/net/sched/ |
D | Kconfig | 10 When the kernel has several packets to send out over a network 11 device, it has to decide which ones to send first, which ones to 12 delay, and which ones to drop. This is the job of the queueing 13 disciplines, several different algorithms for how to do this 18 able to choose from among several alternative algorithms which can 19 then be attached to different network devices. This is useful for 21 need a certain minimum data flow rate, or if you need to limit the 23 This code is considered to be experimental. 31 This Quality of Service (QoS) support will enable you to use 33 (RSVP) on your Linux router if you also say Y to the corresponding [all …]
|
/net/dccp/ |
D | options.c | 265 void dccp_encode_value_var(const u64 value, u8 *to, const u8 len) in dccp_encode_value_var() argument 268 *to++ = (value & 0xFF0000000000ull) >> 40; in dccp_encode_value_var() 270 *to++ = (value & 0xFF00000000ull) >> 32; in dccp_encode_value_var() 272 *to++ = (value & 0xFF000000) >> 24; in dccp_encode_value_var() 274 *to++ = (value & 0xFF0000) >> 16; in dccp_encode_value_var() 276 *to++ = (value & 0xFF00) >> 8; in dccp_encode_value_var() 278 *to++ = (value & 0xFF); in dccp_encode_value_var() 291 unsigned char *to; in dccp_insert_option() local 298 to = skb_push(skb, len + 2); in dccp_insert_option() 299 *to++ = option; in dccp_insert_option() [all …]
|
/net/core/ |
D | dev_addr_lists.c | 633 int dev_uc_sync(struct net_device *to, struct net_device *from) in dev_uc_sync() argument 637 if (to->addr_len != from->addr_len) in dev_uc_sync() 640 netif_addr_lock(to); in dev_uc_sync() 641 err = __hw_addr_sync(&to->uc, &from->uc, to->addr_len); in dev_uc_sync() 643 __dev_set_rx_mode(to); in dev_uc_sync() 644 netif_addr_unlock(to); in dev_uc_sync() 663 int dev_uc_sync_multiple(struct net_device *to, struct net_device *from) in dev_uc_sync_multiple() argument 667 if (to->addr_len != from->addr_len) in dev_uc_sync_multiple() 670 netif_addr_lock(to); in dev_uc_sync_multiple() 671 err = __hw_addr_sync_multiple(&to->uc, &from->uc, to->addr_len); in dev_uc_sync_multiple() [all …]
|
/net/netfilter/ipvs/ |
D | Kconfig | 13 that will take care of intercepting incoming connections to a 14 single IP address and scheduling them to real servers. 19 be used to choose which server the connection is directed to, 24 If you want to compile it in kernel, say Y. To compile it as a 35 Add IPv6 support to IPVS. 42 Say Y here if you want to get additional messages useful in 51 The IPVS connection hash table uses the chaining scheme to handle 57 value of 2 to the your input number power. The number to choose is 58 from 8 to 20, the default number is 12, which means the table size 61 to your virtual server application. It is good to set the table size [all …]
|
/net/netfilter/ |
D | Kconfig | 10 This allows you to classify packets from ingress using the Netfilter 47 and is also scheduled to replace the old syslog-based ipt_LOG 65 through your machine, in order to figure out how they are related 68 This is required to do Masquerading or other kinds of Network 69 Address Translation. It can also be used to enhance packet 90 `CONNMARK' target and `connmark' match. Similar to the mark value 99 This option enables security markings to be applied to 100 connections. Typically they are copied to connections from 102 connections to packets with the same target, with the packets 112 Normally, each connection needs to have a unique system wide [all …]
|
/net/ax25/ |
D | Kconfig | 10 If you want to connect your Linux box to an amateur radio, answer Y 11 here. You want to read <http://www.tapr.org/> 15 Note that the answer to this question won't directly affect the 16 kernel: saying N will just cause the configurator to skip all 27 radio. It is either used by itself for point-to-point links, or to 29 that connects your Linux box to your amateur radio. You can either 31 modem connecting your computer's serial port to your radio's 36 own drivers). If you say Y here, you also have to say Y to one of 39 Information about where to get supporting software for Linux amateur 40 radio as well as information about how to configure an AX.25 port is [all …]
