/net/sched/ |
D | Kconfig | 10 When the kernel has several packets to send out over a network 11 device, it has to decide which ones to send first, which ones to 12 delay, and which ones to drop. This is the job of the queueing 13 disciplines, several different algorithms for how to do this 18 able to choose from among several alternative algorithms which can 19 then be attached to different network devices. This is useful for 21 need a certain minimum data flow rate, or if you need to limit the 23 This code is considered to be experimental. 31 This Quality of Service (QoS) support will enable you to use 33 (RSVP) on your Linux router if you also say Y to the corresponding [all …]
|
/net/netfilter/ipvs/ |
D | Kconfig | 13 that will take care of intercepting incoming connections to a 14 single IP address and scheduling them to real servers. 19 be used to choose which server the connection is directed to, 24 If you want to compile it in kernel, say Y. To compile it as a 34 Add IPv6 support to IPVS. 41 Say Y here if you want to get additional messages useful in 51 The IPVS connection hash table uses the chaining scheme to handle 57 value of 2 to the your input number power. The number to choose is 58 from 8 to 27 for 64BIT(20 otherwise), the default number is 12, 61 table size yourself, according to your virtual server application. [all …]
|
/net/dccp/ |
D | options.c | 266 void dccp_encode_value_var(const u64 value, u8 *to, const u8 len) in dccp_encode_value_var() argument 269 *to++ = (value & 0xFF0000000000ull) >> 40; in dccp_encode_value_var() 271 *to++ = (value & 0xFF00000000ull) >> 32; in dccp_encode_value_var() 273 *to++ = (value & 0xFF000000) >> 24; in dccp_encode_value_var() 275 *to++ = (value & 0xFF0000) >> 16; in dccp_encode_value_var() 277 *to++ = (value & 0xFF00) >> 8; in dccp_encode_value_var() 279 *to++ = (value & 0xFF); in dccp_encode_value_var() 292 unsigned char *to; in dccp_insert_option() local 299 to = skb_push(skb, len + 2); in dccp_insert_option() 300 *to++ = option; in dccp_insert_option() [all …]
|
/net/netfilter/ |
D | Kconfig | 10 This allows you to classify packets from ingress using the Netfilter 29 to list the base netfilter hooks via NFNETLINK. 57 and is also scheduled to replace the old syslog-based ipt_LOG 75 through your machine, in order to figure out how they are related 78 This is required to do Masquerading or other kinds of Network 79 Address Translation. It can also be used to enhance packet 91 This is a simpler but less flexible logging method compared to 93 If both are enabled the backend to use can be configured at run-time 105 `CONNMARK' target and `connmark' match. Similar to the mark value 114 This option enables security markings to be applied to [all …]
|
/net/core/ |
D | dev_addr_lists.c | 698 int dev_uc_sync(struct net_device *to, struct net_device *from) in dev_uc_sync() argument 702 if (to->addr_len != from->addr_len) in dev_uc_sync() 705 netif_addr_lock(to); in dev_uc_sync() 706 err = __hw_addr_sync(&to->uc, &from->uc, to->addr_len); in dev_uc_sync() 708 __dev_set_rx_mode(to); in dev_uc_sync() 709 netif_addr_unlock(to); in dev_uc_sync() 728 int dev_uc_sync_multiple(struct net_device *to, struct net_device *from) in dev_uc_sync_multiple() argument 732 if (to->addr_len != from->addr_len) in dev_uc_sync_multiple() 735 netif_addr_lock(to); in dev_uc_sync_multiple() 736 err = __hw_addr_sync_multiple(&to->uc, &from->uc, to->addr_len); in dev_uc_sync_multiple() [all …]
|
/net/ax25/ |
