/net/bridge/netfilter/ |
D | Kconfig | 27 To compile it as a module, choose M here. If unsure, say N. 36 To compile it as a module, choose M here. If unsure, say N. 45 To compile it as a module, choose M here. If unsure, say N. 54 To compile it as a module, choose M here. If unsure, say N. 63 To compile it as a module, choose M here. If unsure, say N. 71 To compile it as a module, choose M here. If unsure, say N. 79 To compile it as a module, choose M here. If unsure, say N. 88 To compile it as a module, choose M here. If unsure, say N. 97 If you want to compile it as a module, say M here and read 108 To compile it as a module, choose M here. If unsure, say N. [all …]
|
/net/netfilter/ipvs/ |
D | Kconfig | 23 If you want to compile it in kernel, say Y. To compile it as a 58 performance on it. You can adapt the table size yourself, according 64 should be not far less than 200x200, it is good to set the table 119 If you want to compile it in kernel, say Y. To compile it as a 132 If you want to compile it in kernel, say Y. To compile it as a 142 If you want to compile it in kernel, say Y. To compile it as a 152 If you want to compile it in kernel, say Y. To compile it as a 166 If you want to compile it in kernel, say Y. To compile it as a 179 it picks up a least-connection node in the cluster and adds it 184 If you want to compile it in kernel, say Y. To compile it as a [all …]
|
/net/netfilter/ipset/ |
D | Kconfig | 11 To compile it as a module, choose M here. If unsure, say N. 34 To compile it as a module, choose M here. If unsure, say N. 43 To compile it as a module, choose M here. If unsure, say N. 52 To compile it as a module, choose M here. If unsure, say N. 62 To compile it as a module, choose M here. If unsure, say N. 71 To compile it as a module, choose M here. If unsure, say N. 81 To compile it as a module, choose M here. If unsure, say N. 91 To compile it as a module, choose M here. If unsure, say N. 100 To compile it as a module, choose M here. If unsure, say N. 110 To compile it as a module, choose M here. If unsure, say N. [all …]
|
/net/ipv6/netfilter/ |
D | Kconfig | 26 To compile it as a module, choose M here. If unsure, say N. 39 To compile it as a module, choose M here. If unsure, say N. 50 To compile it as a module, choose M here. If unsure, say N. 60 To compile it as a module, choose M here. If unsure, say N. 69 To compile it as a module, choose M here. If unsure, say N. 78 To compile it as a module, choose M here. If unsure, say N. 96 To compile it as a module, choose M here. If unsure, say N. 104 To compile it as a module, choose M here. If unsure, say N. 114 To compile it as a module, choose M here. If unsure, say N. 124 To compile it as a module, choose M here. If unsure, say N. [all …]
|
/net/netfilter/ |
D | Kconfig | 47 To compile it as a module, choose M here. If unsure, say N. 122 the flow-stop time (once it has been destroyed) via Connection 154 If you want to compile it as a module, say M here and read 165 To compile it as a module, choose M here. If unsure, say N. 180 To compile it as a module, choose M here. If unsure, say N. 194 To compile it as a module, choose M here. If unsure, say N. 202 important VoIP protocols, it is widely used by voice hardware and 214 To compile it as a module, choose M here. If unsure, say N. 229 To compile it as a module, choose M here. If unsure, say N. 251 To compile it as a module, choose M here. If unsure, say N. [all …]
|
/net/ipv4/netfilter/ |
D | Kconfig | 26 To compile it as a module, choose M here. If unsure, say N. 49 To compile it as a module, choose M here. If unsure, say N. 61 To compile it as a module, choose M here. If unsure, say N. 80 To compile it as a module, choose M here. If unsure, say N. 101 To compile it as a module, choose M here. If unsure, say N. 112 To compile it as a module, choose M here. If unsure, say N. 131 To compile it as a module, choose M here. If unsure, say N. 144 To compile it as a module, choose M here. If unsure, say N. 158 To compile it as a module, choose M here. If unsure, say N. 188 SNMP payloads. In conjunction with NAT, it allows a network [all …]
|
/net/ipv6/ |
D | ip6mr.c | 347 struct ipmr_mfc_iter *it, loff_t pos) in ipmr_mfc_seq_idx() argument 349 struct mr6_table *mrt = it->mrt; in ipmr_mfc_seq_idx() 353 for (it->ct = 0; it->ct < MFC6_LINES; it->ct++) { in ipmr_mfc_seq_idx() 354 it->cache = &mrt->mfc6_cache_array[it->ct]; in ipmr_mfc_seq_idx() 355 list_for_each_entry(mfc, it->cache, list) in ipmr_mfc_seq_idx() 362 it->cache = &mrt->mfc6_unres_queue; in ipmr_mfc_seq_idx() 363 list_for_each_entry(mfc, it->cache, list) in ipmr_mfc_seq_idx() 368 it->cache = NULL; in ipmr_mfc_seq_idx() 484 struct ipmr_mfc_iter *it = seq->private; in ipmr_mfc_seq_start() local 492 it->mrt = mrt; in ipmr_mfc_seq_start() [all …]