|
/net/ipv4/ |
D | Kconfig | 10 intend to participate in the MBONE, a high bandwidth network on top 13 <http://www.savetz.com/mbone/>. For most people, it's safe to say N. 18 If you intend to run your Linux box mostly as a router, i.e. as a 23 The answer to this question won't directly affect the kernel: 24 answering N will just cause the configurator to skip all the 28 forwarding in your kernel; you can do that by saying Y to "/proc 41 asymmetric routing (packets from you to a host take a different path 42 than packets from that host to you) or if you operate a non-routing 68 Normally, a router decides what to do with a received packet based 70 the Linux router will also be able to take the packet's source [all …]
|
/net/x25/ |
D | Kconfig | 9 X.25 is a set of standardized network protocols, similar in scope to 10 frame relay; the one physical line from your box to the X.25 network 11 entry point can carry several logical point-to-point connections 12 (called "virtual circuits") to other computers connected to the X.25 13 network. Governments, banks, and other organizations tend to use it 14 to connect to each other or to form Wide Area Networks (WANs). Many 18 (say Y to "LAPB Data Link Driver" below if you want that). 26 One connects to an X.25 network either with a dedicated network card 29 to "X.25 async driver" below) or over Ethernet using an ordinary 30 Ethernet card and the LAPB over Ethernet (say Y to "LAPB Data Link
|
/net/6lowpan/ |
D | Kconfig | 14 This enables 6LoWPAN debugfs support. For example to manipulate 31 6LoWPAN IPv6 Destination Options Header compression according to 38 6LoWPAN IPv6 Fragment Header compression according to RFC6282. 44 6LoWPAN IPv6 Hop-by-Hop Options Header compression according to 51 6LoWPAN IPv6 Header compression according to RFC6282. 57 6LoWPAN IPv6 Mobility Header compression according to RFC6282. 63 6LoWPAN IPv6 Routing Header compression according to RFC6282. 69 6LoWPAN IPv6 UDP Header compression according to RFC6282. 75 to RFC7400. 80 6LoWPAN IPv6 UDP generic header compression according to RFC7400. [all …]
|
/net/ |
D | Kconfig | 14 when running on a stand-alone machine that isn't connected to any 23 For a general introduction to Linux networking, it is highly 24 recommended to read the NET-HOWTO, available from 40 This option makes it possible to send different netlink messages 41 to tasks depending on whether the task is a compat task or not. To 42 achieve this, you need to set skb_shinfo(skb)->frag_list to the 44 which message to actually pass to the task. 72 Ethernets. It is highly recommended to say Y here (this will enlarge 74 system) use TCP/IP even if your machine is not connected to any 76 allows you to ping yourself (great fun, that!). [all …]
|
/net/bridge/ |
D | br_forward.c | 72 static void __br_forward(const struct net_bridge_port *to, in __br_forward() argument 80 vg = nbp_vlan_group_rcu(to); in __br_forward() 81 skb = br_handle_vlan(to->br, to, vg, skb); in __br_forward() 86 skb->dev = to->dev; in __br_forward() 96 if (unlikely(netpoll_tx_running(to->br->dev))) { in __br_forward() 101 br_netpoll_send_skb(to, skb); in __br_forward() 138 void br_forward(const struct net_bridge_port *to, in br_forward() argument 141 if (unlikely(!to)) in br_forward() 145 if (rcu_access_pointer(to->backup_port) && !netif_carrier_ok(to->dev)) { in br_forward() 148 backup_port = rcu_dereference(to->backup_port); in br_forward() [all …]
|
D | Kconfig | 12 If you say Y here, then your Linux box will be able to act as an 14 is connected to will appear as one Ethernet to the participants. 15 Several such bridges can work together to create even larger 20 In order to use the Ethernet bridge, you'll need the bridge 27 iptables will then see the IP packets being bridged, so you need to 47 Say N to exclude this support and reduce the binary size. 61 Say N to exclude this support and reduce the binary size.