D | Kconfig | 10 If you want to connect your Linux box to an amateur radio, answer Y 11 here. You want to read <https://www.tapr.org/> 15 Note that the answer to this question won't directly affect the 16 kernel: saying N will just cause the configurator to skip all 27 radio. It is either used by itself for point-to-point links, or to 29 that connects your Linux box to your amateur radio. You can either 31 modem connecting your computer's serial port to your radio's 36 own drivers). If you say Y here, you also have to say Y to one of 39 Information about where to get supporting software for Linux amateur 40 radio as well as information about how to configure an AX.25 port is [all …]
|
/net/ipv4/ |
D | Kconfig | 10 intend to participate in the MBONE, a high bandwidth network on top 13 <https://www.savetz.com/mbone/>. For most people, it's safe to say N. 18 If you intend to run your Linux box mostly as a router, i.e. as a 23 The answer to this question won't directly affect the kernel: 24 answering N will just cause the configurator to skip all the 28 forwarding in your kernel; you can do that by saying Y to "/proc 41 asymmetric routing (packets from you to a host take a different path 42 than packets from that host to you) or if you operate a non-routing 68 Normally, a router decides what to do with a received packet based 70 the Linux router will also be able to take the packet's source [all …]
|
/net/ |
D | Kconfig | 14 when running on a stand-alone machine that isn't connected to any 23 For a general introduction to Linux networking, it is highly 24 recommended to read the NET-HOWTO, available from 40 This option makes it possible to send different netlink messages 41 to tasks depending on whether the task is a compat task or not. To 42 achieve this, you need to set skb_shinfo(skb)->frag_list to the 44 which message to actually pass to the task. 75 Ethernets. It is highly recommended to say Y here (this will enlarge 77 system) use TCP/IP even if your machine is not connected to any 79 allows you to ping yourself (great fun, that!). [all …]
|
/net/x25/ |
D | Kconfig | 9 X.25 is a set of standardized network protocols, similar in scope to 10 frame relay; the one physical line from your box to the X.25 network 11 entry point can carry several logical point-to-point connections 12 (called "virtual circuits") to other computers connected to the X.25 13 network. Governments, banks, and other organizations tend to use it 14 to connect to each other or to form Wide Area Networks (WANs). Many 18 (say Y to "LAPB Data Link Driver" below if you want that). 26 One connects to an X.25 network either with a dedicated network card 29 to "X.25 async driver" below) or over Ethernet using an ordinary 30 Ethernet card and the LAPB over Ethernet (say Y to "LAPB Data Link
|
/net/6lowpan/ |
D | Kconfig | 14 This enables 6LoWPAN debugfs support. For example to manipulate 31 6LoWPAN IPv6 Destination Options Header compression according to 38 6LoWPAN IPv6 Fragment Header compression according to RFC6282. 44 6LoWPAN IPv6 Hop-by-Hop Options Header compression according to 51 6LoWPAN IPv6 Header compression according to RFC6282. 57 6LoWPAN IPv6 Mobility Header compression according to RFC6282. 63 6LoWPAN IPv6 Routing Header compression according to RFC6282. 69 6LoWPAN IPv6 UDP Header compression according to RFC6282. 75 to RFC7400. 80 6LoWPAN IPv6 UDP generic header compression according to RFC7400. [all …]
|
/net/qrtr/ |
D | Kconfig | 8 Say Y if you intend to use Qualcomm IPC router protocol. The 9 protocol is used to communicate with services provided by other 12 In order to do service lookups, a userspace daemon is required to 21 Say Y here to support SMD based ipcrouter channels. SMD is the 27 Say Y here to expose a character device that allows user space to 28 implement endpoints of QRTR, for purpose of tunneling data to other 35 Say Y here to support MHI based ipcrouter channels. MHI is the 36 transport used for communicating to external modems.
