/linux/net/ipv4/ |
H A D | ipip.c | 418 bool *collect_md, __u32 *fwmark) in ipip_netlink_parms() argument 436 *fwmark = nla_get_u32(data[IFLA_IPTUN_FWMARK]); in ipip_netlink_parms() 446 __u32 fwmark = 0; in ipip_newlink() local 455 ipip_netlink_parms(data, &p, &t->collect_md, &fwmark); in ipip_newlink() 456 return ip_tunnel_newlink(dev, tb, &p, fwmark); in ipip_newlink() 467 __u32 fwmark = t->fwmark; in ipip_changelink() local 476 ipip_netlink_parms(data, &p, &collect_md, &fwmark); in ipip_changelink() 484 return ip_tunnel_changelink(dev, tb, &p, fwmark); in ipip_changelink() 532 nla_put_u32(skb, IFLA_IPTUN_FWMARK, tunnel->fwmark)) in ipip_fill_info()
|
H A D | ip_vti.c | 548 __u32 *fwmark) in vti_netlink_parms() argument 575 *fwmark = nla_get_u32(data[IFLA_VTI_FWMARK]); in vti_netlink_parms() 583 __u32 fwmark = 0; in vti_newlink() local 585 vti_netlink_parms(data, &parms, &fwmark); in vti_newlink() 586 return ip_tunnel_newlink(dev, tb, &parms, fwmark); in vti_newlink() 595 __u32 fwmark = t->fwmark; in vti_changelink() local 597 vti_netlink_parms(data, &p, &fwmark); in vti_changelink() 598 return ip_tunnel_changelink(dev, tb, &p, fwmark); in vti_changelink() 629 nla_put_u32(skb, IFLA_VTI_FWMARK, t->fwmark)) in vti_fill_info()
|
H A D | ip_tunnel.c | 298 tunnel->parms.link, tunnel->fwmark, 0, 0); in ip_tunnel_bind_dev() 778 tunnel->fwmark, skb_get_hash(skb), 0); in ip_tunnel_xmit() 877 __u32 fwmark) in ip_tunnel_update() argument 894 if (t->parms.link != p->link || t->fwmark != fwmark) { in ip_tunnel_update() 898 t->fwmark = fwmark; in ip_tunnel_update() 1217 struct ip_tunnel_parm_kern *p, __u32 fwmark) in ip_tunnel_newlink() argument 1238 nt->fwmark = fwmark; in ip_tunnel_newlink() 1271 struct ip_tunnel_parm_kern *p, __u32 fwmark) in ip_tunnel_changelink() argument 1303 ip_tunnel_update(itn, t, dev, p, !tb[IFLA_MTU], fwmark); in ip_tunnel_changelink()
|
/linux/net/netfilter/ipvs/ |
H A D | ip_vs_sched.c | 148 if (svc->fwmark) { in ip_vs_scheduler_err() 150 sched_name, svc->fwmark, svc->fwmark, msg); in ip_vs_scheduler_err()
|
H A D | ip_vs_ctl.c | 336 static inline unsigned int ip_vs_svc_fwm_hashkey(struct netns_ipvs *ipvs, __u32 fwmark) in ip_vs_svc_fwm_hashkey() argument 338 return (((size_t)ipvs>>8) ^ fwmark) & IP_VS_SVC_TAB_MASK; in ip_vs_svc_fwm_hashkey() 356 if (svc->fwmark == 0) { in ip_vs_svc_hash() 367 hash = ip_vs_svc_fwm_hashkey(svc->ipvs, svc->fwmark); in ip_vs_svc_hash() 390 if (svc->fwmark == 0) { in ip_vs_svc_unhash() 436 __ip_vs_svc_fwm_find(struct netns_ipvs *ipvs, int af, __u32 fwmark) in __ip_vs_svc_fwm_find() argument 442 hash = ip_vs_svc_fwm_hashkey(ipvs, fwmark); in __ip_vs_svc_fwm_find() 445 if (svc->fwmark == fwmark && svc->af == af in __ip_vs_svc_fwm_find() 457 ip_vs_service_find(struct netns_ipvs *ipvs, int af, __u32 fwmark, __u16 protocol, in ip_vs_service_find() argument 465 if (fwmark) { in ip_vs_service_find() [all …]
