/external/iproute2/tc/ |
H A D | tc_red.h | 5 extern int tc_red_eval_ewma(unsigned qmin, unsigned burst, unsigned avpkt);
|
H A D | tc_red.c | 50 burst + 1 - qmin/avpkt < (1-(1-W)^burst)/W 53 int tc_red_eval_ewma(unsigned qmin, unsigned burst, unsigned avpkt) argument 57 double a = (double)burst + 1 - (double)qmin/avpkt; 60 fprintf(stderr, "tc_red_eval_ewma() burst %u is too small ?" 61 " Try burst %u\n", burst, 1 + qmin/avpkt); 65 if (a <= (1 - pow(1-W, burst))/W)
|
H A D | q_choke.c | 31 fprintf(stderr, " [ min PACKETS ] [ max PACKETS ] [ burst PACKETS ]\n"); 38 unsigned burst = 0; local 77 } else if (strcmp(*argv, "burst") == 0) { 79 if (get_unsigned(&burst, *argv, 0)) { 80 fprintf(stderr, "Illegal \"burst\"\n"); 119 if (!burst) 120 burst = (2 * opt.qth_min + opt.qth_max) / 3; 132 wlog = tc_red_eval_ewma(opt.qth_min*avpkt, burst, avpkt); 138 fprintf(stderr, "CHOKE: WARNING. Burst %d seems to be too large.\n", burst);
|
H A D | q_red.c | 31 fprintf(stderr, "Usage: ... red limit BYTES [min BYTES] [max BYTES] avpkt BYTES [burst PACKETS]\n"); 39 unsigned burst = 0; local 69 } else if (strcmp(*argv, "burst") == 0) { 71 if (get_unsigned(&burst, *argv, 0)) { 72 fprintf(stderr, "Illegal \"burst\"\n"); 127 if (!burst) 128 burst = (2 * opt.qth_min + opt.qth_max) / (3 * avpkt); 129 if ((wlog = tc_red_eval_ewma(opt.qth_min, burst, avpkt)) < 0) { 134 fprintf(stderr, "RED: WARNING. Burst %d seems to be too large.\n", burst);
|
H A D | q_sfq.c | 34 fprintf(stderr, " [ avpkt BYTES ] [ burst PACKETS ] [ probability P ]\n"); 42 unsigned int burst = 0; local 120 } else if (strcmp(*argv, "burst") == 0) { 122 if (get_unsigned(&burst, *argv, 0)) { 123 fprintf(stderr, "Illegal \"burst\"\n"); 170 if (!burst) 171 burst = (2 * opt.qth_min + opt.qth_max) / (3 * avpkt); 183 wlog = tc_red_eval_ewma(opt.qth_min, burst, avpkt); 189 fprintf(stderr, "SFQ: WARNING. Burst %u seems to be too large.\n", burst);
|
H A D | q_gred.c | 42 fprintf(stderr, " avpkt BYTES burst PACKETS probability PROBABILITY " 122 unsigned burst = 0; local 173 } else if (strcmp(*argv, "burst") == 0) { 175 if (get_unsigned(&burst, *argv, 0)) { 176 fprintf(stderr, "Illegal \"burst\"\n"); 226 if (!burst) { 227 burst = (2 * opt.qth_min + opt.qth_max) / (3 * avpkt); 228 fprintf(stderr, "GRED: set burst to %u\n", burst); 231 if ((wlog = tc_red_eval_ewma(opt.qth_min, burst, avpk [all...] |
H A D | m_police.c | 37 fprintf(stderr, "Usage: ... police rate BPS burst BYTES[/BYTES] [ mtu BYTES[/BYTES] ]\n"); 159 } else if (matches(*argv, "burst") == 0 || 164 fprintf(stderr, "Double \"buffer/burst\" spec\n"); 263 fprintf(stderr, "\"burst\" requires \"rate\".\n"); 284 p.burst = tc_calc_xmittime(p.rate.rate, buffer); 348 buffer = tc_calc_xmitsize(p->rate.rate, p->burst); 349 fprintf(f, "burst %s ", sprint_size(buffer, b1)); 352 fprintf(f, "[%08x] ", p->burst);
|
/external/iptables/include/linux/netfilter/ |
H A D | xt_limit.h | 15 __u32 burst; /* Period multiplier for upper limit. */ member in struct:xt_rateinfo
|
H A D | xt_hashlimit.h | 29 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg 53 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg1
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
H A D | xt_limit.h | 15 __u32 burst; /* Period multiplier for upper limit. */ member in struct:xt_rateinfo
