OpenBSD manual page server

Manual Page Search Parameters

SYSCTL(2) System Calls Manual SYSCTL(2)

sysctlget or set system information

#include <sys/types.h>
#include <sys/sysctl.h>

int
sysctl(const int *name, u_int namelen, void *oldp, size_t *oldlenp, void *newp, size_t newlen);

The () function retrieves system information and allows processes with appropriate privileges to set system information. The information available from sysctl() consists of integers, strings, and tables. Information may be retrieved and set using the sysctl(8) utility; the variable names used by this utility are given here in parentheses.

Unless explicitly noted below, () returns a consistent snapshot of the data requested. Consistency is obtained by locking the destination buffer into memory so that the data may be copied out without blocking. Calls to sysctl() are serialized to avoid deadlock.

The state is described using a “Management Information Base (MIB)” style name, listed in name, which is a namelen length array of integers.

The information is copied into the buffer specified by oldp. The size of the buffer is given by the location specified by oldlenp before the call, and that location gives the amount of data copied after a successful call. If the amount of data available is greater than the size of the buffer supplied, the call supplies as much data as fits in the buffer provided and returns with the error code ENOMEM. If the old value is not desired, oldp and oldlenp should be set to NULL.

The size of the available data can be determined by calling () with a NULL parameter for oldp. The size of the available data will be returned in the location pointed to by oldlenp. For some operations, the amount of space may change often. For these operations, the system attempts to round up so that the returned size is large enough for a call to return the data shortly thereafter.

The terminating NUL character is included in the lengths of string values.

To set a new value, newp is set to point to a buffer of length newlen from which the requested value is to be taken. If a new value is not to be set, newp should be set to NULL and newlen set to 0.

The top level names are defined with a CTL_ prefix in <sys/sysctl.h>, and are as follows. The next and subsequent levels down are found in the include files listed here, and described in separate sections below.

ddb/db_var.h Kernel debugger
sys/sysctl.h Debugging
sys/sysctl.h File system
sys/sysctl.h Generic CPU, I/O
sys/sysctl.h High kernel limits
sys/sysctl.h Machine dependent
sys/socket.h Networking
ufs/ffs/ffs_extern.h Virtual file system
uvm/uvmexp.h Virtual memory

For example, the following retrieves the maximum number of processes allowed in the system:

int mib[2], maxproc;
size_t len;

mib[0] = CTL_KERN;
mib[1] = KERN_MAXPROC;
len = sizeof(maxproc);
if (sysctl(mib, 2, &maxproc, &len, NULL, 0) == -1)
	err(1, "sysctl");

Integer information and settable variables are available for the CTL_DDB level, as described below. More information is also available in ddb(4).

integer yes
integer yes
integer yes
integer yes
integer yes
integer yes
integer yes
integer yes
(ddb.console)
When this variable is set, an architecture dependent magic key sequence on the console or a debugger button will permit entry into the kernel debugger. When running with a securelevel(7) greater than 0, this variable may not be raised.
(ddb.log)
When set, ddb output is also logged in the kernel message buffer.
(ddb.max_line)
Determines the number of lines to page in ddb(4). This variable is also available as the ddb $lines variable.
(ddb.max_width)
Determines the maximum width of a line in ddb(4). This variable is also available as the ddb $maxwidth variable.
(ddb.panic)
When this variable is set, system panics may drop into the kernel debugger. When running with a securelevel(7) greater than 0, this variable may not be raised.
(ddb.radix)
Determines the default radix or base for non-prefixed numbers entered into ddb(4). This variable is also available as the ddb $radix variable.
(ddb.tab_stop_width)
Width of a tab stop in ddb(4). This variable is also available as the ddb $tabstops variable.
(ddb.trigger)
When DBCTL_CONSOLE is set, writing to DBCTL_TRIGGER causes the system to enter ddb(4). When running with a securelevel(7) greater than 0, the process writing to this variable must be running on the console in order to enter ddb(4).

The debugging variables vary from system to system. A debugging variable may be added or deleted without need to recompile () to know about it. Each time it runs, sysctl() gets the list of debugging variables from the kernel and displays their current values. The system defines twenty struct ctldebug variables named debug0 through debug19. They are declared as separate variables so that they can be individually initialized at the location of their associated variable. The loader prevents multiple use of the same variable by issuing errors if a variable is initialized in more than one place. For example, to export the variable dospecialcheck as a debugging variable, the following declaration would be used:

int dospecialcheck = 1;
struct ctldebug debug5 = { "dospecialcheck", &dospecialcheck };

The string and integer information available for the CTL_FS level is detailed below. The changeable column shows whether a process with appropriate privileges may change the value.

integer yes
(fs.posix.setuid)
When this variable is set, ownership changes on a file will cause the S_ISUID and S_ISGID bits to be cleared. When running with a securelevel(7) greater than 0, this variable may not be changed.

The string and integer information available for the CTL_HW level is detailed below. The changeable column shows whether a process with appropriate privileges may change the value.

integer yes
node not applicable
integer no
integer no
integer no
string no
struct no
string no
string no
integer no
integer no
integer no
integer no
string yes
integer no
int64_t no
integer no
string no
node not applicable
integer yes
integer yes
string no
integer no
int64_t no
string no
string no
string no
(hw.allowpowerdown)
Some machines generate an interrupt when the power button is pressed and a driver can catch that interrupt. When this variable is set, such an event will cause the system to perform a regular shutdown and power off the machine. When running with a securelevel(7) greater than 0, this variable may not be changed.
(hw.battery)
Control battery charging. These are only available on hardware that supports battery charging control. There are three subnodes:
integer yes
integer maybe
integer yes

Their meanings are as follows:

(hw.battery.chargemode)
Control if the battery is charged or discharged. A value of -1 means to (forcibly) discharge the battery. A value of 0 means to inhibit charging the battery. A value of 1 means to charge the battery, subject to the configured limits.
(hw.battery.chargestart)
The percentage below which the battery will start charging. Not all hardware allows setting this value. On hardware that does not allow setting this value the battery will typically start charging at a fixed percentage point below the value configured through HW_BATTERY_CHARGESTOP.
(hw.battery.chargestop)
The percentage above which the battery will stop charging. Setting the value to 100 will fully charge the battery.

By setting HW_BATTERY_CHARGEMODE to 1, and setting both HW_BATTERY_CHARGESTART and HW_BATTERY_CHARGESTOP, the battery will be kept charged at a percentage between the configured limits.

(hw.byteorder)
The byteorder (4321 or 1234).
(hw.cpuspeed)
The current CPU frequency (in MHz).
(hw.diskcount)
The number of disks currently attached to the system.
(hw.disknames)
A comma-separated list of disk names.
(hw.diskstats)
An array of struct diskstats structures containing disk statistics.
(hw.machine)
The kernel architecture as returned by uname(1) -m and by machine(1).
(hw.model)
The machine model.
(hw.ncpu)
The number of CPUs configured.
(hw.ncpufound)
The number of CPUs found.
(hw.ncpuonline)
The number of CPUs online.
(hw.pagesize)
The software page size.
(hw.perfpolicy)
The performance policy for power management. Can be one of “manual”, “auto”, or “high”.
The total physical memory, in bytes. This variable is deprecated; use HW_PHYSMEM64 instead.
(hw.physmem)
The total physical memory, in bytes.
(hw.power)
Machine has wall-power.
(hw.product)
The product name of the machine.
(hw.sensors)
Third level comprises an array of struct sensordev structures containing information about devices that may attach hardware monitoring sensors.

