Searched refs:fwmark (Results 1 - 8 of 8) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/contrib/openvpn-fwmarkroute-1.00/
H A Dfwmarkroute.up23 ip rule add fwmark 2 table vpn.out
28 ip rule add fwmark 3 table vpnonly.out
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/
H A Dip_vs.h104 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_user
166 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_entry
206 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_get_dests
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netfilter/ipvs/
H A Dip_vs_ctl.c285 /* the service table hashed by fwmark */
330 * Returns hash value of fwmark for virtual service lookup
332 static __inline__ unsigned ip_vs_svc_fwm_hashkey(__u32 fwmark) argument
334 return fwmark & IP_VS_SVC_TAB_MASK;
339 * or in the ip_vs_svc_fwm_table by fwmark.
352 if (svc->fwmark == 0) {
361 * Hash it by fwmark in ip_vs_svc_fwm_table
363 hash = ip_vs_svc_fwm_hashkey(svc->fwmark);
386 if (svc->fwmark == 0) {
429 * Get service by {fwmark} i
432 __ip_vs_svc_fwm_get(int af, __u32 fwmark) argument
452 ip_vs_service_get(int af, __u32 fwmark, __u16 protocol, const union nf_inet_addr *vaddr, __be16 vport) argument
[all...]
H A Dip_vs_core.c281 * Note: persistent fwmark-based services and persistent
283 * fwmark template: <IPPROTO_IP,caddr,0,fwmark,0,daddr,0>
286 if (svc->fwmark) {
287 union nf_inet_addr fwmark = { local
288 .ip = htonl(svc->fwmark)
292 &fwmark, 0);
314 if (svc->fwmark) {
315 union nf_inet_addr fwmark = { local
316 .ip = htonl(svc->fwmark)
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/networking/libiproute/
H A Diprule.c35 fprintf(stderr, "SELECTOR := [ from PREFIX ] [ to PREFIX ] [ tos TOS ] [ fwmark FWMARK ]\n");
125 fprintf(fp, "fwmark %#x ", *(uint32_t*)RTA_DATA(tb[RTA_PROTOINFO]));
192 "tos\0""fwmark\0""realms\0""table\0""lookup\0""dev\0"
255 uint32_t fwmark; local
257 if (get_u32(&fwmark, *argv, 0))
258 invarg(*argv, "fwmark");
259 addattr32(&req.n, sizeof(req), RTA_PROTOINFO, fwmark);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/ip/
H A Diprule.c38 fprintf(stderr, "SELECTOR := [ from PREFIX ] [ to PREFIX ] [ tos TOS ] [ fwmark FWMARK ]\n");
125 fprintf(fp, "fwmark %#x ", *(__u32*)RTA_DATA(tb[RTA_PROTOINFO]));
242 } else if (strcmp(*argv, "fwmark") == 0) {
243 __u32 fwmark; local
245 if (get_u32(&fwmark, *argv, 0))
246 invarg("fwmark value is invalid\n", *argv);
247 addattr32(&req.n, sizeof(req), RTA_PROTOINFO, fwmark);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/
H A Dip_vs.h425 u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_user_kern
456 struct list_head f_list; /* for fwmark-based service table */
464 __u32 fwmark; /* firewall mark of the service */ member in struct:ip_vs_service
805 ip_vs_service_get(int af, __u32 fwmark, __u16 protocol,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/doc/
H A Dip-cref.tex1928 to mark some classes of packets with \verb|fwmark|. Therefore,
1929 \verb|fwmark| is also included in the set of keys checked by rules.
1934 interface, tos, fwmark\} and, if the selector matches the packet,
2046 \item \verb|fwmark MARK|
2048 --- select the \verb|fwmark| value to match.
2893 to \verb|fwmark| a class of packets.
2898 320: from 193.233.7.83 fwmark 1234 lookup main map-to 192.203.80.144

Completed in 125 milliseconds