Searched refs:fwmark (Results 1 - 6 of 6) sorted by relevance
/external/libnl/src/ |
H A D | nl-fib-lookup.c | 20 " -f, --fwmark <int> Firewall mark\n" 38 uint64_t fwmark = 0; local 43 {"fwmark", 1, 0, 'f'}, 60 fwmark = strtoul(optarg, NULL, 0); 91 flnl_request_set_fwmark(request, fwmark);
|
/external/libnl/lib/fib_lookup/ |
H A D | lookup.c | 213 uint64_t fwmark; local 217 fwmark = flnl_request_get_fwmark(req); 222 fr.fl_fwmark = fwmark != UINT_LEAST64_MAX ? fwmark : 0;
|
H A D | request.c | 94 void flnl_request_set_fwmark(struct flnl_request *req, uint64_t fwmark) argument 96 req->lr_fwmark = fwmark;
|
/external/kernel-headers/original/uapi/linux/ |
H A D | ip_vs.h | 135 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_user 197 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_entry 237 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_get_dests
|
/external/iproute2/ip/ |
H A D | iprule.c | 38 fprintf(stderr, "SELECTOR := [ not ] [ from PREFIX ] [ to PREFIX ] [ tos TOS ] [ fwmark FWMARK[/MASK] ]\n"); 135 fprintf(fp, "fwmark 0x%x/0x%x ", mark, mask); 137 fprintf(fp, "fwmark 0x%x ", mark); 390 } else if (strcmp(*argv, "fwmark") == 0) { 392 __u32 fwmark, fwmask; local 396 if (get_u32(&fwmark, *argv, 0)) 397 invarg("fwmark value is invalid\n", *argv); 398 addattr32(&req.n, sizeof(req), FRA_FWMARK, fwmark);
|
/external/iproute2/doc/ |
H A D | ip-cref.tex | 2020 to mark some classes of packets with \verb|fwmark|. Therefore, 2021 \verb|fwmark| is also included in the set of keys checked by rules. 2026 interface, tos, fwmark\} and, if the selector matches the packet, 2138 \item \verb|fwmark MARK| 2140 --- select the \verb|fwmark| value to match. 3026 to \verb|fwmark| a class of packets. 3031 320: from 193.233.7.83 fwmark 1234 lookup main map-to 192.203.80.144
|
Completed in 276 milliseconds