1TCP(7) Linux Programmer's Manual TCP(7)
2
3
4
6 tcp - TCP protocol
7
9 #include <sys/socket.h>
10 #include <netinet/in.h>
11 #include <netinet/tcp.h>
12
13 tcp_socket = socket(AF_INET, SOCK_STREAM, 0);
14
16 This is an implementation of the TCP protocol defined in RFC 793,
17 RFC 1122 and RFC 2001 with the NewReno and SACK extensions. It pro‐
18 vides a reliable, stream-oriented, full-duplex connection between two
19 sockets on top of ip(7), for both v4 and v6 versions. TCP guarantees
20 that the data arrives in order and retransmits lost packets. It gener‐
21 ates and checks a per-packet checksum to catch transmission errors.
22 TCP does not preserve record boundaries.
23
24 A newly created TCP socket has no remote or local address and is not
25 fully specified. To create an outgoing TCP connection use connect(2)
26 to establish a connection to another TCP socket. To receive new incom‐
27 ing connections, first bind(2) the socket to a local address and port
28 and then call listen(2) to put the socket into the listening state.
29 After that a new socket for each incoming connection can be accepted
30 using accept(2). A socket which has had accept(2) or connect(2) suc‐
31 cessfully called on it is fully specified and may transmit data. Data
32 cannot be transmitted on listening or not yet connected sockets.
33
34 Linux supports RFC 1323 TCP high performance extensions. These include
35 Protection Against Wrapped Sequence Numbers (PAWS), Window Scaling and
36 Timestamps. Window scaling allows the use of large (> 64 kB) TCP win‐
37 dows in order to support links with high latency or bandwidth. To make
38 use of them, the send and receive buffer sizes must be increased. They
39 can be set globally with the /proc/sys/net/ipv4/tcp_wmem and
40 /proc/sys/net/ipv4/tcp_rmem files, or on individual sockets by using
41 the SO_SNDBUF and SO_RCVBUF socket options with the setsockopt(2) call.
42
43 The maximum sizes for socket buffers declared via the SO_SNDBUF and
44 SO_RCVBUF mechanisms are limited by the values in the
45 /proc/sys/net/core/rmem_max and /proc/sys/net/core/wmem_max files.
46 Note that TCP actually allocates twice the size of the buffer requested
47 in the setsockopt(2) call, and so a succeeding getsockopt(2) call will
48 not return the same size of buffer as requested in the setsockopt(2)
49 call. TCP uses the extra space for administrative purposes and inter‐
50 nal kernel structures, and the /proc file values reflect the larger
51 sizes compared to the actual TCP windows. On individual connections,
52 the socket buffer size must be set prior to the listen(2) or connect(2)
53 calls in order to have it take effect. See socket(7) for more informa‐
54 tion.
55
56 TCP supports urgent data. Urgent data is used to signal the receiver
57 that some important message is part of the data stream and that it
58 should be processed as soon as possible. To send urgent data specify
59 the MSG_OOB option to send(2). When urgent data is received, the ker‐
60 nel sends a SIGURG signal to the process or process group that has been
61 set as the socket "owner" using the SIOCSPGRP or FIOSETOWN ioctls (or
62 the POSIX.1-specified fcntl(2) F_SETOWN operation). When the SO_OOBIN‐
63 LINE socket option is enabled, urgent data is put into the normal data
64 stream (a program can test for its location using the SIOCATMARK ioctl
65 described below), otherwise it can be received only when the MSG_OOB
66 flag is set for recv(2) or recvmsg(2).
67
68 When out-of-band data is present, select(2) indicates the file descrip‐
69 tor as having an exceptional condition and poll [4m(2) indicates a POLLPRI
70 event.
71
72 Linux 2.4 introduced a number of changes for improved throughput and
73 scaling, as well as enhanced functionality. Some of these features
74 include support for zero-copy sendfile(2), Explicit Congestion Notifi‐
75 cation, new management of TIME_WAIT sockets, keep-alive socket options
76 and support for Duplicate SACK extensions.
77
78 Address formats
79 TCP is built on top of IP (see ip(7)). The address formats defined by
80 ip(7) apply to TCP. TCP supports point-to-point communication only;
81 broadcasting and multicasting are not supported.
82
83 /proc interfaces
84 System-wide TCP parameter settings can be accessed by files in the
85 directory /proc/sys/net/ipv4/. In addition, most IP /proc interfaces
86 also apply to TCP; see ip(7). Variables described as Boolean take an
87 integer value, with a nonzero value ("true") meaning that the corre‐
88 sponding option is enabled, and a zero value ("false") meaning that the
89 option is disabled.
90
91 tcp_abc (Integer; default: 0; Linux 2.6.15 to Linux 3.8)
92 Control the Appropriate Byte Count (ABC), defined in RFC 3465.
93 ABC is a way of increasing the congestion window (cwnd) more
94 slowly in response to partial acknowledgments. Possible values
95 are:
96
97 0 increase cwnd once per acknowledgment (no ABC)
98
99 1 increase cwnd once per acknowledgment of full sized segment
100
101 2 allow increase cwnd by two if acknowledgment is of two seg‐
102 ments to compensate for delayed acknowledgments.