|
/net/bridge/ |
D | br_forward.c | 73 static void __br_forward(const struct net_bridge_port *to, in __br_forward() argument 84 nbp_switchdev_frame_mark_tx_fwd_offload(to, skb); in __br_forward() 86 vg = nbp_vlan_group_rcu(to); in __br_forward() 87 skb = br_handle_vlan(to->br, to, vg, skb); in __br_forward() 92 skb->dev = to->dev; in __br_forward() 102 if (unlikely(netpoll_tx_running(to->br->dev))) { in __br_forward() 107 br_netpoll_send_skb(to, skb); in __br_forward() 144 void br_forward(const struct net_bridge_port *to, in br_forward() argument 147 if (unlikely(!to)) in br_forward() 151 if (rcu_access_pointer(to->backup_port) && !netif_carrier_ok(to->dev)) { in br_forward() [all …]
|
D | Kconfig | 12 If you say Y here, then your Linux box will be able to act as an 14 is connected to will appear as one Ethernet to the participants. 15 Several such bridges can work together to create even larger 20 In order to use the Ethernet bridge, you'll need the bridge 27 iptables will then see the IP packets being bridged, so you need to 47 Say N to exclude this support and reduce the binary size. 61 Say N to exclude this support and reduce the binary size. 70 If you say Y here, then the Ethernet bridge will be able to run MRP 71 protocol to detect loops 73 Say N to exclude this support and reduce the binary size. [all …]
|
/net/dsa/ |
D | Kconfig | 14 Say Y if you want to enable support for the hardware switches supported 24 Say Y or M if you want to enable support for tagging frames for 35 Say Y if you want to enable support for tagging frames for the 42 Say Y if you want to enable support for tagging frames for the 50 Say Y if you want to enable support for tagging frames for the 57 Say Y or M if you want to enable support for tagging frames 63 Say Y or M if you want to enable support for tagging frames for the 73 Say Y or M if you want to enable support for tagging frames for the 80 Say Y or M if you want to enable support for tagging frames for the 86 Say Y or M if you want to enable support for tagging frames for [all …]
|
/net/mac80211/ |
D | Kconfig | 16 comment "CFG80211 needs to be enabled for MAC80211" 64 Select this option to enable 802.11 mesh operation in mac80211 66 over (possibly multi-hop) wireless links to form a single logical 82 Select this to see extensive information about 91 Select this option to have mac80211 register the 92 mac80211_msg trace subsystem with tracepoints to 97 need to be present in the binary and formatted at 111 selected some functions are marked "noinline" to allow 116 of function calls in the code, but is otherwise safe to 119 If unsure, say N unless you expect to be finding problems [all …]
|
/net/l2tp/ |
D | Kconfig | 18 possible to both end-users and applications. 20 L2TP is often used to tunnel PPP traffic over IP 23 with home workers to connect to their offices. 25 L2TPv3 allows other protocols as well as PPP to be carried 42 used to dump internal state of the l2tp drivers for problem 62 tunneling Point-to-Point Protocol (PPP) [RFC1661] sessions. 67 If you are connecting to L2TPv3 equipment, or you want to 97 used as a control protocol and for data encapsulation to set 103 be used to assign an IP address to the local virtual 104 interface, or add the interface to a bridge. [all …]
|
/net/ipv6/netfilter/ |
D | Kconfig | 59 tristate "Netfilter IPv6 packet duplication to alternate destination" 63 packet to be rerouted to another destination. 85 for IPv6 use this, but connection tracking is going to follow. 86 Say 'Y' or 'M' here if you want to use either of those. 97 This module allows one to match AH packets. 115 frag matching allows you to match packets based on the fragmentation 124 This allows one to match packets based on the hop-by-hop 142 This module allows one to match packets based upon 151 This module allows one to match MH packets. 160 This option allows you to match packets whose replies would [all …]
|
/net/wireless/ |
D | Kconfig | 25 # may need to update this when certificates are changed and are 27 # (this is here rather than below to allow it to be a module) 33 For more information refer to documentation on the wireless wiki: 50 Debugging tools that are supposed to end up in the hands of 61 they can also trigger due to races with userspace. 65 time, the warning might trigger spuriously due to races. 77 and willing to ensure your system will remain regulatory 86 or distributions that have done work necessary to ensure 97 Require that in addition to the "regulatory.db" file a 107 Allow the regulatory database to be signed by one of the keys for [all …]
