/net/netfilter/ |
D | nft_set_bitmap.c | 94 struct nft_bitmap_elem *be; in nft_bitmap_elem_find() local 96 list_for_each_entry_rcu(be, &priv->list, head) { in nft_bitmap_elem_find() 97 if (memcmp(nft_set_ext_key(&be->ext), in nft_bitmap_elem_find() 99 !nft_set_elem_active(&be->ext, genmask)) in nft_bitmap_elem_find() 102 return be; in nft_bitmap_elem_find() 112 struct nft_bitmap_elem *be; in nft_bitmap_get() local 114 list_for_each_entry_rcu(be, &priv->list, head) { in nft_bitmap_get() 115 if (memcmp(nft_set_ext_key(&be->ext), elem->key.val.data, set->klen) || in nft_bitmap_get() 116 !nft_set_elem_active(&be->ext, genmask)) in nft_bitmap_get() 119 return be; in nft_bitmap_get() [all …]
|
D | Kconfig | 79 Address Translation. It can also be used to enhance packet 93 If both are enabled the backend to use can be configured at run-time 114 This option enables security markings to be applied to 139 to be shown in procfs under net/netfilter/nf_conntrack. This 148 provide a notifier chain that can be used by other kernel code 178 to connection tracking entries. It can be used with xtables connlabel 187 tracking code will be able to do state tracking on DCCP connections. 201 tracking code will be able to do state tracking on SCTP connections. 211 tracking code will be able to do state tracking on UDP-Lite 223 on this machine or machines that will be MASQUERADED through this [all …]
|
/net/sched/ |
D | Kconfig | 17 is a FIFO (first come, first served). If you say Y here, you will be 19 then be attached to different network devices. This is useful for 23 This code is considered to be experimental. 37 If you say Y here and to "/proc file system" below, you will be able 60 module will be called sch_htb. 69 module will be called sch_hfsc. 78 module will be called sch_prio. 87 module will be called sch_multiq. 98 module will be called sch_red. 109 module will be called sch_sfb. [all …]
|
/net/mac80211/ |
D | Kconfig | 16 comment "CFG80211 needs to be enabled for MAC80211" 37 mac80211 will use. Note that this default can still be 97 need to be present in the binary and formatted at 119 If unsure, say N unless you expect to be finding problems 127 many debugging messages. It should not be selected 139 should not be selected on production systems as some 160 It should not be selected on production systems as some 171 be selected on production systems as those messages 182 be selected on production systems as those messages 194 It should not be selected on production systems as those [all …]
|
/net/caif/ |
D | Kconfig | 18 If you select to build it as module then CAIF_NETDEV also needs to be 39 Say Y if you will be using a CAIF based GPRS network device. 40 This can be either built-in or a loadable module. 42 also be a built-in. 51 This can be either built-in or a loadable module. 53 also be a built-in.
|
/net/hsr/ |
D | Kconfig | 12 If you say Y here, then your Linux box will be able to act as a 17 For DANH, it must be connected as a node in a ring network together 19 device will be sent in both directions on the ring (over both slave 24 For DANP, it must be connected as a node connecting to two 26 frames sent over the PRP device will be sent to both networks giving 29 etc and will be able to communicate with DANP nodes.
|
/net/wireless/ |
D | Kconfig | 27 # (this is here rather than below to allow it to be a module) 37 When built as a module it will be called cfg80211. 51 users should better be implemented with debugfs. 79 Some options may still be under heavy development and 81 cannot yet be verified. Regulatory verification may at 82 times only be possible until you have the final system 85 This option should only be enabled by system integrators 98 "regulatory.db.p7s" can be loaded with a valid PKCS#7 107 Allow the regulatory database to be signed by one of the keys for 120 that shall be accepted for a signed regulatory database. [all …]
|
/net/vmw_vsock/ |
D | Kconfig | 17 will be called vsock. If unsure, say N. 39 will be called vsock_loopback. If unsure, say N. 51 will be called vmw_vsock_vmci_transport. If unsure, say N. 63 To compile this driver as a module, choose M here: the module will be 70 the virtio_vsock. The module will be called 82 To compile this driver as a module, choose M here: the module will be
|
/net/l2tp/ |
D | Kconfig | 25 L2TPv3 allows other protocols as well as PPP to be carried 41 Support for l2tp directory in debugfs filesystem. This may be 48 will be called l2tp_debugfs. 83 must be enabled in firewalls. 86 will be called l2tp_ip. 96 The Layer 2 Tunneling Protocol, Version 3 (L2TPv3) can be 103 be used to assign an IP address to the local virtual 110 will be called l2tp_eth.
