Home
last modified time | relevance | path

Searched refs:to (Results 1 – 25 of 141) sorted by relevance

123456

/net/sched/
DKconfig10 When the kernel has several packets to send out over a network
11 device, it has to decide which ones to send first, which ones to
12 delay, and which ones to drop. This is the job of the queueing
13 disciplines, several different algorithms for how to do this
18 able to choose from among several alternative algorithms which can
19 then be attached to different network devices. This is useful for
21 need a certain minimum data flow rate, or if you need to limit the
23 This code is considered to be experimental.
31 This Quality of Service (QoS) support will enable you to use
33 (RSVP) on your Linux router if you also say Y to the corresponding
[all …]
/net/dccp/
Doptions.c265 void dccp_encode_value_var(const u64 value, u8 *to, const u8 len) in dccp_encode_value_var() argument
268 *to++ = (value & 0xFF0000000000ull) >> 40; in dccp_encode_value_var()
270 *to++ = (value & 0xFF00000000ull) >> 32; in dccp_encode_value_var()
272 *to++ = (value & 0xFF000000) >> 24; in dccp_encode_value_var()
274 *to++ = (value & 0xFF0000) >> 16; in dccp_encode_value_var()
276 *to++ = (value & 0xFF00) >> 8; in dccp_encode_value_var()
278 *to++ = (value & 0xFF); in dccp_encode_value_var()
291 unsigned char *to; in dccp_insert_option() local
298 to = skb_push(skb, len + 2); in dccp_insert_option()
299 *to++ = option; in dccp_insert_option()
[all …]
/net/core/
Ddev_addr_lists.c633 int dev_uc_sync(struct net_device *to, struct net_device *from) in dev_uc_sync() argument
637 if (to->addr_len != from->addr_len) in dev_uc_sync()
640 netif_addr_lock(to); in dev_uc_sync()
641 err = __hw_addr_sync(&to->uc, &from->uc, to->addr_len); in dev_uc_sync()
643 __dev_set_rx_mode(to); in dev_uc_sync()
644 netif_addr_unlock(to); in dev_uc_sync()
663 int dev_uc_sync_multiple(struct net_device *to, struct net_device *from) in dev_uc_sync_multiple() argument
667 if (to->addr_len != from->addr_len) in dev_uc_sync_multiple()
670 netif_addr_lock(to); in dev_uc_sync_multiple()
671 err = __hw_addr_sync_multiple(&to->uc, &from->uc, to->addr_len); in dev_uc_sync_multiple()
[all …]
/net/netfilter/ipvs/
DKconfig13 that will take care of intercepting incoming connections to a
14 single IP address and scheduling them to real servers.
19 be used to choose which server the connection is directed to,
24 If you want to compile it in kernel, say Y. To compile it as a
35 Add IPv6 support to IPVS.
42 Say Y here if you want to get additional messages useful in
51 The IPVS connection hash table uses the chaining scheme to handle
57 value of 2 to the your input number power. The number to choose is
58 from 8 to 20, the default number is 12, which means the table size
61 to your virtual server application. It is good to set the table size
[all …]
/net/netfilter/
DKconfig10 This allows you to classify packets from ingress using the Netfilter
47 and is also scheduled to replace the old syslog-based ipt_LOG
65 through your machine, in order to figure out how they are related
68 This is required to do Masquerading or other kinds of Network
69 Address Translation. It can also be used to enhance packet
90 `CONNMARK' target and `connmark' match. Similar to the mark value
99 This option enables security markings to be applied to
100 connections. Typically they are copied to connections from
102 connections to packets with the same target, with the packets
112 Normally, each connection needs to have a unique system wide
[all …]
/net/ax25/
DKconfig10 If you want to connect your Linux box to an amateur radio, answer Y
11 here. You want to read <http://www.tapr.org/>
15 Note that the answer to this question won't directly affect the
16 kernel: saying N will just cause the configurator to skip all
27 radio. It is either used by itself for point-to-point links, or to
29 that connects your Linux box to your amateur radio. You can either
31 modem connecting your computer's serial port to your radio's
36 own drivers). If you say Y here, you also have to say Y to one of
39 Information about where to get supporting software for Linux amateur
40 radio as well as information about how to configure an AX.25 port is
[all …]
/net/ipv4/
DKconfig10 intend to participate in the MBONE, a high bandwidth network on top
13 <http://www.savetz.com/mbone/>. For most people, it's safe to say N.
18 If you intend to run your Linux box mostly as a router, i.e. as a
23 The answer to this question won't directly affect the kernel:
24 answering N will just cause the configurator to skip all the
28 forwarding in your kernel; you can do that by saying Y to "/proc
41 asymmetric routing (packets from you to a host take a different path
42 than packets from that host to you) or if you operate a non-routing
68 Normally, a router decides what to do with a received packet based
70 the Linux router will also be able to take the packet's source
[all …]
/net/x25/
DKconfig9 X.25 is a set of standardized network protocols, similar in scope to
10 frame relay; the one physical line from your box to the X.25 network
11 entry point can carry several logical point-to-point connections
12 (called "virtual circuits") to other computers connected to the X.25
13 network. Governments, banks, and other organizations tend to use it
14 to connect to each other or to form Wide Area Networks (WANs). Many
18 (say Y to "LAPB Data Link Driver" below if you want that).
