Home
last modified time | relevance | path

Searched refs:to (Results 1 – 25 of 146) sorted by relevance

123456

/net/sched/
DKconfig10 When the kernel has several packets to send out over a network
11 device, it has to decide which ones to send first, which ones to
12 delay, and which ones to drop. This is the job of the queueing
13 disciplines, several different algorithms for how to do this
18 able to choose from among several alternative algorithms which can
19 then be attached to different network devices. This is useful for
21 need a certain minimum data flow rate, or if you need to limit the
23 This code is considered to be experimental.
31 This Quality of Service (QoS) support will enable you to use
33 (RSVP) on your Linux router if you also say Y to the corresponding
[all …]
/net/netfilter/ipvs/
DKconfig13 that will take care of intercepting incoming connections to a
14 single IP address and scheduling them to real servers.
19 be used to choose which server the connection is directed to,
24 If you want to compile it in kernel, say Y. To compile it as a
34 Add IPv6 support to IPVS.
41 Say Y here if you want to get additional messages useful in
51 The IPVS connection hash table uses the chaining scheme to handle
57 value of 2 to the your input number power. The number to choose is
58 from 8 to 27 for 64BIT(20 otherwise), the default number is 12,
61 table size yourself, according to your virtual server application.
[all …]
/net/dccp/
Doptions.c266 void dccp_encode_value_var(const u64 value, u8 *to, const u8 len) in dccp_encode_value_var() argument
269 *to++ = (value & 0xFF0000000000ull) >> 40; in dccp_encode_value_var()
271 *to++ = (value & 0xFF00000000ull) >> 32; in dccp_encode_value_var()
273 *to++ = (value & 0xFF000000) >> 24; in dccp_encode_value_var()
275 *to++ = (value & 0xFF0000) >> 16; in dccp_encode_value_var()
277 *to++ = (value & 0xFF00) >> 8; in dccp_encode_value_var()
279 *to++ = (value & 0xFF); in dccp_encode_value_var()
292 unsigned char *to; in dccp_insert_option() local
299 to = skb_push(skb, len + 2); in dccp_insert_option()
300 *to++ = option; in dccp_insert_option()
[all …]
/net/netfilter/
DKconfig10 This allows you to classify packets from ingress using the Netfilter
29 to list the base netfilter hooks via NFNETLINK.
57 and is also scheduled to replace the old syslog-based ipt_LOG
75 through your machine, in order to figure out how they are related
78 This is required to do Masquerading or other kinds of Network
79 Address Translation. It can also be used to enhance packet
91 This is a simpler but less flexible logging method compared to
93 If both are enabled the backend to use can be configured at run-time
105 `CONNMARK' target and `connmark' match. Similar to the mark value
114 This option enables security markings to be applied to
[all …]
/net/core/
Ddev_addr_lists.c698 int dev_uc_sync(struct net_device *to, struct net_device *from) in dev_uc_sync() argument
702 if (to->addr_len != from->addr_len) in dev_uc_sync()
705 netif_addr_lock(to); in dev_uc_sync()
706 err = __hw_addr_sync(&to->uc, &from->uc, to->addr_len); in dev_uc_sync()
708 __dev_set_rx_mode(to); in dev_uc_sync()
709 netif_addr_unlock(to); in dev_uc_sync()
728 int dev_uc_sync_multiple(struct net_device *to, struct net_device *from) in dev_uc_sync_multiple() argument
732 if (to->addr_len != from->addr_len) in dev_uc_sync_multiple()
735 netif_addr_lock(to); in dev_uc_sync_multiple()
736 err = __hw_addr_sync_multiple(&to->uc, &from->uc, to->addr_len); in dev_uc_sync_multiple()
[all …]
/net/ax25/
DKconfig10 If you want to connect your Linux box to an amateur radio, answer Y
11 here. You want to read <https://www.tapr.org/>
15 Note that the answer to this question won't directly affect the
16 kernel: saying N will just cause the configurator to skip all
27 radio. It is either used by itself for point-to-point links, or to
29 that connects your Linux box to your amateur radio. You can either
31 modem connecting your computer's serial port to your radio's
36 own drivers). If you say Y here, you also have to say Y to one of
39 Information about where to get supporting software for Linux amateur
40 radio as well as information about how to configure an AX.25 port is
[all …]
/net/ipv4/
DKconfig10 intend to participate in the MBONE, a high bandwidth network on top
13 <https://www.savetz.com/mbone/>. For most people, it's safe to say N.