|
D | Kconfig | 5 # IPv6 as module will cause a CRASH if you try to unload it 164 another protocol and sending it over a channel that understands the 178 deploy IPv6 unicast service to IPv4 sites to which it provides 179 customer premise equipment. Like 6to4, it utilizes stateless IPv6 in 208 another protocol and sending it over a channel that understands the
|
/net/ipv4/ |
D | ipmr.c | 2525 struct ipmr_mfc_iter *it, loff_t pos) in ipmr_mfc_seq_idx() argument 2527 struct mr_table *mrt = it->mrt; in ipmr_mfc_seq_idx() 2531 for (it->ct = 0; it->ct < MFC_LINES; it->ct++) { in ipmr_mfc_seq_idx() 2532 it->cache = &mrt->mfc_cache_array[it->ct]; in ipmr_mfc_seq_idx() 2533 list_for_each_entry_rcu(mfc, it->cache, list) in ipmr_mfc_seq_idx() 2540 it->cache = &mrt->mfc_unres_queue; in ipmr_mfc_seq_idx() 2541 list_for_each_entry(mfc, it->cache, list) in ipmr_mfc_seq_idx() 2546 it->cache = NULL; in ipmr_mfc_seq_idx() 2553 struct ipmr_mfc_iter *it = seq->private; in ipmr_mfc_seq_start() local 2561 it->mrt = mrt; in ipmr_mfc_seq_start() [all …]
|
D | Kconfig | 14 <file:Documentation/networking/multicast.txt>. For most people, it's 41 arriving on. This has security advantages because it prevents the 42 so-called IP spoofing, however it can pose problems if you use 52 Note that some distributions enable it in startup scripts. 90 however, it becomes possible to attach several actions to a packet 172 another protocol and sending it over a channel that understands the 176 appear on a different network than it physically is, or to use 200 another protocol and sending it over a channel that understands the 229 about it, you don't need it. 251 because Cisco supports it. You need special software to use it [all …]
|
/net/tipc/ |
D | Kconfig | 11 originates from Ericsson where it has been used in carrier grade 18 want). The module will be called tipc. If you want to compile it 33 setting it to higher allows for more ports.
|
/net/irda/ircomm/ |
D | Kconfig | 6 To compile it as modules, choose M here: the modules will be 8 IrCOMM implements serial port emulation, and makes it possible to
|
/net/ipx/ |
D | Kconfig | 9 used for local networks of Windows machines. You need it if you 37 Every IPX network has an address that identifies it. Sometimes it is 40 IPX networks: it will then be accessible from everywhere using the
|
/net/caif/ |
D | Kconfig | 17 If you select to build it as module then CAIF_NETDEV also needs to be 40 If you select to build it as a built-in then the main CAIF device must 51 If you select to build it as a built-in then the main CAIF device must
|
/net/irda/irlan/ |
D | Kconfig | 6 To compile it as a module, choose M here: the module will be called 7 irlan. IrLAN emulates an Ethernet and makes it possible to put up
|
/net/irda/irnet/ |
D | Kconfig | 6 To compile it as a module, choose M here: the module will be 12 can use it between Linux machine or with W2k.
|
/net/ax25/ |
D | TODO | 6 A device might be deleted after lookup in the SIOCADDRT ioctl but before it's 13 the race caused by the static variable in it's previous implementation.
|
/net/wimax/ |
D | Kconfig | 22 If unsure, it is safe to select M (module). 39 It is recommended that it is left at 8.
|
/net/openvswitch/ |
D | Kconfig | 10 expected in a traditional hardware switch, it enables fine-grained 20 translate it into packet processing rules.
|
/net/ |
D | Kconfig | 20 For a general introduction to Linux networking, it is highly 37 This option makes it possible to send different netlink messages 123 filter", which means that it can reject individual network packets 126 bothersome to set up; it inspects the network traffic much more 127 closely, modifies it and has knowledge about the higher level 138 the outside, your box can "masquerade" as that computer, i.e. it 140 modifies the packets to make it look like they came from the 285 what was just said, you don't need it: say N. 300 what was just said, you don't need it: say N.
|
/net/decnet/ |
D | TODO | 24 o check MSG_CTRUNC is set where it should be. 27 it into a small library of routines. [probably a project for 2.7.xx]
|
/net/irda/ |
D | Kconfig | 73 time (usually 500ms) before it is allowed to transmit the next time. 93 If unsure, say Y (since it makes it easier to find the bugs).
|
/net/batman-adv/ |
D | Kconfig | 37 this option you can safely remove it and save some space. 51 can safely disable it and save some space.
|
/net/wireless/ |
D | Kconfig | 30 When built as a module it will be called cfg80211. 56 For example, when a driver reports that it was disconnected 61 on it (or mac80211).
|
/net/nfc/nci/ |
D | Kconfig | 10 compile it as module (nci).
|