/net/sched/ |
D | Kconfig | 16 is a FIFO (first come, first served). If you say Y here, you will be 18 then be attached to different network devices. This is useful for 22 This code is considered to be experimental. 35 If you say Y here and to "/proc file system" below, you will be able 61 module will be called sch_cbq. 75 module will be called sch_htb. 84 module will be called sch_hfsc. 98 module will be called sch_atm. 107 module will be called sch_prio. 116 module will be called sch_multiq. [all …]
|
/net/caif/ |
D | Kconfig | 17 If you select to build it as module then CAIF_NETDEV also needs to be 38 Say Y if you will be using a CAIF based GPRS network device. 39 This can be either built-in or a loadable module, 41 also be a built-in. 50 This can be either built-in or a loadable module, 52 also be a built-in.
|
/net/mac80211/ |
D | Kconfig | 13 comment "CFG80211 needs to be enabled for MAC80211" 49 mac80211 will use. Note that this default can still be 89 possible, as drafts leave a number of identifiers to be defined after 120 need to be present in the binary and formatted at 142 If unsure, say N unless you expect to be finding problems 150 many debugging messages. It should not be selected 162 should not be selected on production systems as some 183 It should not be selected on production systems as some 194 be selected on production systems as those messages 206 It should not be selected on production systems as those [all …]
|
/net/ax25/ |
D | TODO | 2 listen_lock have to be bh-safe? 4 Do the netrom and rose locks have to be bh-safe? 6 A device might be deleted after lookup in the SIOCADDRT ioctl but before it's 9 Routes to a device being taken down might be deleted by ax25_rt_device_down
|
/net/l2tp/ |
D | Kconfig | 23 L2TPv3 allows other protocols as well as PPP to be carried 39 Support for l2tp directory in debugfs filesystem. This may be 46 will be called l2tp_debugfs. 81 must be enabled in firewalls. 84 will be called l2tp_ip. 94 The Layer 2 Tunneling Protocol, Version 3 (L2TPv3) can be 101 be used to assign an IP address to the local virtual 108 will be called l2tp_eth.
|
/net/dccp/ |
D | Kconfig | 11 congestion-controlled, unreliable datagrams. It should be suitable 16 module will be called dccp. 37 When compiling DCCP as a module, this debugging output can be toggled 51 Documentation on how to use DCCP connection probing can be found 57 module will be called dccp_probe.
|
/net/atm/ |
D | pppoatm.c | 395 struct atm_backend_ppp be; in pppoatm_assign_vcc() local 403 if (copy_from_user(&be, arg, sizeof be)) in pppoatm_assign_vcc() 405 if (be.encaps != PPPOATM_ENCAPS_AUTODETECT && in pppoatm_assign_vcc() 406 be.encaps != PPPOATM_ENCAPS_VC && be.encaps != PPPOATM_ENCAPS_LLC) in pppoatm_assign_vcc() 419 pvcc->encaps = (enum pppoatm_encaps) be.encaps; in pppoatm_assign_vcc() 423 (be.encaps == e_vc ? 0 : LLC_LEN); in pppoatm_assign_vcc()
|
D | br2684.c | 536 struct atm_backend_br2684 be; in br2684_regvcc() local 539 if (copy_from_user(&be, arg, sizeof be)) in br2684_regvcc() 552 net_dev = br2684_find_dev(&be.ifspec); in br2684_regvcc() 568 if (be.fcs_in != BR2684_FCSIN_NO || in br2684_regvcc() 569 be.fcs_out != BR2684_FCSOUT_NO || in br2684_regvcc() 570 be.fcs_auto || be.has_vpiid || be.send_padding || in br2684_regvcc() 571 (be.encaps != BR2684_ENCAPS_VC && in br2684_regvcc() 572 be.encaps != BR2684_ENCAPS_LLC) || in br2684_regvcc() 573 be.min_size != 0) { in br2684_regvcc() 577 pr_debug("vcc=%p, encaps=%d, brvcc=%p\n", atmvcc, be.encaps, brvcc); in br2684_regvcc() [all …]
|
/net/phonet/ |
D | Kconfig | 12 supported). It can also be used to control Nokia phones 13 from a Linux computer, although AT commands may be easier to use. 16 will be called phonet. If unsure, say N.
