/net/ceph/crush/ |
D | mapper.c | 376 static int crush_bucket_choose(const struct crush_bucket *in, in crush_bucket_choose() argument 382 dprintk(" crush_bucket_choose %d x=%d r=%d\n", in->id, x, r); in crush_bucket_choose() 383 BUG_ON(in->size == 0); in crush_bucket_choose() 384 switch (in->alg) { in crush_bucket_choose() 387 (const struct crush_bucket_uniform *)in, in crush_bucket_choose() 390 return bucket_list_choose((const struct crush_bucket_list *)in, in crush_bucket_choose() 393 return bucket_tree_choose((const struct crush_bucket_tree *)in, in crush_bucket_choose() 397 (const struct crush_bucket_straw *)in, in crush_bucket_choose() 401 (const struct crush_bucket_straw2 *)in, in crush_bucket_choose() 404 dprintk("unknown bucket %d alg %d\n", in->id, in->alg); in crush_bucket_choose() [all …]
|
/net/netfilter/ipvs/ |
D | Kconfig | 24 If you want to compile it in kernel, say Y. To compile it as a 41 Say Y here if you want to get additional messages useful in 43 level in /proc/sys/net/ipv4/vs/debug_level 54 in the hash table. 64 connection in the table. For example, your virtual server gets 200 65 connections per second, the connection lasts for 200 seconds in 66 average in the connection table, the table size should be not far 75 IP VS was compiled built-in. 119 connections to different real servers in a round-robin manner. 121 If you want to compile it in kernel, say Y. To compile it as a [all …]
|
/net/caif/ |
D | Kconfig | 30 Enable the inclusion of debug code in the CAIF stack. 40 This can be either built-in or a loadable module. 41 If you select to build it as a built-in then the main CAIF device must 42 also be a built-in. 51 This can be either built-in or a loadable module. 52 If you select to build it as a built-in then the main CAIF device must 53 also be a built-in.
|
/net/mac80211/ |
D | Kconfig | 64 Select this option to enable 802.11 mesh operation in mac80211 79 bool "Export mac80211 internals in DebugFS" 83 the internal state of mac80211 in debugfs. 96 The overhead in this option is that all the messages 97 need to be present in the binary and formatted at 110 This option affects code generation in mac80211, when 112 easier debugging of problems in the transmit and receive 116 of function calls in the code, but is otherwise safe to 120 in mac80211. 206 is taking part in a mesh network). [all …]
|
/net/ipv6/ |
D | Kconfig | 31 are placed in a multi-homed network. 61 them in the crypto API. You should also enable accelerated 76 them in the crypto API. You should also enable accelerated 95 bool "IPv6: ESP in TCP encapsulation (RFC 8229)" 120 Support for IPv6 Mobility described in RFC 3775. 135 identifier is the identity of an entity in communication 140 "ip -6 route" command. ILA is described in 167 tristate "IPv6: IPv6-in-IPv4 tunnel (SIT driver)" 189 customer premise equipment. Like 6to4, it utilizes stateless IPv6 in 190 IPv4 encapsulation in order to transit IPv4-only network [all …]
|
/net/ax25/ |
D | ax25_addr.c | 284 void ax25_digi_invert(const ax25_digi *in, ax25_digi *out) in ax25_digi_invert() argument 288 out->ndigi = in->ndigi; in ax25_digi_invert() 289 out->lastrepeat = in->ndigi - in->lastrepeat - 2; in ax25_digi_invert() 292 for (ct = 0; ct < in->ndigi; ct++) { in ax25_digi_invert() 293 out->calls[ct] = in->calls[in->ndigi - ct - 1]; in ax25_digi_invert()
|
D | Kconfig | 41 contained in the AX25-HOWTO, available from 43 check out the file <file:Documentation/networking/ax25.rst> in the 44 kernel source. More information about digital amateur radio in 60 transparent in that you don't have to do any special DAMA 75 transparent in that you don't have to do any special DAMA 89 contained in the Linux Ham Wiki, available from 92 digital amateur radio in general is on the WWW at 103 connections in general and amateur radio AX.25 connections in 108 contained in the Linux Ham Wiki, available from 111 digital amateur radio in general is on the WWW at
|
/net/netfilter/ |
D | nf_log_syslog.c | 112 const struct net_device *in, in nf_log_dump_packet_common() argument 122 in ? in->name : "", in nf_log_dump_packet_common() 126 if (physindev && in != physindev) in nf_log_dump_packet_common() 136 const struct net_device *in, in nf_log_arp_packet() argument 151 nf_log_dump_packet_common(m, pf, hooknum, skb, in, out, loginfo, in nf_log_arp_packet() 833 const struct net_device *in, in nf_log_ip_packet() argument 848 nf_log_dump_packet_common(m, pf, hooknum, skb, in, in nf_log_ip_packet() 851 if (in) in nf_log_ip_packet() 868 const struct net_device *in, in nf_log_ip6_packet() argument 883 nf_log_dump_packet_common(m, pf, hooknum, skb, in, out, in nf_log_ip6_packet() [all …]
