| /Linux-v5.4/fs/notify/ | 
| D | mark.c | 7  * fsnotify inode mark locking/lifetime/and refcnting 10  * The group->recnt and mark->refcnt tell how many "things" in the kernel 13  * the reference a group and a mark hold to each other. 22  * mark->lock 23  * mark->connector->lock 26  * each mark is hooked via the g_list.  It also protects the groups private 29  * mark->lock protects the marks attributes like its masks and flags. 30  * Furthermore it protects the access to a reference of the group that the mark 32  * that is being watched by the mark. 34  * mark->connector->lock protects the list of marks anchored inside an [all …] 
 | 
| D | fdinfo.c | 27 				     struct fsnotify_mark *mark))  in show_fdinfo()  argument 30 	struct fsnotify_mark *mark;  in show_fdinfo()  local 33 	list_for_each_entry(mark, &group->marks_list, g_list) {  in show_fdinfo() 34 		show(m, mark);  in show_fdinfo() 76 static void inotify_fdinfo(struct seq_file *m, struct fsnotify_mark *mark)  in inotify_fdinfo()  argument 81 	if (mark->connector->type != FSNOTIFY_OBJ_TYPE_INODE)  in inotify_fdinfo() 84 	inode_mark = container_of(mark, struct inotify_inode_mark, fsn_mark);  in inotify_fdinfo() 85 	inode = igrab(fsnotify_conn_inode(mark->connector));  in inotify_fdinfo() 93 		u32 mask = mark->mask & IN_ALL_EVENTS;  in inotify_fdinfo() 96 			   mask, mark->ignored_mask);  in inotify_fdinfo() [all …] 
 | 
| D | fsnotify.c | 192 	struct fsnotify_mark *mark;  in send_to_group()  local 203 			mark = iter_info->marks[type];  in send_to_group() 204 			if (mark &&  in send_to_group() 205 			    !(mark->flags & FSNOTIFY_MARK_FLAG_IGNORED_SURV_MODIFY))  in send_to_group() 206 				mark->ignored_mask = 0;  in send_to_group() 213 		mark = iter_info->marks[type];  in send_to_group() 214 		/* does the object mark tell us to do something? */  in send_to_group() 215 		if (mark) {  in send_to_group() 216 			group = mark->group;  in send_to_group() 217 			marks_mask |= mark->mask;  in send_to_group() [all …] 
 | 
| /Linux-v5.4/net/netfilter/ipvs/ | 
| D | ip_vs_wrr.c | 108 	struct ip_vs_wrr_mark *mark;  in ip_vs_wrr_init_svc()  local 111 	 *    Allocate the mark variable for WRR scheduling  in ip_vs_wrr_init_svc() 113 	mark = kmalloc(sizeof(struct ip_vs_wrr_mark), GFP_KERNEL);  in ip_vs_wrr_init_svc() 114 	if (mark == NULL)  in ip_vs_wrr_init_svc() 117 	mark->cl = list_entry(&svc->destinations, struct ip_vs_dest, n_list);  in ip_vs_wrr_init_svc() 118 	mark->di = ip_vs_wrr_gcd_weight(svc);  in ip_vs_wrr_init_svc() 119 	mark->mw = ip_vs_wrr_max_weight(svc) - (mark->di - 1);  in ip_vs_wrr_init_svc() 120 	mark->cw = mark->mw;  in ip_vs_wrr_init_svc() 121 	svc->sched_data = mark;  in ip_vs_wrr_init_svc() 129 	struct ip_vs_wrr_mark *mark = svc->sched_data;  in ip_vs_wrr_done_svc()  local [all …] 
 | 
| /Linux-v5.4/tools/testing/selftests/tc-testing/tc-tests/actions/ | 
| D | skbedit.json | 4         "name": "Add skbedit action with valid mark", 17         "cmdUnderTest": "$TC actions add action skbedit mark 1", 20         "matchPattern": "action order [0-9]*: skbedit  mark 1", 28         "name": "Add skbedit action with 32-bit maximum mark", 41         "cmdUnderTest": "$TC actions add action skbedit mark 4294967295 pipe index 1", 44         "matchPattern": "action order [0-9]*: skbedit  mark 4294967295.*pipe.*index 1", 52         "name": "Add skbedit action with mark exceeding 32-bit maximum", 65         "cmdUnderTest": "$TC actions add action skbedit mark 666777888999", 68         "matchPattern": "action order [0-9]*:  skbedit mark", 74         "name": "Add skbedit action with valid mark and mask", [all …] 
 | 
| D | ife.json | 4         "name": "Create valid ife encode action with mark and pass control", 17         "cmdUnderTest": "$TC actions add action ife encode allow mark pass index 2", 20 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow mark.*index 2", 28         "name": "Create valid ife encode action with mark and pipe control", 41         "cmdUnderTest": "$TC actions add action ife encode use mark 10 pipe index 2", 44 …  "matchPattern": "action order [0-9]*: ife encode action pipe.*type 0[xX]ED3E.*use mark.*index 2", 52         "name": "Create valid ife encode action with mark and continue control", 65         "cmdUnderTest": "$TC actions add action ife encode allow mark continue index 2", 68 …chPattern": "action order [0-9]*: ife encode action continue.*type 0[xX]ED3E.*allow mark.*index 2", 76         "name": "Create valid ife encode action with mark and drop control", [all …] 
