Home
last modified time | relevance | path

Searched refs:packets (Results 1 – 25 of 52) sorted by relevance

123

/net/netfilter/
Dnft_counter.c22 s64 packets; member
45 this_cpu->packets++; in nft_counter_do_eval()
73 this_cpu->packets = in nft_counter_do_init()
113 this_cpu->packets -= total->packets; in nft_counter_reset()
123 u64 bytes, packets; in nft_counter_fetch() local
134 packets = this_cpu->packets; in nft_counter_fetch()
138 total->packets += packets; in nft_counter_fetch()
152 nla_put_be64(skb, NFTA_COUNTER_PACKETS, cpu_to_be64(total.packets), in nft_counter_do_dump()
245 this_cpu->packets = total.packets; in nft_counter_clone()
Dxt_connbytes.c45 what = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].packets); in connbytes_mt()
48 what = atomic64_read(&counters[IP_CT_DIR_REPLY].packets); in connbytes_mt()
51 what = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].packets); in connbytes_mt()
52 what += atomic64_read(&counters[IP_CT_DIR_REPLY].packets); in connbytes_mt()
74 pkts = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].packets); in connbytes_mt()
78 pkts = atomic64_read(&counters[IP_CT_DIR_REPLY].packets); in connbytes_mt()
83 pkts = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].packets) + in connbytes_mt()
84 atomic64_read(&counters[IP_CT_DIR_REPLY].packets); in connbytes_mt()
DKconfig9 This allows you to classify packets from ingress using the Netfilter
29 for queueing packets via NFNETLINK.
37 for logging packets via NFNETLINK.
47 Connection tracking keeps a record of what packets have passed
72 of packets, but this mark value is kept in the conntrack session
73 instead of the individual packets.
82 packets using the CONNSECMARK target and copied back from
83 connections to packets with the same target, with the packets
431 This is the kernel functionality to redirect packets to local
528 packets matching some criteria.
[all …]
Dxt_set.c190 if (info->packets.op != IPSET_COUNTER_NONE || in set_match_v3()
200 if (!match_counter0(opt.ext.packets, &info->packets)) in set_match_v3()
237 if (info->packets.op != IPSET_COUNTER_NONE || in set_match_v4()
247 if (!match_counter(opt.ext.packets, &info->packets)) in set_match_v4()
Dnf_conntrack_acct.c51 (unsigned long long)atomic64_read(&counter[dir].packets), in seq_print_acct()
/net/mpls/
DKconfig9 MultiProtocol Label Switching routes packets through logical
10 circuits. Originally conceived as a way of routing packets at
11 hardware speeds (before hardware was capable of routing ipv4 packets),
21 This is helper module to allow segmentation of non-MPLS GSO packets
23 become MPLS GSO packets.
28 Add support for forwarding of mpls packets.
/net/core/
Dgen_stats.c131 u32 packets; in __gnet_stats_copy_basic_cpu() local
136 packets = bcpu->bstats.packets; in __gnet_stats_copy_basic_cpu()
140 bstats->packets += packets; in __gnet_stats_copy_basic_cpu()
160 bstats->packets = b->packets; in __gnet_stats_copy_basic()
190 d->tc_stats.packets = bstats.packets; in gnet_stats_copy_basic()
198 sb.packets = bstats.packets; in gnet_stats_copy_basic()
Dgen_estimator.c90 rate = (u64)(b.packets - est->last_packets) << (10 - est->ewma_log - est->intvl_log); in est_timer()
99 est->last_packets = b.packets; in est_timer()
169 est->last_packets = b.packets; in gen_new_estimator()
/net/sched/
Dsch_generic.c63 int *packets) in try_bulk_dequeue_skb() argument
76 (*packets)++; /* GSO counts as one pkt */ in try_bulk_dequeue_skb()
86 int *packets) in try_bulk_dequeue_skb_slow() argument
105 (*packets) += cnt; in try_bulk_dequeue_skb_slow()
113 int *packets) in dequeue_skb() argument
118 *packets = 1; in dequeue_skb()
152 try_bulk_dequeue_skb(q, skb, txq, packets); in dequeue_skb()
154 try_bulk_dequeue_skb_slow(q, skb, packets); in dequeue_skb()
157 trace_qdisc_dequeue(q, txq, *packets, skb); in dequeue_skb()
232 static inline int qdisc_restart(struct Qdisc *q, int *packets) in qdisc_restart() argument
[all …]
DKconfig9 When the kernel has several packets to send out over a network
51 scheduling algorithm. This algorithm classifies the waiting packets
189 Say Y if you want to schedule packets according to the
319 packets. This qdisc doesn't do anything else besides running classifiers,
320 which can also have actions attached to them. In case of outgoing packets,
