/linux-4.1.27/net/sctp/ |
D | probe.c | 50 static unsigned int fwmark __read_mostly = 0; 51 MODULE_PARM_DESC(fwmark, "skb mark to match (0=no mark)"); 52 module_param(fwmark, uint, 0); 145 if (((port == 0 && fwmark == 0) || in jsctp_sf_eat_sack() 148 (fwmark > 0 && skb->mark == fwmark)) && in jsctp_sf_eat_sack() 225 port, fwmark, bufsize); in sctpprobe_init()
|
/linux-4.1.27/net/ipv4/ |
D | tcp_probe.c | 49 static unsigned int fwmark __read_mostly; 50 MODULE_PARM_DESC(fwmark, "skb mark to match (0=no mark)"); 51 module_param(fwmark, uint, 0); 114 if (((port == 0 && fwmark == 0) || in jtcp_rcv_established() 117 (fwmark > 0 && skb->mark == fwmark)) && in jtcp_rcv_established() 284 port, fwmark, bufsize); in tcpprobe_init()
|
/linux-4.1.27/net/netfilter/ipvs/ |
D | ip_vs_sched.c | 153 if (svc->fwmark) { in ip_vs_scheduler_err() 155 sched_name, svc->fwmark, svc->fwmark, msg); in ip_vs_scheduler_err()
|
D | ip_vs_ctl.c | 288 static inline unsigned int ip_vs_svc_fwm_hashkey(struct net *net, __u32 fwmark) in ip_vs_svc_fwm_hashkey() argument 290 return (((size_t)net>>8) ^ fwmark) & IP_VS_SVC_TAB_MASK; in ip_vs_svc_fwm_hashkey() 308 if (svc->fwmark == 0) { in ip_vs_svc_hash() 319 hash = ip_vs_svc_fwm_hashkey(svc->net, svc->fwmark); in ip_vs_svc_hash() 342 if (svc->fwmark == 0) { in ip_vs_svc_unhash() 388 __ip_vs_svc_fwm_find(struct net *net, int af, __u32 fwmark) in __ip_vs_svc_fwm_find() argument 394 hash = ip_vs_svc_fwm_hashkey(net, fwmark); in __ip_vs_svc_fwm_find() 397 if (svc->fwmark == fwmark && svc->af == af in __ip_vs_svc_fwm_find() 409 ip_vs_service_find(struct net *net, int af, __u32 fwmark, __u16 protocol, in ip_vs_service_find() argument 418 if (fwmark) { in ip_vs_service_find() [all …]
|
D | ip_vs_sync.c | 142 __be32 fwmark; /* Firewall mark from skb */ member 164 __be32 fwmark; /* Firewall mark from skb */ member 725 s->v4.fwmark = htonl(cp->fwmark); in ip_vs_sync_conn() 841 unsigned long timeout, __u32 fwmark, in ip_vs_proc_conn() argument 906 fwmark, flags); in ip_vs_proc_conn() 909 fwmark); in ip_vs_proc_conn() 1180 ntohl(s->v4.timeout), ntohl(s->v4.fwmark), in ip_vs_proc_sync_conn() 1187 ntohl(s->v6.timeout), ntohl(s->v6.fwmark), in ip_vs_proc_sync_conn()
|
D | ip_vs_core.c | 245 const union nf_inet_addr fwmark = { .ip = htonl(svc->fwmark) }; in ip_vs_sched_persist() local 298 if (svc->fwmark) { in ip_vs_sched_persist() 300 vaddr = &fwmark; in ip_vs_sched_persist() 467 if (!svc->fwmark && pptr[1] != svc->port) { in ip_vs_schedule() 557 if (ipvs->sysctl_cache_bypass && svc->fwmark && unicast) { in ip_vs_leave()
|
D | ip_vs_conn.c | 643 cp->protocol, cp->fwmark, cp->flags); in ip_vs_try_bind_dest() 875 struct ip_vs_dest *dest, __u32 fwmark) in ip_vs_conn_new() argument 903 cp->fwmark = fwmark; in ip_vs_conn_new()
|
/linux-4.1.27/include/uapi/linux/ |
D | ip_vs.h | 135 __u32 fwmark; /* firwall mark of service */ member 197 __u32 fwmark; /* firwall mark of service */ member 237 __u32 fwmark; /* firwall mark of service */ member
|
/linux-4.1.27/include/net/ |
D | ip_vs.h | 547 __u32 fwmark; /* Fire wall mark from skb */ member 620 u32 fwmark; /* firwall mark of service */ member 662 __u32 fwmark; /* firewall mark of the service */ member 1213 struct ip_vs_dest *dest, __u32 fwmark); 1372 ip_vs_service_find(struct net *net, int af, __u32 fwmark, __u16 protocol, 1388 __u16 protocol, __u32 fwmark, __u32 flags);
|
/linux-4.1.27/Documentation/networking/ |
D | tproxy.txt | 21 # ip rule add fwmark 1 lookup 100
|
D | ip-sysctl.txt | 60 Controls the fwmark of kernel-generated IPv4 reply packets that are not 62 If unset, these packets have a fwmark of zero. If set, they have the 63 fwmark of the packet they are replying to. 1277 Controls the fwmark of kernel-generated IPv6 reply packets that are not 1279 If unset, these packets have a fwmark of zero. If set, they have the 1280 fwmark of the packet they are replying to.
|