/net/sched/ |
D | Kconfig | 9 When the kernel has several packets to send out over a network 10 device, it has to decide which ones to send first, which ones to 11 delay, and which ones to drop. This is the job of the queueing 12 disciplines, several different algorithms for how to do this 17 able to choose from among several alternative algorithms which can 18 then be attached to different network devices. This is useful for 20 need a certain minimum data flow rate, or if you need to limit the 22 This code is considered to be experimental. 29 This Quality of Service (QoS) support will enable you to use 31 (RSVP) on your Linux router if you also say Y to the corresponding [all …]
|
/net/dccp/ |
D | options.c | 283 void dccp_encode_value_var(const u64 value, u8 *to, const u8 len) in dccp_encode_value_var() argument 286 *to++ = (value & 0xFF0000000000ull) >> 40; in dccp_encode_value_var() 288 *to++ = (value & 0xFF00000000ull) >> 32; in dccp_encode_value_var() 290 *to++ = (value & 0xFF000000) >> 24; in dccp_encode_value_var() 292 *to++ = (value & 0xFF0000) >> 16; in dccp_encode_value_var() 294 *to++ = (value & 0xFF00) >> 8; in dccp_encode_value_var() 296 *to++ = (value & 0xFF); in dccp_encode_value_var() 310 unsigned char *to; in dccp_insert_option() local 317 to = skb_push(skb, len + 2); in dccp_insert_option() 318 *to++ = option; in dccp_insert_option() [all …]
|
/net/ax25/ |
D | Kconfig | 9 If you want to connect your Linux box to an amateur radio, answer Y 10 here. You want to read <http://www.tapr.org/tapr/html/pkthome.html> 14 Note that the answer to this question won't directly affect the 15 kernel: saying N will just cause the configurator to skip all 26 radio. It is either used by itself for point-to-point links, or to 28 that connects your Linux box to your amateur radio. You can either 30 modem connecting your computer's serial port to your radio's 35 own drivers). If you say Y here, you also have to say Y to one of 38 Information about where to get supporting software for Linux amateur 39 radio as well as information about how to configure an AX.25 port is [all …]
|
D | TODO | 2 listen_lock have to be bh-safe? 4 Do the netrom and rose locks have to be bh-safe? 9 Routes to a device being taken down might be deleted by ax25_rt_device_down 12 The ax25_rt_find_route synopsys is pervert but I somehow had to deal with 17 Check socket locking when ax25_rcv is sending to raw sockets. In particular
|
/net/netfilter/ |
D | Kconfig | 24 and is also scheduled to replace the old syslog-based ipt_LOG 32 through your machine, in order to figure out how they are related 35 This is required to do Masquerading or other kinds of Network 36 Address Translation. It can also be used to enhance packet 69 `CONNMARK' target and `connmark' match. Similar to the mark value 78 This option enables security markings to be applied to 79 connections. Typically they are copied to connections from 81 connections to packets with the same target, with the packets 92 to get notified about changes in the connection tracking state. 103 tracking code will be able to do state tracking on DCCP connections. [all …]
|
/net/core/ |
D | dev_mcast.c | 118 int dev_mc_sync(struct net_device *to, struct net_device *from) in dev_mc_sync() argument 122 netif_addr_lock_bh(to); in dev_mc_sync() 123 err = __dev_addr_sync(&to->mc_list, &to->mc_count, in dev_mc_sync() 126 __dev_set_rx_mode(to); in dev_mc_sync() 127 netif_addr_unlock_bh(to); in dev_mc_sync() 144 void dev_mc_unsync(struct net_device *to, struct net_device *from) in dev_mc_unsync() argument 147 netif_addr_lock(to); in dev_mc_unsync() 149 __dev_addr_unsync(&to->mc_list, &to->mc_count, in dev_mc_unsync() 151 __dev_set_rx_mode(to); in dev_mc_unsync() 153 netif_addr_unlock(to); in dev_mc_unsync()
|
/net/ipx/ |
D | Kconfig | 10 want to access Novell NetWare file or print servers using the Linux 15 to do the former, you'll also have to say Y to "NCP file system 18 IPX is similar in scope to IP, while SPX, which runs on top of IPX, 19 is similar to TCP. 30 Unless you want to integrate your Linux box with a local Novell 38 useful to give an IPX "network" address to your Linux box as well 41 same address). The way this is done is to create a virtual internal 42 "network" inside your box and to assign an IPX address to this 43 network. Say Y here if you want to do this; read the IPX-HOWTO at 46 The full internal IPX network enables you to allocate sockets on [all …]
|
/net/netfilter/ipvs/ |
D | Kconfig | 11 that will take care of intercepting incoming connections to a 12 single IP address and scheduling them to real servers. 17 be used to choose which server the connection is directed to, 22 If you want to compile it in kernel, say Y. To compile it as a 31 Add IPv6 support to IPVS. This is incomplete and might be dangerous. 40 Say Y here if you want to get additional messages useful in 49 The IPVS connection hash table uses the chaining scheme to handle 55 value of 2 to the your input number power. The number to choose is 56 from 8 to 20, the default number is 12, which means the table size 59 to your virtual server application. It is good to set the table size [all …]
|
/net/x25/ |
D | Kconfig | 9 X.25 is a set of standardized network protocols, similar in scope to 10 frame relay; the one physical line from your box to the X.25 network 11 entry point can carry several logical point-to-point connections 12 (called "virtual circuits") to other computers connected to the X.25 13 network. Governments, banks, and other organizations tend to use it 14 to connect to each other or to form Wide Area Networks (WANs). Many 18 (say Y to "LAPB Data Link Driver" below if you want that). 26 One connects to an X.25 network either with a dedicated network card 29 to "X.25 async driver" below) or over Ethernet using an ordinary 30 Ethernet card and the LAPB over Ethernet (say Y to "LAPB Data Link