103
104 tcp_abort_on_overflow (Boolean; default: disabled; since Linux 2.4)
105 Enable resetting connections if the listening service is too
106 slow and unable to keep up and accept them. It means that if
107 overflow occurred due to a burst, the connection will recover.
108 Enable this option only if you are really sure that the listen‐
109 ing daemon cannot be tuned to accept connections faster.
110 Enabling this option can harm the clients of your server.
111
112 tcp_adv_win_scale (integer; default: 2; since Linux 2.4)
113 Count buffering overhead as bytes/2^tcp_adv_win_scale, if
114 tcp_adv_win_scale is greater than 0; or bytes-
115 bytes/2^(-tcp_adv_win_scale), if tcp_adv_win_scale is less than
116 or equal to zero.
117
118 The socket receive buffer space is shared between the applica‐
119 tion and kernel. TCP maintains part of the buffer as the TCP
120 window, this is the size of the receive window advertised to the
121 other end. The rest of the space is used as the "application"
122 buffer, used to isolate the network from scheduling and applica‐
123 tion latencies. The tcp_adv_win_scale default value of 2
124 implies that the space used for the application buffer is one
125 fourth that of the total.
126
127 tcp_allowed_congestion_control (String; default: see text; since Linux
128 2.4.20)
129 Show/set the congestion control algorithm choices available to
130 unprivileged processes (see the description of the TCP_CONGES‐
131 TION socket option). The items in the list are separated by
132 white space and terminated by a newline character. The list is
133 a subset of those listed in tcp_available_congestion_control.
134 The default value for this list is "reno" plus the default set‐
135 ting of tcp_congestion_control.
136
137 tcp_autocorking (Boolean; default: enabled; since Linux 3.14)
138 If this option is enabled, the kernel tries to coalesce small
139 writes (from consecutive write(2) and sendmsg(2) calls) as much
140 as possible, in order to decrease the total number of sent pack‐
141 ets. Coalescing is done if at least one prior packet for the
142 flow is waiting in Qdisc queues or device transmit queue.
143 Applications can still use the TCP_CORK socket option to obtain
144 optimal behavior when they know how/when to uncork their sock‐
145 ets.
146
147 tcp_available_congestion_control (String; read-only; since Linux
148 2.4.20)
149 Show a list of the congestion-control algorithms that are regis‐
150 tered. The items in the list are separated by white space and
151 terminated by a newline character. This list is a limiting set
152 for the list in tcp_allowed_congestion_control. More conges‐
153 tion-control algorithms may be available as modules, but not
154 loaded.
155
156 tcp_app_win (integer; default: 31; since Linux 2.4)
157 This variable defines how many bytes of the TCP window are
158 reserved for buffering overhead.
159
160 A maximum of (window/2^tcp_app_win, mss) bytes in the window are
161 reserved for the application buffer. A value of 0 implies that
162 no amount is reserved.
163
164 tcp_base_mss (Integer; default: 512; since Linux 2.6.17)
165 The initial value of search_low to be used by the packetization
166 layer Path MTU discovery (MTU probing). If MTU probing is
167 enabled, this is the initial MSS used by the connection.
168
169 tcp_bic (Boolean; default: disabled; Linux 2.4.27/2.6.6 to 2.6.13)
170 Enable BIC TCP congestion control algorithm. BIC-TCP is a
171 sender-side-only change that ensures a linear RTT fairness under
172 large windows while offering both scalability and bounded TCP-
173 friendliness. The protocol combines two schemes called additive
174 increase and binary search increase. When the congestion window
175 is large, additive increase with a large increment ensures lin‐
176 ear RTT fairness as well as good scalability. Under small con‐
177 gestion windows, binary search increase provides TCP friendli‐
178 ness.
179
180 tcp_bic_low_window (integer; default: 14; Linux 2.4.27/2.6.6 to 2.6.13)
181 Set the threshold window (in packets) where BIC TCP starts to
182 adjust the congestion window. Below this threshold BIC TCP
183 behaves the same as the default TCP Reno.
184
185 tcp_bic_fast_convergence (Boolean; default: enabled; Linux 2.4.27/2.6.6
186 to 2.6.13)
187 Force BIC TCP to more quickly respond to changes in congestion
188 window. Allows two flows sharing the same connection to con‐
189 verge more rapidly.
190
191 tcp_congestion_control (String; default: see text; since Linux 2.4.13)
192 Set the default congestion-control algorithm to be used for new
193 connections. The algorithm "reno" is always available, but
194 additional choices may be available depending on kernel configu‐
195 ration. The default value for this file is set as part of ker‐
196 nel configuration.
197
198 tcp_dma_copybreak (integer; default: 4096; since Linux 2.6.24)
199 Lower limit, in bytes, of the size of socket reads that will be
200 offloaded to a DMA copy engine, if one is present in the system
201 and the kernel was configured with the CONFIG_NET_DMA option.
202
203 tcp_dsack (Boolean; default: enabled; since Linux 2.4)
204 Enable RFC 2883 TCP Duplicate SACK support.
205
206 tcp_ecn (Integer; default: see below; since Linux 2.4)
207 Enable RFC 3168 Explicit Congestion Notification.
208
209 This file can have one of the following values:
210
211 0 Disable ECN. Neither initiate nor accept ECN. This was
212 the default up to and including Linux 2.6.30.
