Home
last modified time | relevance | path

Searched refs:be (Results 1 – 25 of 57) sorted by relevance

123

/net/netfilter/
Dnft_set_bitmap.c96 struct nft_bitmap_elem *be; in nft_bitmap_elem_find() local
98 list_for_each_entry_rcu(be, &priv->list, head) { in nft_bitmap_elem_find()
99 if (memcmp(nft_set_ext_key(&be->ext), in nft_bitmap_elem_find()
101 !nft_set_elem_active(&be->ext, genmask)) in nft_bitmap_elem_find()
104 return be; in nft_bitmap_elem_find()
114 struct nft_bitmap_elem *new = elem->priv, *be; in nft_bitmap_insert() local
118 be = nft_bitmap_elem_find(set, new, genmask); in nft_bitmap_insert()
119 if (be) { in nft_bitmap_insert()
120 *ext = &be->ext; in nft_bitmap_insert()
137 struct nft_bitmap_elem *be = elem->priv; in nft_bitmap_remove() local
[all …]
/net/sched/
DKconfig16 is a FIFO (first come, first served). If you say Y here, you will be
18 then be attached to different network devices. This is useful for
22 This code is considered to be experimental.
36 If you say Y here and to "/proc file system" below, you will be able
62 module will be called sch_cbq.
76 module will be called sch_htb.
85 module will be called sch_hfsc.
99 module will be called sch_atm.
108 module will be called sch_prio.
117 module will be called sch_multiq.
[all …]
/net/mac80211/
DKconfig15 comment "CFG80211 needs to be enabled for MAC80211"
50 mac80211 will use. Note that this default can still be
81 possible, as drafts leave a number of identifiers to be defined after
112 need to be present in the binary and formatted at
134 If unsure, say N unless you expect to be finding problems
142 many debugging messages. It should not be selected
154 should not be selected on production systems as some
175 It should not be selected on production systems as some
186 be selected on production systems as those messages
197 be selected on production systems as those messages
[all …]
/net/caif/
DKconfig17 If you select to build it as module then CAIF_NETDEV also needs to be
38 Say Y if you will be using a CAIF based GPRS network device.
39 This can be either built-in or a loadable module,
41 also be a built-in.
50 This can be either built-in or a loadable module,
52 also be a built-in.
/net/l2tp/
DKconfig24 L2TPv3 allows other protocols as well as PPP to be carried
40 Support for l2tp directory in debugfs filesystem. This may be
47 will be called l2tp_debugfs.
82 must be enabled in firewalls.
85 will be called l2tp_ip.
95 The Layer 2 Tunneling Protocol, Version 3 (L2TPv3) can be
102 be used to assign an IP address to the local virtual
109 will be called l2tp_eth.
/net/ax25/
DTODO2 listen_lock have to be bh-safe?
4 Do the netrom and rose locks have to be bh-safe?
6 A device might be deleted after lookup in the SIOCADDRT ioctl but before it's
9 Routes to a device being taken down might be deleted by ax25_rt_device_down
/net/dccp/
DKconfig11 congestion-controlled, unreliable datagrams. It should be suitable
16 module will be called dccp.
37 When compiling DCCP as a module, this debugging output can be toggled
51 Documentation on how to use DCCP connection probing can be found
57 module will be called dccp_probe.
/net/vmw_vsock/
DKconfig16 will be called vsock. If unsure, say N.
28 will be called vmw_vsock_vmci_transport. If unsure, say N.
40 To compile this driver as a module, choose M here: the module will be
47 the virtio_vsock. The module will be called
59 To compile this driver as a module, choose M here: the module will be
/net/atm/
Dpppoatm.c394 struct atm_backend_ppp be; in pppoatm_assign_vcc() local
402 if (copy_from_user(&be, arg, sizeof be)) in pppoatm_assign_vcc()
404 if (be.encaps != PPPOATM_ENCAPS_AUTODETECT && in pppoatm_assign_vcc()
405 be.encaps != PPPOATM_ENCAPS_VC && be.encaps != PPPOATM_ENCAPS_LLC) in pppoatm_assign_vcc()
418 pvcc->encaps = (enum pppoatm_encaps) be.encaps; in pppoatm_assign_vcc()
422 (be.encaps == e_vc ? 0 : LLC_LEN); in pppoatm_assign_vcc()
Dbr2684.c535 struct atm_backend_br2684 be; in br2684_regvcc() local
538 if (copy_from_user(&be, arg, sizeof be)) in br2684_regvcc()
551 net_dev = br2684_find_dev(&be.ifspec); in br2684_regvcc()
567 if (be.fcs_in != BR2684_FCSIN_NO || in br2684_regvcc()
568 be.fcs_out != BR2684_FCSOUT_NO || in br2684_regvcc()
569 be.fcs_auto || be.has_vpiid || be.send_padding || in br2684_regvcc()
570 (be.encaps != BR2684_ENCAPS_VC && in br2684_regvcc()
571 be.encaps != BR2684_ENCAPS_LLC) || in br2684_regvcc()
572 be.min_size != 0) { in br2684_regvcc()
576 pr_debug("vcc=%p, encaps=%d, brvcc=%p\n", atmvcc, be.encaps, brvcc); in br2684_regvcc()
