf3SMauro Carvalho Chehab	Configuration of SNDBUF (master) or RCVBUF (slave) socket limit.
26682a07bf3SMauro Carvalho Chehab	Default value is 0 (preserve system defaults).
26782a07bf3SMauro Carvalho Chehab
26882a07bf3SMauro Carvalho Chehabsync_ports - INTEGER
26982a07bf3SMauro Carvalho Chehab	default 1
27082a07bf3SMauro Carvalho Chehab
27182a07bf3SMauro Carvalho Chehab	The number of threads that master and backup servers can use for
27282a07bf3SMauro Carvalho Chehab	sync traffic. Every thread will use single UDP port, thread 0 will
27382a07bf3SMauro Carvalho Chehab	use the default port 8848 while last thread will use port
27482a07bf3SMauro Carvalho Chehab	8848+sync_ports-1.
27582a07bf3SMauro Carvalho Chehab
27682a07bf3SMauro Carvalho Chehabsnat_reroute - BOOLEAN
27782a07bf3SMauro Carvalho Chehab	- 0 - disabled
27882a07bf3SMauro Carvalho Chehab	- not 0 - enabled (default)
27982a07bf3SMauro Carvalho Chehab
28082a07bf3SMauro Carvalho Chehab	If enabled, recalculate the route of SNATed packets from
28182a07bf3SMauro Carvalho Chehab	realservers so that they are routed as if they originate from the
28282a07bf3SMauro Carvalho Chehab	director. Otherwise they are routed as if they are forwarded by the
28382a07bf3SMauro Carvalho Chehab	director.
28482a07bf3SMauro Carvalho Chehab
28582a07bf3SMauro Carvalho Chehab	If policy routing is in effect then it is possible that the route
28682a07bf3SMauro Carvalho Chehab	of a packet originating from a director is routed differently to a
28782a07bf3SMauro Carvalho Chehab	packet being forwarded by the director.
28882a07bf3SMauro Carvalho Chehab
28982a07bf3SMauro Carvalho Chehab	If policy routing is not in effect then the recalculated route will
29082a07bf3SMauro Carvalho Chehab	always be the same as the original route so it is an optimisation
29182a07bf3SMauro Carvalho Chehab	to disable snat_reroute and avoid the recalculation.
29282a07bf3SMauro Carvalho Chehab
29382a07bf3SMauro Carvalho Chehabsync_persist_mode - INTEGER
29482a07bf3SMauro Carvalho Chehab	default 0
29582a07bf3SMauro Carvalho Chehab
29682a07bf3SMauro Carvalho Chehab	Controls the synchronisation of connections when using persistence
29782a07bf3SMauro Carvalho Chehab
29882a07bf3SMauro Carvalho Chehab	0: All types of connections are synchronised
29982a07bf3SMauro Carvalho Chehab
30082a07bf3SMauro Carvalho Chehab	1: Attempt to reduce the synchronisation traffic depending on
30182a07bf3SMauro Carvalho Chehab	the connection type. For persistent services avoid synchronisation
30282a07bf3SMauro Carvalho Chehab	for normal connections, do it only for persistence templates.
30382a07bf3SMauro Carvalho Chehab	In such case, for TCP and SCTP it may need enabling sloppy_tcp and
30482a07bf3SMauro Carvalho Chehab	sloppy_sctp flags on backup servers. For non-persistent services
30582a07bf3SMauro Carvalho Chehab	such optimization is not applied, mode 0 is assumed.
30682a07bf3SMauro Carvalho Chehab
30782a07bf3SMauro Carvalho Chehabsync_version - INTEGER
30882a07bf3SMauro Carvalho Chehab	default 1
30982a07bf3SMauro Carvalho Chehab
31082a07bf3SMauro Carvalho Chehab	The version of the synchronisation protocol used when sending
31182a07bf3SMauro Carvalho Chehab	synchronisation messages.
31282a07bf3SMauro Carvalho Chehab
31382a07bf3SMauro Carvalho Chehab	0 selects the original synchronisation protocol (version 0). This
31482a07bf3SMauro Carvalho Chehab	should be used when sending synchronisation messages to a legacy
31582a07bf3SMauro Carvalho Chehab	system that only understands the original synchronisation protocol.
31682a07bf3SMauro Carvalho Chehab
31782a07bf3SMauro Carvalho Chehab	1 selects the current synchronisation protocol (version 1). This
31882a07bf3SMauro Carvalho Chehab	should be used where possible.
31982a07bf3SMauro Carvalho Chehab
32082a07bf3SMauro Carvalho Chehab	Kernels with this sync_version entry are able to receive messages
32182a07bf3SMauro Carvalho Chehab	of both version 1 and version 2 of the synchronisation protocol.
3222232642eSDust Li
3232232642eSDust Lirun_estimation - BOOLEAN
3242232642eSDust Li	0 - disabled
3252232642eSDust Li	not 0 - enabled (default)
3262232642eSDust Li
327*144361c1SJulian Anastasov	If disabled, the estimation will be suspended and kthread tasks
328*144361c1SJulian Anastasov	stopped.
3292232642eSDust Li
3302232642eSDust Li	You can always re-enable estimation by setting this value to 1.
3312232642eSDust Li	But be careful, the first estimation after re-enable is not
3322232642eSDust Li	accurate.
333