213
214 1 Enable ECN when requested by incoming connections and
215 also request ECN on outgoing connection attempts.
216
217 2 Enable ECN when requested by incoming connections, but do
218 not request ECN on outgoing connections. This value is
219 supported, and is the default, since Linux 2.6.31.
220
221 When enabled, connectivity to some destinations could be
222 affected due to older, misbehaving middle boxes along the path,
223 causing connections to be dropped. However, to facilitate and
224 encourage deployment with option 1, and to work around such
225 buggy equipment, the tcp_ecn_fallback option has been intro‐
226 duced.
227
228 tcp_ecn_fallback (Boolean; default: enabled; since Linux 4.1)
229 Enable RFC 3168, Section 6.1.1.1. fallback. When enabled, out‐
230 going ECN-setup SYNs that time out within the normal SYN
231 retransmission timeout will be resent with CWR and ECE cleared.
232
233 tcp_fack (Boolean; default: enabled; since Linux 2.2)
234 Enable TCP Forward Acknowledgement support.
235
236 tcp_fin_timeout (integer; default: 60; since Linux 2.2)
237 This specifies how many seconds to wait for a final FIN packet
238 before the socket is forcibly closed. This is strictly a viola‐
239 tion of the TCP specification, but required to prevent denial-
240 of-service attacks. In Linux 2.2, the default value was 180.
241
242 tcp_frto (integer; default: see below; since Linux 2.4.21/2.6)
243 Enable F-RTO, an enhanced recovery algorithm for TCP retransmis‐
244 sion timeouts (RTOs). It is particularly beneficial in wireless
245 environments where packet loss is typically due to random radio
246 interference rather than intermediate router congestion. See
247 RFC 4138 for more details.
248
249 This file can have one of the following values:
250
251 0 Disabled. This was the default up to and including Linux
252 2.6.23.
253
254 1 The basic version F-RTO algorithm is enabled.
255
256 2 Enable SACK-enhanced F-RTO if flow uses SACK. The basic ver‐
257 sion can be used also when SACK is in use though in that case
258 scenario(s) exists where F-RTO interacts badly with the
259 packet counting of the SACK-enabled TCP flow. This value is
260 the default since Linux 2.6.24.
261
262 Before Linux 2.6.22, this parameter was a Boolean value, sup‐
263 porting just values 0 and 1 above.
264
265 tcp_frto_response (integer; default: 0; since Linux 2.6.22)
266 When F-RTO has detected that a TCP retransmission timeout was
267 spurious (i.e., the timeout would have been avoided had TCP set
268 a longer retransmission timeout), TCP has several options con‐
269 cerning what to do next. Possible values are:
270
271 0 Rate halving based; a smooth and conservative response,
272 results in halved congestion window (cwnd) and slow-start
273 threshold (ssthresh) after one RTT.
274
275 1 Very conservative response; not recommended because even
276 though being valid, it interacts poorly with the rest of
277 Linux TCP; halves cwnd and ssthresh immediately.
278
279 2 Aggressive response; undoes congestion-control measures that
280 are now known to be unnecessary (ignoring the possibility of
281 a lost retransmission that would require TCP to be more cau‐
282 tious); cwnd and ssthresh are restored to the values prior to
283 timeout.
284
285 tcp_keepalive_intvl (integer; default: 75; since Linux 2.4)
286 The number of seconds between TCP keep-alive probes.
287
288 tcp_keepalive_probes (integer; default: 9; since Linux 2.2)
289 The maximum number of TCP keep-alive probes to send before giv‐
290 ing up and killing the connection if no response is obtained
291 from the other end.
292
293 tcp_keepalive_time (integer; default: 7200; since Linux 2.2)
294 The number of seconds a connection needs to be idle before TCP
295 begins sending out keep-alive probes. Keep-alives are sent only
296 when the SO_KEEPALIVE socket option is enabled. The default
297 value is 7200 seconds (2 hours). An idle connection is termi‐
298 nated after approximately an additional 11 minutes (9 probes an
299 interval of 75 seconds apart) when keep-alive is enabled.
300
301 Note that underlying connection tracking mechanisms and applica‐
302 tion timeouts may be much shorter.
303
304 tcp_low_latency (Boolean; default: disabled; since Linux 2.4.21/2.6)
305 If enabled, the TCP stack makes decisions that prefer lower
306 latency as opposed to higher throughput. It this option is dis‐
307 abled, then higher throughput is preferred. An example of an
308 application where this default should be changed would be a
309 Beowulf compute cluster.
310
311 tcp_max_orphans (integer; default: see below; since Linux 2.4)
312 The maximum number of orphaned (not attached to any user file
313 handle) TCP sockets allowed in the system. When this number is
314 exceeded, the orphaned connection is reset and a warning is
315 printed. This limit exists only to prevent simple denial-of-
316 service attacks. Lowering this limit is not recommended. Net‐
317 work conditions might require you to increase the number of
318 orphans allowed, but note that each orphan can eat up to ~64 kB
319 of unswappable memory. The default initial value is set equal
320 to the kernel parameter NR_FILE. This initial default is
321 adjusted depending on the memory in the system.