Third, fourth and fifth levels together comprise an array of struct sensor structures containing snapshot readings of hardware monitoring sensors. In such usage, third level indicates the numerical representation of the sensor device name to which the sensor is attached (a device's xname and number are matched with the help of struct sensordev structure above), fourth level indicates sensor type and fifth level is an ordinal sensor number (unique to the specified sensor type on the specified sensor device).

The and structures and enumeration are defined in <sys/sensors.h>.

(hw.serialno)
The serial number of the machine.
(hw.setperf)
Current CPU performance (percentage). It is only modifiable if HW_PERFPOLICY is set to “manual”.
(hw.smt)
If set to 1, enable simultaneous multithreading (SMT) on CPUs that support it. Disabled by default.
(hw.ucomnames)
A comma-separated list of currently attached ucom(4) devices in the following format:

N:bus.rootport.route.interface

The route consists of five hexadecimal digits identifying the path from the root port to the port containing the interface.

The amount of available non-kernel memory in bytes. This variable is deprecated; use HW_USERMEM64 instead.
(hw.usermem)
The amount of available non-kernel memory in bytes.
(hw.uuid)
The universal unique identification number assigned to the machine.
(hw.vendor)
The vendor name for this machine.
(hw.version)
The version or revision of this machine.

The string and integer information available for the CTL_KERN level is detailed below. The changeable column shows whether a process with appropriate privileges may change the value. The types of data currently available are process information, system vnodes, the open file entries, routing table entries, virtual memory statistics, load average history, and clock rate information.

integer yes
integer yes
integer no
node yes
struct timeval no
integer yes
integer no
struct clockinfo no
dev_t no
long[CPUSTATES] no
u_int64_t[CPUSTATES] no
struct cpustats no
string yes
struct kinfo_file no
struct forkstat no
integer no
integer no
integer yes
integer yes
string yes
node not applicable
integer no
node no
integer yes
integer yes
integer yes
integer no
integer yes
integer yes
integer yes
struct mbstat no
char[] no
integer no
struct nchstats no
integer no
integer no
integer yes
integer no
integer no
integer no
string no
integer no
string no
string no
struct pf_status no
integer yes
integer no
struct kinfo_proc no
node not applicable
string not applicable
node not applicable
struct kinfo_vmentry no
node not applicable
integer no
integer no
integer raise only
node not applicable
node not applicable
integer yes
integer yes
int yes
integer yes
node not applicable
integer no
integer no
integer no
node not applicable
node not applicable
integer no
integer yes
string no
node yes
node not applicable
node not applicable
integer yes
(kern.allowdt)
Allow userland processes access to /dev/dt. When running with a securelevel(7) greater than 0, this variable may not be changed.
(kern.allowkmem)
Allow userland processes access to /dev/mem and /dev/kmem. When running with a securelevel(7) greater than 0, this variable may not be changed.
(kern.argmax)
The maximum number of bytes allowed among the arguments to execve(2).
(kern.audio)
Control device-independent aspects of the audio(4) subsystem. Currently, there is one subnode:
integer yes

Its meaning is as follows:

(kern.audio.record)
If set to the default value of 0, recording is muted by default for all audio devices. Otherwise, audio recording is enabled by default. For individual devices, this setting can be overridden with the mixerctl(8) record.enable variable.
(kern.boottime)
A struct timeval structure is returned. This structure contains the time that the system was booted.
(kern.bufcachepercent)
The maximum percentage of DMA-reachable physical memory the buffer cache may use.
(kern.ccpu)
The scheduler exponential decay value.
(kern.clockrate)
A struct clockinfo structure is returned. This structure contains the hard clock, statistics clock and profiling clock frequencies, and the number of microseconds per hard clock tick.
(kern.consdev)
The console device.
(kern.cp_time)
An array of longs of size CPUSTATES is returned, containing statistics about the number of ticks spent by the system in interrupt processing, user processes (nice(1) or normal), system processing, lock spinning, or idling.
(kern.cp_time2)
Similar to KERN_CPTIME, but obtains information from only the single CPU specified by the third level name given.
A struct cpustats structure is returned. This structure contains the array described in KERN_CPTIME2 and a bit mask indicating the status of the CPU specified by the third level name.
(kern.domainname)
Get or set the YP domain name like with getdomainname(3), setdomainname(3), and domainname(1).
(kern.file)
Return the entire file table, or a subset of it. An array of struct kinfo_file structures is returned, whose size depends on the current number of selected files in the system. The third and fourth level names are as follows:
A file type
A process ID
A user ID

The fifth level name is the size of the struct kinfo_file and the sixth level name is the number of structures to return.

(kern.forkstat)
A struct forkstat structure is returned. This structure contains information about the number of fork(2), vfork(2), and __tfork(3) system calls as well as kernel thread creations since system startup, and the number of pages of virtual memory involved in each.
(kern.fscale)
The kernel fixed-point scale factor.
(kern.fsync)
Return 1 if the File Synchronisation Option is available on this system, otherwise 0.
(kern.global_ptrace)
When set to 1, permit ptrace(2) to attach to any process with the appropriate privileges. When set to 0, processes may only attach to their own descendants.
(kern.hostid)
Get or set the host ID.
(kern.hostname)
Get or set the hostname like with gethostname(3), sethostname(3), and hostname(1).
(kern.job_control)
Return 1 if job control is available on this system, otherwise 0.
(kern.malloc)
Return kernel memory bucket statistics. The third level names are detailed below. There are no changeable values in this branch.
node
string
string
node

The variables are as follows:

(kern.malloc.bucket)
A node containing the statistics for the memory bucket of the specified size (in decimal notation, the number of bytes per bucket element, e.g., 16, 32, 128). Each node returns a struct kmembuckets.

If a value is specified that does not correspond directly to a bucket size, the statistics for the closest larger bucket size will be returned instead.

Note that bucket sizes are typically powers of 2.

(kern.malloc.buckets)
Return a comma-separated list of the bucket sizes used by the kernel.
(kern.malloc.kmemnames)
Return a comma-separated list of the names of the kernel malloc(9) types.
(kern.malloc.kmemstat)
A node containing the statistics for the memory types of the specified name. Each node returns a struct kmemstats.
(kern.maxclusters)
The maximum number of mbuf(9) clusters that may be allocated.
(kern.maxfiles)
The maximum number of open files that may be open in the system.
(kern.maxlocksperuid)
The maximum number of file locks per user; the default is 1024.
(kern.maxpartitions)
The maximum number of partitions allowed per disk.
(kern.maxproc)
The maximum number of simultaneous processes the system will allow.
(kern.maxthread)
The maximum number of simultaneous threads the system will allow.
(kern.maxvnodes)
The maximum number of vnodes available on the system.
(kern.mbstat)
A struct mbstat structure is returned, containing statistics on mbuf(9) usage.
(kern.msgbuf)
Returns a buffer containing kernel log messages; see dmesg(8).
(kern.msgbufsize)
The size of the kernel message buffer.
(kern.nchstats)
A struct nchstats structure is returned. This structure contains information about the filename to inode(5) mapping cache.
(kern.nfiles)
Number of open files.
(kern.ngroups)
The maximum number of supplemental groups.
(kern.nosuidcoredump)
Whether a process may dump core after changing user or group ID:
0 euid == 0 current directory
1 never
2 always /var/crash
3 depends /var/crash/$programname/
(kern.nprocs)
The number of entries in the kernel process table.
(kern.nthreads)
The number of entries in the kernel thread table.
(kern.numvnodes)
Number of vnodes in use.
(kern.osrelease)
The system release string as returned by uname(1) -r.
(kern.osrevision)
The system revision number.
(kern.ostype)
The system type string as returned by uname(1) -s; it is always “OpenBSD”.
(kern.osversion)
The kernel build version as returned by uname(1) -v.
The struct pf_status structure.
(kern.pool_debug)
Modify the memory pool debug level. Valid values are:

0
Disable pool debugging.
1
Enable use after free detection.
2
In addition to 1, when calling either malloc(9) or pool_get(9) with flags indicating that sleeping is allowed then always yield. Useful to detect potential races.
(kern.posix1version)
The version of ISO/IEC 9945 (POSIX 1003.1) with which the system attempts to comply.
(kern.proc)
Return the entire process table, or a subset of it. An array of struct kinfo_proc structures is returned, whose size depends on the current number of selected processes in the system. The third and fourth level names are as follows:
None
A kernel thread
A process ID
A process group
A real user ID
A session PID
A tty device
A user ID

The fifth level name is the size of the struct kinfo_proc and the sixth level name is the number of structures to return.

(kern.procargs)
Returns the arguments or environment of a process. The third level name is the PID of the process. The fourth level name is one of:

KERN_PROC_NARGV and KERN_PROC_NENV return the number of elements as an int in the argv or env array. KERN_PROC_ARGV returns the argv array and KERN_PROC_ENV returns the environ array. The buffer pointed to by oldp is filled with an array of char pointers followed by the strings themselves. The last char pointer is a NULL pointer.

(kern.proc_cwd)
Return the current working directory of a process. The third level name is the target process ID. A NUL-terminated string is returned.
(kern.proc_nobroadcastkill)
When set, a process will no longer be signaled when sending broadcast signals. The third level name is the target process ID.
(kern.proc_vmmap)
Return the entire process VM map entries. An array of struct kinfo_vmentry structures is returned, whose size depends on the current number of VM map entries of the selected process. Iteration is possible by setting the base address in the first element of struct kinfo_vmentry.
(kern.profiling)
Return profiling information about the kernel. If the kernel is not compiled for profiling, attempts to retrieve any of the KERN_PROF values will fail with EOPNOTSUPP. The third level names for the string and integer profiling information are detailed below. The changeable column shows whether a process with appropriate privileges may change the value.
u_short[] yes
u_short[] yes
struct gmonparam no
integer yes
struct tostruct yes

The variables are as follows:

Array of statistical program counter counts.
Array indexed by program counter of call-from points.
Structure giving the sizes of the above arrays.
Returns GMON_PROF_ON or GMON_PROF_OFF to show that profiling is running or stopped.
Array of struct tostruct describing destination of calls and their counts.
(kern.rawpartition)
The raw partition of a disk (a == 0).
(kern.saved_ids)
Returns 1 if saved set-group-ID and saved set-user-ID are available.
(kern.securelevel)
The system security level. This level may be raised by processes with appropriate privileges. It may only be lowered by process 1.
(kern.seminfo)
Return the elements of struct seminfo. If the kernel is not compiled with System V style semaphore support, attempts to retrieve any of the KERN_SEMINFO values will fail with EOPNOTSUPP. The third level names for the elements of struct seminfo are detailed below. The changeable column shows whether a process with appropriate privileges may change the value.
integer no
integer yes
integer yes
integer yes
integer yes
integer yes
integer no
integer no
integer no

The variables are as follows:

(kern.seminfo.semaem)
The adjust on exit maximum value.
(kern.seminfo.semmni)
The maximum number of semaphore identifiers allowed.
(kern.seminfo.semmns)
The maximum number of semaphores allowed in the system.
(kern.seminfo.semmnu)
The maximum number of semaphore undo structures allowed in the system.
(kern.seminfo.semmsl)
The maximum number of semaphores allowed per ID.
(kern.seminfo.semopm)
The maximum number of operations per semop(2) call.
(kern.seminfo.semume)
The maximum number of undo entries per process.
(kern.seminfo.semusz)
The size (in bytes) of the undo structure.
(kern.seminfo.semvmx)
The semaphore maximum value.
(kern.shminfo)
Return the elements of struct shminfo. If the kernel is not compiled with System V style shared memory support, attempts to retrieve any of the KERN_SHMINFO values will fail with EOPNOTSUPP. The third level names for the elements of struct shminfo are detailed below. The changeable column shows whether a process with appropriate privileges may change the value.
integer yes
integer yes
integer yes
integer yes
integer yes

The variables are as follows:

(kern.shminfo.shmall)
The maximum amount of total shared memory allowed in the system (in pages).
(kern.shminfo.shmmax)
The maximum shared memory segment size (in bytes).
(kern.shminfo.shmmin)
The minimum shared memory segment size (in bytes).
(kern.shminfo.shmmni)
The maximum number of shared memory identifiers in the system.
(kern.shminfo.shmseg)
The maximum number of shared memory segments per process.
(kern.somaxconn)
Upper bound on the number of half-open connections a process can allow to be associated with a socket, using listen(2). The default value is 128.
(kern.sominconn)
Lower bound on the number of half-open connections a process can allow to be associated with a socket, using listen(2). The default value is 80.
(kern.splassert)
Modify the system interrupt priority level. Valid values are:

0
Disable error checking.
1
Print a message if an error is detected.
2
Print a message if an error is detected, and a stack trace if possible.
3
The same as 2, but also drop into the kernel debugger.

Any other value causes a system panic on errors. See splassert(9) for more information.

(kern.stackgap_random)
Sets the range of the random value added to the stack pointer on each program execution. The random value is added to make buffer overflow exploitation slightly harder. The bigger the number, the harder it is to brute force this added protection, but it also means bigger waste of memory.
(kern.sysvipc_info)
Return System V style IPC configuration and run-time information. The third level name selects the System V style IPC facility.
struct msg_sysctl_info
struct sem_sysctl_info
struct shm_sysctl_info
Return information on the System V style message facility. The structure is defined in <sys/msg.h>.
Return information on the System V style semaphore facility. The structure is defined in <sys/sem.h>.
Return information on the System V style shared memory facility. The structure is defined in <sys/shm.h>.
(kern.sysvmsg)
Returns 1 if System V style message queue functionality is available on this system, otherwise 0.
(kern.sysvem)
Returns 1 if System V style semaphore functionality is available on this system, otherwise 0.
(kern.sysvshm)
Returns 1 if System V style shared memory functionality is available on this system, otherwise 0.
(kern.timecounter)
Return statistics information about the kernel time counter. The third level names information is detailed below. The changeable column shows whether a process with appropriate privileges may change the value.
string no
string yes
integer no
integer yes

The variables are as follows:

(kern.timecounter.choice)
Get the list of kernel time counter sources and their claimed quality (higher is better).
(kern.timecounter.hardware)
Get or set the kernel time counter source by name.
(kern.timecounter.tick)
Get the number of times we have reset the kernel time counter information.
(kern.timecounter.timestepwarnings)
Get or set a flag to log a message when the kernel time is stepped.
(kern.tty)
Return statistics information about tty input/output. The third level names information is detailed below. The changeable column shows whether a process with appropriate privileges may change the value.
struct itty no
int64_t no
int64_t no
int64_t no
int64_t no

The variables are as follows:

(kern.tty.ttyinfo)
Returns an array of struct itty structures containing tty statistics.
(kern.tty.tk_cancc)
Returns the number of input characters in canonical mode.
(kern.tty.tk_nin)
Returns the number of input characters from a tty(4).
(kern.tty.tk_nout)
Returns the number of output characters on a tty(4).
(kern.tty.tk_rawcc)
Returns the number of input characters in raw mode.
(kern.ttycount)
Number of available tty(4) devices.
(kern.utc_offset)
The real-time clock's (RTC) offset from Coordinated Universal Time (UTC) expressed as minutes East of UTC+0. When set, time read from the RTC is adjusted to remove the offset and time written to the RTC is adjusted to reapply it. This may simplify multibooting with an operating system that does not run the RTC in UTC mode. When running with a securelevel(7) greater than 0, this variable may not be changed.
(kern.version)
The system version string.
(kern.video)
Control device-independent aspects of the video(4) subsystem. Currently, there is one subnode:
integer yes

Its meaning is as follows:

(kern.video.record)
If set to the default value of 0, recording is blanked for all video devices. If the value is non-zero, video recording is enabled.
(kern.watchdog)
Return information on hardware watchdog timers. If the kernel does not support a hardware watchdog timer, attempts to retrieve or set any of the KERN_WATCHDOG values will fail with EOPNOTSUPP.
integer yes
integer yes

The variables are as follows:

(kern.watchdog.auto)
If set to 1, the kernel refreshes the watchdog timer periodically. If set to 0, a userland process must ensure that the watchdog timer gets refreshed by setting the KERN_WATCHDOG_PERIOD variable.
(kern.watchdog.period)
The period of the watchdog timer in seconds. Set to 0 to disable the watchdog timer.
(kern.witness)
Control settings of witness(4).
integer yes
integer yes

The variables are as follows:

(kern.witness.locktrace)
When set, witness(4) saves a stack trace on each lock acquisition. The stack traces of acquired locks can be viewed using ddb(4).
(kern.witness.watch)
Control how witness(4) behaves on error. Valid values are:

-1
Disable witness(4) completely. System reboot is needed to re-enable it.
0
Disable lock order checking.
1
Print a message if an error is detected.
2
Print a message if an error is detected, and a stack trace if possible.
3
The same as 2, but also drop into the kernel debugger.
(kern.wxabort)
Generate an abort, rather than returning an error, on W^X violation.

The set of variables defined is architecture dependent. Most architectures define at least the following variables.

dev_t no

Consult the example file /etc/examples/sysctl.conf for a non-exhaustive list of machdep variables.

The string and integer information available for the CTL_NET level is detailed below. The changeable column shows whether a process with appropriate privileges may change the value.

routing messages no
IPv4 values yes
IPv6 values yes
UNIX-domain values yes
key management no
MPLS values yes
PIPEX values yes
Return the entire routing table or a subset of it. The data is returned as a sequence of routing messages (see route(4) for the header file, format, and meaning). The length of each message is contained in the message header.

The third level name is a protocol number, which is currently always 0. The fourth level name is an address family, which may be set to 0 to select all address families. The fifth and sixth level names are as follows:

priority
rtflags
None
None
None
rtableid
If set to 0, show all routes. If set to any number, show all routes with that number priority. If set to a negative number, show routes that do not have the positive priority value.

An optional seventh level name can be provided to select the routing table on which to run the operation. If not provided, the current routing table is used.

Get or set various global information about IPv4 (Internet Protocol version 4). The third level name is the protocol. The fourth level name is the variable name. The currently defined protocols and names are:
ah enable integer yes
bpf bufsize integer yes
bpf maxbufsize integer yes
carp allow integer yes
carp log integer yes
carp preempt integer yes
divert recvspace integer yes
divert sendspace integer yes
esp enable integer yes
esp udpencap integer yes
esp udpencap_port integer yes
etherip allow integer yes
gre allow integer yes
gre wccp integer yes
icmp bmcastecho integer yes
icmp errppslimit integer yes
icmp maskrepl integer yes
icmp rediraccept integer yes
icmp redirtimeout integer yes
icmp stats structure no
icmp tstamprepl integer yes
ip arpqueued integer no
ip arpdown integer yes
ip arptimeout integer yes
ip arpq node N/A
ip directed-broadcast integer yes
ip encdebug integer yes
ip forwarding integer yes
ip ipsec-allocs integer yes
ip ipsec-auth-alg string yes
ip ipsec-bytes integer yes
ip ipsec-comp-alg string yes
ip ipsec-enc-alg string yes
ip ipsec-expire-acquire integer yes
ip ipsec-firstuse integer yes
ip ipsec-invalid-life integer yes
ip ipsec-pfs integer yes
ip ipsec-soft-allocs integer yes
ip ipsec-soft-bytes integer yes
ip ipsec-soft-firstuse integer yes
ip ipsec-soft-timeout integer yes
ip ipsec-timeout integer yes
ip maxqueue integer yes
ip mforwarding integer yes
ip mtudisc integer yes
ip mtudisctimeout integer yes
ip multipath integer yes
ip portfirst integer yes
ip porthifirst integer yes
ip porthilast integer yes
ip portlast integer yes
ip redirect integer yes
ip sourceroute integer yes
ip stats structure no
ip ttl integer yes
ipcomp enable integer yes
ipip allow integer yes
tcp ackonpush integer yes
tcp always_keepalive integer yes
tcp baddynamic array yes
tcp ecn integer yes
tcp ident structure no
tcp keepidle integer yes
tcp keepinittime integer yes
tcp keepintvl integer yes
tcp mssdflt integer yes
tcp reasslimit integer yes
tcp rfc1323 integer yes
tcp rfc3390 integer yes
tcp rootonly array yes
tcp rstppslimit integer yes
tcp sack integer yes
tcp stats structure no
tcp synbucketlimit integer yes
tcp syncachelimit integer yes
tcp synhashsize integer yes
tcp synuselimit integer yes
tcp tso integer yes
udp baddynamic array yes
udp checksum integer yes
udp recvspace integer yes
udp rootonly array yes
udp sendspace integer yes
udp stats structure no

The variables are as follows:

(net.inet.ah.enable)
If set to 1, enable the Authentication Header (AH) IPsec protocol. Enabled by default. See ipsec(4) for more information.
(net.bpf.bufsize)
The initial size of bpf(4) buffers.
(net.bpf.maxbufsize)
The maximum size a user may request a bpf(4) buffer to be.
(net.inet.carp.allow)
If set to 0, incoming carp(4) packets will not be processed. If set to any other value, processing will occur. Enabled by default.
(net.inet.carp.log)
Controls the verbosity of carp(4) logging. May be a value between 0 and 7 corresponding with syslog(3) priorities. The default value is 2.
(net.inet.carp.preempt)
If set to 0, carp(4) will not attempt to become master if it is receiving advertisements from another active master. If set to any other value, carp will become master of the virtual host if it believes it can send advertisements more frequently than the current master. Disabled by default.
(net.inet.divert.recvspace)
Returns the default divert receive buffer size.
(net.inet.divert.sendspace)
Returns the default divert send buffer size.
(net.inet.esp.enable)
If set to 1, enable the Encapsulating Security Payload (ESP) IPsec protocol. Enabled by default. See ipsec(4) for more information.
(net.inet.esp.udpencap)
If set to 1, enable processing of UDP encapsulated ESP packets. Enabled by default.
(net.inet.udpencap_port)
Contains the value of the UDP port that triggers decapsulation for incoming UDP encapsulated ESP packets. The default port is 4500.
(net.inet.etherip.allow)
If set to 0, incoming Ethernet-in-IPv4 packets will not be processed. If set to any other value, processing will occur.
(net.inet.gre.allow)
If set to 0, incoming GRE packets will not be processed. If set to any other value, processing will occur.
(net.inet.gre.wccp)
If set to 0, incoming WCCPv1-style GRE packets will not be processed. If set to any other value, and gre.allow allows GRE packet processing, WCCPv1-style GRE packets will be processed.
(net.inet.icmp.bmcastecho)
If set to 1, respond to ICMP echo requests destined for broadcast and multicast addresses. Note, enabling this could open a system to a type of denial of service attack called "smurfing", and is thus not advised.
(net.inet.icmp.errppslimit)
This variable specifies the maximum number of outgoing ICMP error messages per second. ICMP error messages exceeding this value are subject to rate limitation and will not go out from the node. A negative value disables rate limitation.
(kern.inet.icmp.maskrepl)
Returns 1 if ICMP network mask requests are to be answered.
(kern.inet.icmp.rediraccept)
If set to non-zero, the host will accept ICMP redirect packets. Note that routers will never accept ICMP redirect packets, and the variable is meaningful on IP hosts only.
(net.inet.icmp.redrttimeout)
This variable specifies the lifetime of routing entries generated by incoming ICMP redirects. The default timeout is 10 minutes.
(kern.inet.icmp.stats)
Returns the ICMP statistics in a struct icmpstat.
(net.inet.icmp.tstamprepl)
If set to 1, reply to ICMP timestamp requests. If set to 0, ignore timestamp requests.
(net.inet.ip.arpqueued)
Number of packets ARP resolution is holding onto until it gets a MAC address for an IP.
(net.inet.ip.arpdown)
Lifetime of unresolved ARP entries, in seconds.
(net.inet.ip.arptimeout)
Lifetime of resolved ARP entries, in seconds.
Fifth level comprises an array of struct ifqueue structures containing information about ARP queue. The fifth level names for the elements of struct ifqueue are detailed below.
integer no
integer no
integer yes

The variables are as follows:

(net.inet.ip.arpq.drops)
Returns number of packet dropped.
(net.inet.ip.arpq.len)
Returns the current queue length.
(net.inet.ip.arpq.maxlen)
Get or set the maximum number of queue length.
(net.inet.ip.directed-broadcast)
Returns 1 if directed broadcast behavior is enabled for the host.
(net.inet.ip.encdebug)
Returns 1 when error message reporting is enabled for the host. If the kernel has been compiled with the ENCDEBUG option, then debugging information will also be reported when this variable is set.
(net.inet.ip.forwarding)
If set to 0, IP forwarding is disabled. The IP stack also requires the destination IP address of incoming packets to match the IP address of the network interface the packet is bound to. If set to 1, IP forwarding is enabled for the host, indicating the host is acting as a router. If set to 2, IP forwarding is restricted to traffic that has been IPsec encapsulated or decapsulated by the host. Enabling packet forwarding (values either 1 or 2) relaxes the requirements on incoming packets, so that its destination address must match just any IP address bound to the host. The default value is 0.
(net.inet.ip.ipsec-allocs)
The number of IPsec flows that can use a security association before it expires. If set to less than or equal to zero, the security association will not expire because of this counter. The default value is 0.
(net.inet.ip.ipsec-auth-alg)
This is the default authentication algorithm the kernel will instruct key management daemons to negotiate when establishing security associations on behalf of the kernel. Such security associations can occur as a result of a process having requested some security level through setsockopt(2), or as a result of dynamic VPN entries. Supported values are hmac-md5, hmac-sha1, and hmac-ripemd160. If set to any other value, it is left to the key management daemons to select an authentication algorithm for the security association. The default value is hmac-sha1.
(net.inet.ip.ipsec-bytes)
The number of bytes that will be processed by a security association before it expires. If set to less than or equal to zero, the security association will not expire because of this counter. The default value is 0.
(net.inet.ip.ipsec-comp-alg)
The compression algorithm to use with an IP Compression Association (IPCA). Currently the only possible value is “deflate”.
(net.inet.ip.ipsec-enc-alg)
This is the default encryption algorithm the kernel will instruct key management daemons to negotiate when establishing security associations on behalf of the kernel. Such security associations can occur as a result of a process having requested some security level through setsockopt(2), or as a result of dynamic VPN entries. Supported values are aes, des, 3des, blowfish and cast128. If set to any other value, it is left to the key management daemons to select an encryption algorithm for the security association. The default value is aes.
(net.inet.ip.ipsec-expire-acquire)
How long the kernel should allow key management to dynamically acquire security associations before re-sending a request. The default value is 30 seconds.
(net.inet.ip.ipsec-firstuse)
The number of seconds after a security association is first used before it expires. If set to less than or equal to zero, the security association will not expire because of this timer. The default value is 7200 seconds.
(net.inet.ip.ipsec-invalid-life)
The lifetime of embryonic Security Associations (SAs that key management daemons have reserved but not fully established yet) in seconds. If set to less than or equal to zero, embryonic SAs will not expire. The default value is 60.
(net.inet.ip.ipsec-pfs)
If set to any non-zero value, the kernel will ask the key management daemons to use Perfect Forward Secrecy when establishing IPsec Security Associations. Perfect Forward Secrecy makes IPsec Security Associations cryptographically distinct from each other, such that breaking the key for one such SA does not compromise any others. Requiring PFS for every security association significantly increases the computational load of isakmpd(8) exchanges. The default value is 1.
(net.inet.ip.ipsec-soft-allocs)
The number of IPsec flows that can use a security association before a message is sent by the kernel to key management for renegotiation of the security association. If set to less than or equal to zero, no message is sent to key management. The default value is 0.
(net.inet.ip.ipsec-soft-bytes)
The number of bytes that will be processed by a security association before a message is sent by the kernel to key management for renegotiation of the security association. If set to less than or equal to zero, no message is sent to key management. The default value is 0.
(net.inet.ip.ipsec-soft-firstuse)
The number of seconds after a security association is first used before a message is sent by the kernel to key management for renegotiation of the security association. If set to less than or equal to zero, no message is sent to key management. The default value is 3600 seconds.
(net.inet.ip.ipsec-soft-timeout)
The number of seconds after a security association is established before a message is sent by the kernel to key management for renegotiation of the security association. If set to less than or equal to zero, no message is sent to key management. The default value is 80000 seconds.
(net.inet.ip.ipsec-timeout)
The number of seconds after a security association is established before it will expire. If set to less than or equal to zero, the security association will not expire because of this timer. The default value is 86400 seconds.
(net.inet.ip.maxqueue)
Fragment flood protection. Sets the maximum number of unassembled IP fragments in the fragment queue.
(net.inet.ip.mforwarding)
If set to 1, then multicast forwarding is enabled for the host. The default is 0.
(net.inet.ip.mtudisc)
Returns 1 if Path MTU Discovery is enabled.
(net.inet.ip.mtudisctimeout)
Number of seconds in which a route added by the Path MTU Discovery engine will time out. When the route times out, the Path MTU Discovery engine will attempt to probe a larger path MTU.
(net.inet.ip.multipath)
This variable enables multipath routing for IPv4 addresses. If set to 0, only the first route selected will be used for a given destination regardless of how many routes exist in the routing table.
(net.inet.ip.portfirst)
Minimum registered port number for TCP/UDP port allocation. Registered ports can be used by ordinary user processes or programs executed by ordinary users. Cannot be less than 1024 or greater than 49151. Must be less than ip.portlast.
(net.inet.ip.porthifirst)
Minimum dynamic/private port number for TCP/UDP port allocation. Dynamic/private ports can be used by ordinary user processes or programs executed by ordinary users. Cannot be less than 49152 or greater than 65535. Must be less than ip.porthilast.
(net.inet.ip.porthilast)
Maximum dynamic/private port number for TCP/UDP port allocation. Dynamic/private ports can be used by ordinary user processes or programs executed by ordinary users. Cannot be less than 49152 or greater than 65535. Must be greater than ip.porthifirst.
(net.inet.ip.portlast)
Maximum registered port number for TCP/UDP port allocation. Registered ports can be used by ordinary user processes or programs executed by ordinary users. Cannot be less than 1024 or greater than 49151. Must be greater than ip.portfirst.
(net.inet.ip.redirect)
Returns 1 when ICMP redirects may be sent by the host. This option is ignored unless the host is routing IP packets, and should normally be enabled on all systems.
(net.inet.ip.sourceroute)
Returns 1 when forwarding of source-routed packets is enabled for the host. When running with a securelevel(7) greater than 0, this variable may not be changed.
(net.inet.ip.stats)
Returns the IP statistics in a struct ipstat.
(net.inet.ip.ttl)
The maximum time-to-live (hop count) value for an IP packet sourced by the system. This value applies to normal transport protocols, not to ICMP.
(net.inet.ipcomp.enable)
Enable the IPComp protocol. See ipcomp(4) for more information.
(net.inet.ipip.allow)
If set to 0, incoming IP-in-IP packets will not be processed. If set to any other value, processing will occur; furthermore, if set to 2, no checks for spoofing of loopback addresses will be done. This is useful only for debugging purposes, and should never be used in production systems.
(net.inet.tcp.ackonpush)
Returns 1 if TCP segments with the TH_PUSH flag set are being acknowledged immediately, otherwise 0.
(net.inet.tcp.baddynamic)
An array of in_port_t is returned specifying the bitmask of TCP ports between 512 and 1023 inclusive that should not be allocated dynamically by the kernel (i.e., they must be bound specifically by port number).
(net.inet.tcp.ecn)
Returns 1 if Explicit Congestion Notifications for TCP are enabled.
(net.inet.tcp.ident)
A struct tcp_ident_mapping specifying a local and foreign endpoint of a TCP socket is filled in with the effective and real UIDs of the process that owns the socket. If no such socket exists, then the effective and real UID values are both set to -1.
(net.inet.tcp.keepidle)
If the socket option SO_KEEPALIVE has been set on a socket, then this value specifies how much time in seconds a connection needs to be idle before keepalives are sent.
(net.inet.tcp.keepinittime)
Time in seconds to keep alive the initial SYN packet of a TCP handshake.
(net.inet.tcp.keepintvl)
Time in seconds after a keepalive probe is sent until, in the absence of any response, another probe is sent.
(net.inet.tcp.always_keepalive)
Act as if the option SO_KEEPALIVE was set on all TCP sockets.
(net.inet.tcp.mssdflt)
The maximum segment size that is used as default for non-local connections. The default value is 512.
(net.inet.tcp.reasslimit)
The maximum number of out-of-order TCP segments the system will store for reassembly.
(net.inet.tcp.rfc1323)
Returns 1 if RFC 1323 extensions to TCP are enabled.
(net.inet.tcp.rfc3390)
Returns 1 if the TCP Initial Window is increased to 4 * MSS or 4380 bytes, as specified in RFC 3390. Returns 2 if the TCP Initial Window is increased to 10 * MSS or 14600 bytes, as specified in RFC 6928.
(net.inet.tcp.rootonly)
An array of in_port_t is returned specifying the bitmask of TCP ports that can only be bound by processes with root euid. When running with a securelevel(7) greater than 0, this variable may not be changed.
(net.inet.tcp.rstppslimit)
This variable specifies the maximum number of outgoing TCP RST packets per second. TCP RST packets exceeding this value are subject to rate limitation and will not go out from the node. A negative value disables rate limitation.
(net.inet.tcp.sack)
Returns 1 if RFC 2018 Selective Acknowledgements are enabled.
(net.inet.tcp.stats)
Returns the TCP statistics in a struct tcpstat.
(net.inet.tcp.synbucketlimit)
The maximum number of entries allowed per hash bucket in the TCP SYN cache.
(net.inet.tcp.syncachelimit)
The maximum number of entries allowed in the TCP SYN cache.
(net.inet.tcp.synhashsize)
The number of buckets in the TCP SYN cache hash array. After the value is set, the actual size changes when the alternative SYN cache becomes empty and both SYN caches are swapped.
(net.inet.tcp.synuselimit)
The minimum number of times the hash function for the TCP SYN cache is used before it is reseeded.
(net.inet.tcp.tso)
If set to 0, disable TCP segmentation offload (TSO). If set to 1, TSO is enabled (the default).
(net.inet.udp.baddynamic)
Analogous to tcp.baddynamic but for UDP sockets.
(net.inet.udp.checksum)
Returns 1 when UDP checksums are being computed and checked. Disabling UDP checksums is strongly discouraged.
(net.inet.udp.recvspace)
Returns the default UDP receive buffer size.
(net.inet.udp.rootonly)
Analogous to tcp.rootonly but for UDP sockets.
(net.inet.udp.sendspace)
Returns the default UDP send buffer size.
(net.inet.udp.stats)
Returns the UDP statistics in a struct udpstat.
Get or set various global information about IPv6 (Internet Protocol version 6). The third level name is the protocol. The fourth level name is the variable name. The currently defined protocols and names are:
icmp6 errppslimit integer yes
icmp6 mtudisc_hiwat integer yes
icmp6 mtudisc_lowat integer yes
icmp6 nd6_debug integer yes
icmp6 nd6_delay integer yes
icmp6 nd6_maxnudhint integer yes
icmp6 nd6_mmaxtries integer yes
icmp6 nd6_umaxtries integer yes
icmp6 redirtimeout integer yes
ip6 auto_flowlabel integer yes
ip6 dad_count integer yes
ip6 dad_pending integer yes
ip6 defmcasthlim integer yes
ip6 forwarding integer yes
ip6 hdrnestlimit integer yes
ip6 hlim integer yes
ip6 log_interval integer yes
ip6 maxdynroutes integer yes
ip6 maxfragpackets integer yes
ip6 maxfrags integer yes
ip6 mforwarding integer yes
ip6 mtudisctimeout integer yes
ip6 multicast_mtudisc integer yes
ip6 multipath integer yes
ip6 neighborgcthresh integer yes
ip6 redirect integer yes
ip6 soiikey uint8_t[IP6_SOIIKEY_LEN] yes
ip6 use_deprecated integer yes

The variables are as follows:

(net.inet6.icmp6.errppslimit)
This variable specifies the maximum number of outgoing ICMPv6 error messages per second. ICMPv6 error messages exceeding this value are subject to rate limitation and will not go out from the node. A negative value will disable the rate limitation.

(net.inet6.icmp6.mtudisc_hiwat)
 
(net.inet6.icmp6.mtudisc_lowat)
These variables define the maximum number of routing table entries created due to path MTU discovery (preventing denial-of-service attacks with ICMPv6 too big messages). After IPv6 path MTU discovery happens, path MTU information is kept in the routing table. If the number of routing table entries exceeds this value, the kernel will not attempt to keep the path MTU information. icmp6.mtudisc_hiwat is used when we have verified ICMPv6 too big messages. icmp6.mtudisc_lowat is used when we have unverified ICMPv6 too big messages. Verification is performed by using address/port pairs kept in connected PCBs. A negative value disables the upper limit.