18 If you intend to run your Linux box mostly as a router, i.e. as a
23 The answer to this question won't directly affect the kernel:
24 answering N will just cause the configurator to skip all the
28 forwarding in your kernel; you can do that by saying Y to "/proc
41 asymmetric routing (packets from you to a host take a different path
42 than packets from that host to you) or if you operate a non-routing
68 Normally, a router decides what to do with a received packet based
70 the Linux router will also be able to take the packet's source
[all …]
/net/
DKconfig14 when running on a stand-alone machine that isn't connected to any
23 For a general introduction to Linux networking, it is highly
24 recommended to read the NET-HOWTO, available from
40 This option makes it possible to send different netlink messages
41 to tasks depending on whether the task is a compat task or not. To
42 achieve this, you need to set skb_shinfo(skb)->frag_list to the
44 which message to actually pass to the task.
75 Ethernets. It is highly recommended to say Y here (this will enlarge
77 system) use TCP/IP even if your machine is not connected to any
79 allows you to ping yourself (great fun, that!).
[all …]
/net/x25/
DKconfig9 X.25 is a set of standardized network protocols, similar in scope to
10 frame relay; the one physical line from your box to the X.25 network
11 entry point can carry several logical point-to-point connections
12 (called "virtual circuits") to other computers connected to the X.25
13 network. Governments, banks, and other organizations tend to use it
14 to connect to each other or to form Wide Area Networks (WANs). Many
18 (say Y to "LAPB Data Link Driver" below if you want that).
26 One connects to an X.25 network either with a dedicated network card
29 to "X.25 async driver" below) or over Ethernet using an ordinary
30 Ethernet card and the LAPB over Ethernet (say Y to "LAPB Data Link
/net/6lowpan/
DKconfig14 This enables 6LoWPAN debugfs support. For example to manipulate
31 6LoWPAN IPv6 Destination Options Header compression according to
38 6LoWPAN IPv6 Fragment Header compression according to RFC6282.
44 6LoWPAN IPv6 Hop-by-Hop Options Header compression according to
51 6LoWPAN IPv6 Header compression according to RFC6282.
57 6LoWPAN IPv6 Mobility Header compression according to RFC6282.
63 6LoWPAN IPv6 Routing Header compression according to RFC6282.
69 6LoWPAN IPv6 UDP Header compression according to RFC6282.
75 to RFC7400.
80 6LoWPAN IPv6 UDP generic header compression according to RFC7400.
[all …]
/net/qrtr/
DKconfig8 Say Y if you intend to use Qualcomm IPC router protocol. The
9 protocol is used to communicate with services provided by other
12 In order to do service lookups, a userspace daemon is required to
21 Say Y here to support SMD based ipcrouter channels. SMD is the
27 Say Y here to expose a character device that allows user space to
28 implement endpoints of QRTR, for purpose of tunneling data to other
35 Say Y here to support MHI based ipcrouter channels. MHI is the
36 transport used for communicating to external modems.
/net/bridge/
Dbr_forward.c73 static void __br_forward(const struct net_bridge_port *to, in __br_forward() argument
84 nbp_switchdev_frame_mark_tx_fwd_offload(to, skb); in __br_forward()
86 vg = nbp_vlan_group_rcu(to); in __br_forward()
87 skb = br_handle_vlan(to->br, to, vg, skb); in __br_forward()
92 skb->dev = to->dev; in __br_forward()
102 if (unlikely(netpoll_tx_running(to->br->dev))) { in __br_forward()
107 br_netpoll_send_skb(to, skb); in __br_forward()
144 void br_forward(const struct net_bridge_port *to, in br_forward() argument
147 if (unlikely(!to)) in br_forward()
151 if (rcu_access_pointer(to->backup_port) && !netif_carrier_ok(to->dev)) { in br_forward()
[all …]
DKconfig12 If you say Y here, then your Linux box will be able to act as an
14 is connected to will appear as one Ethernet to the participants.