322
323 tcp_max_syn_backlog (integer; default: see below; since Linux 2.2)
324 The maximum number of queued connection requests which have
325 still not received an acknowledgement from the connecting
326 client. If this number is exceeded, the kernel will begin drop‐
327 ping requests. The default value of 256 is increased to 1024
328 when the memory present in the system is adequate or greater (>=
329 128 MB), and reduced to 128 for those systems with very low mem‐
330 ory (<= 32 MB).
331
332 Prior to Linux 2.6.20, it was recommended that if this needed to
333 be increased above 1024, the size of the SYNACK hash table
334 (TCP_SYNQ_HSIZE) in include/net/tcp.h should be modified to keep
335
336 TCP_SYNQ_HSIZE * 16 <= tcp_max_syn_backlog
337
338 and the kernel should be recompiled. In Linux 2.6.20, the fixed
339 sized TCP_SYNQ_HSIZE was removed in favor of dynamic sizing.
340
341 tcp_max_tw_buckets (integer; default: see below; since Linux 2.4)
342 The maximum number of sockets in TIME_WAIT state allowed in the
343 system. This limit exists only to prevent simple denial-of-ser‐
344 vice attacks. The default value of NR_FILE*2 is adjusted
345 depending on the memory in the system. If this number is
346 exceeded, the socket is closed and a warning is printed.
347
348 tcp_moderate_rcvbuf (Boolean; default: enabled; since Linux
349 2.4.17/2.6.7)
350 If enabled, TCP performs receive buffer auto-tuning, attempting
351 to automatically size the buffer (no greater than tcp_rmem[2])
352 to match the size required by the path for full throughput.
353
354 tcp_mem (since Linux 2.4)
355 This is a vector of 3 integers: [low, pressure, high]. These
356 bounds, measured in units of the system page size, are used by
357 TCP to track its memory usage. The defaults are calculated at
358 boot time from the amount of available memory. (TCP can only
359 use low memory for this, which is limited to around 900
360 megabytes on 32-bit systems. 64-bit systems do not suffer this
361 limitation.)
362
363 low TCP doesn't regulate its memory allocation when the
364 number of pages it has allocated globally is below
365 this number.
366
367 pressure When the amount of memory allocated by TCP exceeds
368 this number of pages, TCP moderates its memory con‐
369 sumption. This memory pressure state is exited once
370 the number of pages allocated falls below the low
371 mark.
372
373 high The maximum number of pages, globally, that TCP will
374 allocate. This value overrides any other limits
375 imposed by the kernel.
376
377 tcp_mtu_probing (integer; default: 0; since Linux 2.6.17)
378 This parameter controls TCP Packetization-Layer Path MTU Discov‐
379 ery. The following values may be assigned to the file:
380
381 0 Disabled
382
383 1 Disabled by default, enabled when an ICMP black hole detected
384
385 2 Always enabled, use initial MSS of tcp_base_mss.
386
387 tcp_no_metrics_save (Boolean; default: disabled; since Linux 2.6.6)
388 By default, TCP saves various connection metrics in the route
389 cache when the connection closes, so that connections estab‐
390 lished in the near future can use these to set initial condi‐
391 tions. Usually, this increases overall performance, but it may
392 sometimes cause performance degradation. If tcp_no_metrics_save
393 is enabled, TCP will not cache metrics on closing connections.
394
395 tcp_orphan_retries (integer; default: 8; since Linux 2.4)
396 The maximum number of attempts made to probe the other end of a
397 connection which has been closed by our end.
398
399 tcp_reordering (integer; default: 3; since Linux 2.4)
400 The maximum a packet can be reordered in a TCP packet stream
401 without TCP assuming packet loss and going into slow start. It
402 is not advisable to change this number. This is a packet
403 reordering detection metric designed to minimize unnecessary
404 back off and retransmits provoked by reordering of packets on a
405 connection.
406
407 tcp_retrans_collapse (Boolean; default: enabled; since Linux 2.2)
408 Try to send full-sized packets during retransmit.
409
410 tcp_retries1 (integer; default: 3; since Linux 2.2)
411 The number of times TCP will attempt to retransmit a packet on
412 an established connection normally, without the extra effort of
413 getting the network layers involved. Once we exceed this number
414 of retransmits, we first have the network layer update the route
415 if possible before each new retransmit. The default is the RFC
416 specified minimum of 3.
417
418 tcp_retries2 (integer; default: 15; since Linux 2.2)
419 The maximum number of times a TCP packet is retransmitted in
420 established state before giving up. The default value is 15,
421 which corresponds to a duration of approximately between 13 to
422 30 minutes, depending on the retransmission timeout. The
423 RFC 1122 specified minimum limit of 100 seconds is typically
424 deemed too short.
425
426 tcp_rfc1337 (Boolean; default: disabled; since Linux 2.2)
427 Enable TCP behavior conformant with RFC 1337. When disabled, if
428 a RST is received in TIME_WAIT state, we close the socket imme‐
429 diately without waiting for the end of the TIME_WAIT period.