336 causes following packets to enqueue until a dequeue command arrives
342 command, only packets up to the first plug are released for delivery.
409 Say Y here if you want to be able to classify packets using
419 Say Y here if you want to be able to classify packets based on
432 If you say Y here, you will be able to classify packets
[all …]
Dact_gact.c40 u32 pack = atomic_inc_return(&gact->packets); in gact_determ()
150 static void tcf_gact_stats_update(struct tc_action *a, u64 bytes, u32 packets, in tcf_gact_stats_update() argument
158 packets); in tcf_gact_stats_update()
160 this_cpu_ptr(gact->common.cpu_qstats)->drops += packets; in tcf_gact_stats_update()
Dsch_mqprio.c244 sch->bstats.packets += qdisc->bstats.packets; in mqprio_dump()
352 bstats.packets += qdisc->bstats.packets; in mqprio_dump_class_stats()
Dsch_mq.c110 sch->bstats.packets += qdisc->bstats.packets; in mq_dump()
Dact_mirred.c234 static void tcf_stats_update(struct tc_action *a, u64 bytes, u32 packets, in tcf_stats_update() argument
240 _bstats_cpu_update(this_cpu_ptr(a->cpu_bstats), bytes, packets); in tcf_stats_update()
/net/
DKconfig103 This enables security marking of network packets, similar
114 This allows timestamping of network packets by PHYs with
123 Netfilter is a framework for filtering and mangling network packets
129 filter", which means that it can reject individual network packets
146 modifies the packets to make it look like they came from the
187 tristate "Bridged IP/ARP packets filtering"
322 The network stack has to drop packets when a receive processing CPU's
335 This module will inject preconfigured packets, at a configurable
351 state in response to incoming packets. It is used for debugging
368 event that packets are discarded in the network stack. Alerts
[all …]
/net/ipv6/netfilter/
DKconfig18 Connection tracking keeps a record of what packets have passed
158 This module allows one to match AH packets.
176 frag matching allows you to match packets based on the fragmentation
185 This allows one to match packets based on the hop-by-hop
203 This module allows one to match packets based upon
212 This module allows one to match MH packets.
221 This option allows you to match packets whose replies would
231 rt matching allows you to match packets based on the routing
/net/l2tp/
DKconfig15 L2TP facilitates the tunneling of packets across an
28 The kernel component handles only L2TP data packets: a
81 in IP packets, it used IP protocol number 115, so this port
/net/ipv4/
DKconfig18 computer that forwards and redistributes network packets, say Y; you
36 automatically rejects incoming packets if the routing table entry
40 asymmetric routing (packets from you to a host take a different path
41 than packets from that host to you) or if you operate a non-routing
87 for those packets. The router considers all these paths to be of
97 received packets which look strange and could be evidence of an
182 This is helper module to demultiplex GRE packets on GRE version field criteria.
220 packets that have several destination addresses. It is needed on the
281 an aid in tracing the packets to their actual source and should not
565 Note that in general congestion avoidance (cwnd decreased when # packets
[all …]
/net/psample/
DKconfig11 This netlink channel allows transferring packets alongside some
/net/atm/
DKconfig37 briefly removed during revalidation. If you say Y here, packets to
46 LANE client can also act as an proxy client bridging packets between
/net/ipv6/
DKconfig194 into IPv4 packets. This is useful if you want to connect two IPv6
314 Support for encapsulation of packets within an outer IPv6
317 processing of SRv6 packets based on their active segment.
329 of SR-enabled packets.
/net/ipv4/netfilter/
DKconfig18 Connection tracking keeps a record of what packets have passed
200 inside AH header of IPSec packets.
218 This option allows you to match packets whose replies would
411 for forwarded ARP packets. See the man page for arptables(8).
/net/rxrpc/
DKconfig34 transmitted packets.
/net/mac80211/
Dsta_info.h387 unsigned long packets; member
544 u64 packets[IEEE80211_NUM_ACS]; member
/net/dccp/
DKconfig47 state in response to incoming packets. It is used for debugging

123