|
/net/ |
D | Kconfig | 10 when running on a stand-alone machine that isn't connected to any 19 For a general introduction to Linux networking, it is highly 20 recommended to read the NET-HOWTO, available from 39 Ethernets. It is highly recommended to say Y here (this will enlarge 41 system) use TCP/IP even if your machine is not connected to any 43 allows you to ping yourself (great fun, that!). 45 For an excellent introduction to Linux networking, please read the 49 If you say Y here and also to "/proc file system support" and 51 behavior of the TCP/IP code by writing to the (virtual) files in 65 bool "Only allow certain groups to create sockets" [all …]
|
/net/ipv4/ |
D | Kconfig | 9 intend to participate in the MBONE, a high bandwidth network on top 15 safe to say N. 20 If you intend to run your Linux box mostly as a router, i.e. as a 25 The answer to this question won't directly affect the kernel: 26 answering N will just cause the configurator to skip all the 30 forwarding in your kernel; you can do that by saying Y to "/proc 43 asymmetric routing (packets from you to a host take a different path 44 than packets from that host to you) or if you operate a non-routing 100 Normally, a router decides what to do with a received packet based 102 the Linux router will also be able to take the packet's source [all …]
|
/net/bridge/ |
D | br_forward.c | 59 static void __br_deliver(const struct net_bridge_port *to, struct sk_buff *skb) in __br_deliver() argument 61 skb->dev = to->dev; in __br_deliver() 66 static void __br_forward(const struct net_bridge_port *to, struct sk_buff *skb) in __br_forward() argument 76 skb->dev = to->dev; in __br_forward() 84 void br_deliver(const struct net_bridge_port *to, struct sk_buff *skb) in br_deliver() argument 86 if (should_deliver(to, skb)) { in br_deliver() 87 __br_deliver(to, skb); in br_deliver() 95 void br_forward(const struct net_bridge_port *to, struct sk_buff *skb) in br_forward() argument 97 if (should_deliver(to, skb)) { in br_forward() 98 __br_forward(to, skb); in br_forward()
|
D | Kconfig | 10 If you say Y here, then your Linux box will be able to act as an 12 is connected to will appear as one Ethernet to the participants. 13 Several such bridges can work together to create even larger 18 In order to use the Ethernet bridge, you'll need the bridge 25 iptables will then see the IP packets being bridged, so you need to
|
/net/ipv6/netfilter/ |
D | Kconfig | 14 through your machine, in order to figure out how they are related 19 which generalize ip_conntrack to support other layer 3 protocols. 29 This option adds a queue handler to the kernel for IPv6 30 packets which enables users to receive the filtered packets 53 for IPv6 use this, but connection tracking is going to follow. 54 Say 'Y' or 'M' here if you want to use either of those. 65 This module allows one to match AH packets. 83 frag matching allows you to match packets based on the fragmentation 92 This allows one to match packets based on the hop-by-hop 101 HL matching allows you to match packets based on the hop [all …]
|
/net/ipv4/netfilter/ |
D | Kconfig | 19 through your machine, in order to figure out how they are related 24 which generalize ip_conntrack to support other layer 3 protocols. 34 layer 3 dependant connection tracking. This is needed to keep 35 old programs that have not been adapted to the new names working. 43 Netfilter has the ability to queue packets to user space: the 44 netlink device can be used to access them using this driver. 59 etc) subsystems now use this: say `Y' or `M' here if you want to use 71 This option allows you to match what routing thinks of an address, 74 If you want to compile it as a module, say M here and read 81 This match extension allows you to match a range of SPIs [all …]
|
/net/irda/ |
D | Kconfig | 10 Say Y here if you want to build support for the IrDA (TM) protocols. 16 the file <file:Documentation/networking/irda.txt>. You also want to 20 If you want to exchange bits of data (vCal, vCard) with a PDA, you 21 will need to install some OBEX application, such as OpenObex : 40 Say Y here to support the connectionless Ultra IRDA protocol. 41 Ultra allows to exchange data over IrDA with really simple devices 53 Say Y here if you want IrLMP to cache the last LSAP used. This 63 Say Y here is you want IrLAP to send fast RR (Receive Ready) frames 72 the secondary station will not have to wait the max. turn around 73 time (usually 500ms) before it is allowed to transmit the next time. [all …]
|
/net/bluetooth/ |
D | Kconfig | 12 that typically extends up to 10 meters. More information about 17 HCI Device drivers (Interface to the hardware) 25 Say Y here to compile Bluetooth support into the kernel or say M to 29 utilities like hciconfig and hcid. These utilities and updates to 41 Say Y here to compile L2CAP support into the kernel or say M to 51 Say Y here to compile SCO support into the kernel or say M to
|
/net/sctp/ |
D | Kconfig | 21 services to its users: 24 -- data fragmentation to conform to discovered path MTU size, 46 this option to gather detailed trace information 63 HMAC algorithm to be used during association initialization. It 64 is strongly recommended to use HMAC-SHA1 or HMAC-MD5. See 66 to make usable by SCTP. 72 establishment. It is advised to use either HMAC-MD5 or HMAC-SHA1. 78 is advised to use either HMAC-MD5 or HMAC-SHA1. 84 advised to use either HMAC-MD5 or HMAC-SHA1.