15 Several such bridges can work together to create even larger
20 In order to use the Ethernet bridge, you'll need the bridge
27 iptables will then see the IP packets being bridged, so you need to
47 Say N to exclude this support and reduce the binary size.
61 Say N to exclude this support and reduce the binary size.
70 If you say Y here, then the Ethernet bridge will be able to run MRP
71 protocol to detect loops
73 Say N to exclude this support and reduce the binary size.
[all …]
/net/dsa/
DKconfig14 Say Y if you want to enable support for the hardware switches supported
24 Say Y or M if you want to enable support for tagging frames for
35 Say Y if you want to enable support for tagging frames for the
42 Say Y if you want to enable support for tagging frames for the
50 Say Y if you want to enable support for tagging frames for the
57 Say Y or M if you want to enable support for tagging frames
63 Say Y or M if you want to enable support for tagging frames for the
73 Say Y or M if you want to enable support for tagging frames for the
80 Say Y or M if you want to enable support for tagging frames for the
86 Say Y or M if you want to enable support for tagging frames for
[all …]
/net/mac80211/
DKconfig16 comment "CFG80211 needs to be enabled for MAC80211"
64 Select this option to enable 802.11 mesh operation in mac80211
66 over (possibly multi-hop) wireless links to form a single logical
82 Select this to see extensive information about
91 Select this option to have mac80211 register the
92 mac80211_msg trace subsystem with tracepoints to
97 need to be present in the binary and formatted at
111 selected some functions are marked "noinline" to allow
116 of function calls in the code, but is otherwise safe to
119 If unsure, say N unless you expect to be finding problems
[all …]
/net/l2tp/
DKconfig18 possible to both end-users and applications.
20 L2TP is often used to tunnel PPP traffic over IP
23 with home workers to connect to their offices.
25 L2TPv3 allows other protocols as well as PPP to be carried
42 used to dump internal state of the l2tp drivers for problem
62 tunneling Point-to-Point Protocol (PPP) [RFC1661] sessions.
67 If you are connecting to L2TPv3 equipment, or you want to
97 used as a control protocol and for data encapsulation to set
103 be used to assign an IP address to the local virtual
104 interface, or add the interface to a bridge.
[all …]
/net/ipv6/netfilter/
DKconfig59 tristate "Netfilter IPv6 packet duplication to alternate destination"
63 packet to be rerouted to another destination.
85 for IPv6 use this, but connection tracking is going to follow.
86 Say 'Y' or 'M' here if you want to use either of those.
97 This module allows one to match AH packets.
115 frag matching allows you to match packets based on the fragmentation
124 This allows one to match packets based on the hop-by-hop
142 This module allows one to match packets based upon
151 This module allows one to match MH packets.
160 This option allows you to match packets whose replies would
[all …]
/net/wireless/
DKconfig25 # may need to update this when certificates are changed and are
27 # (this is here rather than below to allow it to be a module)
33 For more information refer to documentation on the wireless wiki:
50 Debugging tools that are supposed to end up in the hands of
61 they can also trigger due to races with userspace.
65 time, the warning might trigger spuriously due to races.
77 and willing to ensure your system will remain regulatory
86 or distributions that have done work necessary to ensure
97 Require that in addition to the "regulatory.db" file a
107 Allow the regulatory database to be signed by one of the keys for
[all …]
/net/hsr/
DKconfig12 If you say Y here, then your Linux box will be able to act as a
14 attached node implementing PRP"). For this to work, your Linux box
24 For DANP, it must be connected as a node connecting to two
26 frames sent over the PRP device will be sent to both networks giving
29 etc and will be able to communicate with DANP nodes.
