/external/iproute2/tc/ |
H A D | tc_red.h | 5 extern int tc_red_eval_ewma(unsigned qmin, unsigned burst, unsigned avpkt);
|
H A D | tc_red.c | 50 burst + 1 - qmin/avpkt < (1-(1-W)^burst)/W 53 int tc_red_eval_ewma(unsigned qmin, unsigned burst, unsigned avpkt) argument 57 double a = (double)burst + 1 - (double)qmin/avpkt; 60 fprintf(stderr, "tc_red_eval_ewma() burst %u is too small ?" 61 " Try burst %u\n", burst, 1 + qmin/avpkt); 65 if (a <= (1 - pow(1-W, burst))/W)
|
H A D | q_choke.c | 31 fprintf(stderr, " [ min PACKETS ] [ max PACKETS ] [ burst PACKETS ]\n"); 38 unsigned burst = 0; local 77 } else if (strcmp(*argv, "burst") == 0) { 79 if (get_unsigned(&burst, *argv, 0)) { 80 fprintf(stderr, "Illegal \"burst\"\n"); 119 if (!burst) 120 burst = (2 * opt.qth_min + opt.qth_max) / 3; 132 wlog = tc_red_eval_ewma(opt.qth_min*avpkt, burst, avpkt); 138 fprintf(stderr, "CHOKE: WARNING. Burst %d seems to be too large.\n", burst);
|
H A D | q_red.c | 31 fprintf(stderr, "Usage: ... red limit BYTES [min BYTES] [max BYTES] avpkt BYTES [burst PACKETS]\n"); 39 unsigned burst = 0; local 69 } else if (strcmp(*argv, "burst") == 0) { 71 if (get_unsigned(&burst, *argv, 0)) { 72 fprintf(stderr, "Illegal \"burst\"\n"); 127 if (!burst) 128 burst = (2 * opt.qth_min + opt.qth_max) / (3 * avpkt); 129 if ((wlog = tc_red_eval_ewma(opt.qth_min, burst, avpkt)) < 0) { 134 fprintf(stderr, "RED: WARNING. Burst %d seems to be too large.\n", burst);
|
H A D | q_sfq.c | 34 fprintf(stderr, " [ avpkt BYTES ] [ burst PACKETS ] [ probability P ]\n"); 42 unsigned int burst = 0; local 120 } else if (strcmp(*argv, "burst") == 0) { 122 if (get_unsigned(&burst, *argv, 0)) { 123 fprintf(stderr, "Illegal \"burst\"\n"); 170 if (!burst) 171 burst = (2 * opt.qth_min + opt.qth_max) / (3 * avpkt); 183 wlog = tc_red_eval_ewma(opt.qth_min, burst, avpkt); 189 fprintf(stderr, "SFQ: WARNING. Burst %u seems to be too large.\n", burst);
|
H A D | q_gred.c | 42 fprintf(stderr, " avpkt BYTES burst PACKETS probability PROBABILITY " 122 unsigned burst = 0; local 173 } else if (strcmp(*argv, "burst") == 0) { 175 if (get_unsigned(&burst, *argv, 0)) { 176 fprintf(stderr, "Illegal \"burst\"\n"); 226 if (!burst) { 227 burst = (2 * opt.qth_min + opt.qth_max) / (3 * avpkt); 228 fprintf(stderr, "GRED: set burst to %u\n", burst); 231 if ((wlog = tc_red_eval_ewma(opt.qth_min, burst, avpk [all...] |
H A D | m_police.c | 37 fprintf(stderr, "Usage: ... police rate BPS burst BYTES[/BYTES] [ mtu BYTES[/BYTES] ]\n"); 159 } else if (matches(*argv, "burst") == 0 || 164 fprintf(stderr, "Double \"buffer/burst\" spec\n"); 263 fprintf(stderr, "\"burst\" requires \"rate\".\n"); 284 p.burst = tc_calc_xmittime(p.rate.rate, buffer); 348 buffer = tc_calc_xmitsize(p->rate.rate, p->burst); 349 fprintf(f, "burst %s ", sprint_size(buffer, b1)); 352 fprintf(f, "[%08x] ", p->burst);
|
/external/iptables/include/linux/netfilter/ |
H A D | xt_limit.h | 15 __u32 burst; /* Period multiplier for upper limit. */ member in struct:xt_rateinfo
|
H A D | xt_hashlimit.h | 29 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg 53 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg1
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
H A D | xt_limit.h | 15 __u32 burst; /* Period multiplier for upper limit. */ member in struct:xt_rateinfo