430
431 tcp_rmem (since Linux 2.4)
432 This is a vector of 3 integers: [min, default, max]. These
433 parameters are used by TCP to regulate receive buffer sizes.
434 TCP dynamically adjusts the size of the receive buffer from the
435 defaults listed below, in the range of these values, depending
436 on memory available in the system.
437
438 min minimum size of the receive buffer used by each TCP
439 socket. The default value is the system page size.
440 (On Linux 2.4, the default value is 4 kB, lowered to
441 PAGE_SIZE bytes in low-memory systems.) This value is
442 used to ensure that in memory pressure mode, alloca‐
443 tions below this size will still succeed. This is not
444 used to bound the size of the receive buffer declared
445 using SO_RCVBUF on a socket.
446
447 default the default size of the receive buffer for a TCP
448 socket. This value overwrites the initial default
449 buffer size from the generic global
450 net.core.rmem_default defined for all protocols. The
451 default value is 87380 bytes. (On Linux 2.4, this
452 will be lowered to 43689 in low-memory systems.) If
453 larger receive buffer sizes are desired, this value
454 should be increased (to affect all sockets). To
455 employ large TCP windows, the net.ipv4.tcp_win‐
456 dow_scaling must be enabled (default).
457
458 max the maximum size of the receive buffer used by each
459 TCP socket. This value does not override the global
460 net.core.rmem_max. This is not used to limit the size
461 of the receive buffer declared using SO_RCVBUF on a
462 socket. The default value is calculated using the
463 formula
464
465 max(87380, min(4 MB, tcp_mem[1]*PAGE_SIZE/128))
466
467 (On Linux 2.4, the default is 87380*2 bytes, lowered
468 to 87380 in low-memory systems).
469
470 tcp_sack (Boolean; default: enabled; since Linux 2.2)
471 Enable RFC 2018 TCP Selective Acknowledgements.
472
473 tcp_slow_start_after_idle (Boolean; default: enabled; since Linux
474 2.6.18)
475 If enabled, provide RFC 2861 behavior and time out the conges‐
476 tion window after an idle period. An idle period is defined as
477 the current RTO (retransmission timeout). If disabled, the con‐
478 gestion window will not be timed out after an idle period.
479
480 tcp_stdurg (Boolean; default: disabled; since Linux 2.2)
481 If this option is enabled, then use the RFC 1122 interpretation
482 of the TCP urgent-pointer field. According to this interpreta‐
483 tion, the urgent pointer points to the last byte of urgent data.
484 If this option is disabled, then use the BSD-compatible inter‐
485 pretation of the urgent pointer: the urgent pointer points to
486 the first byte after the urgent data. Enabling this option may
487 lead to interoperability problems.
488
489 tcp_syn_retries (integer; default: 5; since Linux 2.2)
490 The maximum number of times initial SYNs for an active TCP con‐
491 nection attempt will be retransmitted. This value should not be
492 higher than 255. The default value is 5, which corresponds to
493 approximately 180 seconds.
494
495 tcp_synack_retries (integer; default: 5; since Linux 2.2)
496 The maximum number of times a SYN/ACK segment for a passive TCP
497 connection will be retransmitted. This number should not be
498 higher than 255.
499
500 tcp_syncookies (Boolean; since Linux 2.2)
501 Enable TCP syncookies. The kernel must be compiled with CON‐
502 FIG_SYN_COOKIES. Send out syncookies when the syn backlog queue
503 of a socket overflows. The syncookies feature attempts to pro‐
504 tect a socket from a SYN flood attack. This should be used as a
505 last resort, if at all. This is a violation of the TCP proto‐
506 col, and conflicts with other areas of TCP such as TCP exten‐
507 sions. It can cause problems for clients and relays. It is not
508 recommended as a tuning mechanism for heavily loaded servers to
509 help with overloaded or misconfigured conditions. For recom‐
510 mended alternatives see tcp_max_syn_backlog, tcp_synack_retries,
511 and tcp_abort_on_overflow.
512
513 tcp_timestamps (integer; default: 1; since Linux 2.2)
514 Set to one of the following values to enable or disable RFC 1323
515 TCP timestamps:
516
517 0 Disable timestamps.
518
519 1 Enable timestamps as defined in RFC1323 and use random offset
520 for each connection rather than only using the current time.
521
522 2 As for the value 1, but without random offsets. Setting
523 tcp_timestamps to this value is meaningful since Linux 4.10.
524
525 tcp_tso_win_divisor (integer; default: 3; since Linux 2.6.9)
526 This parameter controls what percentage of the congestion window
527 can be consumed by a single TCP Segmentation Offload (TSO)
528 frame. The setting of this parameter is a tradeoff between
529 burstiness and building larger TSO frames.
530
531 tcp_tw_recycle (Boolean; default: disabled; Linux 2.4 to 4.11)
532 Enable fast recycling of TIME_WAIT sockets. Enabling this
533 option is not recommended as the remote IP may not use monotoni‐
534 cally increasing timestamps (devices behind NAT, devices with
535 per-connection timestamp offsets). See RFC 1323 (PAWS) and RFC
536 6191.
