/net/netfilter/ |
D | nft_set_bitmap.c | 96 struct nft_bitmap_elem *be; in nft_bitmap_elem_find() local 98 list_for_each_entry_rcu(be, &priv->list, head) { in nft_bitmap_elem_find() 99 if (memcmp(nft_set_ext_key(&be->ext), in nft_bitmap_elem_find() 101 !nft_set_elem_active(&be->ext, genmask)) in nft_bitmap_elem_find() 104 return be; in nft_bitmap_elem_find() 114 struct nft_bitmap_elem *new = elem->priv, *be; in nft_bitmap_insert() local 118 be = nft_bitmap_elem_find(set, new, genmask); in nft_bitmap_insert() 119 if (be) { in nft_bitmap_insert() 120 *ext = &be->ext; in nft_bitmap_insert() 137 struct nft_bitmap_elem *be = elem->priv; in nft_bitmap_remove() local [all …]
|
/net/sched/ |
D | Kconfig | 16 is a FIFO (first come, first served). If you say Y here, you will be 18 then be attached to different network devices. This is useful for 22 This code is considered to be experimental. 36 If you say Y here and to "/proc file system" below, you will be able 62 module will be called sch_cbq. 76 module will be called sch_htb. 85 module will be called sch_hfsc. 99 module will be called sch_atm. 108 module will be called sch_prio. 117 module will be called sch_multiq. [all …]
|
/net/mac80211/ |
D | Kconfig | 15 comment "CFG80211 needs to be enabled for MAC80211" 50 mac80211 will use. Note that this default can still be 81 possible, as drafts leave a number of identifiers to be defined after 112 need to be present in the binary and formatted at 134 If unsure, say N unless you expect to be finding problems 142 many debugging messages. It should not be selected 154 should not be selected on production systems as some 175 It should not be selected on production systems as some 186 be selected on production systems as those messages 197 be selected on production systems as those messages [all …]
|
/net/caif/ |
D | Kconfig | 17 If you select to build it as module then CAIF_NETDEV also needs to be 38 Say Y if you will be using a CAIF based GPRS network device. 39 This can be either built-in or a loadable module, 41 also be a built-in. 50 This can be either built-in or a loadable module, 52 also be a built-in.
|
/net/l2tp/ |
D | Kconfig | 24 L2TPv3 allows other protocols as well as PPP to be carried 40 Support for l2tp directory in debugfs filesystem. This may be 47 will be called l2tp_debugfs. 82 must be enabled in firewalls. 85 will be called l2tp_ip. 95 The Layer 2 Tunneling Protocol, Version 3 (L2TPv3) can be 102 be used to assign an IP address to the local virtual 109 will be called l2tp_eth.
|
/net/ax25/ |
D | TODO | 2 listen_lock have to be bh-safe? 4 Do the netrom and rose locks have to be bh-safe? 6 A device might be deleted after lookup in the SIOCADDRT ioctl but before it's 9 Routes to a device being taken down might be deleted by ax25_rt_device_down
|
/net/dccp/ |
D | Kconfig | 11 congestion-controlled, unreliable datagrams. It should be suitable 16 module will be called dccp. 37 When compiling DCCP as a module, this debugging output can be toggled 51 Documentation on how to use DCCP connection probing can be found 57 module will be called dccp_probe.
|
/net/vmw_vsock/ |
D | Kconfig | 16 will be called vsock. If unsure, say N. 28 will be called vmw_vsock_vmci_transport. If unsure, say N. 40 To compile this driver as a module, choose M here: the module will be 47 the virtio_vsock. The module will be called 59 To compile this driver as a module, choose M here: the module will be
|
/net/atm/ |
D | pppoatm.c | 394 struct atm_backend_ppp be; in pppoatm_assign_vcc() local 402 if (copy_from_user(&be, arg, sizeof be)) in pppoatm_assign_vcc() 404 if (be.encaps != PPPOATM_ENCAPS_AUTODETECT && in pppoatm_assign_vcc() 405 be.encaps != PPPOATM_ENCAPS_VC && be.encaps != PPPOATM_ENCAPS_LLC) in pppoatm_assign_vcc() 418 pvcc->encaps = (enum pppoatm_encaps) be.encaps; in pppoatm_assign_vcc() 422 (be.encaps == e_vc ? 0 : LLC_LEN); in pppoatm_assign_vcc()
|
D | br2684.c | 535 struct atm_backend_br2684 be; in br2684_regvcc() local 538 if (copy_from_user(&be, arg, sizeof be)) in br2684_regvcc() 551 net_dev = br2684_find_dev(&be.ifspec); in br2684_regvcc() 567 if (be.fcs_in != BR2684_FCSIN_NO || in br2684_regvcc() 568 be.fcs_out != BR2684_FCSOUT_NO || in br2684_regvcc() 569 be.fcs_auto || be.has_vpiid || be.send_padding || in br2684_regvcc() 570 (be.encaps != BR2684_ENCAPS_VC && in br2684_regvcc() 571 be.encaps != BR2684_ENCAPS_LLC) || in br2684_regvcc() 572 be.min_size != 0) { in br2684_regvcc() 576 pr_debug("vcc=%p, encaps=%d, brvcc=%p\n", atmvcc, be.encaps, brvcc); in br2684_regvcc() [all …]
|
/net/wireless/ |
D | Kconfig | 30 When built as a module it will be called cfg80211. 43 users should better be implemented with debugfs. 72 Some options may still be under heavy development and 74 cannot yet be verified. Regulatory verification may at 75 times only be possible until you have the final system 78 This option should only be enabled by system integrators 111 to be an authorized master, i.e., with radar detection support and DFS 153 the parser will be upkept with the latest wireless-regdb updates but 154 older wireless-regdb formats will be ignored. The parser may later 155 be replaced to avoid issues with conflicts on versions of [all …]
|
D | db.txt | 6 # You should be using CRDA instead. It is even better if you use the CRDA 12 # regulatory rules that cover the regulatory domains you will be using. Your
|
/net/phonet/ |
D | Kconfig | 12 supported). It can also be used to control Nokia phones 13 from a Linux computer, although AT commands may be easier to use. 16 will be called phonet. If unsure, say N.
