/linux/net/netfilter/ipvs/ |
H A D | ip_vs_wrr.c | 108 struct ip_vs_wrr_mark *mark; in ip_vs_wrr_init_svc() local 111 * Allocate the mark variable for WRR scheduling in ip_vs_wrr_init_svc() 113 mark = kmalloc(sizeof(struct ip_vs_wrr_mark), GFP_KERNEL); in ip_vs_wrr_init_svc() 114 if (mark == NULL) in ip_vs_wrr_init_svc() 117 mark->cl = list_entry(&svc->destinations, struct ip_vs_dest, n_list); in ip_vs_wrr_init_svc() 118 mark->di = ip_vs_wrr_gcd_weight(svc); in ip_vs_wrr_init_svc() 119 mark->mw = ip_vs_wrr_max_weight(svc) - (mark->di - 1); in ip_vs_wrr_init_svc() 120 mark->cw = mark->mw; in ip_vs_wrr_init_svc() 121 svc->sched_data = mark; in ip_vs_wrr_init_svc() 129 struct ip_vs_wrr_mark *mark = svc->sched_data; in ip_vs_wrr_done_svc() local [all …]
|
/linux/kernel/ |
H A D | audit_fsnotify.c | 23 * this mark lives on the parent directory of the inode in question. 30 struct fsnotify_mark mark; /* fsnotify mark on the inode */ member 47 static void audit_fsnotify_free_mark(struct fsnotify_mark *mark) in audit_fsnotify_free_mark() argument 51 audit_mark = container_of(mark, struct audit_fsnotify_mark, mark); in audit_fsnotify_free_mark() 55 char *audit_mark_path(struct audit_fsnotify_mark *mark) in audit_mark_path() argument 57 return mark->path; in audit_mark_path() 60 int audit_mark_compare(struct audit_fsnotify_mark *mark, unsigned long ino, dev_t dev) in audit_mark_compare() argument 62 if (mark->ino == AUDIT_INO_UNSET) in audit_mark_compare() 64 return (mark->ino == ino) && (mark->dev == dev); in audit_mark_compare() 97 fsnotify_init_mark(&audit_mark->mark, audit_fsnotify_group); in audit_alloc_mark() [all …]
|
H A D | audit_tree.c | 28 struct fsnotify_mark *mark; member 41 struct fsnotify_mark mark; member 51 * audit_tree_mark (fsnotify mark). We replace struct chunk on tagging / 52 * untagging, the mark is stable as long as there is chunk attached. The 53 * association between mark and chunk is protected by hash_lock and 55 * audit_tree_group->mark_mutex and check that the mark is alive by 56 * FSNOTIFY_MARK_FLAG_ATTACHED flag check, we are sure the mark points to 77 * chunk is refcounted by embedded .refs. Mark associated with the chunk holds 78 * one chunk reference. This reference is dropped either when a mark is going 80 * mark get 161 audit_mark(struct fsnotify_mark * mark) audit_mark() argument 166 mark_chunk(struct fsnotify_mark * mark) mark_chunk() argument 171 audit_tree_destroy_watch(struct fsnotify_mark * mark) audit_tree_destroy_watch() argument 279 replace_mark_chunk(struct fsnotify_mark * mark,struct audit_chunk * chunk) replace_mark_chunk() argument 349 untag_chunk(struct audit_chunk * chunk,struct fsnotify_mark * mark) untag_chunk() argument 399 struct fsnotify_mark *mark; create_chunk() local 460 struct fsnotify_mark *mark; tag_chunk() local 575 struct fsnotify_mark *mark; prune_tree_chunks() local 1035 audit_tree_handle_event(struct fsnotify_mark * mark,u32 mask,struct inode * inode,struct inode * dir,const struct qstr * file_name,u32 cookie) audit_tree_handle_event() argument 1042 audit_tree_freeing_mark(struct fsnotify_mark * mark,struct fsnotify_group * group) audit_tree_freeing_mark() argument [all...] |
/linux/net/bridge/netfilter/ |