|
H A D | xt_hashlimit.h | 30 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg 54 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg1
|
/external/kernel-headers/original/uapi/linux/netfilter_bridge/ |
H A D | ebt_limit.h | 16 __u32 burst; /* Period multiplier for upper limit. */ member in struct:ebt_limit_info
|
/external/iptables/extensions/ |
H A D | libxt_limit.c | 31 "--limit-burst number number to match in a burst, default %u\n", 37 {.name = "limit-burst", .id = O_BURST, .type = XTTYPE_UINT32, 38 .flags = XTOPT_PUT, XTOPT_POINTER(struct xt_rateinfo, burst), 85 r->burst = XT_LIMIT_BURST; 90 if (r->avg*r->burst/r->burst != r->avg) 92 "Sorry: burst too large for that avg rate.\n"); 143 printf(" burst %u", r->burst); [all...] |
H A D | libxt_hashlimit.c | 48 "[--hashlimit-burst <num>] number to match in a burst, default %u\n" 88 " --hashlimit-burst <num> number to match in a burst, default %u\n" 100 {.name = "hashlimit-burst", .id = O_BURST, .type = XTTYPE_UINT32, 102 XTOPT_POINTER(s, cfg.burst)}, 133 {.name = "hashlimit-burst", .id = O_BURST, .type = XTTYPE_STRING}, 180 "\"--hashlimit-burst\", or out of range (1-%u).", XT_HASHLIMIT_BURST_MAX); 183 static uint32_t parse_burst(const char *burst, struct xt_hashlimit_mtinfo1 *info) argument 188 if (!xtables_strtoul(burst, 410 uint32_t burst = 0; local 465 print_bytes(uint32_t avg, uint32_t burst, const char *prefix) argument [all...] |
/external/chromium_org/net/quic/congestion_control/ |
H A D | hybrid_slow_start_test.cc | 57 // we expect to be able to send a burst of 30 packet before we trigger the 62 for (int burst = 0; burst < kMaxLoopCount; ++burst) { 89 // Will not trigger since our lowest RTT in our burst is the same as the long 100 // Expect to trigger since all packets in this burst was above the long term
|
/external/iproute2/examples/ |
H A D | SYN-DoS.rate.limit | 36 police rate 1kbit burst 40 mtu 9k drop flowid :1
|
/external/linux-tools-perf/perf-3.12.0/arch/metag/lib/ |
H A D | memset.S | 59 ! This does a byte structured burst of up to 7 bytes 63 ! D1Ar5 should be burst size (<= D1Ar3)
|
/external/iproute2/examples/diffserv/ |
H A D | Edge2 | 38 # Allow up to at least 60 packets to burst (assuming maximum packet 44 police rate 1500kbit burst 90k mtu 9k drop flowid :1
|
/external/iproute2/include/linux/ |
H A D | pkt_cls.h | 129 __u32 burst; member in struct:tc_police
|
/external/libnl/include/linux/ |
H A D | pkt_cls.h | 132 __u32 burst; member in struct:tc_police
|
/external/kernel-headers/original/uapi/linux/ |
H A D | pkt_cls.h | 129 __u32 burst; member in struct:tc_police
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_config.h | 148 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ member in struct:hostapd_tx_queue_params
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_config.h | 148 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ member in struct:hostapd_tx_queue_params
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_config.h | 148 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ member in struct:hostapd_tx_queue_params
|
/external/iproute2/doc/ |
H A D | ip-tunnels.tex | 436 rate 128Kbit burst 4K limit 10K 438 will limit tunneled traffic to 128Kbit with maximal burst size of 4K
|