537
538 tcp_tw_reuse (Boolean; default: disabled; since Linux 2.4.19/2.6)
539 Allow to reuse TIME_WAIT sockets for new connections when it is
540 safe from protocol viewpoint. It should not be changed without
541 advice/request of technical experts.
542
543 tcp_vegas_cong_avoid (Boolean; default: disabled; Linux 2.2 to 2.6.13)
544 Enable TCP Vegas congestion avoidance algorithm. TCP Vegas is a
545 sender-side-only change to TCP that anticipates the onset of
546 congestion by estimating the bandwidth. TCP Vegas adjusts the
547 sending rate by modifying the congestion window. TCP Vegas
548 should provide less packet loss, but it is not as aggressive as
549 TCP Reno.
550
551 tcp_westwood (Boolean; default: disabled; Linux 2.4.26/2.6.3 to 2.6.13)
552 Enable TCP Westwood+ congestion control algorithm. TCP West‐
553 wood+ is a sender-side-only modification of the TCP Reno proto‐
554 col stack that optimizes the performance of TCP congestion con‐
555 trol. It is based on end-to-end bandwidth estimation to set
556 congestion window and slow start threshold after a congestion
557 episode. Using this estimation, TCP Westwood+ adaptively sets a
558 slow start threshold and a congestion window which takes into
559 account the bandwidth used at the time congestion is experi‐
560 enced. TCP Westwood+ significantly increases fairness with
561 respect to TCP Reno in wired networks and throughput over wire‐
562 less links.
563
564 tcp_window_scaling (Boolean; default: enabled; since Linux 2.2)
565 Enable RFC 1323 TCP window scaling. This feature allows the use
566 of a large window (> 64 kB) on a TCP connection, should the
567 other end support it. Normally, the 16 bit window length field
568 in the TCP header limits the window size to less than 64 kB. If
569 larger windows are desired, applications can increase the size
570 of their socket buffers and the window scaling option will be
571 employed. If tcp_window_scaling is disabled, TCP will not nego‐
572 tiate the use of window scaling with the other end during con‐
573 nection setup.
574
575 tcp_wmem (since Linux 2.4)
576 This is a vector of 3 integers: [min, default, max]. These
577 parameters are used by TCP to regulate send buffer sizes. TCP
578 dynamically adjusts the size of the send buffer from the default
579 values listed below, in the range of these values, depending on
580 memory available.
581
582 min Minimum size of the send buffer used by each TCP
583 socket. The default value is the system page size.
584 (On Linux 2.4, the default value is 4 kB.) This value
585 is used to ensure that in memory pressure mode, allo‐
586 cations below this size will still succeed. This is
587 not used to bound the size of the send buffer declared
588 using SO_SNDBUF on a socket.
589
590 default The default size of the send buffer for a TCP socket.
591 This value overwrites the initial default buffer size
592 from the generic global
593 /proc/sys/net/core/wmem_default defined for all proto‐
594 cols. The default value is 16 kB. If larger send
595 buffer sizes are desired, this value should be
596 increased (to affect all sockets). To employ large
597 TCP windows, the /proc/sys/net/ipv4/tcp_window_scaling
598 must be set to a nonzero value (default).
599
600 max The maximum size of the send buffer used by each TCP
601 socket. This value does not override the value in
602 /proc/sys/net/core/wmem_max. This is not used to
603 limit the size of the send buffer declared using
604 SO_SNDBUF on a socket. The default value is calcu‐
605 lated using the formula
606
607 max(65536, min(4 MB, tcp_mem[1]*PAGE_SIZE/128))
608
609 (On Linux 2.4, the default value is 128 kB, lowered
610 64 kB depending on low-memory systems.)
611
612 tcp_workaround_signed_windows (Boolean; default: disabled; since Linux
613 2.6.26)
614 If enabled, assume that no receipt of a window-scaling option
615 means that the remote TCP is broken and treats the window as a
616 signed quantity. If disabled, assume that the remote TCP is not
617 broken even if we do not receive a window scaling option from
618 it.
619
620 Socket options
621 To set or get a TCP socket option, call getsockopt(2) to read or set‐
622 sockopt(2) to write the option with the option level argument set to
623 IPPROTO_TCP. Unless otherwise noted, optval is a pointer to an int.
624 In addition, most IPPROTO_IP socket options are valid on TCP sockets.
625 For more information see ip(7).
626
627 TCP_CONGESTION (since Linux 2.6.13)
628 The argument for this option is a string. This option allows
629 the caller to set the TCP congestion control algorithm to be
630 used, on a per-socket basis. Unprivileged processes are
631 restricted to choosing one of the algorithms in tcp_allowed_con‐
632 gestion_control (described above). Privileged processes
633 (CAP_NET_ADMIN) can choose from any of the available congestion-
634 control algorithms (see the description of tcp_available_conges‐
635 tion_control above).