H A D | ebt_mark.c | 12 /* The mark target can be used in any chain, 29 skb->mark = info->mark; in ebt_mark_tg() 31 skb->mark |= info->mark; in ebt_mark_tg() 33 skb->mark &= info->mark; in ebt_mark_tg() 35 skb->mark ^= info->mark; in ebt_mark_tg() 58 compat_ulong_t mark; member 67 kern->mark = user->mark; in mark_tg_compat_from_user() 76 if (put_user(kern->mark, &user->mark) || in mark_tg_compat_to_user() 84 .name = "mark", 110 MODULE_DESCRIPTION("Ebtables: Packet mark modification");
|
H A D | ebt_mark_m.c | 22 return !!(skb->mark & info->mask) ^ info->invert; in ebt_mark_mt() 23 return ((skb->mark & info->mask) == info->mark) ^ info->invert; in ebt_mark_mt() 42 compat_ulong_t mark, mask; member 51 kern->mark = user->mark; in mark_mt_compat_from_user() 62 if (put_user(kern->mark, &user->mark) || in mark_mt_compat_to_user() 98 MODULE_DESCRIPTION("Ebtables: Packet mark match");
|
/linux/tools/testing/selftests/tc-testing/tc-tests/actions/ |
H A D | skbedit.json | 4 "name": "Add skbedit action with valid mark", 20 "cmdUnderTest": "$TC actions add action skbedit mark 1", 23 "matchPattern": "action order [0-9]*: skbedit mark 1", 31 "name": "Add skbedit action with 32-bit maximum mark", 47 "cmdUnderTest": "$TC actions add action skbedit mark 4294967295 pipe index 1", 50 "matchPattern": "action order [0-9]*: skbedit mark 4294967295.*pipe.*index 1", 58 "name": "Add skbedit action with mark exceeding 32-bit maximum", 74 "cmdUnderTest": "$TC actions add action skbedit mark 666777888999", 77 "matchPattern": "action order [0-9]*: skbedit mark", 83 "name": "Add skbedit action with valid mark and mask", [all …]
|
H A D | ife.json | 4 "name": "Create valid ife encode action with mark and pass control", 20 "cmdUnderTest": "$TC actions add action ife encode allow mark pass index 2", 23 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow mark.*index 2", 31 "name": "Create valid ife encode action with mark and pipe control", 47 "cmdUnderTest": "$TC actions add action ife encode use mark 10 pipe index 2", 50 … "matchPattern": "action order [0-9]*: ife encode action pipe.*type 0[xX]ED3E.*use mark.*index 2", 58 "name": "Create valid ife encode action with mark and continue control", 74 "cmdUnderTest": "$TC actions add action ife encode allow mark continue index 2", 77 …chPattern": "action order [0-9]*: ife encode action continue.*type 0[xX]ED3E.*allow mark.*index 2", 85 "name": "Create valid ife encode action with mark and drop control", [all …]
|
/linux/samples/bpf/ |
H A D | test_cgrp2_sock.c | 30 static int prog_load(__u32 idx, __u32 mark, __u32 prio) in prog_load() argument 48 /* set mark on socket */ in prog_load() 55 /* if uid is 0, use given mark, else use the uid as the mark */ in prog_load() 58 BPF_MOV64_IMM(BPF_REG_3, mark), in prog_load() 60 /* set the mark on the new socket */ in prog_load() 62 BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, mark)), in prog_load() 63 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, mark)), in prog_load() 87 if (mark) in prog_load() 107 if (mark) { in prog_load() 145 unsigned int mark = 0; in get_somark() local [all …]
|
H A D | test_cgrp2_sock.sh | 98 check_sock "dev , mark 0, priority 0" "No programs attached" 99 check_sock6 "dev , mark 0, priority 0" "No programs attached" 107 check_sock "dev cgrp2_sock, mark 0, priority 0" "Device set" 108 check_sock6 "dev cgrp2_sock, mark 0, priority 0" "Device set" 110 # verify mark is set 114 cleanup_and_exit 1 "Failed to install program to set mark" 116 check_sock "dev , mark 666, priority 0" "Mark set" 117 check_sock6 "dev , mark 666, priority 0" "Mark set" 125 check_sock "dev , mark 0, priority 123" "Priority set" 126 check_sock6 "dev , mark 0, priority 123" "Priority set" [all …]