|
/net/sctp/ |
D | stream.c | 121 ret = genradix_prealloc(&stream->in, incnt, gfp); in sctp_stream_alloc_in() 192 genradix_free(&stream->in); in sctp_stream_free() 217 stream->in = new->in; in sctp_stream_update() 224 new->in.tree.root = NULL; in sctp_stream_update() 273 bool out, in; in sctp_send_reset_streams() local 287 in = params->srs_flags & SCTP_STREAM_RESET_INCOMING; in sctp_send_reset_streams() 288 if (!out && !in) in sctp_send_reset_streams() 305 if (in) { in sctp_send_reset_streams() 334 chunk = sctp_make_strreset_req(asoc, str_nums, nstr_list, out, in); in sctp_send_reset_streams() 374 asoc->strreset_outstanding = out + in; in sctp_send_reset_streams() [all …]
|
/net/hsr/ |
D | Kconfig | 17 For DANH, it must be connected as a node in a ring network together 19 device will be sent in both directions on the ring (over both slave 21 in the ring acts like a bridge for HSR frames, but filters frames 32 described in IEC 62439-3:2010 (HSRv0) and IEC 62439-3:2012 (HSRv1), 33 and PRP standard described in IEC 62439-4:2012 (PRP), but no 38 relying on this code in a safety critical system!
|
/net/netfilter/ipset/ |
D | Kconfig | 9 ipset(8). You can use the sets in netfilter via the "set" match 61 in a set. 89 address triples in a set. 99 network address/prefix triples in a set. 108 one can store IPv4/IPv6 address and MAC (ethernet address) pairs in a set. 117 one can store MAC (ethernet address) elements in a set. 126 one can store two IPv4/IPv6 subnets, and a protocol/port in a set. 135 one can store IPv4/IPv6 network address/prefix elements in a set. 144 one can store IPv4/IPv6 network address/prefix pairs in a set. 154 protocol/port pairs as elements in a set. [all …]
|
/net/dccp/ccids/ |
D | Kconfig | 12 If in doubt, say N. 28 CCID-3 is further described in RFC 4342, 31 The TFRC congestion control algorithms were initially described in 37 If in doubt, say N. 48 If in doubt, say N.
|
/net/wireless/ |
D | Kconfig | 50 Debugging tools that are supposed to end up in the hands of 83 in place. 89 you are a wireless researcher and are working in a controlled 97 Require that in addition to the "regulatory.db" file a 100 keys in the certs/ directory. 109 (in net/wireless/certs/). 119 certificates like in the kernel sources (net/wireless/certs/) 123 for your certificates, and if cfg80211 is built-in they also must be. 152 capabilities. However, note that in order to not create daisy chain 153 scenarios, this relaxation is not allowed in cases where the BSS client [all …]
|
/net/can/ |
D | Kconfig | 10 communications protocol. Development of the CAN bus started in 12 released in 1986. The CAN bus was originally mainly for automotive, 13 but is now widely used in marine (NMEA2000), industrial, and medical 15 PF_CAN is contained in <Documentation/networking/can.rst>. 28 the BSD socket API. You probably want to use the raw socket in 41 You probably want to use the bcm socket in most cases where cyclic 42 CAN messages are used on the bus (e.g. in automotive environments).
|
/net/bridge/netfilter/ |
D | nft_meta_bridge.c | 26 const struct net_device *in = nft_in(pkt), *out = nft_out(pkt); in nft_meta_bridge_get_eval() local 32 br_dev = nft_meta_get_bridge(in); in nft_meta_bridge_get_eval() 40 br_dev = nft_meta_get_bridge(in); in nft_meta_bridge_get_eval() 44 br_vlan_get_pvid_rcu(in, &p_pvid); in nft_meta_bridge_get_eval() 51 br_dev = nft_meta_get_bridge(in); in nft_meta_bridge_get_eval()
|
D | Kconfig | 34 through your machine, in order to figure out how they are related 141 the 'nfmark' value in the frame. This can be set by the mark target. 142 This value is the same as the one used in the iptables mark match and 196 setting the 'nfmark' value in the frame. 197 This value is the same as the one used in the iptables mark match and 223 This option adds the log watcher, that you can use in any rule 224 in any ebtables table. It records info about the frame header 237 This option adds the nflog watcher, that you can use in any rule 238 in any ebtables table.
