/external/iproute2/tc/ |
H A D | tc_red.h | 5 extern int tc_red_eval_ewma(unsigned qmin, unsigned burst, unsigned avpkt);
|
H A D | tc_red.c | 50 burst + 1 - qmin/avpkt < (1-(1-W)^burst)/W 53 int tc_red_eval_ewma(unsigned qmin, unsigned burst, unsigned avpkt) argument 57 double a = (double)burst + 1 - (double)qmin/avpkt; 62 if (a <= (1 - pow(1-W, burst))/W)
|
H A D | q_red.c | 30 fprintf(stderr, "Usage: ... red limit BYTES min BYTES max BYTES avpkt BYTES burst PACKETS\n"); 37 unsigned burst = 0; local 67 } else if (strcmp(*argv, "burst") == 0) { 69 if (get_unsigned(&burst, *argv, 0)) { 70 fprintf(stderr, "Illegal \"burst\"\n"); 107 if (!opt.qth_min || !opt.qth_max || !burst || !opt.limit || !avpkt) { 108 fprintf(stderr, "Required parameter (min, max, burst, limit, avpkt) is missing\n"); 112 if ((wlog = tc_red_eval_ewma(opt.qth_min, burst, avpkt)) < 0) { 117 fprintf(stderr, "RED: WARNING. Burst %d seems to be to large.\n", burst);
|
H A D | q_gred.c | 41 fprintf(stderr, " avpkt BYTES burst PACKETS probability PROBABILITY " 122 unsigned burst = 0; local 172 } else if (strcmp(*argv, "burst") == 0) { 174 if (get_unsigned(&burst, *argv, 0)) { 175 fprintf(stderr, "Illegal \"burst\"\n"); 219 if (!opt.qth_min || !opt.qth_max || !burst || !opt.limit || !avpkt || 221 fprintf(stderr, "Required parameter (min, max, burst, limit, " 226 if ((wlog = tc_red_eval_ewma(opt.qth_min, burst, avpkt)) < 0) { 232 "large.\n", burst);
|
H A D | m_police.c | 37 fprintf(stderr, "Usage: ... police rate BPS burst BYTES[/BYTES] [ mtu BYTES[/BYTES] ]\n"); 159 } else if (matches(*argv, "burst") == 0 || 164 fprintf(stderr, "Double \"buffer/burst\" spec\n"); 263 fprintf(stderr, "\"burst\" requires \"rate\".\n"); 284 p.burst = tc_calc_xmittime(p.rate.rate, buffer); 348 buffer = tc_calc_xmitsize(p->rate.rate, p->burst); 349 fprintf(f, "burst %s ", sprint_size(buffer, b1)); 352 fprintf(f, "[%08x] ", p->burst);
|
/external/iptables/include/linux/netfilter/ |
H A D | xt_limit.h | 15 __u32 burst; /* Period multiplier for upper limit. */ member in struct:xt_rateinfo
|
H A D | xt_hashlimit.h | 25 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg 49 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg1
|
/external/kernel-headers/original/linux/netfilter/ |
H A D | xt_limit.h | 11 u_int32_t burst; /* Period multiplier for upper limit. */ member in struct:xt_rateinfo
|
/external/kernel-headers/original/linux/netfilter_ipv4/ |
H A D | ipt_hashlimit.h | 20 u_int32_t burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg
|
/external/iptables/extensions/ |
H A D | libxt_limit.c | 28 "--limit-burst number number to match in a burst, default %u\n", 34 {.name = "limit-burst", .id = O_BURST, .type = XTTYPE_UINT32, 35 .flags = XTOPT_PUT, XTOPT_POINTER(struct xt_rateinfo, burst), 81 r->burst = XT_LIMIT_BURST; 86 if (r->avg*r->burst/r->burst != r->avg) 88 "Sorry: burst too large for that avg rate.\n"); 134 printf(" burst %u", r->burst); [all...] |
H A D | libxt_hashlimit.c | 38 "[--hashlimit-burst <num>] number to match in a burst, default %u\n" 76 " --hashlimit-burst <num> number to match in a burst, default %u\n" 88 {.name = "hashlimit-burst", .id = O_BURST, .type = XTTYPE_UINT32, 90 XTOPT_POINTER(s, cfg.burst)}, 121 {.name = "hashlimit-burst", .id = O_BURST, .type = XTTYPE_UINT32, 123 XTOPT_POINTER(s, cfg.burst)}, 183 r->cfg.burst = XT_HASHLIMIT_BURST; 194 info->cfg.burst [all...] |
/external/iproute2/examples/ |
H A D | SYN-DoS.rate.limit | 36 police rate 1kbit burst 40 mtu 9k drop flowid :1
|
/external/iproute2/examples/diffserv/ |
H A D | Edge2 | 38 # Allow up to at least 60 packets to burst (assuming maximum packet 44 police rate 1500kbit burst 90k mtu 9k drop flowid :1
|
/external/iproute2/include/linux/ |
H A D | pkt_cls.h | 129 __u32 burst; member in struct:tc_police
|
/external/kernel-headers/original/linux/ |
H A D | pkt_cls.h | 132 __u32 burst; member in struct:tc_police
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_config.h | 137 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ member in struct:hostapd_tx_queue_params
|
H A D | hostapd.c | 810 p->cwmax, p->burst)) {
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_config.h | 137 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ member in struct:hostapd_tx_queue_params
|
H A D | hostapd.c | 810 p->cwmax, p->burst)) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_config.h | 137 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ member in struct:hostapd_tx_queue_params
|
H A D | hostapd.c | 810 p->cwmax, p->burst)) {
|
/external/iproute2/doc/ |
H A D | ip-tunnels.tex | 436 rate 128Kbit burst 4K limit 10K 438 will limit tunneled traffic to 128Kbit with maximal burst size of 4K
|
/external/wpa_supplicant_8/hostapd/ |
H A D | config_file.c | 899 } else if (os_strcmp(pos, "burst") == 0) { 900 queue->burst = hostapd_config_read_int10(val);
|