|
/net/qrtr/ |
D | Kconfig | 9 Say Y if you intend to use Qualcomm IPC router protocol. The 10 protocol is used to communicate with services provided by other 13 In order to do service lookups, a userspace daemon is required to 22 Say Y here to support SMD based ipcrouter channels. SMD is the 28 Say Y here to expose a character device that allows user space to 29 implement endpoints of QRTR, for purpose of tunneling data to other
|
/net/mac80211/ |
D | Kconfig | 16 comment "CFG80211 needs to be enabled for MAC80211" 64 Select this option to enable 802.11 mesh operation in mac80211 66 over (possibly multi-hop) wireless links to form a single logical 82 Select this to see extensive information about 91 Select this option to have mac80211 register the 92 mac80211_msg trace subsystem with tracepoints to 97 need to be present in the binary and formatted at 111 selected some functions are marked "noinline" to allow 116 of function calls in the code, but is otherwise safe to 119 If unsure, say N unless you expect to be finding problems [all …]
|
/net/l2tp/ |
D | Kconfig | 18 possible to both end-users and applications. 20 L2TP is often used to tunnel PPP traffic over IP 23 with home workers to connect to their offices. 25 L2TPv3 allows other protocols as well as PPP to be carried 42 used to dump internal state of the l2tp drivers for problem 62 tunneling Point-to-Point Protocol (PPP) [RFC1661] sessions. 67 If you are connecting to L2TPv3 equipment, or you want to 97 used as a control protocol and for data encapsulation to set 103 be used to assign an IP address to the local virtual 104 interface, or add the interface to a bridge. [all …]
|
/net/ipv6/netfilter/ |
D | Kconfig | 59 tristate "Netfilter IPv6 packet duplication to alternate destination" 63 packet to be rerouted to another destination. 82 for IPv6 use this, but connection tracking is going to follow. 83 Say 'Y' or 'M' here if you want to use either of those. 94 This module allows one to match AH packets. 112 frag matching allows you to match packets based on the fragmentation 121 This allows one to match packets based on the hop-by-hop 139 This module allows one to match packets based upon 148 This module allows one to match MH packets. 157 This option allows you to match packets whose replies would [all …]
|
/net/wireless/ |
D | Kconfig | 24 # may need to update this when certificates are changed and are 26 # (this is here rather than below to allow it to be a module) 32 For more information refer to documentation on the wireless wiki: 49 Debugging tools that are supposed to end up in the hands of 60 they can also trigger due to races with userspace. 64 time, the warning might trigger spuriously due to races. 76 and willing to ensure your system will remain regulatory 85 or distributions that have done work necessary to ensure 96 Require that in addition to the "regulatory.db" file a 106 Allow the regulatory database to be signed by one of the keys for [all …]
|
/net/dsa/ |
D | Kconfig | 16 Say Y if you want to enable support for the hardware switches supported 40 Say Y if you want to enable support for tagging frames for the 48 Say Y if you want to enable support for tagging frames for the 55 Say Y or M if you want to enable support for tagging frames for the 61 Say Y or M if you want to enable support for tagging frames for the 67 Say Y or M if you want to enable support for tagging frames for the 73 Say Y or M if you want to enable support for tagging frames for 79 Say Y if you want to enable support for tagging frames for the 85 Say Y or M if you want to enable support for tagging frames for 91 Say Y or M if you want to enable support for tagging frames for the [all …]
|
/net/batman-adv/ |
D | Kconfig | 15 B.A.T.M.A.N. (better approach to mobile ad-hoc networking) is 33 compatible to B.A.T.M.A.N. IV networks. 42 to avoid Ethernet frames looping when mesh nodes are connected 43 to both the same LAN and the same mesh. If you will never use 61 This option enables network coding, a mechanism that aims to 65 configured to have promiscuous mode enabled in order to make 75 This option enables the multicast optimisation which aims to 84 Enable this to export routing related debug tables via debugfs. 96 outputting debugging information to the debugfs log or tracing 105 Say Y here if you want to enable batman-adv device configuration and [all …]
|
/net/decnet/ |
D | Kconfig | 11 to those which run over TCP/IP. 13 To find some tools to use with the kernel layer support, please 20 Be sure to say Y to "/proc file system support" and "Sysctl support" 21 below when using DECnet, since you will need sysctl support to aid 35 do say Y here, then make sure that you also say Y to "Kernel/User 37 filtering". The first two are required to allow configuration via 41 to work.