|
H A D | xt_hashlimit.h | 30 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg 54 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg1
|
/external/kernel-headers/original/uapi/linux/netfilter_bridge/ |
H A D | ebt_limit.h | 16 __u32 burst; /* Period multiplier for upper limit. */ member in struct:ebt_limit_info
|
/external/iptables/extensions/ |
H A D | libxt_limit.c | 31 "--limit-burst number number to match in a burst, default %u\n", 37 {.name = "limit-burst", .id = O_BURST, .type = XTTYPE_UINT32, 38 .flags = XTOPT_PUT, XTOPT_POINTER(struct xt_rateinfo, burst), 85 r->burst = XT_LIMIT_BURST; 90 if (r->avg*r->burst/r->burst != r->avg) 92 "Sorry: burst too large for that avg rate.\n"); 143 printf(" burst %u", r->burst); [all...] |
H A D | libxt_hashlimit.c | 48 "[--hashlimit-burst <num>] number to match in a burst, default %u\n" 88 " --hashlimit-burst <num> number to match in a burst, default %u\n" 100 {.name = "hashlimit-burst", .id = O_BURST, .type = XTTYPE_UINT32, 102 XTOPT_POINTER(s, cfg.burst)}, 133 {.name = "hashlimit-burst", .id = O_BURST, .type = XTTYPE_STRING}, 180 "\"--hashlimit-burst\", or out of range (1-%u).", XT_HASHLIMIT_BURST_MAX); 183 static uint32_t parse_burst(const char *burst, struct xt_hashlimit_mtinfo1 *info) argument 188 if (!xtables_strtoul(burst, 410 uint32_t burst = 0; local 465 print_bytes(uint32_t avg, uint32_t burst, const char *prefix) argument [all...] |
/external/iproute2/examples/ |
H A D | SYN-DoS.rate.limit | 36 police rate 1kbit burst 40 mtu 9k drop flowid :1
|
/external/iproute2/examples/diffserv/ |
H A D | Edge2 | 38 # Allow up to at least 60 packets to burst (assuming maximum packet 44 police rate 1500kbit burst 90k mtu 9k drop flowid :1
|
/external/guava/guava-tests/test/com/google/common/util/concurrent/ |
H A D | RateLimiterTest.java | 101 limiter.acquire(1); // R0.00, concluding a burst of 5 permits 105 "R0.00", "R0.00", "R0.00", "R0.00", // first request and burst 169 limiter.acquire(11); // all these are served in a burst (10 + 1 by borrowing from the future) 283 long burst = measureTotalTimeMillis(limiter, oneSecWorthOfWork, new Random()); 284 // we allow one second worth of work to go in a burst (i.e. take less than a second) 285 assertTrue(burst <= 1000);
|
/external/iproute2/include/linux/ |
H A D | pkt_cls.h | 129 __u32 burst; member in struct:tc_police
|
/external/libnl/include/linux/ |
H A D | pkt_cls.h | 132 __u32 burst; member in struct:tc_police
|
/external/kernel-headers/original/uapi/linux/ |
H A D | pkt_cls.h | 129 __u32 burst; member in struct:tc_police
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_config.h | 173 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ member in struct:hostapd_tx_queue_params
|
H A D | hostapd.c | 1119 p->cwmax, p->burst)) {
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_config.h | 173 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ member in struct:hostapd_tx_queue_params
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_config.h | 173 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ member in struct:hostapd_tx_queue_params
|
/external/iproute2/doc/ |
H A D | ip-tunnels.tex | 436 rate 128Kbit burst 4K limit 10K 438 will limit tunneled traffic to 128Kbit with maximal burst size of 4K
|