|
H A D | ip_vs_sync.c | 144 __be32 fwmark; /* Firewall mark from skb */ member 166 __be32 fwmark; /* Firewall mark from skb */ member 730 s->v4.fwmark = htonl(cp->fwmark); in ip_vs_sync_conn() 846 unsigned long timeout, __u32 fwmark, in ip_vs_proc_conn() argument 910 fwmark, flags); in ip_vs_proc_conn() 913 fwmark); in ip_vs_proc_conn() 1180 ntohl(s->v4.timeout), ntohl(s->v4.fwmark), in ip_vs_proc_sync_conn() 1187 ntohl(s->v6.timeout), ntohl(s->v6.fwmark), in ip_vs_proc_sync_conn()
|
H A D | ip_vs_core.c | 263 const union nf_inet_addr fwmark = { .ip = htonl(svc->fwmark) }; in ip_vs_sched_persist() local 326 if (svc->fwmark) { in ip_vs_sched_persist() 328 vaddr = &fwmark; in ip_vs_sched_persist() 516 if (!svc->fwmark && vport != svc->port) { in ip_vs_schedule() 600 if (sysctl_cache_bypass(ipvs) && svc->fwmark && in ip_vs_leave() 1149 if (svc->fwmark) in ip_vs_new_conn_out()
|
H A D | ip_vs_conn.c | 664 cp->protocol, cp->fwmark, cp->flags); in ip_vs_try_bind_dest() 943 struct ip_vs_dest *dest, __u32 fwmark) in ip_vs_conn_new() argument 971 cp->fwmark = fwmark; in ip_vs_conn_new()
|
/linux/include/uapi/linux/ |
H A D | ip_vs.h | 149 __u32 fwmark; /* firwall mark of service */ member 211 __u32 fwmark; /* firwall mark of service */ member 251 __u32 fwmark; /* firwall mark of service */ member
|
/linux/tools/testing/selftests/net/ |
H A D | cmsg_so_mark.sh | 30 ip -netns $NS rule add fwmark $MARK lookup 300 31 ip -6 -netns $NS rule add fwmark $MARK lookup 300
|
/linux/net/ipv6/ |
H A D | sit.c | 938 flowi4_init_output(&fl4, tunnel->parms.link, tunnel->fwmark, in ipip6_tunnel_xmit() 1142 __u32 fwmark) in ipip6_tunnel_update() argument 1157 if (t->parms.link != p->link || t->fwmark != fwmark) { in ipip6_tunnel_update() 1159 t->fwmark = fwmark; in ipip6_tunnel_update() 1327 ipip6_tunnel_update(t, p, t->fwmark); in ipip6_tunnel_change() 1498 __u32 *fwmark) in ipip6_netlink_parms() argument 1513 *fwmark = nla_get_u32(data[IFLA_IPTUN_FWMARK]); in ipip6_netlink_parms() 1573 ipip6_netlink_parms(data, &nt->parms, &nt->fwmark); in ipip6_newlink() 1613 __u32 fwmark = t->fwmark; in ipip6_changelink() local 1625 ipip6_netlink_parms(data, &p, &fwmark); in ipip6_changelink() [all …]
|
H A D | ip6_vti.c | 716 t->parms.fwmark = p->fwmark; in vti6_tnl_change() 997 parms->fwmark = nla_get_u32(data[IFLA_VTI_FWMARK]); in vti6_netlink_parms() 1080 nla_put_u32(skb, IFLA_VTI_FWMARK, parm->fwmark)) in vti6_fill_info()
|
H A D | ip6_gre.c | 656 fl6->flowi6_mark = t->parms.fwmark; in prepare_ip6gre_xmit_ipv4() 701 fl6->flowi6_mark = t->parms.fwmark; in prepare_ip6gre_xmit_ipv6() 728 fl6->flowi6_mark = t->parms.fwmark; in prepare_ip6gre_xmit_other() 1229 t->parms.fwmark = p->fwmark; in ip6gre_tnl_copy_tnl_parm() 1834 parms->fwmark = nla_get_u32(data[IFLA_GRE_FWMARK]); in ip6gre_netlink_parms() 2181 nla_put_u32(skb, IFLA_GRE_FWMARK, p->fwmark)) in ip6gre_fill_info()