(net.inet6.icmp6.nd6_debug)
If set to non-zero, IPv6 neighbor discovery will generate debugging messages. The debug output is useful for diagnosing IPv6 interoperability issues. The flag must be set to 0 for normal operation.

(net.inet6.icmp6.nd6_delay)
This variable specifies the DELAY_FIRST_PROBE_TIME timing constant in IPv6 neighbor discovery specification (RFC 4861), in seconds.

(net.inet6.icmp6.nd6_maxnudhint)
IPv6 neighbor discovery permits upper layer protocols to supply reachability hints, to avoid unnecessary neighbor discovery exchanges. This variable defines the number of consecutive hints the neighbor discovery layer will take. For example, by setting the variable to 3, neighbor discovery will take a maximum of 3 consecutive hints. After receiving 3 hints, the neighbor discovery layer will instead perform the normal neighbor discovery process.

(net.inet6.icmp6.nd6_mmaxtries)
This variable specifies the MAX_MULTICAST_SOLICIT constant in IPv6 neighbor discovery specification (RFC 4861).

(net.inet6.icmp6.nd6_umaxtries)
This variable specifies the MAX_UNICAST_SOLICIT constant in IPv6 neighbor discovery specification (RFC 4861).

(net.inet6.icmp6.redirtimeout)
The variable specifies the lifetime of routing entries generated by incoming ICMPv6 redirects.

(net.inet6.ip6.auto_flowlabel)
On connected transport protocol packets, fill the IPv6 flowlabel field to help intermediate routers identify packet flows.

(net.inet6.ip6.dad_count)
This variable configures the number of IPv6 DAD (duplicated address detection) probe packets. These packets are generated when IPv6 interfaces are first brought up.

(net.inet6.ip6.dad_pending)
This variable displays the number of pending IPv6 DAD (duplicated address detection) before completion. It is used to make sure that DAD is completed before netstart(8) is executed.

(net.inet6.ip6.defmcasthlim)
The default hop limit value for an IPv6 multicast packet sourced by the node. This value applies to all the transport protocols on top of IPv6. Methods for overriding this value are documented in ip6(4).

(net.inet6.ip6.forwarding)
Returns 1 when IPv6 forwarding is enabled for the node, meaning that the node is acting as a router. Returns 0 when IPv6 forwarding is disabled for the node, meaning that the node is acting as a host. Note that IPv6 defines node behavior for the “router” and “host” cases quite differently, and changing this variable during operation may cause serious trouble. Hence, this variable should only be set at bootstrap time. As with IPv4, if forwarding is disabled then the destination address of incoming packets must match the IP address bound to the interface. If forwarding is enabled, the check is relaxed so that the destination IP address of incoming packets must match just any address bound to the host.

(net.inet6.ip6.hdrnestlimit)
The number of IPv6 extension headers permitted on incoming IPv6 packets. If set to 0, the node will accept as many extension headers as possible.

(net.inet6.ip6.hlim)
The default hop limit value for an IPv6 unicast packet sourced by the node. This value applies to all the transport protocols on top of IPv6. Methods for overriding this value are documented in ip6(4).

(net.inet6.ip6.log_interval)
This variable permits adjusting the amount of logs generated by the IPv6 packet forwarding engine. The value indicates the number of seconds of interval which must elapse between log output.

(net.inet6.ip6.maxdynroutes)
Maximum number of routes created by redirect. Set to negative to disable. The default value is 4096.

(net.inet6.ip6.maxfragpackets)
The maximum number of fragmented packets the node will accept. 0 means that the node will not accept any fragmented packets. -1 means that the node will accept as many fragmented packets as it receives. The flag is provided basically for avoiding possible DoS attacks.

(net.inet6.ip6.maxfrags)
The maximum number of fragments the node will accept. 0 means that the node will not accept any fragments. -1 means that the node will accept as many fragments as it receives. The flag is provided basically for avoiding possible DoS attacks.

(net.inet6.ip6.mforwarding)
If set to 1, then multicast forwarding is enabled for the host. The default is 0.

(net.inet6.ip6.multicast_mtudisc)
This variable controls generation of ICMPv6 Too Big messages when the machine is performing as an IPv6 multicast router. If set to 1, an ICMPv6 Too Big message will be generated for multicast packets which were too big to be forwarded. If set to 0, the ICMPv6 Too Big message will be suppressed.

(net.inet6.ip6.multipath)
This variable enables multipath routing for IPv6 addresses. If set to 0, only the first route selected will be used for a given destination regardless of how many routes exist in the routing table.

(net.inet6.ip6.mtudisctimeout)
Number of seconds in which a route added by the Path MTU Discovery engine will time out. When the route times out, the Path MTU Discovery engine will attempt to probe a larger path MTU.

(net.inet6.ip6.neighborgcthresh)
Maximum number of entries in neighbor cache. Set to negative to disable. The default value is 2048.

(net.inet6.ip6.redirect)
Returns 1 when ICMPv6 redirects may be sent by the node. This option is ignored unless the node is routing IP packets, and should normally be enabled on all systems.

(net.inet6.ip6.soiikey)
This variable configures the secret key for the RFC 7217 algorithm to calculate a persistent Semantically Opaque Interface Identifier (SOII) for IPv6 Stateless Address Autoconfiguration (SLAAC) addresses. It must be IP6_SOIIKEY_LEN bytes long.

(net.inet6.ip6.use_deprecated)
This variable controls the use of deprecated addresses, specified in RFC 4862 5.5.4.

We reuse net.inet.tcp and net.inet.udp for TCP/UDP over IPv6.

Get or set various global information about UNIX-domain protocol family. The third level name is the socket type. The fourth level name is the variable name. The currently defined socket types and names are:
stream recvspace integer yes
stream sendspace integer yes
dgram recvspace integer yes
dgram sendspace integer yes
seqpacket recvspace integer yes
seqpacket sendspace integer yes
inflight integer no
deferred integer no

The variables are as follows:

(net.unix.stream.recvspace)
Returns the default SOCK_STREAM receive buffer size.
(net.unix.stream.sendspace)
Returns the default SOCK_STREAM send buffer size.
(net.unix.dgram.recvspace)
Returns the default SOCK_DGRAM receive buffer size.
(net.unix.dgram.sendspace)
Returns the default SOCK_DGRAM send buffer size.
(net.unix.seqpacket.recvspace)
Returns the default SOCK_SEQPACKET receive buffer size.
(net.unix.seqpacket.sendspace)
Returns the default SOCK_SEQPACKET send buffer size.
(net.unix.inflight)
Returns the number of file descriptors inflight.
(net.unix.deferred)
Returns the number of file descriptors to be closed.
Return ipsec(4) database dumps. The second level name is PF_KEY_V2. The third level name selects the database as follows:

Security Association database (SADB).
IPsec flow database (SPD).
Get or set global information about MPLS (Multiprotocol Label Switching).
integer yes
integer yes
integer yes
(net.mpls.ttl)
Set or get the default TTL value which is used for MPLS (Shim) Header. The default is 255.
(net.mpls.mapttl_ip)
If set to 1, the TTL field is synchronized between the IP header and the MPLS label stack. If set to 0, the IP header TTL is not modified while passing through MPLS and the MPLS label stack is initialized with the MPLSCTL_DEFTTL. The default is 1.
(net.mpls.mapttl_ip6)
If set to 1, the TTL field is synchronized between the IPv6 header and the MPLS label stack. If set to 0, the IPv6 header TTL is not modified while passing through MPLS and the MPLS label stack is initialized with the MPLSCTL_DEFTTL. The default is 0.
(net.pipex)
Get or set global information about PIPEX.