|
/net/hsr/ |
D | Kconfig | 12 If you say Y here, then your Linux box will be able to act as a 14 attached node implementing PRP"). For this to work, your Linux box 24 For DANP, it must be connected as a node connecting to two 26 frames sent over the PRP device will be sent to both networks giving 29 etc and will be able to communicate with DANP nodes. 31 This code is a "best effort" to comply with the HSR standard as 34 compliancy tests have been made. Use iproute2 to select the protocol 35 you would like to use. 37 You need to perform any and all necessary tests yourself before
|
/net/atm/ |
D | Kconfig | 14 In order to participate in an ATM network, your Linux box needs an 15 ATM networking card. If you have that, say Y here and to the driver 18 Note that you need a set of user-space programs to actually make use 27 ATMARP. If you want to communication with other IP hosts on your ATM 28 network, you will typically either say Y here or to "LAN Emulation 36 cannot be reached because there is no VC to it in the kernel's 38 briefly removed during revalidation. If you say Y here, packets to 48 ELAN and Ethernet segments. You need LANE if you want to try MPOA. 63 ATM PVCs can carry ethernet PDUs according to RFC2684 (formerly 1483) 72 This is an experimental mechanism for users who need to terminate a
|
/net/batman-adv/ |
D | Kconfig | 14 B.A.T.M.A.N. (better approach to mobile ad-hoc networking) is 32 compatible to B.A.T.M.A.N. IV networks. 41 to avoid Ethernet frames looping when mesh nodes are connected 42 to both the same LAN and the same mesh. If you will never use 60 This option enables network coding, a mechanism that aims to 64 configured to have promiscuous mode enabled in order to make 74 This option enables the multicast optimisation which aims to 84 outputting debugging information to the tracing buffer. The output is 93 say N here. Select this option to gather traces like the debug 95 BATMAN_ADV_DEBUG must also be selected to get trace events for
|
/net/caif/ |
D | Kconfig | 11 The "Communication CPU to Application CPU Interface" (CAIF) is a packet 18 If you select to build it as module then CAIF_NETDEV also needs to be 19 built as a module. You will also need to say Y (or M) to any CAIF 22 See Documentation/networking/caif for a further explanation on how to 41 If you select to build it as a built-in then the main CAIF device must 52 If you select to build it as a built-in then the main CAIF device must
|
/net/ipv4/netfilter/ |
D | Kconfig | 70 tristate "Netfilter IPv4 packet duplication to alternate destination" 74 packet to be rerouted to another destination. 107 management system to access multiple private networks with 109 inside SNMP payloads to match IP-layer NAT mapping. 134 etc) subsystems now use this: say `Y' or `M' here if you want to use 146 This match extension allows you to match a range of SPIs 165 This option allows you to match packets whose replies would 197 The REJECT target allows a filtering rule to specify that an ICMP 198 error should be issued in response to an incoming packet, rather 209 The SYNPROXY target allows you to intercept TCP connections and [all …]
|
D | nf_nat_snmp_basic_main.c | 64 __be32 to; member 74 memcpy(&s[7], &ctx->to, 4); in fast_csum() 84 memcpy(&s[4], &ctx->to, 4); in fast_csum() 116 (void *)&ctx->from, (void *)&ctx->to); in snmp_helper() 120 *pdata = ctx->to; in snmp_helper() 137 ctx.to = ct->tuplehash[!dir].tuple.dst.u3.ip; in snmp_translate() 140 ctx.to = ct->tuplehash[dir].tuple.dst.u3.ip; in snmp_translate() 143 if (ctx.from == ctx.to) in snmp_translate()
|
/net/can/ |
D | Kconfig | 9 Controller Area Network (CAN) is a slow (up to 1Mbit/s) serial 17 If you want CAN support you should say Y here and also to the 26 The raw CAN protocol option offers access to the CAN bus via 27 the BSD socket API. You probably want to use the raw socket in 40 You probably want to use the bcm socket in most cases where cyclic 48 The CAN Gateway/Router is used to route (and modify) CAN frames. 60 CAN Transport Protocols offer support for segmented Point-to-Point 64 segmentation is needed to transport longer Protocol Data Units (PDU) 67 This protocol driver implements data transfers according to 69 If you want to perform automotive vehicle diagnostic services (UDS),
|