Lines Matching refs:to
10 When the kernel has several packets to send out over a network
11 device, it has to decide which ones to send first, which ones to
12 delay, and which ones to drop. This is the job of the queueing
13 disciplines, several different algorithms for how to do this
18 able to choose from among several alternative algorithms which can
19 then be attached to different network devices. This is useful for
21 need a certain minimum data flow rate, or if you need to limit the
23 This code is considered to be experimental.
31 This Quality of Service (QoS) support will enable you to use
33 (RSVP) on your Linux router if you also say Y to the corresponding
37 If you say Y here and to "/proc file system" below, you will be able
38 to read status information about packet schedulers from the file
42 can say Y to as many as you like. If unsure, say N now.
51 Say Y here if you want to use the Class-Based Queueing (CBQ) packet
59 say Y here. Then say Y to all the queueing algorithms below that you
60 want to use as leaf disciplines.
68 Say Y here if you want to use the Hierarchical Token Buckets (HTB)
73 HTB is very similar to CBQ regarding its goals however is has
82 Say Y here if you want to use the Hierarchical Fair Service Curve
92 Say Y here if you want to use the ATM pseudo-scheduler. This
95 the flow(s) it is handling to a given virtual circuit.
105 Say Y here if you want to use an n-band priority queue packet
114 Say Y here if you want to use an n-band queue packet scheduler
115 to support devices that have multiple hardware transmit queues.
123 Say Y here if you want to use the Random Early Detection (RED)
134 Say Y here if you want to use the Stochastic Fair Blue (SFB)
145 Say Y here if you want to use the Stochastic Fairness Queueing (SFQ)
156 Say Y here if you want to use the True Link Equalizer (TLE) packet
168 Say Y here if you want to use the Token Bucket Filter (TBF) packet
179 Say Y here if you want to use the Credit Based Shaper (CBS) packet
190 Say Y here if you want to use the Earliest TxTime First (ETF) packet
201 Say Y here if you want to use the Time Aware Priority (taprio) packet
212 Say Y here if you want to use the Generic Random Early Detection
223 Say Y if you want to schedule packets according to the
225 Technical information on this method, with pointers to associated
234 Say Y if you want to emulate network delay, loss, and packet
235 re-ordering. This is often useful to simulate networks when
246 Say Y here if you want to use the Deficit Round Robin (DRR) packet
257 Say Y here if you want to use the Multi-queue Priority scheduler.
258 This scheduler allows QOS to be offloaded on NICs that have support
269 Say Y here if you want to use the SKB priority queue
270 scheduler. This schedules packets according to skb->priority,
282 Say Y here if you want to use the CHOKe packet scheduler (CHOose
284 flows). This is a variation of RED which tries to penalize flows
293 Say Y here if you want to use the Quick Fair Queueing Scheduler (QFQ)
304 Say Y here if you want to use the Controlled Delay (CODEL)
315 Say Y here if you want to use the FQ Controlled Delay (FQ_CODEL)
326 Say Y here if you want to use the Common Applications Kept Enhanced
337 Say Y here if you want to use the FQ packet scheduling algorithm.
339 FQ does flow separation, and is able to respect pacing requirements
351 Say Y here if you want to use the Heavy-Hitter Filter (HHF)
360 Say Y here if you want to use the Proportional Integral controller
373 Say Y here if you want to use the Flow Queue Proportional Integral
388 Say Y here if you want to use classifiers for incoming and/or outgoing
390 which can also have actions attached to them. In case of outgoing packets,
392 before real enqueuing to an egress qdisc happens.
403 This queuing discipline allows userspace to plug/unplug a network
406 causes following packets to enqueue until a dequeue command arrives
407 over netlink, causing the plug to be removed and resuming the normal
412 command, only packets up to the first plug are released for delivery.
413 The Remus HA project uses this module to enable speculative execution
414 of virtual machines by allowing the generated network output to be rolled
417 For more information, please refer to <http://wiki.xenproject.org/wiki/Remus>
420 want to protect Xen guests with Remus.
430 qdiscs in one scheduler. ETS makes it easy to configure a set of
431 strict and bandwidth-sharing bands to implement the transmission
434 Say Y here if you want to use the ETS packet scheduling
500 Say Y here if you want to be able to classify packets using
512 If you say Y here, you will be able to classify packets
513 according to the route table entry they matched.
522 If you say Y here, you will be able to classify packets
523 according to netfilter/firewall marks.
532 Say Y here to be able to classify packets using a universal
542 Say Y here to make u32 gather additional statistics useful for
549 Say Y here to be able to use netfilter marks as u32 key.
555 If you say Y here, you will be able to classify packets based on
568 Say Y here if you want to classify packets based on the control
578 If you say Y here, you will be able to classify packets based on
579 programmable BPF (JIT'ed) filters as an alternative to ematches.
588 If you say Y here, you will be able to classify packets based on
598 If you say Y here, you will be able to classify packets based on
608 Say Y here if you want to use extended matches on top of classifiers
614 A recent version of the iproute2 package is required to use
631 Say Y here if you want to be able to classify packets based on
641 Say Y here if you want to be able to classify packets based on
651 Say Y here if you want to be able to classify packets using
661 Say Y here if you want to be able to classify packets based on
676 Say Y here if you want to be able to classify packets based on
686 Say Y here if you want to be able to classify CAN frames based
696 Say Y here if you want to be able to classify packets based on
706 Say Y here to be able to classify packets based on iptables
718 Say Y here if you want to use traffic control actions. Actions
719 get attached to classifiers and are invoked after a successful
720 classification. They are used to overwrite the classification
723 A recent version of the iproute2 package is required to use
730 Say Y here if you want to do traffic policing, i.e. strict
741 Say Y here to take generic actions such as dropping and
751 Say Y here to use the generic action randomly or deterministically.
757 Say Y here to allow packets to be mirrored or redirected to
768 Say Y here to allow packet sampling tc action. The packet sample
779 Say Y here to be able to invoke iptables targets after successful
789 Say Y here to do stateless NAT on IPv4 packets. You should use
799 Say Y here if you want to mangle the content of packets.
808 Say Y here to add a simple action for demonstration purposes.
811 to the console for every packet that passes by.
822 Say Y here to change skb priority or queue_mapping settings.
834 Say Y here to update some common checksum after some direct
844 Say Y here to push or pop MPLS headers.
855 Say Y here to push or pop vlan headers.
866 Say Y here to execute BPF code on packets. The BPF code will decide
879 Say Y here to allow retrieving of conn mark
891 Say Y here to allow transfer of a connmark stored information.
893 ipv4/v6 diffserv and/or to transfer connmark to packet
907 Say Y here to allow modification of skb data
919 Say Y here to allow for sourcing and terminating metadata
920 For details refer to netdev01 paper:
931 Say Y here to set/release ip tunnel metadata.
942 Say Y here to allow sending the packets to conntrack module.
953 Say Y here to allow to control the ingress flow to be passed at
962 tristate "Support to encoding decoding skb mark on IFE action"
966 tristate "Support to encoding decoding skb prio on IFE action"
970 tristate "Support to encoding decoding skb tcindex on IFE action"
979 Say Y here to allow tc chain misses to continue in OvS datapath in
980 the correct recirc_id, and hardware chain misses to continue in