26 One connects to an X.25 network either with a dedicated network card
29 to "X.25 async driver" below) or over Ethernet using an ordinary
30 Ethernet card and the LAPB over Ethernet (say Y to "LAPB Data Link
/net/6lowpan/
DKconfig14 This enables 6LoWPAN debugfs support. For example to manipulate
31 6LoWPAN IPv6 Destination Options Header compression according to
38 6LoWPAN IPv6 Fragment Header compression according to RFC6282.
44 6LoWPAN IPv6 Hop-by-Hop Options Header compression according to
51 6LoWPAN IPv6 Header compression according to RFC6282.
57 6LoWPAN IPv6 Mobility Header compression according to RFC6282.
63 6LoWPAN IPv6 Routing Header compression according to RFC6282.
69 6LoWPAN IPv6 UDP Header compression according to RFC6282.
75 to RFC7400.
80 6LoWPAN IPv6 UDP generic header compression according to RFC7400.
[all …]
/net/
DKconfig14 when running on a stand-alone machine that isn't connected to any
23 For a general introduction to Linux networking, it is highly
24 recommended to read the NET-HOWTO, available from
40 This option makes it possible to send different netlink messages
41 to tasks depending on whether the task is a compat task or not. To
42 achieve this, you need to set skb_shinfo(skb)->frag_list to the
44 which message to actually pass to the task.
72 Ethernets. It is highly recommended to say Y here (this will enlarge
74 system) use TCP/IP even if your machine is not connected to any
76 allows you to ping yourself (great fun, that!).
[all …]
/net/bridge/
Dbr_forward.c72 static void __br_forward(const struct net_bridge_port *to, in __br_forward() argument
80 vg = nbp_vlan_group_rcu(to); in __br_forward()
81 skb = br_handle_vlan(to->br, to, vg, skb); in __br_forward()
86 skb->dev = to->dev; in __br_forward()
96 if (unlikely(netpoll_tx_running(to->br->dev))) { in __br_forward()
101 br_netpoll_send_skb(to, skb); in __br_forward()
138 void br_forward(const struct net_bridge_port *to, in br_forward() argument
141 if (unlikely(!to)) in br_forward()
145 if (rcu_access_pointer(to->backup_port) && !netif_carrier_ok(to->dev)) { in br_forward()
148 backup_port = rcu_dereference(to->backup_port); in br_forward()
[all …]
DKconfig12 If you say Y here, then your Linux box will be able to act as an
14 is connected to will appear as one Ethernet to the participants.
15 Several such bridges can work together to create even larger
20 In order to use the Ethernet bridge, you'll need the bridge
27 iptables will then see the IP packets being bridged, so you need to
47 Say N to exclude this support and reduce the binary size.
61 Say N to exclude this support and reduce the binary size.
/net/qrtr/
DKconfig9 Say Y if you intend to use Qualcomm IPC router protocol. The
10 protocol is used to communicate with services provided by other
13 In order to do service lookups, a userspace daemon is required to
22 Say Y here to support SMD based ipcrouter channels. SMD is the
28 Say Y here to expose a character device that allows user space to
29 implement endpoints of QRTR, for purpose of tunneling data to other
/net/mac80211/
DKconfig16 comment "CFG80211 needs to be enabled for MAC80211"
64 Select this option to enable 802.11 mesh operation in mac80211
66 over (possibly multi-hop) wireless links to form a single logical
82 Select this to see extensive information about
91 Select this option to have mac80211 register the
92 mac80211_msg trace subsystem with tracepoints to
97 need to be present in the binary and formatted at
111 selected some functions are marked "noinline" to allow
116 of function calls in the code, but is otherwise safe to
119 If unsure, say N unless you expect to be finding problems
[all …]
/net/l2tp/
DKconfig18 possible to both end-users and applications.
20 L2TP is often used to tunnel PPP traffic over IP
23 with home workers to connect to their offices.
25 L2TPv3 allows other protocols as well as PPP to be carried
42 used to dump internal state of the l2tp drivers for problem
62 tunneling Point-to-Point Protocol (PPP) [RFC1661] sessions.
67 If you are connecting to L2TPv3 equipment, or you want to
97 used as a control protocol and for data encapsulation to set
103 be used to assign an IP address to the local virtual
104 interface, or add the interface to a bridge.
[all …]
/net/ipv6/netfilter/
DKconfig59 tristate "Netfilter IPv6 packet duplication to alternate destination"
63 packet to be rerouted to another destination.
82 for IPv6 use this, but connection tracking is going to follow.
83 Say 'Y' or 'M' here if you want to use either of those.
94 This module allows one to match AH packets.
112 frag matching allows you to match packets based on the fragmentation
121 This allows one to match packets based on the hop-by-hop
139 This module allows one to match packets based upon
148 This module allows one to match MH packets.
157 This option allows you to match packets whose replies would
[all …]
/net/wireless/
DKconfig24 # may need to update this when certificates are changed and are
26 # (this is here rather than below to allow it to be a module)
32 For more information refer to documentation on the wireless wiki:
49 Debugging tools that are supposed to end up in the hands of
60 they can also trigger due to races with userspace.