|
H A D | ip6_tunnel.c | 1367 fl6.flowi6_mark = t->parms.fwmark; in ipxip6_tnl_xmit() 1548 t->parms.fwmark = p->fwmark; in ip6_tnl_change() 2002 parms->fwmark = nla_get_u32(data[IFLA_IPTUN_FWMARK]); in ip6_tnl_netlink_parms() 2131 nla_put_u32(skb, IFLA_IPTUN_FWMARK, parm->fwmark)) in ip6_tnl_fill_info()
|
/linux/drivers/net/wireguard/ |
H A D | socket.c | 27 .flowi4_mark = wg->fwmark, in send4() 36 skb->mark = wg->fwmark; in send4() 105 .flowi6_mark = wg->fwmark, in send6() 116 skb->mark = wg->fwmark; in send6()
|
H A D | device.h | 55 u32 fwmark; member
|
H A D | netlink.c | 234 nla_put_u32(skb, WGDEVICE_A_FWMARK, wg->fwmark) || in wg_get_device_dump() 528 wg->fwmark = nla_get_u32(info->attrs[WGDEVICE_A_FWMARK]); in wg_set_device()
|
/linux/tools/testing/selftests/net/netfilter/ |
H A D | nft_tproxy_tcp.sh | 215 ip netns exec "$nsrouter" $ip_command rule add fwmark 1 table 100 272 ip netns exec "$nsrouter" $ip_command rule del fwmark 1 table 100
|
H A D | nft_tproxy_udp.sh | 181 ip netns exec "$nsrouter" $ip_command rule add fwmark 1 table 100 246 ip netns exec "$nsrouter" $ip_command rule del fwmark 1 table 100
|
H A D | nft_nat_zones.sh | 108 echo netns exec "$gw" ip rule add fwmark "$i" lookup $((1000+i))
|
/linux/include/net/ |
H A D | ip_tunnels.h | 183 __u32 fwmark; member 408 struct ip_tunnel_parm_kern *p, __u32 fwmark); 410 struct ip_tunnel_parm_kern *p, __u32 fwmark);
|
H A D | ip_vs.h | 590 __u32 fwmark; /* Fire wall mark from skb */ member 638 u32 fwmark; /* firewall mark of service */ member 684 __u32 fwmark; /* firewall mark of the service */ member 1357 struct ip_vs_dest *dest, __u32 fwmark); 1527 ip_vs_service_find(struct netns_ipvs *ipvs, int af, __u32 fwmark, __u16 protocol, 1550 __u16 protocol, __u32 fwmark, __u32 flags);
|
H A D | ip6_tunnel.h | 38 __u32 fwmark; member
|
/linux/Documentation/networking/ |
H A D | tproxy.rst | 33 # ip rule add fwmark 1 lookup 100
|
H A D | ip-sysctl.rst | 73 Controls the fwmark of kernel-generated IPv4 reply packets that are not 75 If unset, these packets have a fwmark of zero. If set, they have the 76 fwmark of the packet they are replying to. 478 socket mark will set the mark of the accepting socket to the fwmark of 480 (starting from the first SYNACK) to be sent with that fwmark. The 482 have a fwmark set via setsockopt(SOL_SOCKET, SO_MARK, ...) are 1780 - 0 - The fwmark of the packet is not included in reverse path 1782 utilizing the fwmark in only one direction, e.g., transparent 1785 - 1 - The fwmark of the packet is included in reverse path route 1786 lookup. This permits rp_filter to function when the fwmark is [all …]
|