636
637 TCP_CORK (since Linux 2.2)
638 If set, don't send out partial frames. All queued partial
639 frames are sent when the option is cleared again. This is use‐
640 ful for prepending headers before calling sendfile(2), or for
641 throughput optimization. As currently implemented, there is a
642 200 millisecond ceiling on the time for which output is corked
643 by TCP_CORK. If this ceiling is reached, then queued data is
644 automatically transmitted. This option can be combined with
645 TCP_NODELAY only since Linux 2.5.71. This option should not be
646 used in code intended to be portable.
647
648 TCP_DEFER_ACCEPT (since Linux 2.4)
649 Allow a listener to be awakened only when data arrives on the
650 socket. Takes an integer value (seconds), this can bound the
651 maximum number of attempts TCP will make to complete the connec‐
652 tion. This option should not be used in code intended to be
653 portable.
654
655 TCP_INFO (since Linux 2.4)
656 Used to collect information about this socket. The kernel
657 returns a struct tcp_info as defined in the file
658 /usr/include/linux/tcp.h. This option should not be used in
659 code intended to be portable.
660
661 TCP_KEEPCNT (since Linux 2.4)
662 The maximum number of keepalive probes TCP should send before
663 dropping the connection. This option should not be used in code
664 intended to be portable.
665
666 TCP_KEEPIDLE (since Linux 2.4)
667 The time (in seconds) the connection needs to remain idle before
668 TCP starts sending keepalive probes, if the socket option
669 SO_KEEPALIVE has been set on this socket. This option should
670 not be used in code intended to be portable.
671
672 TCP_KEEPINTVL (since Linux 2.4)
673 The time (in seconds) between individual keepalive probes. This
674 option should not be used in code intended to be portable.
675
676 TCP_LINGER2 (since Linux 2.4)
677 The lifetime of orphaned FIN_WAIT2 state sockets. This option
678 can be used to override the system-wide setting in the file
679 /proc/sys/net/ipv4/tcp_fin_timeout for this socket. This is not
680 to be confused with the socket(7) level option SO_LINGER. This
681 option should not be used in code intended to be portable.
682
683 TCP_MAXSEG
684 The maximum segment size for outgoing TCP packets. In Linux 2.2
685 and earlier, and in Linux 2.6.28 and later, if this option is
686 set before connection establishment, it also changes the MSS
687 value announced to the other end in the initial packet. Values
688 greater than the (eventual) interface MTU have no effect. TCP
689 will also impose its minimum and maximum bounds over the value
690 provided.
691
692 TCP_NODELAY
693 If set, disable the Nagle algorithm. This means that segments
694 are always sent as soon as possible, even if there is only a
695 small amount of data. When not set, data is buffered until
696 there is a sufficient amount to send out, thereby avoiding the
697 frequent sending of small packets, which results in poor uti‐
698 lization of the network. This option is overridden by TCP_CORK;
699 however, setting this option forces an explicit flush of pending
700 output, even if TCP_CORK is currently set.
701
702 TCP_QUICKACK (since Linux 2.4.4)
703 Enable quickack mode if set or disable quickack mode if cleared.
704 In quickack mode, acks are sent immediately, rather than delayed
705 if needed in accordance to normal TCP operation. This flag is
706 not permanent, it only enables a switch to or from quickack
707 mode. Subsequent operation of the TCP protocol will once again
708 enter/leave quickack mode depending on internal protocol pro‐
709 cessing and factors such as delayed ack timeouts occurring and
710 data transfer. This option should not be used in code intended
711 to be portable.
712
713 TCP_SYNCNT (since Linux 2.4)
714 Set the number of SYN retransmits that TCP should send before
715 aborting the attempt to connect. It cannot exceed 255. This
716 option should not be used in code intended to be portable.
717
718 TCP_USER_TIMEOUT (since Linux 2.6.37)
719 This option takes an unsigned int as an argument. When the
720 value is greater than 0, it specifies the maximum amount of time
721 in milliseconds that transmitted data may remain unacknowledged
722 before TCP will forcibly close the corresponding connection and
723 return ETIMEDOUT to the application. If the option value is
724 specified as 0, TCP will to use the system default.
725
726 Increasing user timeouts allows a TCP connection to survive
727 extended periods without end-to-end connectivity. Decreasing
728 user timeouts allows applications to "fail fast", if so desired.
729 Otherwise, failure may take up to 20 minutes with the current
730 system defaults in a normal WAN environment.
731
732 This option can be set during any state of a TCP connection, but
733 is effective only during the synchronized states of a connection
734 (ESTABLISHED, FIN-WAIT-1, FIN-WAIT-2, CLOSE-WAIT, CLOSING, and
735 LAST-ACK). Moreover, when used with the TCP keepalive
736 (SO_KEEPALIVE) option, TCP_USER_TIMEOUT will override keepalive
737 to determine when to close a connection due to keepalive fail‐
738 ure.
739
740 The option has no effect on when TCP retransmits a packet, nor
741 when a keepalive probe is sent.
742
743 This option, like many others, will be inherited by the socket
744 returned by accept(2), if it was set on the listening socket.
745
746 Further details on the user timeout feature can be found in
747 RFC 793 and RFC 5482 ("TCP User Timeout Option").
748
749 TCP_WINDOW_CLAMP (since Linux 2.4)
750 Bound the size of the advertised window to this value. The ker‐
751 nel imposes a minimum size of SOCK_MIN_RCVBUF/2. This option
752 should not be used in code intended to be portable.