|
/net/tls/ |
D | tls_device_fallback.c | 53 struct scatter_walk *in, in tls_enc_record() argument 77 scatterwalk_copychunks(buf, in, len, 0); in tls_enc_record() 84 scatterwalk_pagedone(in, 0, 1); in tls_enc_record() 98 chain_to_walk(sg_in + 1, in); in tls_enc_record() 118 scatterwalk_copychunks(NULL, in, len, 2); in tls_enc_record() 119 scatterwalk_pagedone(in, 0, 1); in tls_enc_record() 157 struct scatter_walk out, in; in tls_enc_records() local 160 scatterwalk_start(&in, sg_in); in tls_enc_records() 165 cpu_to_be64(rcd_sn), &in, &out, &len, prot); in tls_enc_records() 170 scatterwalk_done(&in, 0, 0); in tls_enc_records()
|
/net/ipv4/netfilter/ |
D | nf_tproxy_ipv4.c | 79 const struct net_device *in, in nf_tproxy_get_sock_v4() argument 99 in->ifindex, 0); in nf_tproxy_get_sock_v4() 111 daddr, dport, in->ifindex); in nf_tproxy_get_sock_v4() 120 in->ifindex); in nf_tproxy_get_sock_v4()
|
/net/l2tp/ |
D | Kconfig | 17 intervening network in a way that is as transparent as 26 over L2TP tunnels. L2TPv3 is defined in RFC 3931 41 Support for l2tp directory in debugfs filesystem. This may be 61 originally defined in RFC 2661, is a standard method for 82 in IP packets, it used IP protocol number 115, so this port 83 must be enabled in firewalls.
|
/net/ipv6/netfilter/ |
D | nf_tproxy_ipv6.c | 80 const struct net_device *in, in nf_tproxy_get_sock_v6() argument 101 in->ifindex, 0); in nf_tproxy_get_sock_v6() 113 ntohs(dport), in->ifindex, 0); in nf_tproxy_get_sock_v6() 122 in->ifindex); in nf_tproxy_get_sock_v6()
|
/net/9p/ |
D | trans_virtio.c | 259 int in, out, out_sgs, in_sgs; in p9_virtio_request() local 277 in = pack_sg_list(chan->sg, out, in p9_virtio_request() 279 if (in) in p9_virtio_request() 426 int in, out, err, out_sgs, in_sgs; in p9_virtio_zc_request() local 498 in = pack_sg_list(chan->sg, out, in p9_virtio_zc_request() 500 if (in) in p9_virtio_zc_request() 504 sgs[out_sgs + in_sgs++] = chan->sg + out + in; in p9_virtio_zc_request() 505 in += pack_sg_list_p(chan->sg, out + in, VIRTQUEUE_NUM, in p9_virtio_zc_request()
|
/net/mptcp/ |
D | Kconfig | 10 subflows in order to utilize multiple network paths. Each subflow 34 For more information on KUnit and unit tests in general please refer 35 to the KUnit documentation in Documentation/dev-tools/kunit/.
|
/net/ |
D | Kconfig | 19 in the kernel and the tools often go hand in hand. The tools are 20 contained in the package net-tools, the location and version number 21 of which are given in <file:Documentation/Changes>. 87 behavior of the TCP/IP code by writing to the (virtual) files in 88 /proc/sys/net/ipv4/*; the options are explained in the file 112 bool "Timestamping in PHY devices" 117 capabilities. This option adds some overhead in the transmit 158 Another use of Netfilter is in transparent proxying: if a machine on 282 Cgroup subsystem for use in assigning processes to network priorities on 291 being used in cls_cgroup and for netfilter matching. [all …]
|
/net/openvswitch/ |
D | Kconfig | 21 expected in a traditional hardware switch, it enables fine-grained 23 control is useful in a wide variety of applications but is 24 particularly important in multi-server virtualization deployments, 28 The Open vSwitch datapath provides an in-kernel fast path for packet
|
/net/dsa/ |
D | Kconfig | 22 tristate "Tag driver for Atheros AR9331 SoC with built-in switch" 25 the Atheros AR9331 SoC with built-in switch. 32 tristate "Tag driver for Broadcom switches using in-frame headers" 39 tristate "Tag driver for Broadcom legacy switches using in-frame headers" 103 (PAUSE frames) over the CPU port is not supported when operating in 112 Flow control over the CPU port is functional in this mode. When using 126 Realtek switches with 4 byte protocol A tags, sich as found in
|