Home
last modified time | relevance | path

Searched refs:fwmark (Results 1 – 11 of 11) sorted by relevance

/linux-4.4.14/net/sctp/
Dprobe.c50 static unsigned int fwmark __read_mostly = 0;
51 MODULE_PARM_DESC(fwmark, "skb mark to match (0=no mark)");
52 module_param(fwmark, uint, 0);
145 if (((port == 0 && fwmark == 0) || in jsctp_sf_eat_sack()
148 (fwmark > 0 && skb->mark == fwmark)) && in jsctp_sf_eat_sack()
225 port, fwmark, bufsize); in sctpprobe_init()
/linux-4.4.14/net/ipv4/
Dtcp_probe.c49 static unsigned int fwmark __read_mostly;
50 MODULE_PARM_DESC(fwmark, "skb mark to match (0=no mark)");
51 module_param(fwmark, uint, 0);
114 if (((port == 0 && fwmark == 0) || in jtcp_rcv_established()
117 (fwmark > 0 && skb->mark == fwmark)) && in jtcp_rcv_established()
284 port, fwmark, bufsize); in tcpprobe_init()
/linux-4.4.14/net/netfilter/ipvs/
Dip_vs_sched.c153 if (svc->fwmark) { in ip_vs_scheduler_err()
155 sched_name, svc->fwmark, svc->fwmark, msg); in ip_vs_scheduler_err()
Dip_vs_ctl.c288 static inline unsigned int ip_vs_svc_fwm_hashkey(struct netns_ipvs *ipvs, __u32 fwmark) in ip_vs_svc_fwm_hashkey() argument
290 return (((size_t)ipvs>>8) ^ fwmark) & IP_VS_SVC_TAB_MASK; in ip_vs_svc_fwm_hashkey()
308 if (svc->fwmark == 0) { in ip_vs_svc_hash()
319 hash = ip_vs_svc_fwm_hashkey(svc->ipvs, svc->fwmark); in ip_vs_svc_hash()
342 if (svc->fwmark == 0) { in ip_vs_svc_unhash()
388 __ip_vs_svc_fwm_find(struct netns_ipvs *ipvs, int af, __u32 fwmark) in __ip_vs_svc_fwm_find() argument
394 hash = ip_vs_svc_fwm_hashkey(ipvs, fwmark); in __ip_vs_svc_fwm_find()
397 if (svc->fwmark == fwmark && svc->af == af in __ip_vs_svc_fwm_find()
409 ip_vs_service_find(struct netns_ipvs *ipvs, int af, __u32 fwmark, __u16 protocol, in ip_vs_service_find() argument
417 if (fwmark) { in ip_vs_service_find()
[all …]
Dip_vs_sync.c142 __be32 fwmark; /* Firewall mark from skb */ member
164 __be32 fwmark; /* Firewall mark from skb */ member
726 s->v4.fwmark = htonl(cp->fwmark); in ip_vs_sync_conn()
842 unsigned long timeout, __u32 fwmark, in ip_vs_proc_conn() argument
906 fwmark, flags); in ip_vs_proc_conn()
909 fwmark); in ip_vs_proc_conn()
1180 ntohl(s->v4.timeout), ntohl(s->v4.fwmark), in ip_vs_proc_sync_conn()
1187 ntohl(s->v6.timeout), ntohl(s->v6.fwmark), in ip_vs_proc_sync_conn()
Dip_vs_core.c245 const union nf_inet_addr fwmark = { .ip = htonl(svc->fwmark) }; in ip_vs_sched_persist() local
308 if (svc->fwmark) { in ip_vs_sched_persist()
310 vaddr = &fwmark; in ip_vs_sched_persist()
496 if (!svc->fwmark && vport != svc->port) { in ip_vs_schedule()
580 if (sysctl_cache_bypass(ipvs) && svc->fwmark && in ip_vs_leave()
Dip_vs_conn.c645 cp->protocol, cp->fwmark, cp->flags); in ip_vs_try_bind_dest()
876 struct ip_vs_dest *dest, __u32 fwmark) in ip_vs_conn_new() argument
904 cp->fwmark = fwmark; in ip_vs_conn_new()
/linux-4.4.14/include/uapi/linux/
Dip_vs.h135 __u32 fwmark; /* firwall mark of service */ member
197 __u32 fwmark; /* firwall mark of service */ member
237 __u32 fwmark; /* firwall mark of service */ member
/linux-4.4.14/include/net/
Dip_vs.h539 __u32 fwmark; /* Fire wall mark from skb */ member
585 u32 fwmark; /* firwall mark of service */ member
627 __u32 fwmark; /* firewall mark of the service */ member
1216 struct ip_vs_dest *dest, __u32 fwmark);
1375 ip_vs_service_find(struct netns_ipvs *ipvs, int af, __u32 fwmark, __u16 protocol,
1391 __u16 protocol, __u32 fwmark, __u32 flags);
/linux-4.4.14/Documentation/networking/
Dtproxy.txt21 # ip rule add fwmark 1 lookup 100
Dip-sysctl.txt60 Controls the fwmark of kernel-generated IPv4 reply packets that are not
62 If unset, these packets have a fwmark of zero. If set, they have the
63 fwmark of the packet they are replying to.
1345 Controls the fwmark of kernel-generated IPv6 reply packets that are not
1347 If unset, these packets have a fwmark of zero. If set, they have the
1348 fwmark of the packet they are replying to.