|
/net/tipc/ |
D | Kconfig | 18 want). The module will be called tipc. If you want to compile it 30 for TIPC. Most users do not need to bother, so if 41 Default is 3 zones in a network; setting this to higher 55 Default is 1; setting this to smaller value might save 56 some memory, setting it to higher 67 Setting this to a smaller value saves some memory, 68 setting it to higher allows more nodes. 80 Setting this to a smaller value saves some memory, 81 setting it to higher allows more nodes. 91 Setting this to a smaller value saves some memory, [all …]
|
/net/wimax/ |
D | Kconfig | 4 # Note the ugly 'depends on' on WIMAX: that disallows RFKILL to be a 5 # module if WIMAX is to be linked in. The WiMAX code is done in such a 7 # case an embedded system wants to rip it out. 10 # support to inject events coming from hw rfkill switches. That 11 # dependency could be killed if input.h provided appropiate means to 23 Select to configure support for devices that provide 35 If unsure, it is safe to select M (module). 43 Select the maximum debug verbosity level to be compiled into
|
/net/decnet/ |
D | Kconfig | 10 to those which run over TCP/IP. 12 To find some tools to use with the kernel layer support, please 19 Be sure to say Y to "/proc file system support" and "Sysctl support" 20 below when using DECnet, since you will need sysctl support to aid 34 do say Y here, then make sure that you also say Y to "Kernel/User 36 filtering". The first two are required to allow configuration via 40 to work.
|
/net/atm/ |
D | Kconfig | 13 In order to participate in an ATM network, your Linux box needs an 14 ATM networking card. If you have that, say Y here and to the driver 17 Note that you need a set of user-space programs to actually make use 26 ATMARP. If you want to communication with other IP hosts on your ATM 27 network, you will typically either say Y here or to "LAN Emulation 35 cannot be reached because there is no VC to it in the kernel's 37 briefly removed during revalidation. If you say Y here, packets to 47 ELAN and Ethernet segments. You need LANE if you want to try MPOA. 62 ATM PVCs can carry ethernet PDUs according to RFC2684 (formerly 1483) 71 This is an experimental mechanism for users who need to terminate a
|
/net/xfrm/ |
D | Kconfig | 23 one, two policies can be applied to the same packet at once. 32 A feature to update locator(s) of a given IPsec security 35 where mobile nodes change their attachment point to the Internet. 59 PF_KEYv2 socket family, compatible to KAME ones. 60 They are required if you are going to use IPsec tools ported 70 Add a PF_KEY MIGRATE message to PF_KEYv2 socket family. 71 The PF_KEY MIGRATE message is used to dynamically update 75 change their attachment point to the Internet. Detail
|
/net/wireless/ |
D | Kconfig | 9 You can enable this if you want to debug regulatory changes. 32 temporarily as an option to help prevent immediate issues 33 due to the switch to the new regulatory framework which 43 It is important to note though that if you *do* have CRDA present 44 and if this option is enabled CRDA *will* be called to update the 47 mainly exists to leave around for a kernel release some old static 48 regulatory domains that were defined and to keep around the old 56 module parameter and cannot port it to use the new userspace
|
/net/dccp/ccids/ |
D | Kconfig | 10 ccid2_debug parameter to 0 or 1. 19 rate-controlled congestion control mechanism. TFRC is designed to 46 ccid3_debug parameter to 0 or 1. 63 This option enables to set a higher lower bound for the nofeedback 69 * 16-20ms to match the typical multimedia inter-frame interval 71 * 1000ms corresponds to the lower TCP RTO bound (RFC 2988, 2.4) 74 efficient DCCP implementations, and a small value to avoid disrupting 77 The purpose of the nofeedback timer is to slow DCCP down when there
|