Home
last modified time | relevance | path

Searched refs:fwmark (Results 1 – 11 of 11) sorted by relevance

/linux-4.1.27/net/sctp/
Dprobe.c50 static unsigned int fwmark __read_mostly = 0;
51 MODULE_PARM_DESC(fwmark, "skb mark to match (0=no mark)");
52 module_param(fwmark, uint, 0);
145 if (((port == 0 && fwmark == 0) || in jsctp_sf_eat_sack()
148 (fwmark > 0 && skb->mark == fwmark)) && in jsctp_sf_eat_sack()
225 port, fwmark, bufsize); in sctpprobe_init()
/linux-4.1.27/net/ipv4/
Dtcp_probe.c49 static unsigned int fwmark __read_mostly;
50 MODULE_PARM_DESC(fwmark, "skb mark to match (0=no mark)");
51 module_param(fwmark, uint, 0);
114 if (((port == 0 && fwmark == 0) || in jtcp_rcv_established()
117 (fwmark > 0 && skb->mark == fwmark)) && in jtcp_rcv_established()
284 port, fwmark, bufsize); in tcpprobe_init()
/linux-4.1.27/net/netfilter/ipvs/
Dip_vs_sched.c153 if (svc->fwmark) { in ip_vs_scheduler_err()
155 sched_name, svc->fwmark, svc->fwmark, msg); in ip_vs_scheduler_err()
Dip_vs_ctl.c288 static inline unsigned int ip_vs_svc_fwm_hashkey(struct net *net, __u32 fwmark) in ip_vs_svc_fwm_hashkey() argument
290 return (((size_t)net>>8) ^ fwmark) & IP_VS_SVC_TAB_MASK; in ip_vs_svc_fwm_hashkey()
308 if (svc->fwmark == 0) { in ip_vs_svc_hash()
319 hash = ip_vs_svc_fwm_hashkey(svc->net, svc->fwmark); in ip_vs_svc_hash()
342 if (svc->fwmark == 0) { in ip_vs_svc_unhash()
388 __ip_vs_svc_fwm_find(struct net *net, int af, __u32 fwmark) in __ip_vs_svc_fwm_find() argument
394 hash = ip_vs_svc_fwm_hashkey(net, fwmark); in __ip_vs_svc_fwm_find()
397 if (svc->fwmark == fwmark && svc->af == af in __ip_vs_svc_fwm_find()
409 ip_vs_service_find(struct net *net, int af, __u32 fwmark, __u16 protocol, in ip_vs_service_find() argument
418 if (fwmark) { in ip_vs_service_find()
[all …]
Dip_vs_sync.c142 __be32 fwmark; /* Firewall mark from skb */ member
164 __be32 fwmark; /* Firewall mark from skb */ member
725 s->v4.fwmark = htonl(cp->fwmark); in ip_vs_sync_conn()
841 unsigned long timeout, __u32 fwmark, in ip_vs_proc_conn() argument
906 fwmark, flags); in ip_vs_proc_conn()
909 fwmark); in ip_vs_proc_conn()
1180 ntohl(s->v4.timeout), ntohl(s->v4.fwmark), in ip_vs_proc_sync_conn()
1187 ntohl(s->v6.timeout), ntohl(s->v6.fwmark), in ip_vs_proc_sync_conn()
Dip_vs_core.c245 const union nf_inet_addr fwmark = { .ip = htonl(svc->fwmark) }; in ip_vs_sched_persist() local
298 if (svc->fwmark) { in ip_vs_sched_persist()
300 vaddr = &fwmark; in ip_vs_sched_persist()
467 if (!svc->fwmark && pptr[1] != svc->port) { in ip_vs_schedule()
557 if (ipvs->sysctl_cache_bypass && svc->fwmark && unicast) { in ip_vs_leave()
Dip_vs_conn.c643 cp->protocol, cp->fwmark, cp->flags); in ip_vs_try_bind_dest()
875 struct ip_vs_dest *dest, __u32 fwmark) in ip_vs_conn_new() argument
903 cp->fwmark = fwmark; in ip_vs_conn_new()
/linux-4.1.27/include/uapi/linux/
Dip_vs.h135 __u32 fwmark; /* firwall mark of service */ member
197 __u32 fwmark; /* firwall mark of service */ member
237 __u32 fwmark; /* firwall mark of service */ member
/linux-4.1.27/include/net/
Dip_vs.h547 __u32 fwmark; /* Fire wall mark from skb */ member
620 u32 fwmark; /* firwall mark of service */ member
662 __u32 fwmark; /* firewall mark of the service */ member
1213 struct ip_vs_dest *dest, __u32 fwmark);
1372 ip_vs_service_find(struct net *net, int af, __u32 fwmark, __u16 protocol,
1388 __u16 protocol, __u32 fwmark, __u32 flags);
/linux-4.1.27/Documentation/networking/
Dtproxy.txt21 # ip rule add fwmark 1 lookup 100
Dip-sysctl.txt60 Controls the fwmark of kernel-generated IPv4 reply packets that are not
62 If unset, these packets have a fwmark of zero. If set, they have the
63 fwmark of the packet they are replying to.
1277 Controls the fwmark of kernel-generated IPv6 reply packets that are not
1279 If unset, these packets have a fwmark of zero. If set, they have the
1280 fwmark of the packet they are replying to.