The currently defined variable names are:

integer yes
If set to 1, enable PIPEX processing. The default is 0.

The string and integer information available for the CTL_VFS level is detailed below. The changeable column shows whether a process with appropriate privileges may change the value.

VFS generic info no
filesystem info no
This second level identifier requests generic information about the VFS layer. Within it, the following third level identifiers exist:
struct vfsconf no
int no
filesystem #
After finding the filesystem dependent vfc_typenum using VFS_GENERIC with VFS_CONF, it is possible to access filesystem dependent information.

Some filesystems may contain settings.

FFS
integer yes
integer yes
integer no
integer yes
integer yes
integer yes
integer yes
integer yes
integer yes
integer yes
integer yes
integer yes
integer yes
integer yes
integer yes
(vfs.ffs.dirhash_dirsize)
The minimum size of a directory, in bytes, before it is considered for hashing.
(vfs.ffs.dirhash_maxmem)
The maximum amount of memory, in bytes, to be used for storing directory hashes.
(vfs.ffs.dirhash_mem)
The amount of memory currently used by all directory hashes.
(vfs.ffs.max_softdeps)
Maximum structures before slowdowns.
(vfs.ffs.sd_blk_limit_hit)
Number of times block slowdown imposed.
(vfs.ffs.sd_blk_limit_push)
Number of times block limit neared.
(vfs.ffs.sd_dir_entry)
Bufs redirtied as dir entry cannot write.
(vfs.ffs.sd_direct_blk_ptrs)
Bufs redirtied as direct ptrs not written.
(vfs.ffs.sd_indir_blk_ptrs)
Bufs redirtied as indirect ptrs not written.
(vfs.ffs.sd_ino_limit_hit)
Number of times inode limit imposed.
(vfs.ffs.sd_ino_limit_push)
Number of times inode limit neared.
(vfs.ffs.sd_inode_bitmap)
Bufs redirtied as inode bitmap not written.
(vfs.ffs.sd_sync_limit_hit)
Number of synchronous slowdowns imposed.
(vfs.ffs.sd_tickdelay)
Ticks to pause during slowdown.
(vfs.ffs.sd_worklist_push)
Number of worklist cleanups.
NFS
struct nfsstats yes
int yes
(vfs.nfs.iothreads)
The number of I/O kernel threads for NFS clients. The default is 4; the maximum is 20.
FUSE
int no
int no
int no
int no
(vfs.fuse.fusefs_fbufs_in)
The number of inbound fusebufs.
(vfs.fuse.fusefs_open_devices)
The number of FUSE devices opened.
(vfs.fuse.fusefs_pool_pages)
The number of pages used for fusebuf memory.
(vfs.fuse.fusefs_fbufs_wait)
The number of fusebufs waiting for a response.

The string and integer information available for the CTL_VM level is detailed below. The changeable column shows whether a process with appropriate privileges may change the value.

integer yes
struct loadavg no
string yes
integer no
struct vmtotal no
integer no
struct psstrings no
swap encrypt values yes
integer no
struct uvmexp no
integer yes
integer yes
(vm.anonmin)
Percentage of physical memory available for pages which contain anonymous mapping.
(vm.loadavg)
Return the load average history. The returned data consists of a struct loadavg.
(vm.malloc_conf)
String of option flags for the malloc(3) family of functions which will be applied to all programs starting in the future. The string contains a maximum of 15 characters.
(vm.maxslp)
The time for a process to be blocked before being swappable, in seconds.
(vm.vmmeter)
Return the system wide virtual memory statistics. The returned data consists of a struct vmtotal.
(vm.nkmempages)
Number of pages in kmem_map.
(vm.psstrings)
Returns the address of the process struct ps_strings. The ps(1) program uses it to locate the argument and environment strings.
Contains statistics about swap encryption. The string and integer information available for the third level is detailed below.
integer no
integer no
integer yes
(vm.swapencrypt.keyscreated)
The number of encryption keys that have been randomly created. The swap partition is divided into sections of normally 512KB. Each section has its own encryption key.
(vm.swapencrypt.keysdeleted)
The number of encryption keys that have been deleted, thus effectively erasing the data that has been encrypted with them. Encryption keys are deleted when their reference counter reaches zero.
(vm.swapencrypt.enable)
Set to 1 to enable swap encryption for all processes. A 0 disables swap encryption. Turning this option on does not affect swap data already on the disk, but all newly written data will be encrypted. When swap encryption is turned on, automatic crash(8) dumps are disabled.
(vm.uspace)
The number of bytes allocated for each kernel stack.
(vm.uvmexp)
Contains statistics about the UVM memory management system.
(vm.vnodemin)
Percentage of physical memory available for pages which contain cached file data.
(vm.vtextmin)
Percentage of physical memory available for pages which contain cached executable data.

If the call to sysctl() is unsuccessful, -1 is returned and errno is set appropriately.

<sys/sysctl.h>
top level identifiers and second level kernel and hardware identifiers
<sys/socket.h>
second level network identifiers
<sys/gmon.h>
third level profiling identifiers
<uvm/uvmexp.h>
second level virtual memory identifiers
<uvm/uvm_swap_encrypt.h>
third level virtual memory identifiers
<net/if.h>
packet input/output queue identifiers
<net/pipex.h>
third level PIPEX identifiers
<netinet/in.h>
third and fourth level IPv4/v6 identifiers
<netinet/ip_divert.h>
fourth level divert identifiers
<netinet/icmp_var.h>
fourth level ICMP identifiers
<netinet/icmp6.h>
fourth level ICMPv6 identifiers
<netinet/tcp_var.h>
fourth level TCP identifiers
<netinet/udp_var.h>
fourth level UDP identifiers
<ddb/db_var.h>
second level ddb identifiers
<sys/mount.h>
second level vfs identifiers
<miscfs/fuse/fusefs.h>
third level fusefs identifiers
<nfs/nfs.h>
third level NFS identifiers
<ufs/ffs/ffs_extern.h>
third level FFS identifiers
<machine/cpu.h>
second level CPU identifiers

The following errors may be reported:

[]
The buffer name, oldp, newp, or length pointer oldlenp contains an invalid address.
[]
The name array is less than two or greater than CTL_MAXNAME.
[]
A non-null newp pointer is given and its specified length in newlen is too large or too small.
[]
The length pointed to by oldlenp is too short to hold the requested value.
[]
The mib specified does not exist, or exceeds the range that is possible.
[]
If the mib is a sparsely populated array, this error may be returned instead.
[]
The name array specifies an intermediate rather than terminal name.
[]
The name array specifies a value that is unknown.
[]
An attempt is made to set a read-only value.
[]
A process without appropriate privileges attempts to set a value.
[]
An attempt to change a value protected by the current kernel security level is made.
[]
No process could be found which corresponds to the given process ID.

pathconf(2), sysconf(3), ddb(4), sysctl.conf(5), securelevel(7), sysctl(8)

The sysctl() function first appeared in 4.4BSD.

October 30, 2024 OpenBSD-current