|
/net/atm/ |
D | Kconfig | 14 In order to participate in an ATM network, your Linux box needs an 15 ATM networking card. If you have that, say Y here and to the driver 18 Note that you need a set of user-space programs to actually make use 27 ATMARP. If you want to communication with other IP hosts on your ATM 28 network, you will typically either say Y here or to "LAN Emulation 36 cannot be reached because there is no VC to it in the kernel's 38 briefly removed during revalidation. If you say Y here, packets to 48 ELAN and Ethernet segments. You need LANE if you want to try MPOA. 63 ATM PVCs can carry ethernet PDUs according to RFC2684 (formerly 1483) 72 This is an experimental mechanism for users who need to terminate a
|
/net/caif/ |
D | Kconfig | 11 The "Communication CPU to Application CPU Interface" (CAIF) is a packet 18 If you select to build it as module then CAIF_NETDEV also needs to be 19 built as modules. You will also need to say yes to any CAIF physical 22 See Documentation/networking/caif for a further explanation on how to 41 If you select to build it as a built-in then the main CAIF device must 52 If you select to build it as a built-in then the main CAIF device must
|
/net/xfrm/ |
D | Kconfig | 35 This provides a virtual interface to route IPsec traffic. 44 one, two policies can be applied to the same packet at once. 53 A feature to update locator(s) of a given IPsec security 56 where mobile nodes change their attachment point to the Internet. 80 PF_KEYv2 socket family, compatible to KAME ones. 81 They are required if you are going to use IPsec tools ported 91 Add a PF_KEY MIGRATE message to PF_KEYv2 socket family. 92 The PF_KEY MIGRATE message is used to dynamically update 96 change their attachment point to the Internet. Detail
|
/net/ipv4/netfilter/ |
D | Kconfig | 70 tristate "Netfilter IPv4 packet duplication to alternate destination" 74 packet to be rerouted to another destination. 101 management system to access multiple private networks with 103 inside SNMP payloads to match IP-layer NAT mapping. 128 etc) subsystems now use this: say `Y' or `M' here if you want to use 140 This match extension allows you to match a range of SPIs 159 This option allows you to match packets whose replies would 191 The REJECT target allows a filtering rule to specify that an ICMP 192 error should be issued in response to an incoming packet, rather 203 The SYNPROXY target allows you to intercept TCP connections and [all …]
|
D | nf_nat_snmp_basic_main.c | 64 __be32 to; member 74 memcpy(&s[7], &ctx->to, 4); in fast_csum() 84 memcpy(&s[4], &ctx->to, 4); in fast_csum() 116 (void *)&ctx->from, (void *)&ctx->to); in snmp_helper() 120 *pdata = ctx->to; in snmp_helper() 137 ctx.to = ct->tuplehash[!dir].tuple.dst.u3.ip; in snmp_translate() 140 ctx.to = ct->tuplehash[dir].tuple.dst.u3.ip; in snmp_translate() 143 if (ctx.from == ctx.to) in snmp_translate()
|