|
/net/sunrpc/ |
D | Kconfig | 21 choose M here: the module will be called xprtrdma. 42 daemon which may be found in the Linux nfs-utils package 44 Kerberos support should be installed. 53 that is be used by the 'rpcdebug' utility to turn on or off
|
/net/wimax/ |
D | Kconfig | 17 The different WiMAX drivers can be enabled in the menu entry 30 Select the maximum debug verbosity level to be compiled into 34 be selectively enabled for different parts of the code using
|
/net/bridge/ |
D | Kconfig | 11 If you say Y here, then your Linux box will be able to act as an 32 will be called bridge. 42 If you say Y here, then the Ethernet bridge will be able selectively 56 If you say Y here, then the Ethernet bridge will be able selectively
|
/net/tipc/ |
D | Kconfig | 17 can be inserted in and removed from the running kernel whenever you 18 want). The module will be called tipc. If you want to compile it 29 Specifies how many ports can be supported by a node.
|
/net/wireless/ |
D | Kconfig | 30 When built as a module it will be called cfg80211. 43 users should better be implemented with debugfs. 85 Some options may still be under heavy development and 87 cannot yet be verified. Regulatory verification may at 88 times only be possible until you have the final system 91 This option should only be enabled by system integrators
|
D | db.txt | 6 # You should be using CRDA instead. It is even better if you use the CRDA 12 # regulatory rules that cover the regulatory domains you will be using. Your
|
/net/decnet/ |
D | TODO | 20 [maybe this should be done at socket level... the control data in the 21 send/recvmsg() calls should simply be a vector of set/getsockopt() 24 o check MSG_CTRUNC is set where it should be.
|
/net/netfilter/ipvs/ |
D | Kconfig | 11 option must be enabled for at least one of the clustered computers 18 be used to choose which server the connection is directed to, 19 thus load balancing can be achieved among the servers. For more 54 Note the table size must be power of 2. The table size will be the 64 should be not far less than 200x200, it is good to set the table 224 When there is an idle server available, the job will be sent to 226 is no idle server available, the job will be sent to the server 245 needs to be large enough to effectively fit all the destinations 258 the IP address and port number of real servers cannot be sent to 271 connection state to be exported to the Netfilter framework
|
/net/dccp/ccids/ |
D | Kconfig | 8 The debugging output can additionally be toggled by setting the 19 be reasonably fair when competing for bandwidth with TCP-like flows, 44 The debugging output can additionally be toggled by setting the
|
/net/ipv4/ |
D | Kconfig | 22 will then be presented with several options that allow more precise 72 the Linux router will also be able to take the packet's source 74 of the packet can be used for routing decisions as well. 88 Normally, the routing tables specify a single action to be taken in 92 for those packets. The router considers all these paths to be of 102 received packets which look strange and could be evidence of an 127 net via NFS and you want the IP address of your computer to be 135 must be operating on your network. Read 144 net via NFS and you want the IP address of your computer to be 150 want to use BOOTP, a BOOTP server must be operating on your network. [all …]
|
/net/irda/ircomm/ |
D | Kconfig | 6 To compile it as modules, choose M here: the modules will be 10 infrared link. Thus you should be able to use application like PPP,
|
/net/irda/irlan/ |
D | Kconfig | 6 To compile it as a module, choose M here: the module will be called 10 The IrLAN protocol can be used to talk with infrared access points
|
/net/xfrm/ |
D | Kconfig | 28 one, two policies can be applied to the same packet at once. 29 Policy which lives shorter time in kernel should be a sub. 81 information can be found in the internet-draft
|
/net/vmw_vsock/ |
D | Kconfig | 16 will be called vsock. If unsure, say N. 28 will be called vmw_vsock_vmci_transport. If unsure, say N.
|
/net/can/ |
D | Kconfig | 37 interaction. The BCM can be 'programmed' via the BSD socket API and 50 CAN frames can be routed between CAN network interfaces (one hop). 51 They can be modified with AND/OR/XOR/SET operations as configured
|
/net/netfilter/ |
D | Kconfig | 44 Address Translation. It can also be used to enhance packet 65 This option enables security markings to be applied to 92 to be shown in procfs under net/netfilter/nf_conntrack. This 101 provide a notifier chain that can be used by other kernel code 139 tracking code will be able to do state tracking on DCCP connections. 152 tracking code will be able to do state tracking on SCTP connections. 162 tracking code will be able to do state tracking on UDP-Lite 174 on this machine or machines that will be MASQUERADED through this 450 "Use netfilter MARK value as routing key") and can also be used by 486 This option adds a 'AUDIT' target, which can be used to create [all …]
|