/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/contrib/openvpn-fwmarkroute-1.00/ |
H A D | fwmarkroute.up | 23 ip rule add fwmark 2 table vpn.out 28 ip rule add fwmark 3 table vpnonly.out
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | ip_vs.h | 104 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_user 166 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_entry 206 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_get_dests
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netfilter/ipvs/ |
H A D | ip_vs_ctl.c | 285 /* the service table hashed by fwmark */ 330 * Returns hash value of fwmark for virtual service lookup 332 static __inline__ unsigned ip_vs_svc_fwm_hashkey(__u32 fwmark) argument 334 return fwmark & IP_VS_SVC_TAB_MASK; 339 * or in the ip_vs_svc_fwm_table by fwmark. 352 if (svc->fwmark == 0) { 361 * Hash it by fwmark in ip_vs_svc_fwm_table 363 hash = ip_vs_svc_fwm_hashkey(svc->fwmark); 386 if (svc->fwmark == 0) { 429 * Get service by {fwmark} i 432 __ip_vs_svc_fwm_get(int af, __u32 fwmark) argument 452 ip_vs_service_get(int af, __u32 fwmark, __u16 protocol, const union nf_inet_addr *vaddr, __be16 vport) argument [all...] |
H A D | ip_vs_core.c | 281 * Note: persistent fwmark-based services and persistent 283 * fwmark template: <IPPROTO_IP,caddr,0,fwmark,0,daddr,0> 286 if (svc->fwmark) { 287 union nf_inet_addr fwmark = { local 288 .ip = htonl(svc->fwmark) 292 &fwmark, 0); 314 if (svc->fwmark) { 315 union nf_inet_addr fwmark = { local 316 .ip = htonl(svc->fwmark) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/networking/libiproute/ |
H A D | iprule.c | 35 fprintf(stderr, "SELECTOR := [ from PREFIX ] [ to PREFIX ] [ tos TOS ] [ fwmark FWMARK ]\n"); 125 fprintf(fp, "fwmark %#x ", *(uint32_t*)RTA_DATA(tb[RTA_PROTOINFO])); 192 "tos\0""fwmark\0""realms\0""table\0""lookup\0""dev\0" 255 uint32_t fwmark; local 257 if (get_u32(&fwmark, *argv, 0)) 258 invarg(*argv, "fwmark"); 259 addattr32(&req.n, sizeof(req), RTA_PROTOINFO, fwmark);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/ip/ |
H A D | iprule.c | 38 fprintf(stderr, "SELECTOR := [ from PREFIX ] [ to PREFIX ] [ tos TOS ] [ fwmark FWMARK ]\n"); 125 fprintf(fp, "fwmark %#x ", *(__u32*)RTA_DATA(tb[RTA_PROTOINFO])); 242 } else if (strcmp(*argv, "fwmark") == 0) { 243 __u32 fwmark; local 245 if (get_u32(&fwmark, *argv, 0)) 246 invarg("fwmark value is invalid\n", *argv); 247 addattr32(&req.n, sizeof(req), RTA_PROTOINFO, fwmark);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/ |
H A D | ip_vs.h | 425 u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_user_kern 456 struct list_head f_list; /* for fwmark-based service table */ 464 __u32 fwmark; /* firewall mark of the service */ member in struct:ip_vs_service 805 ip_vs_service_get(int af, __u32 fwmark, __u16 protocol,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/doc/ |
H A D | ip-cref.tex | 1928 to mark some classes of packets with \verb|fwmark|. Therefore, 1929 \verb|fwmark| is also included in the set of keys checked by rules. 1934 interface, tos, fwmark\} and, if the selector matches the packet, 2046 \item \verb|fwmark MARK| 2048 --- select the \verb|fwmark| value to match. 2893 to \verb|fwmark| a class of packets. 2898 320: from 193.233.7.83 fwmark 1234 lookup main map-to 192.203.80.144
|