/net/netfilter/ |
D | nft_counter.c | 22 s64 packets; member 45 this_cpu->packets++; in nft_counter_do_eval() 73 this_cpu->packets = in nft_counter_do_init() 113 this_cpu->packets -= total->packets; in nft_counter_reset() 123 u64 bytes, packets; in nft_counter_fetch() local 134 packets = this_cpu->packets; in nft_counter_fetch() 138 total->packets += packets; in nft_counter_fetch() 152 nla_put_be64(skb, NFTA_COUNTER_PACKETS, cpu_to_be64(total.packets), in nft_counter_do_dump() 245 this_cpu->packets = total.packets; in nft_counter_clone()
|
D | xt_connbytes.c | 45 what = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].packets); in connbytes_mt() 48 what = atomic64_read(&counters[IP_CT_DIR_REPLY].packets); in connbytes_mt() 51 what = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].packets); in connbytes_mt() 52 what += atomic64_read(&counters[IP_CT_DIR_REPLY].packets); in connbytes_mt() 74 pkts = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].packets); in connbytes_mt() 78 pkts = atomic64_read(&counters[IP_CT_DIR_REPLY].packets); in connbytes_mt() 83 pkts = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].packets) + in connbytes_mt() 84 atomic64_read(&counters[IP_CT_DIR_REPLY].packets); in connbytes_mt()
|
D | Kconfig | 9 This allows you to classify packets from ingress using the Netfilter 29 for queueing packets via NFNETLINK. 37 for logging packets via NFNETLINK. 47 Connection tracking keeps a record of what packets have passed 72 of packets, but this mark value is kept in the conntrack session 73 instead of the individual packets. 82 packets using the CONNSECMARK target and copied back from 83 connections to packets with the same target, with the packets 431 This is the kernel functionality to redirect packets to local 528 packets matching some criteria. [all …]
|
D | xt_set.c | 190 if (info->packets.op != IPSET_COUNTER_NONE || in set_match_v3() 200 if (!match_counter0(opt.ext.packets, &info->packets)) in set_match_v3() 237 if (info->packets.op != IPSET_COUNTER_NONE || in set_match_v4() 247 if (!match_counter(opt.ext.packets, &info->packets)) in set_match_v4()
|
D | nf_conntrack_acct.c | 51 (unsigned long long)atomic64_read(&counter[dir].packets), in seq_print_acct()
|
/net/mpls/ |
D | Kconfig | 9 MultiProtocol Label Switching routes packets through logical 10 circuits. Originally conceived as a way of routing packets at 11 hardware speeds (before hardware was capable of routing ipv4 packets), 21 This is helper module to allow segmentation of non-MPLS GSO packets 23 become MPLS GSO packets. 28 Add support for forwarding of mpls packets.
|
/net/core/ |
D | gen_stats.c | 131 u32 packets; in __gnet_stats_copy_basic_cpu() local 136 packets = bcpu->bstats.packets; in __gnet_stats_copy_basic_cpu() 140 bstats->packets += packets; in __gnet_stats_copy_basic_cpu() 160 bstats->packets = b->packets; in __gnet_stats_copy_basic() 190 d->tc_stats.packets = bstats.packets; in gnet_stats_copy_basic() 198 sb.packets = bstats.packets; in gnet_stats_copy_basic()
|
D | gen_estimator.c | 90 rate = (u64)(b.packets - est->last_packets) << (10 - est->ewma_log - est->intvl_log); in est_timer() 99 est->last_packets = b.packets; in est_timer() 169 est->last_packets = b.packets; in gen_new_estimator()
|
/net/sched/ |
D | sch_generic.c | 63 int *packets) in try_bulk_dequeue_skb() argument 76 (*packets)++; /* GSO counts as one pkt */ in try_bulk_dequeue_skb() 86 int *packets) in try_bulk_dequeue_skb_slow() argument 105 (*packets) += cnt; in try_bulk_dequeue_skb_slow() 113 int *packets) in dequeue_skb() argument 118 *packets = 1; in dequeue_skb() 152 try_bulk_dequeue_skb(q, skb, txq, packets); in dequeue_skb() 154 try_bulk_dequeue_skb_slow(q, skb, packets); in dequeue_skb() 157 trace_qdisc_dequeue(q, txq, *packets, skb); in dequeue_skb() 232 static inline int qdisc_restart(struct Qdisc *q, int *packets) in qdisc_restart() argument [all …]
|
D | Kconfig | 9 When the kernel has several packets to send out over a network 51 scheduling algorithm. This algorithm classifies the waiting packets 189 Say Y if you want to schedule packets according to the 319 packets. This qdisc doesn't do anything else besides running classifiers, 320 which can also have actions attached to them. In case of outgoing packets, 336 causes following packets to enqueue until a dequeue command arrives 342 command, only packets up to the first plug are released for delivery. 409 Say Y here if you want to be able to classify packets using 419 Say Y here if you want to be able to classify packets based on 432 If you say Y here, you will be able to classify packets [all …]
