Home
last modified time | relevance | path

Searched refs:it (Results 1 – 25 of 43) sorted by relevance

12

/net/bridge/netfilter/
DKconfig27 To compile it as a module, choose M here. If unsure, say N.
36 To compile it as a module, choose M here. If unsure, say N.
45 To compile it as a module, choose M here. If unsure, say N.
54 To compile it as a module, choose M here. If unsure, say N.
63 To compile it as a module, choose M here. If unsure, say N.
71 To compile it as a module, choose M here. If unsure, say N.
79 To compile it as a module, choose M here. If unsure, say N.
88 To compile it as a module, choose M here. If unsure, say N.
97 If you want to compile it as a module, say M here and read
108 To compile it as a module, choose M here. If unsure, say N.
[all …]
/net/netfilter/ipvs/
DKconfig23 If you want to compile it in kernel, say Y. To compile it as a
58 performance on it. You can adapt the table size yourself, according
64 should be not far less than 200x200, it is good to set the table
119 If you want to compile it in kernel, say Y. To compile it as a
132 If you want to compile it in kernel, say Y. To compile it as a
142 If you want to compile it in kernel, say Y. To compile it as a
152 If you want to compile it in kernel, say Y. To compile it as a
166 If you want to compile it in kernel, say Y. To compile it as a
179 it picks up a least-connection node in the cluster and adds it
184 If you want to compile it in kernel, say Y. To compile it as a
[all …]
/net/netfilter/ipset/
DKconfig11 To compile it as a module, choose M here. If unsure, say N.
34 To compile it as a module, choose M here. If unsure, say N.
43 To compile it as a module, choose M here. If unsure, say N.
52 To compile it as a module, choose M here. If unsure, say N.
62 To compile it as a module, choose M here. If unsure, say N.
71 To compile it as a module, choose M here. If unsure, say N.
81 To compile it as a module, choose M here. If unsure, say N.
91 To compile it as a module, choose M here. If unsure, say N.
100 To compile it as a module, choose M here. If unsure, say N.
110 To compile it as a module, choose M here. If unsure, say N.
[all …]
/net/ipv6/netfilter/
DKconfig26 To compile it as a module, choose M here. If unsure, say N.
39 To compile it as a module, choose M here. If unsure, say N.
50 To compile it as a module, choose M here. If unsure, say N.
60 To compile it as a module, choose M here. If unsure, say N.
69 To compile it as a module, choose M here. If unsure, say N.
78 To compile it as a module, choose M here. If unsure, say N.
96 To compile it as a module, choose M here. If unsure, say N.
104 To compile it as a module, choose M here. If unsure, say N.
114 To compile it as a module, choose M here. If unsure, say N.
124 To compile it as a module, choose M here. If unsure, say N.
[all …]
/net/netfilter/
DKconfig47 To compile it as a module, choose M here. If unsure, say N.
122 the flow-stop time (once it has been destroyed) via Connection
154 If you want to compile it as a module, say M here and read
165 To compile it as a module, choose M here. If unsure, say N.
180 To compile it as a module, choose M here. If unsure, say N.
194 To compile it as a module, choose M here. If unsure, say N.
202 important VoIP protocols, it is widely used by voice hardware and
214 To compile it as a module, choose M here. If unsure, say N.
229 To compile it as a module, choose M here. If unsure, say N.
251 To compile it as a module, choose M here. If unsure, say N.
[all …]
/net/ipv4/netfilter/
DKconfig26 To compile it as a module, choose M here. If unsure, say N.
49 To compile it as a module, choose M here. If unsure, say N.
61 To compile it as a module, choose M here. If unsure, say N.
80 To compile it as a module, choose M here. If unsure, say N.
101 To compile it as a module, choose M here. If unsure, say N.
112 To compile it as a module, choose M here. If unsure, say N.
131 To compile it as a module, choose M here. If unsure, say N.
144 To compile it as a module, choose M here. If unsure, say N.
158 To compile it as a module, choose M here. If unsure, say N.
188 SNMP payloads. In conjunction with NAT, it allows a network
[all …]
/net/ipv6/
Dip6mr.c347 struct ipmr_mfc_iter *it, loff_t pos) in ipmr_mfc_seq_idx() argument
349 struct mr6_table *mrt = it->mrt; in ipmr_mfc_seq_idx()
353 for (it->ct = 0; it->ct < MFC6_LINES; it->ct++) { in ipmr_mfc_seq_idx()
354 it->cache = &mrt->mfc6_cache_array[it->ct]; in ipmr_mfc_seq_idx()
355 list_for_each_entry(mfc, it->cache, list) in ipmr_mfc_seq_idx()
362 it->cache = &mrt->mfc6_unres_queue; in ipmr_mfc_seq_idx()
363 list_for_each_entry(mfc, it->cache, list) in ipmr_mfc_seq_idx()