31 This code is a "best effort" to comply with the HSR standard as
34 compliancy tests have been made. Use iproute2 to select the protocol
35 you would like to use.
37 You need to perform any and all necessary tests yourself before
/net/atm/
DKconfig14 In order to participate in an ATM network, your Linux box needs an
15 ATM networking card. If you have that, say Y here and to the driver
18 Note that you need a set of user-space programs to actually make use
27 ATMARP. If you want to communication with other IP hosts on your ATM
28 network, you will typically either say Y here or to "LAN Emulation
36 cannot be reached because there is no VC to it in the kernel's
38 briefly removed during revalidation. If you say Y here, packets to
48 ELAN and Ethernet segments. You need LANE if you want to try MPOA.
63 ATM PVCs can carry ethernet PDUs according to RFC2684 (formerly 1483)
72 This is an experimental mechanism for users who need to terminate a
/net/batman-adv/
DKconfig14 B.A.T.M.A.N. (better approach to mobile ad-hoc networking) is
32 compatible to B.A.T.M.A.N. IV networks.
41 to avoid Ethernet frames looping when mesh nodes are connected
42 to both the same LAN and the same mesh. If you will never use
60 This option enables network coding, a mechanism that aims to
64 configured to have promiscuous mode enabled in order to make
74 This option enables the multicast optimisation which aims to
84 outputting debugging information to the tracing buffer. The output is
93 say N here. Select this option to gather traces like the debug
95 BATMAN_ADV_DEBUG must also be selected to get trace events for
/net/caif/
DKconfig11 The "Communication CPU to Application CPU Interface" (CAIF) is a packet
18 If you select to build it as module then CAIF_NETDEV also needs to be
19 built as a module. You will also need to say Y (or M) to any CAIF
22 See Documentation/networking/caif for a further explanation on how to
41 If you select to build it as a built-in then the main CAIF device must
52 If you select to build it as a built-in then the main CAIF device must
/net/ipv4/netfilter/
DKconfig70 tristate "Netfilter IPv4 packet duplication to alternate destination"
74 packet to be rerouted to another destination.
107 management system to access multiple private networks with
109 inside SNMP payloads to match IP-layer NAT mapping.
134 etc) subsystems now use this: say `Y' or `M' here if you want to use
146 This match extension allows you to match a range of SPIs
165 This option allows you to match packets whose replies would
197 The REJECT target allows a filtering rule to specify that an ICMP
198 error should be issued in response to an incoming packet, rather
209 The SYNPROXY target allows you to intercept TCP connections and
[all …]
Dnf_nat_snmp_basic_main.c64 __be32 to; member
74 memcpy(&s[7], &ctx->to, 4); in fast_csum()
84 memcpy(&s[4], &ctx->to, 4); in fast_csum()
116 (void *)&ctx->from, (void *)&ctx->to); in snmp_helper()
120 *pdata = ctx->to; in snmp_helper()
137 ctx.to = ct->tuplehash[!dir].tuple.dst.u3.ip; in snmp_translate()
140 ctx.to = ct->tuplehash[dir].tuple.dst.u3.ip; in snmp_translate()
143 if (ctx.from == ctx.to) in snmp_translate()
/net/can/
DKconfig9 Controller Area Network (CAN) is a slow (up to 1Mbit/s) serial
17 If you want CAN support you should say Y here and also to the
26 The raw CAN protocol option offers access to the CAN bus via
27 the BSD socket API. You probably want to use the raw socket in
40 You probably want to use the bcm socket in most cases where cyclic
48 The CAN Gateway/Router is used to route (and modify) CAN frames.
60 CAN Transport Protocols offer support for segmented Point-to-Point
64 segmentation is needed to transport longer Protocol Data Units (PDU)
67 This protocol driver implements data transfers according to
69 If you want to perform automotive vehicle diagnostic services (UDS),

123456