[all …]
/net/wireless/
DKconfig30 When built as a module it will be called cfg80211.
43 users should better be implemented with debugfs.
72 Some options may still be under heavy development and
74 cannot yet be verified. Regulatory verification may at
75 times only be possible until you have the final system
78 This option should only be enabled by system integrators
111 to be an authorized master, i.e., with radar detection support and DFS
153 the parser will be upkept with the latest wireless-regdb updates but
154 older wireless-regdb formats will be ignored. The parser may later
155 be replaced to avoid issues with conflicts on versions of
[all …]
Ddb.txt6 # You should be using CRDA instead. It is even better if you use the CRDA
12 # regulatory rules that cover the regulatory domains you will be using. Your
/net/phonet/
DKconfig12 supported). It can also be used to control Nokia phones
13 from a Linux computer, although AT commands may be easier to use.
16 will be called phonet. If unsure, say N.
/net/sunrpc/
DKconfig31 daemon which may be found in the Linux nfs-utils package
33 Kerberos support should be installed.
43 that is be used by the 'rpcdebug' utility to turn on or off
61 will be called rpcrdma.ko.
/net/wimax/
DKconfig17 The different WiMAX drivers can be enabled in the menu entry
30 Select the maximum debug verbosity level to be compiled into
34 be selectively enabled for different parts of the code using
/net/openvswitch/
DKconfig35 To compile this code as a module, choose M here: the module will be
46 If you say Y here, then the Open vSwitch will be able create GRE
59 If you say Y here, then the Open vSwitch will be able create vxlan vport.
71 If you say Y here, then the Open vSwitch will be able create geneve vport.
/net/bridge/
DKconfig11 If you say Y here, then your Linux box will be able to act as an
32 will be called bridge.
42 If you say Y here, then the Ethernet bridge will be able selectively
56 If you say Y here, then the Ethernet bridge will be able selectively
/net/hsr/
DKconfig8 If you say Y here, then your Linux box will be able to act as a
11 and it must be connected as a node in a ring network together with
14 All Ethernet frames sent over the hsr device will be sent in both
/net/decnet/
DTODO20 [maybe this should be done at socket level... the control data in the
21 send/recvmsg() calls should simply be a vector of set/getsockopt()
24 o check MSG_CTRUNC is set where it should be.
/net/ipv4/
DKconfig19 will then be presented with several options that allow more precise
69 the Linux router will also be able to take the packet's source
71 of the packet can be used for routing decisions as well.
83 Normally, the routing tables specify a single action to be taken in
87 for those packets. The router considers all these paths to be of
97 received packets which look strange and could be evidence of an
122 net via NFS and you want the IP address of your computer to be
130 must be operating on your network. Read
139 net via NFS and you want the IP address of your computer to be
145 want to use BOOTP, a BOOTP server must be operating on your network.
[all …]
/net/dccp/ccids/
DKconfig8 The debugging output can additionally be toggled by setting the
19 be reasonably fair when competing for bandwidth with TCP-like flows,
44 The debugging output can additionally be toggled by setting the
/net/netfilter/ipvs/
DKconfig11 option must be enabled for at least one of the clustered computers
18 be used to choose which server the connection is directed to,
19 thus load balancing can be achieved among the servers. For more
55 Note the table size must be power of 2. The table size will be the
65 should be not far less than 200x200, it is good to set the table
246 When there is an idle server available, the job will be sent to
248 is no idle server available, the job will be sent to the server
267 needs to be large enough to effectively fit all the destinations
280 the IP address and port number of real servers cannot be sent to
293 connection state to be exported to the Netfilter framework
/net/can/
DKconfig37 interaction. The BCM can be 'programmed' via the BSD socket API and
50 CAN frames can be routed between CAN network interfaces (one hop).
51 They can be modified with AND/OR/XOR/SET operations as configured
/net/nfc/
DKconfig15 be called nfc.
29 be called nfc_digital.
/net/xfrm/
DKconfig43 one, two policies can be applied to the same packet at once.
44 Policy which lives shorter time in kernel should be a sub.
96 information can be found in the internet-draft

123