753
754 Sockets API
755 TCP provides limited support for out-of-band data, in the form of (a
756 single byte of) urgent data. In Linux this means if the other end
757 sends newer out-of-band data the older urgent data is inserted as nor‐
758 mal data into the stream (even when SO_OOBINLINE is not set). This
759 differs from BSD-based stacks.
760
761 Linux uses the BSD compatible interpretation of the urgent pointer
762 field by default. This violates RFC 1122, but is required for interop‐
763 erability with other stacks. It can be changed via
764 /proc/sys/net/ipv4/tcp_stdurg.
765
766 It is possible to peek at out-of-band data using the recv(2) MSG_PEEK
767 flag.
768
769 Since version 2.4, Linux supports the use of MSG_TRUNC in the flags
770 argument of recv(2) (and recvmsg(2)). This flag causes the received
771 bytes of data to be discarded, rather than passed back in a caller-sup‐
772 plied buffer. Since Linux 2.4.4, MSG_TRUNC also has this effect when
773 used in conjunction with MSG_OOB to receive out-of-band data.
774
775 Ioctls
776 The following ioctl(2) calls return information in value. The correct
777 syntax is:
778
779 int value;
780 error = ioctl(tcp_socket, ioctl_type, &value);
781
782 ioctl_type is one of the following:
783
784 SIOCINQ
785 Returns the amount of queued unread data in the receive buffer.
786 The socket must not be in LISTEN state, otherwise an error (EIN‐
787 VAL) is returned. SIOCINQ is defined in <linux/sockios.h>.
788 Alternatively, you can use the synonymous FIONREAD, defined in
789 <sys/ioctl.h>.
790
791 SIOCATMARK
792 Returns true (i.e., value is nonzero) if the inbound data stream
793 is at the urgent mark.
794
795 If the SO_OOBINLINE socket option is set, and SIOCATMARK returns
796 true, then the next read from the socket will return the urgent
797 data. If the SO_OOBINLINE socket option is not set, and SIOCAT‐
798 MARK returns true, then the next read from the socket will
799 return the bytes following the urgent data (to actually read the
800 urgent data requires the recv(MSG_OOB) flag).
801
802 Note that a read never reads across the urgent mark. If an
803 application is informed of the presence of urgent data via
804 select(2) (using the exceptfds argument) or through delivery of
805 a SIGURG signal, then it can advance up to the mark using a loop
806 which repeatedly tests SIOCATMARK and performs a read (request‐
807 ing any number of bytes) as long as SIOCATMARK returns false.
808
809 SIOCOUTQ
810 Returns the amount of unsent data in the socket send queue. The
811 socket must not be in LISTEN state, otherwise an error (EINVAL)
812 is returned. SIOCOUTQ is defined in <linux/sockios.h>. Alter‐
813 natively, you can use the synonymous TIOCOUTQ, defined in
814 <sys/ioctl.h>.
815
816 Error handling
817 When a network error occurs, TCP tries to resend the packet. If it
818 doesn't succeed after some time, either ETIMEDOUT or the last received
819 error on this connection is reported.
820
821 Some applications require a quicker error notification. This can be
822 enabled with the IPPROTO_IP level IP_RECVERR socket option. When this
823 option is enabled, all incoming errors are immediately passed to the
824 user program. Use this option with care — it makes TCP less tolerant
825 to routing changes and other normal network conditions.
826
828 EAFNOTSUPPORT
829 Passed socket address type in sin_family was not AF_INET.
830
831 EPIPE The other end closed the socket unexpectedly or a read is exe‐
832 cuted on a shut down socket.
833
834 ETIMEDOUT
835 The other end didn't acknowledge retransmitted data after some
836 time.
837
838 Any errors defined for ip(7) or the generic socket layer may also be
839 returned for TCP.
840
842 Support for Explicit Congestion Notification, zero-copy sendfile(2),
843 reordering support and some SACK extensions (DSACK) were introduced in
844 2.4. Support for forward acknowledgement (FACK), TIME_WAIT recycling,
845 and per-connection keepalive socket options were introduced in 2.3.
846
848 Not all errors are documented.
849 IPv6 is not described.
850
852 accept(2), bind(2), connect(2), getsockopt(2), listen(2), recvmsg(2),
853 sendfile(2), sendmsg(2), socket(2), ip(7), socket(7)
854
855 RFC 793 for the TCP specification.
856 RFC 1122 for the TCP requirements and a description of the Nagle algo‐
857 rithm.
858 RFC 1323 for TCP timestamp and window scaling options.
859 RFC 1337 for a description of TIME_WAIT assassination hazards.
860 RFC 3168 for a description of Explicit Congestion Notification.
861 RFC 2581 for TCP congestion control algorithms.
862 RFC 2018 and RFC 2883 for SACK and extensions to SACK.
863
865 This page is part of release 4.15 of the Linux man-pages project. A
866 description of the project, information about reporting bugs, and the
867 latest version of this page, can be found at
868 https://www.kernel.org/doc/man-pages/.
869
870
871
872Linux 2017-09-15 TCP(7)