/external/iptables/include/linux/netfilter/ |
H A D | xt_limit.h | 15 __u32 burst; /* Period multiplier for upper limit. */ member in struct:xt_rateinfo
|
H A D | xt_hashlimit.h | 29 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg 53 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg1
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
H A D | xt_limit.h | 15 __u32 burst; /* Period multiplier for upper limit. */ member in struct:xt_rateinfo
|
H A D | xt_hashlimit.h | 30 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg 54 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg1
|
/external/kernel-headers/original/uapi/linux/netfilter_bridge/ |
H A D | ebt_limit.h | 16 __u32 burst; /* Period multiplier for upper limit. */ member in struct:ebt_limit_info
|
/external/iproute2/tc/ |
H A D | tc_red.c | 50 burst + 1 - qmin/avpkt < (1-(1-W)^burst)/W 53 int tc_red_eval_ewma(unsigned qmin, unsigned burst, unsigned avpkt) argument 57 double a = (double)burst + 1 - (double)qmin/avpkt; 60 fprintf(stderr, "tc_red_eval_ewma() burst %u is too small ?" 61 " Try burst %u\n", burst, 1 + qmin/avpkt); 65 if (a <= (1 - pow(1-W, burst))/W)
|
H A D | q_choke.c | 31 fprintf(stderr, " [ min PACKETS ] [ max PACKETS ] [ burst PACKETS ]\n"); 38 unsigned burst = 0; local 77 } else if (strcmp(*argv, "burst") == 0) { 79 if (get_unsigned(&burst, *argv, 0)) { 80 fprintf(stderr, "Illegal \"burst\"\n"); 119 if (!burst) 120 burst = (2 * opt.qth_min + opt.qth_max) / 3; 132 wlog = tc_red_eval_ewma(opt.qth_min*avpkt, burst, avpkt); 138 fprintf(stderr, "CHOKE: WARNING. Burst %d seems to be too large.\n", burst);
|
H A D | q_gred.c | 42 fprintf(stderr, " avpkt BYTES burst PACKETS probability PROBABILITY " 122 unsigned burst = 0; local 173 } else if (strcmp(*argv, "burst") == 0) { 175 if (get_unsigned(&burst, *argv, 0)) { 176 fprintf(stderr, "Illegal \"burst\"\n"); 226 if (!burst) { 227 burst = (2 * opt.qth_min + opt.qth_max) / (3 * avpkt); 228 fprintf(stderr, "GRED: set burst to %u\n", burst); 231 if ((wlog = tc_red_eval_ewma(opt.qth_min, burst, avpk [all...] |
H A D | q_red.c | 31 fprintf(stderr, "Usage: ... red limit BYTES [min BYTES] [max BYTES] avpkt BYTES [burst PACKETS]\n"); 39 unsigned burst = 0; local 69 } else if (strcmp(*argv, "burst") == 0) { 71 if (get_unsigned(&burst, *argv, 0)) { 72 fprintf(stderr, "Illegal \"burst\"\n"); 127 if (!burst) 128 burst = (2 * opt.qth_min + opt.qth_max) / (3 * avpkt); 129 if ((wlog = tc_red_eval_ewma(opt.qth_min, burst, avpkt)) < 0) { 134 fprintf(stderr, "RED: WARNING. Burst %d seems to be too large.\n", burst);
|
H A D | q_sfq.c | 34 fprintf(stderr, " [ avpkt BYTES ] [ burst PACKETS ] [ probability P ]\n"); 42 unsigned int burst = 0; local 120 } else if (strcmp(*argv, "burst") == 0) { 122 if (get_unsigned(&burst, *argv, 0)) { 123 fprintf(stderr, "Illegal \"burst\"\n"); 170 if (!burst) 171 burst = (2 * opt.qth_min + opt.qth_max) / (3 * avpkt); 183 wlog = tc_red_eval_ewma(opt.qth_min, burst, avpkt); 189 fprintf(stderr, "SFQ: WARNING. Burst %u seems to be too large.\n", burst);
|
/external/iptables/extensions/ |
H A D | libxt_hashlimit.c | 48 "[--hashlimit-burst <num>] number to match in a burst, default %u\n" 88 " --hashlimit-burst <num> number to match in a burst, default %u\n" 100 {.name = "hashlimit-burst", .id = O_BURST, .type = XTTYPE_UINT32, 102 XTOPT_POINTER(s, cfg.burst)}, 133 {.name = "hashlimit-burst", .id = O_BURST, .type = XTTYPE_STRING}, 180 "\"--hashlimit-burst\", or out of range (1-%u).", XT_HASHLIMIT_BURST_MAX); 183 static uint32_t parse_burst(const char *burst, struct xt_hashlimit_mtinfo1 *info) argument 188 if (!xtables_strtoul(burst, 410 uint32_t burst = 0; local 465 print_bytes(uint32_t avg, uint32_t burst, const char *prefix) argument [all...] |
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
H A D | sctp_usrreq.c | 5469 uint8_t *burst; local 5471 SCTP_CHECK_AND_CAST(burst, optval, uint8_t, optsize); 5474 inp->sctp_ep.max_burst = *burst;
|
H A D | sctputil.c | 409 sctp_log_maxburst(struct sctp_tcb *stcb, struct sctp_nets *net, int error, int burst, uint8_t from) argument 418 sctp_clog.x.cwnd.cwnd_augment = burst;
|
/external/iproute2/include/linux/ |
H A D | pkt_cls.h | 129 __u32 burst; member in struct:tc_police
|
/external/kernel-headers/original/uapi/linux/ |
H A D | pkt_cls.h | 129 __u32 burst; member in struct:tc_police
|
/external/libnl/include/linux/ |
H A D | pkt_cls.h | 132 __u32 burst; member in struct:tc_police
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_config.h | 148 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ member in struct:hostapd_tx_queue_params
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_config.h | 148 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ member in struct:hostapd_tx_queue_params
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_config.h | 148 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ member in struct:hostapd_tx_queue_params
|