|
D | act_gact.c | 40 u32 pack = atomic_inc_return(&gact->packets); in gact_determ() 150 static void tcf_gact_stats_update(struct tc_action *a, u64 bytes, u32 packets, in tcf_gact_stats_update() argument 158 packets); in tcf_gact_stats_update() 160 this_cpu_ptr(gact->common.cpu_qstats)->drops += packets; in tcf_gact_stats_update()
|
D | sch_mqprio.c | 244 sch->bstats.packets += qdisc->bstats.packets; in mqprio_dump() 352 bstats.packets += qdisc->bstats.packets; in mqprio_dump_class_stats()
|
D | sch_mq.c | 110 sch->bstats.packets += qdisc->bstats.packets; in mq_dump()
|
D | act_mirred.c | 234 static void tcf_stats_update(struct tc_action *a, u64 bytes, u32 packets, in tcf_stats_update() argument 240 _bstats_cpu_update(this_cpu_ptr(a->cpu_bstats), bytes, packets); in tcf_stats_update()
|
/net/ |
D | Kconfig | 103 This enables security marking of network packets, similar 114 This allows timestamping of network packets by PHYs with 123 Netfilter is a framework for filtering and mangling network packets 129 filter", which means that it can reject individual network packets 146 modifies the packets to make it look like they came from the 187 tristate "Bridged IP/ARP packets filtering" 322 The network stack has to drop packets when a receive processing CPU's 335 This module will inject preconfigured packets, at a configurable 351 state in response to incoming packets. It is used for debugging 368 event that packets are discarded in the network stack. Alerts [all …]
|
/net/ipv6/netfilter/ |
D | Kconfig | 18 Connection tracking keeps a record of what packets have passed 158 This module allows one to match AH packets. 176 frag matching allows you to match packets based on the fragmentation 185 This allows one to match packets based on the hop-by-hop 203 This module allows one to match packets based upon 212 This module allows one to match MH packets. 221 This option allows you to match packets whose replies would 231 rt matching allows you to match packets based on the routing
|
/net/l2tp/ |
D | Kconfig | 15 L2TP facilitates the tunneling of packets across an 28 The kernel component handles only L2TP data packets: a 81 in IP packets, it used IP protocol number 115, so this port
|
/net/ipv4/ |
D | Kconfig | 18 computer that forwards and redistributes network packets, say Y; you 36 automatically rejects incoming packets if the routing table entry 40 asymmetric routing (packets from you to a host take a different path 41 than packets from that host to you) or if you operate a non-routing 87 for those packets. The router considers all these paths to be of 97 received packets which look strange and could be evidence of an 182 This is helper module to demultiplex GRE packets on GRE version field criteria. 220 packets that have several destination addresses. It is needed on the 281 an aid in tracing the packets to their actual source and should not 565 Note that in general congestion avoidance (cwnd decreased when # packets [all …]
|
/net/psample/ |
D | Kconfig | 11 This netlink channel allows transferring packets alongside some
|
/net/atm/ |
D | Kconfig | 37 briefly removed during revalidation. If you say Y here, packets to 46 LANE client can also act as an proxy client bridging packets between
|
/net/ipv6/ |
D | Kconfig | 194 into IPv4 packets. This is useful if you want to connect two IPv6 314 Support for encapsulation of packets within an outer IPv6 317 processing of SRv6 packets based on their active segment. 329 of SR-enabled packets.
|
/net/ipv4/netfilter/ |
D | Kconfig | 18 Connection tracking keeps a record of what packets have passed 200 inside AH header of IPSec packets. 218 This option allows you to match packets whose replies would 411 for forwarded ARP packets. See the man page for arptables(8).
|
/net/rxrpc/ |
D | Kconfig | 34 transmitted packets.
|
/net/mac80211/ |
D | sta_info.h | 387 unsigned long packets; member 544 u64 packets[IEEE80211_NUM_ACS]; member
|
/net/dccp/ |
D | Kconfig | 47 state in response to incoming packets. It is used for debugging
|