368 it->cache = NULL; in ipmr_mfc_seq_idx()
484 struct ipmr_mfc_iter *it = seq->private; in ipmr_mfc_seq_start() local
492 it->mrt = mrt; in ipmr_mfc_seq_start()
[all …]
DKconfig5 # IPv6 as module will cause a CRASH if you try to unload it
164 another protocol and sending it over a channel that understands the
178 deploy IPv6 unicast service to IPv4 sites to which it provides
179 customer premise equipment. Like 6to4, it utilizes stateless IPv6 in
208 another protocol and sending it over a channel that understands the
/net/ipv4/
Dipmr.c2525 struct ipmr_mfc_iter *it, loff_t pos) in ipmr_mfc_seq_idx() argument
2527 struct mr_table *mrt = it->mrt; in ipmr_mfc_seq_idx()
2531 for (it->ct = 0; it->ct < MFC_LINES; it->ct++) { in ipmr_mfc_seq_idx()
2532 it->cache = &mrt->mfc_cache_array[it->ct]; in ipmr_mfc_seq_idx()
2533 list_for_each_entry_rcu(mfc, it->cache, list) in ipmr_mfc_seq_idx()
2540 it->cache = &mrt->mfc_unres_queue; in ipmr_mfc_seq_idx()
2541 list_for_each_entry(mfc, it->cache, list) in ipmr_mfc_seq_idx()
2546 it->cache = NULL; in ipmr_mfc_seq_idx()
2553 struct ipmr_mfc_iter *it = seq->private; in ipmr_mfc_seq_start() local
2561 it->mrt = mrt; in ipmr_mfc_seq_start()
[all …]
DKconfig14 <file:Documentation/networking/multicast.txt>. For most people, it's
41 arriving on. This has security advantages because it prevents the
42 so-called IP spoofing, however it can pose problems if you use
52 Note that some distributions enable it in startup scripts.
90 however, it becomes possible to attach several actions to a packet
172 another protocol and sending it over a channel that understands the
176 appear on a different network than it physically is, or to use
200 another protocol and sending it over a channel that understands the
229 about it, you don't need it.
251 because Cisco supports it. You need special software to use it
[all …]
/net/tipc/
DKconfig11 originates from Ericsson where it has been used in carrier grade
18 want). The module will be called tipc. If you want to compile it
33 setting it to higher allows for more ports.
/net/irda/ircomm/
DKconfig6 To compile it as modules, choose M here: the modules will be
8 IrCOMM implements serial port emulation, and makes it possible to
/net/ipx/
DKconfig9 used for local networks of Windows machines. You need it if you
37 Every IPX network has an address that identifies it. Sometimes it is
40 IPX networks: it will then be accessible from everywhere using the
/net/caif/
DKconfig17 If you select to build it as module then CAIF_NETDEV also needs to be
40 If you select to build it as a built-in then the main CAIF device must
51 If you select to build it as a built-in then the main CAIF device must
/net/irda/irlan/
DKconfig6 To compile it as a module, choose M here: the module will be called
7 irlan. IrLAN emulates an Ethernet and makes it possible to put up
/net/irda/irnet/
DKconfig6 To compile it as a module, choose M here: the module will be
12 can use it between Linux machine or with W2k.
/net/ax25/
DTODO6 A device might be deleted after lookup in the SIOCADDRT ioctl but before it's
13 the race caused by the static variable in it's previous implementation.
/net/wimax/
DKconfig22 If unsure, it is safe to select M (module).
39 It is recommended that it is left at 8.
/net/openvswitch/
DKconfig10 expected in a traditional hardware switch, it enables fine-grained
20 translate it into packet processing rules.
/net/
DKconfig20 For a general introduction to Linux networking, it is highly
37 This option makes it possible to send different netlink messages
123 filter", which means that it can reject individual network packets
126 bothersome to set up; it inspects the network traffic much more
127 closely, modifies it and has knowledge about the higher level
138 the outside, your box can "masquerade" as that computer, i.e. it
140 modifies the packets to make it look like they came from the
285 what was just said, you don't need it: say N.
300 what was just said, you don't need it: say N.
/net/decnet/
DTODO24 o check MSG_CTRUNC is set where it should be.
27 it into a small library of routines. [probably a project for 2.7.xx]
/net/irda/
DKconfig73 time (usually 500ms) before it is allowed to transmit the next time.
93 If unsure, say Y (since it makes it easier to find the bugs).
/net/batman-adv/
DKconfig37 this option you can safely remove it and save some space.
51 can safely disable it and save some space.
/net/wireless/
DKconfig30 When built as a module it will be called cfg80211.
56 For example, when a driver reports that it was disconnected
61 on it (or mac80211).
/net/nfc/nci/
DKconfig10 compile it as module (nci).

12