|
/net/atm/ |
D | br2684.c | 536 struct atm_backend_br2684 be; in br2684_regvcc() local 539 if (copy_from_user(&be, arg, sizeof be)) in br2684_regvcc() 552 net_dev = br2684_find_dev(&be.ifspec); in br2684_regvcc() 568 if (be.fcs_in != BR2684_FCSIN_NO || in br2684_regvcc() 569 be.fcs_out != BR2684_FCSOUT_NO || in br2684_regvcc() 570 be.fcs_auto || be.has_vpiid || be.send_padding || in br2684_regvcc() 571 (be.encaps != BR2684_ENCAPS_VC && in br2684_regvcc() 572 be.encaps != BR2684_ENCAPS_LLC) || in br2684_regvcc() 573 be.min_size != 0) { in br2684_regvcc() 577 pr_debug("vcc=%p, encaps=%d, brvcc=%p\n", atmvcc, be.encaps, brvcc); in br2684_regvcc() [all …]
|
D | pppoatm.c | 391 struct atm_backend_ppp be; in pppoatm_assign_vcc() local 395 if (copy_from_user(&be, arg, sizeof be)) in pppoatm_assign_vcc() 397 if (be.encaps != PPPOATM_ENCAPS_AUTODETECT && in pppoatm_assign_vcc() 398 be.encaps != PPPOATM_ENCAPS_VC && be.encaps != PPPOATM_ENCAPS_LLC) in pppoatm_assign_vcc() 411 pvcc->encaps = (enum pppoatm_encaps) be.encaps; in pppoatm_assign_vcc() 415 (be.encaps == e_vc ? 0 : LLC_LEN); in pppoatm_assign_vcc()
|
/net/bridge/ |
D | Kconfig | 12 If you say Y here, then your Linux box will be able to act as an 33 will be called bridge. 43 If you say Y here, then the Ethernet bridge will be able selectively 57 If you say Y here, then the Ethernet bridge will be able selectively 70 If you say Y here, then the Ethernet bridge will be able to run MRP 81 If you say Y here, then the Ethernet bridge will be able to run CFM
|
/net/sunrpc/ |
D | Kconfig | 31 daemon which may be found in the Linux nfs-utils package 33 Kerberos support should be installed. 46 they were found to be insecure. 59 that is be used by the 'rpcdebug' utility to turn on or off 77 will be called rpcrdma.ko.
|
/net/phonet/ |
D | Kconfig | 13 supported). It can also be used to control Nokia phones 14 from a Linux computer, although AT commands may be easier to use. 17 will be called phonet. If unsure, say N.
|
/net/ipv4/ |
D | Kconfig | 20 will then be presented with several options that allow more precise 70 the Linux router will also be able to take the packet's source 72 of the packet can be used for routing decisions as well. 84 Normally, the routing tables specify a single action to be taken in 88 for those packets. The router considers all these paths to be of 98 received packets which look strange and could be evidence of an 123 net via NFS and you want the IP address of your computer to be 131 must be operating on your network. Read 140 net via NFS and you want the IP address of your computer to be 146 want to use BOOTP, a BOOTP server must be operating on your network. [all …]
|
/net/xfrm/ |
D | Kconfig | 55 one, two policies can be applied to the same packet at once. 56 Policy which lives shorter time in kernel should be a sub. 82 # RFC 8221 lists as MUST be implemented. 91 # algorithms that RFC 8221 lists as MUST be implemented. 132 information can be found in the internet-draft
|
/net/openvswitch/ |
D | Kconfig | 36 To compile this code as a module, choose M here: the module will be 47 If you say Y here, then the Open vSwitch will be able create GRE 60 If you say Y here, then the Open vSwitch will be able create vxlan vport. 72 If you say Y here, then the Open vSwitch will be able create geneve vport.
|
/net/dccp/ |
D | Kconfig | 12 congestion-controlled, unreliable datagrams. It should be suitable 17 module will be called dccp. 38 When compiling DCCP as a module, this debugging output can be toggled
|
/net/ipv6/ |
D | Kconfig | 20 module will be called ipv6. 46 autoconfigured addresses to be used more quickly. 56 AH can be used with various authentication algorithms. Besides 58 implementations of the algorithms that RFC 8221 lists as MUST be 71 ESP can be used with various encryption and authentication algorithms. 73 implementations of the algorithms that RFC 8221 lists as MUST be 138 ILA can be configured using the "encap ila" option with 161 encapsulating protocol. This can be used with xfrm mode tunnel to give 254 may sometimes lead to unintended routing behavior. This can be 276 will also be able to take interfaces and packet marks into
|
/net/netfilter/ipvs/ |
D | Kconfig | 12 option must be enabled for at least one of the clustered computers 19 be used to choose which server the connection is directed to, 20 thus load balancing can be achieved among the servers. For more 56 Note the table size must be power of 2. The table size will be the 66 average in the connection table, the table size should be not far 243 destinations changes, a connection will likely be sent to the same 266 When there is an idle server available, the job will be sent to 268 is no idle server available, the job will be sent to the server 298 needs to be large enough to effectively fit all the destinations 315 proportional to the weights specified. The table needs to be large [all …]
|
/net/dccp/ccids/ |
D | Kconfig | 9 The debugging output can additionally be toggled by setting the 20 be reasonably fair when competing for bandwidth with TCP-like flows, 45 The debugging output can additionally be toggled by setting the
|
/net/tipc/ |
D | Kconfig | 19 can be inserted in and removed from the running kernel whenever you 20 want). The module will be called tipc. If you want to compile it 47 All TIPC messages will be encrypted/decrypted by using the currently most
|
/net/ax25/ |
D | Kconfig | 49 module will be called ax25. 63 be enabled at runtime. For more about DAMA see 78 be explicitly enabled, so if unsure, say Y. 96 module will be called netrom. 115 module will be called rose.
|
/net/nfc/ |
D | Kconfig | 15 be called nfc. 29 be called nfc_digital.
|
/net/dns_resolver/ |
D | Kconfig | 10 which can be used to make upcalls to perform DNS lookups in 25 To compile this as a module, choose M here: the module will be called
|