|
/net/sunrpc/ |
D | Kconfig | 31 daemon which may be found in the Linux nfs-utils package 33 Kerberos support should be installed. 43 that is be used by the 'rpcdebug' utility to turn on or off 61 will be called rpcrdma.ko.
|
/net/wimax/ |
D | Kconfig | 17 The different WiMAX drivers can be enabled in the menu entry 30 Select the maximum debug verbosity level to be compiled into 34 be selectively enabled for different parts of the code using
|
/net/openvswitch/ |
D | Kconfig | 35 To compile this code as a module, choose M here: the module will be 46 If you say Y here, then the Open vSwitch will be able create GRE 59 If you say Y here, then the Open vSwitch will be able create vxlan vport. 71 If you say Y here, then the Open vSwitch will be able create geneve vport.
|
/net/bridge/ |
D | Kconfig | 11 If you say Y here, then your Linux box will be able to act as an 32 will be called bridge. 42 If you say Y here, then the Ethernet bridge will be able selectively 56 If you say Y here, then the Ethernet bridge will be able selectively
|
/net/hsr/ |
D | Kconfig | 8 If you say Y here, then your Linux box will be able to act as a 11 and it must be connected as a node in a ring network together with 14 All Ethernet frames sent over the hsr device will be sent in both
|
/net/decnet/ |
D | TODO | 20 [maybe this should be done at socket level... the control data in the 21 send/recvmsg() calls should simply be a vector of set/getsockopt() 24 o check MSG_CTRUNC is set where it should be.
|
/net/ipv4/ |
D | Kconfig | 19 will then be presented with several options that allow more precise 69 the Linux router will also be able to take the packet's source 71 of the packet can be used for routing decisions as well. 83 Normally, the routing tables specify a single action to be taken in 87 for those packets. The router considers all these paths to be of 97 received packets which look strange and could be evidence of an 122 net via NFS and you want the IP address of your computer to be 130 must be operating on your network. Read 139 net via NFS and you want the IP address of your computer to be 145 want to use BOOTP, a BOOTP server must be operating on your network. [all …]
|
/net/dccp/ccids/ |
D | Kconfig | 8 The debugging output can additionally be toggled by setting the 19 be reasonably fair when competing for bandwidth with TCP-like flows, 44 The debugging output can additionally be toggled by setting the
|
/net/netfilter/ipvs/ |
D | Kconfig | 11 option must be enabled for at least one of the clustered computers 18 be used to choose which server the connection is directed to, 19 thus load balancing can be achieved among the servers. For more 55 Note the table size must be power of 2. The table size will be the 65 should be not far less than 200x200, it is good to set the table 246 When there is an idle server available, the job will be sent to 248 is no idle server available, the job will be sent to the server 267 needs to be large enough to effectively fit all the destinations 280 the IP address and port number of real servers cannot be sent to 293 connection state to be exported to the Netfilter framework
|
/net/can/ |
D | Kconfig | 37 interaction. The BCM can be 'programmed' via the BSD socket API and 50 CAN frames can be routed between CAN network interfaces (one hop). 51 They can be modified with AND/OR/XOR/SET operations as configured
|
/net/nfc/ |
D | Kconfig | 15 be called nfc. 29 be called nfc_digital.
|
/net/xfrm/ |
D | Kconfig | 43 one, two policies can be applied to the same packet at once. 44 Policy which lives shorter time in kernel should be a sub. 96 information can be found in the internet-draft
|