/linux-4.4.14/net/sctp/ |
D | probe.c | 50 static unsigned int fwmark __read_mostly = 0; 51 MODULE_PARM_DESC(fwmark, "skb mark to match (0=no mark)"); 52 module_param(fwmark, uint, 0); 145 if (((port == 0 && fwmark == 0) || in jsctp_sf_eat_sack() 148 (fwmark > 0 && skb->mark == fwmark)) && in jsctp_sf_eat_sack() 225 port, fwmark, bufsize); in sctpprobe_init()
|
/linux-4.4.14/net/ipv4/ |
D | tcp_probe.c | 49 static unsigned int fwmark __read_mostly; 50 MODULE_PARM_DESC(fwmark, "skb mark to match (0=no mark)"); 51 module_param(fwmark, uint, 0); 114 if (((port == 0 && fwmark == 0) || in jtcp_rcv_established() 117 (fwmark > 0 && skb->mark == fwmark)) && in jtcp_rcv_established() 284 port, fwmark, bufsize); in tcpprobe_init()
|
/linux-4.4.14/net/netfilter/ipvs/ |
D | ip_vs_sched.c | 153 if (svc->fwmark) { in ip_vs_scheduler_err() 155 sched_name, svc->fwmark, svc->fwmark, msg); in ip_vs_scheduler_err()
|
D | ip_vs_ctl.c | 288 static inline unsigned int ip_vs_svc_fwm_hashkey(struct netns_ipvs *ipvs, __u32 fwmark) in ip_vs_svc_fwm_hashkey() argument 290 return (((size_t)ipvs>>8) ^ fwmark) & IP_VS_SVC_TAB_MASK; in ip_vs_svc_fwm_hashkey() 308 if (svc->fwmark == 0) { in ip_vs_svc_hash() 319 hash = ip_vs_svc_fwm_hashkey(svc->ipvs, svc->fwmark); in ip_vs_svc_hash() 342 if (svc->fwmark == 0) { in ip_vs_svc_unhash() 388 __ip_vs_svc_fwm_find(struct netns_ipvs *ipvs, int af, __u32 fwmark) in __ip_vs_svc_fwm_find() argument 394 hash = ip_vs_svc_fwm_hashkey(ipvs, fwmark); in __ip_vs_svc_fwm_find() 397 if (svc->fwmark == fwmark && svc->af == af in __ip_vs_svc_fwm_find() 409 ip_vs_service_find(struct netns_ipvs *ipvs, int af, __u32 fwmark, __u16 protocol, in ip_vs_service_find() argument 417 if (fwmark) { in ip_vs_service_find() [all …]
|
D | ip_vs_sync.c | 142 __be32 fwmark; /* Firewall mark from skb */ member 164 __be32 fwmark; /* Firewall mark from skb */ member 726 s->v4.fwmark = htonl(cp->fwmark); in ip_vs_sync_conn() 842 unsigned long timeout, __u32 fwmark, in ip_vs_proc_conn() argument 906 fwmark, flags); in ip_vs_proc_conn() 909 fwmark); in ip_vs_proc_conn() 1180 ntohl(s->v4.timeout), ntohl(s->v4.fwmark), in ip_vs_proc_sync_conn() 1187 ntohl(s->v6.timeout), ntohl(s->v6.fwmark), in ip_vs_proc_sync_conn()
|
D | ip_vs_core.c | 245 const union nf_inet_addr fwmark = { .ip = htonl(svc->fwmark) }; in ip_vs_sched_persist() local 308 if (svc->fwmark) { in ip_vs_sched_persist() 310 vaddr = &fwmark; in ip_vs_sched_persist() 496 if (!svc->fwmark && vport != svc->port) { in ip_vs_schedule() 580 if (sysctl_cache_bypass(ipvs) && svc->fwmark && in ip_vs_leave()
|
D | ip_vs_conn.c | 645 cp->protocol, cp->fwmark, cp->flags); in ip_vs_try_bind_dest() 876 struct ip_vs_dest *dest, __u32 fwmark) in ip_vs_conn_new() argument 904 cp->fwmark = fwmark; in ip_vs_conn_new()
|
/linux-4.4.14/include/uapi/linux/ |
D | ip_vs.h | 135 __u32 fwmark; /* firwall mark of service */ member 197 __u32 fwmark; /* firwall mark of service */ member 237 __u32 fwmark; /* firwall mark of service */ member
|
/linux-4.4.14/include/net/ |
D | ip_vs.h | 539 __u32 fwmark; /* Fire wall mark from skb */ member 585 u32 fwmark; /* firwall mark of service */ member 627 __u32 fwmark; /* firewall mark of the service */ member 1216 struct ip_vs_dest *dest, __u32 fwmark); 1375 ip_vs_service_find(struct netns_ipvs *ipvs, int af, __u32 fwmark, __u16 protocol, 1391 __u16 protocol, __u32 fwmark, __u32 flags);
|
/linux-4.4.14/Documentation/networking/ |
D | tproxy.txt | 21 # ip rule add fwmark 1 lookup 100
|
D | ip-sysctl.txt | 60 Controls the fwmark of kernel-generated IPv4 reply packets that are not 62 If unset, these packets have a fwmark of zero. If set, they have the 63 fwmark of the packet they are replying to. 1345 Controls the fwmark of kernel-generated IPv6 reply packets that are not 1347 If unset, these packets have a fwmark of zero. If set, they have the 1348 fwmark of the packet they are replying to.
|