64 time, the warning might trigger spuriously due to races.
76 and willing to ensure your system will remain regulatory
85 or distributions that have done work necessary to ensure
96 Require that in addition to the "regulatory.db" file a
106 Allow the regulatory database to be signed by one of the keys for
[all …]
/net/dsa/
DKconfig16 Say Y if you want to enable support for the hardware switches supported
40 Say Y if you want to enable support for tagging frames for the
48 Say Y if you want to enable support for tagging frames for the
55 Say Y or M if you want to enable support for tagging frames for the
61 Say Y or M if you want to enable support for tagging frames for the
67 Say Y or M if you want to enable support for tagging frames for the
73 Say Y or M if you want to enable support for tagging frames for
79 Say Y if you want to enable support for tagging frames for the
85 Say Y or M if you want to enable support for tagging frames for
91 Say Y or M if you want to enable support for tagging frames for the
[all …]
/net/batman-adv/
DKconfig15 B.A.T.M.A.N. (better approach to mobile ad-hoc networking) is
33 compatible to B.A.T.M.A.N. IV networks.
42 to avoid Ethernet frames looping when mesh nodes are connected
43 to both the same LAN and the same mesh. If you will never use
61 This option enables network coding, a mechanism that aims to
65 configured to have promiscuous mode enabled in order to make
75 This option enables the multicast optimisation which aims to
84 Enable this to export routing related debug tables via debugfs.
96 outputting debugging information to the debugfs log or tracing
105 Say Y here if you want to enable batman-adv device configuration and
[all …]
/net/decnet/
DKconfig11 to those which run over TCP/IP.
13 To find some tools to use with the kernel layer support, please
20 Be sure to say Y to "/proc file system support" and "Sysctl support"
21 below when using DECnet, since you will need sysctl support to aid
35 do say Y here, then make sure that you also say Y to "Kernel/User
37 filtering". The first two are required to allow configuration via
41 to work.
/net/atm/
DKconfig14 In order to participate in an ATM network, your Linux box needs an
15 ATM networking card. If you have that, say Y here and to the driver
18 Note that you need a set of user-space programs to actually make use
27 ATMARP. If you want to communication with other IP hosts on your ATM
28 network, you will typically either say Y here or to "LAN Emulation
36 cannot be reached because there is no VC to it in the kernel's
38 briefly removed during revalidation. If you say Y here, packets to
48 ELAN and Ethernet segments. You need LANE if you want to try MPOA.
63 ATM PVCs can carry ethernet PDUs according to RFC2684 (formerly 1483)
72 This is an experimental mechanism for users who need to terminate a
/net/caif/
DKconfig11 The "Communication CPU to Application CPU Interface" (CAIF) is a packet
18 If you select to build it as module then CAIF_NETDEV also needs to be
19 built as modules. You will also need to say yes to any CAIF physical
22 See Documentation/networking/caif for a further explanation on how to
41 If you select to build it as a built-in then the main CAIF device must
52 If you select to build it as a built-in then the main CAIF device must
/net/xfrm/
DKconfig35 This provides a virtual interface to route IPsec traffic.
44 one, two policies can be applied to the same packet at once.
53 A feature to update locator(s) of a given IPsec security
56 where mobile nodes change their attachment point to the Internet.
80 PF_KEYv2 socket family, compatible to KAME ones.
81 They are required if you are going to use IPsec tools ported
91 Add a PF_KEY MIGRATE message to PF_KEYv2 socket family.
92 The PF_KEY MIGRATE message is used to dynamically update
96 change their attachment point to the Internet. Detail
/net/ipv4/netfilter/
DKconfig70 tristate "Netfilter IPv4 packet duplication to alternate destination"
74 packet to be rerouted to another destination.
101 management system to access multiple private networks with
103 inside SNMP payloads to match IP-layer NAT mapping.
128 etc) subsystems now use this: say `Y' or `M' here if you want to use
140 This match extension allows you to match a range of SPIs
159 This option allows you to match packets whose replies would
191 The REJECT target allows a filtering rule to specify that an ICMP
192 error should be issued in response to an incoming packet, rather
203 The SYNPROXY target allows you to intercept TCP connections and
[all …]
Dnf_nat_snmp_basic_main.c64 __be32 to; member
74 memcpy(&s[7], &ctx->to, 4); in fast_csum()
84 memcpy(&s[4], &ctx->to, 4); in fast_csum()
116 (void *)&ctx->from, (void *)&ctx->to); in snmp_helper()
120 *pdata = ctx->to; in snmp_helper()
137 ctx.to = ct->tuplehash[!dir].tuple.dst.u3.ip; in snmp_translate()
140 ctx.to = ct->tuplehash[dir].tuple.dst.u3.ip; in snmp_translate()
143 if (ctx.from == ctx.to) in snmp_translate()

123456