|
H A D | xdp2skb_meta_kern.c | 4 * Example howto transfer info from XDP to SKB, e.g. skb->mark 28 __u32 mark; member 57 meta->mark = 42; in _xdp_mark() 72 ctx->mark = 41; in _tc_mark() 78 ctx->mark = meta->mark; /* Transfer XDP-mark to SKB-mark */ in _tc_mark() 98 iptables -I INPUT -p icmp -m mark --mark 41 # == 0x29 99 iptables -I INPUT -p icmp -m mark --mark 42 # == 0x2a
|
/linux/net/netfilter/ipset/ |
H A D | ip_set_hash_ipmark.c | 4 /* Kernel module implementing an IP set type: the hash:ip,mark type */ 29 IP_SET_MODULE_DESC("hash:ip,mark", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX); 30 MODULE_ALIAS("ip_set_hash:ip,mark"); 41 __u32 mark; member 52 ip1->mark == ip2->mark; in hash_ipmark4_data_equal() 60 nla_put_net32(skb, IPSET_ATTR_MARK, htonl(data->mark))) in hash_ipmark4_data_list() 89 e.mark = skb->mark; in hash_ipmark4_kadt() 90 e.mark &= h->markmask; in hash_ipmark4_kadt() 122 e.mark = ntohl(nla_get_be32(tb[IPSET_ATTR_MARK])); in hash_ipmark4_uadt() 123 e.mark &= h->markmask; in hash_ipmark4_uadt() [all …]
|
/linux/lib/ |
H A D | xarray.c | 25 * @mark is an xa_mark_t; a small number indicating one of the mark bits. 68 static inline void xa_mark_set(struct xarray *xa, xa_mark_t mark) in xa_mark_set() argument 70 if (!(xa->xa_flags & XA_FLAGS_MARK(mark))) in xa_mark_set() 71 xa->xa_flags |= XA_FLAGS_MARK(mark); in xa_mark_set() 74 static inline void xa_mark_clear(struct xarray *xa, xa_mark_t mark) in xa_mark_clear() argument 76 if (xa->xa_flags & XA_FLAGS_MARK(mark)) in xa_mark_clear() 77 xa->xa_flags &= ~(XA_FLAGS_MARK(mark)); in xa_mark_clear() 80 static inline unsigned long *node_marks(struct xa_node *node, xa_mark_t mark) in node_marks() argument 82 return node->marks[(__force unsigned)mark]; in node_marks() 86 node_get_mark(struct xa_node * node,unsigned int offset,xa_mark_t mark) node_get_mark() argument 93 node_set_mark(struct xa_node * node,unsigned int offset,xa_mark_t mark) node_set_mark() argument 100 node_clear_mark(struct xa_node * node,unsigned int offset,xa_mark_t mark) node_clear_mark() argument 105 node_any_mark(struct xa_node * node,xa_mark_t mark) node_any_mark() argument 110 node_mark_all(struct xa_node * node,xa_mark_t mark) node_mark_all() argument 115 mark_inc(mark) global() argument 128 unsigned int mark = 0; xas_squash_marks() local 579 xa_mark_t mark = 0; xas_expand() local 857 xas_get_mark(const struct xa_state * xas,xa_mark_t mark) xas_get_mark() argument 876 xas_set_mark(const struct xa_state * xas,xa_mark_t mark) xas_set_mark() argument 905 xas_clear_mark(const struct xa_state * xas,xa_mark_t mark) xas_clear_mark() argument 941 xa_mark_t mark = 0; xas_init_marks() local 959 xa_mark_t mark = XA_MARK_0; node_get_marks() local 973 node_mark_slots(struct xa_node * node,unsigned int sibs,xa_mark_t mark) node_mark_slots() argument 989 xa_mark_t mark = XA_MARK_0; node_set_marks() local 1321 xas_find_marked(struct xa_state * xas,unsigned long max,xa_mark_t mark) xas_find_marked() argument 1919 __xa_set_mark(struct xarray * xa,unsigned long index,xa_mark_t mark) __xa_set_mark() argument 1937 __xa_clear_mark(struct xarray * xa,unsigned long index,xa_mark_t mark) __xa_clear_mark() argument 1959 xa_get_mark(struct xarray * xa,unsigned long index,xa_mark_t mark) xa_get_mark() argument 1989 xa_set_mark(struct xarray * xa,unsigned long index,xa_mark_t mark) xa_set_mark() argument 2007 xa_clear_mark(struct xarray * xa,unsigned long index,xa_mark_t mark) xa_clear_mark() argument 2133 xas_extract_marked(struct xa_state * xas,void ** dst,unsigned long max,unsigned int n,xa_mark_t mark) xas_extract_marked() argument [all...] |
/linux/include/linux/ |
H A D | folio_queue.h | 34 unsigned long marks; /* 1-bit mark per folio */ 35 unsigned long marks2; /* Second 1-bit mark per folio */ 36 unsigned long marks3; /* Third 1-bit mark per folio */ 97 * folioq_is_marked: Check first folio mark in a folio queue segment 101 * Determine if the first mark is set for the folio in the specified slot in a 110 * folioq_mark: Set the first mark on a folio in a folio queue segment 114 * Set the first mark for the folio in the specified slot in a folio queue 123 * folioq_unmark: Clear the first mark on a folio in a folio queue segment 127 * Clear the first mark for the folio in the specified slot in a folio queue 136 * folioq_is_marked2: Check second folio mark in a folio queue segment [all …]
|
/linux/net/netfilter/ |
H A D | xt_mark.c | 18 MODULE_DESCRIPTION("Xtables: packet mark operations"); 30 skb->mark = (skb->mark & ~info->mask) ^ info->mark; in mark_tg() 39 return ((skb->mark & info->mask) == info->mark) ^ info->invert; in mark_mt() 44 .name = "MARK", 53 .name = "MARK", 63 .name = "MARK", 74 .name = "mark",
|
H A D | xt_connmark.c | 19 MODULE_DESCRIPTION("Xtables: connection mark operations"); 41 oldmark = READ_ONCE(ct->mark); in connmark_tg_shift() 48 if (READ_ONCE(ct->mark) != newmark) { in connmark_tg_shift() 49 WRITE_ONCE(ct->mark, newmark); in connmark_tg_shift() 54 new_targetmark = (skb->mark & info->nfmask); in connmark_tg_shift() 60 newmark = (READ_ONCE(ct->mark) & ~info->ctmask) ^ in connmark_tg_shift() 62 if (READ_ONCE(ct->mark) != newmark) { in connmark_tg_shift() 63 WRITE_ONCE(ct->mark, newmark); in connmark_tg_shift() 68 new_targetmark = (READ_ONCE(ct->mark) & info->ctmask); in connmark_tg_shift() 74 newmark = (skb->mark & ~info->nfmask) ^ in connmark_tg_shift() [all …]
|
H A D | nft_chain_route.c | 24 u32 mark; in nf_route_table_hook4() local 31 mark = skb->mark; in nf_route_table_hook4() 43 skb->mark != mark || in nf_route_table_hook4() 71 u32 mark, flowlabel; in nf_route_table_hook6() local 79 /* save source/dest address, mark, hoplimit, flowlabel, priority */ in nf_route_table_hook6() 82 mark = skb->mark; in nf_route_table_hook6() 92 skb->mark != mark || in nf_route_table_hook6()
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | fib_lookup.c | 30 #define MARK 42 macro 54 __u32 mark; member 111 { .desc = "IPv4 policy routing, mark doesn't point to a policy", 115 .mark = MARK_NO_POLICY, }, 116 { .desc = "IPv4 policy routing, mark points to a policy", 120 .mark = MARK, }, 121 { .desc = "IPv4 policy routing, mark points to a policy, but no flag", 125 .mark = MARK, }, 130 { .desc = "IPv6 policy routing, mark doesn't point to a policy", 134 .mark = MARK_NO_POLICY, }, [all …]
|
/linux/tools/testing/selftests/net/ |
H A D | cmsg_so_mark.sh | 10 MARK=1000 30 ip -netns $NS rule add fwmark $MARK lookup 300 31 ip -6 -netns $NS rule add fwmark $MARK lookup 300 58 [ $ovr == "both" ] && m="-M $MARK -m" 60 ip netns exec $NS ./cmsg_sender -$i -p $p $m $((MARK + 1)) $TGT 1234 63 [ $ovr == "diff" ] && m="-M $((MARK + 1)) -m" 65 ip netns exec $NS ./cmsg_sender -$i -p $p $m $MARK -s $TGT 1234
|
/linux/Documentation/admin-guide/device-mapper/ |
H A D | log-writes.rst | 77 mark <description> 79 You can use a dmsetup message to set an arbitrary mark in a log. 86 dmsetup message log 0 mark mkfs 89 This would allow you to replay the log up to the mkfs mark and 93 Every log has a mark at the end labeled "dm-log-writes-end". 110 dmsetup message log 0 mark mkfs 114 dmsetup message log 0 mark fsync 119 replay-log --log /dev/sdc --replay /dev/sdb --end-mark fsync 130 dmsetup message log 0 mark mkfs 138 replay-log --log /dev/sdc --replay /dev/sdb --end-mark mkfs [all …]
|
/linux/net/sched/ |
H A D | act_meta_mark.c | 3 * net/sched/act_meta_mark.c IFE skb->mark metadata module 24 u32 ifemark = skb->mark; in skbmark_encode() 33 skb->mark = ntohl(ifemark); in skbmark_decode() 39 return ife_check_meta_u32(skb->mark, e); in skbmark_check() 46 .synopsis = "skb mark 32 bit metadata", 71 MODULE_DESCRIPTION("Inter-FE skb mark metadata module");
|
/linux/arch/powerpc/kernel/ |
H A D | smp-tbsync.c | 26 volatile u64 mark; member 39 static void enter_contest(u64 mark, long add) in enter_contest() argument 41 while (get_tb() < mark) in enter_contest() 73 enter_contest(tbsync->mark, -1); in smp_generic_take_timebase() 82 u64 mark; in start_contest() local 90 tbsync->mark = mark = tb + 400; in start_contest() 101 enter_contest(mark, 1); in start_contest()
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_ldsx_insn.c | 96 old_mark = skb->mark; in _tc() 98 skb->mark = 0xf6fe; in _tc() 109 [off_mark]"i"(offsetof(struct __sk_buff, mark) in _tc() 111 + sizeof(skb->mark) - 1 in _tc() 116 tmp_mark = (char)skb->mark; in _tc() 120 skb->mark = old_mark; in _tc()
|
/linux/include/net/tc_act/ |
H A D | tc_skbedit.h | 17 u32 mark; member 47 /* Return true iff action is mark */ 55 u32 mark; in tcf_skbedit_mark() local 58 mark = rcu_dereference(to_skbedit(a)->params)->mark; in tcf_skbedit_mark() 61 return mark; in tcf_skbedit_mark()
|
/linux/tools/testing/selftests/net/mptcp/ |
H A D | mptcp_sockopt.sh | 55 ip netns exec $ns $t -A OUTPUT -p tcp --syn -m mark --mark $m -j ACCEPT 58 ip netns exec $ns $t -A OUTPUT -p tcp --tcp-flags RST RST -m mark --mark 0 -j ACCEPT 60 ip netns exec $ns $t -A OUTPUT -p tcp -m mark --mark $m -j ACCEPT 61 ip netns exec $ns $t -A OUTPUT -p tcp -m mark --mark 0 -j DROP 213 print_title "Mark ${ip:2}" 222 mptcp_lib_result_code "${retc}" "mark ${ip}"
|
/linux/drivers/dma/sh/ |
H A D | shdma-base.c | 64 if (sdesc->mark == DESC_SUBMITTED) { in shdma_chan_xfer_ld_queue() 85 /* Mark all chunks of this descriptor as submitted, move to the queue */ in shdma_tx_submit() 91 if (chunk != desc && (chunk->mark == DESC_IDLE || in shdma_tx_submit() 96 chunk->mark = DESC_SUBMITTED; in shdma_tx_submit() 162 if (sdesc->mark != DESC_PREPARED) { in shdma_get_desc() 163 BUG_ON(sdesc->mark != DESC_IDLE); in shdma_get_desc() 240 desc->mark = DESC_IDLE; in shdma_alloc_chan_resources() 340 BUG_ON(desc->mark != DESC_SUBMITTED && in __ld_cleanup() 341 desc->mark != DESC_COMPLETED && in __ld_cleanup() 342 desc->mark != DESC_WAITING); in __ld_cleanup() [all …]
|