 | 
| /Linux-v5.4/net/bridge/netfilter/ | 
| D | ebt_mark.c | 12 /* The mark target can be used in any chain, 29 		skb->mark = info->mark;  in ebt_mark_tg() 31 		skb->mark |= info->mark;  in ebt_mark_tg() 33 		skb->mark &= info->mark;  in ebt_mark_tg() 35 		skb->mark ^= info->mark;  in ebt_mark_tg() 58 	compat_ulong_t mark;  member 67 	kern->mark = user->mark;  in mark_tg_compat_from_user() 76 	if (put_user(kern->mark, &user->mark) ||  in mark_tg_compat_to_user() 84 	.name		= "mark", 110 MODULE_DESCRIPTION("Ebtables: Packet mark modification");
  | 
| D | ebt_mark_m.c | 22 		return !!(skb->mark & info->mask) ^ info->invert;  in ebt_mark_mt() 23 	return ((skb->mark & info->mask) == info->mark) ^ info->invert;  in ebt_mark_mt() 42 	compat_ulong_t mark, mask;  member 51 	kern->mark = user->mark;  in mark_mt_compat_from_user() 62 	if (put_user(kern->mark, &user->mark) ||  in mark_mt_compat_to_user() 98 MODULE_DESCRIPTION("Ebtables: Packet mark match");
  | 
| /Linux-v5.4/kernel/ | 
| D | audit_fsnotify.c | 23  * this mark lives on the parent directory of the inode in question. 30 	struct fsnotify_mark mark; /* fsnotify mark on the inode */  member 47 static void audit_fsnotify_free_mark(struct fsnotify_mark *mark)  in audit_fsnotify_free_mark()  argument 51 	audit_mark = container_of(mark, struct audit_fsnotify_mark, mark);  in audit_fsnotify_free_mark() 55 char *audit_mark_path(struct audit_fsnotify_mark *mark)  in audit_mark_path()  argument 57 	return mark->path;  in audit_mark_path() 60 int audit_mark_compare(struct audit_fsnotify_mark *mark, unsigned long ino, dev_t dev)  in audit_mark_compare()  argument 62 	if (mark->ino == AUDIT_INO_UNSET)  in audit_mark_compare() 64 	return (mark->ino == ino) && (mark->dev == dev);  in audit_mark_compare() 97 	fsnotify_init_mark(&audit_mark->mark, audit_fsnotify_group);  in audit_alloc_mark() [all …] 
 | 
| D | audit_tree.c | 28 	struct fsnotify_mark *mark;  member 41 	struct fsnotify_mark mark;  member 51  * audit_tree_mark (fsnotify mark). We replace struct chunk on tagging / 52  * untagging, the mark is stable as long as there is chunk attached. The 53  * association between mark and chunk is protected by hash_lock and 55  * audit_tree_group->mark_mutex and check that the mark is alive by 56  * FSNOTIFY_MARK_FLAG_ATTACHED flag check, we are sure the mark points to 77  * chunk is refcounted by embedded .refs. Mark associated with the chunk holds 78  * one chunk reference. This reference is dropped either when a mark is going 80  * mark gets replaced. This reference must be dropped using [all …] 
 | 
| /Linux-v5.4/samples/bpf/ | 
| D | test_cgrp2_sock.c | 30 static int prog_load(__u32 idx, __u32 mark, __u32 prio)  in prog_load()  argument 48 	/* set mark on socket */  in prog_load() 55 		/* if uid is 0, use given mark, else use the uid as the mark */  in prog_load() 58 		BPF_MOV64_IMM(BPF_REG_3, mark),  in prog_load() 60 		/* set the mark on the new socket */  in prog_load() 62 		BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, mark)),  in prog_load() 63 		BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, mark)),  in prog_load() 83 	if (mark)  in prog_load() 103 	if (mark) {  in prog_load() 141 	unsigned int mark = 0;  in get_somark()  local [all …] 
 | 
| D | test_cgrp2_sock.sh | 96 check_sock "dev , mark 0, priority 0" "No programs attached" 97 check_sock6 "dev , mark 0, priority 0" "No programs attached" 105 check_sock "dev cgrp2_sock, mark 0, priority 0" "Device set" 106 check_sock6 "dev cgrp2_sock, mark 0, priority 0" "Device set" 108 # verify mark is set 112 	cleanup_and_exit 1 "Failed to install program to set mark" 114 check_sock "dev , mark 666, priority 0" "Mark set" 115 check_sock6 "dev , mark 666, priority 0" "Mark set" 123 check_sock "dev , mark 0, priority 123" "Priority set" 124 check_sock6 "dev , mark 0, priority 123" "Priority set" [all …] 
 | 
| D | xdp2skb_meta_kern.c | 4  * Example howto transfer info from XDP to SKB, e.g. skb->mark 28 	__u32 mark;  member 57 	meta->mark = 42;  in _xdp_mark() 72 		ctx->mark = 41;  in _tc_mark() 78 	ctx->mark = meta->mark; /* Transfer XDP-mark to SKB-mark */  in _tc_mark() 98 iptables -I INPUT -p icmp -m mark --mark 41  # == 0x29 99 iptables -I INPUT -p icmp -m mark --mark 42  # == 0x2a
  | 
| /Linux-v5.4/include/linux/ | 
| D | fsnotify_backend.h | 111  * freeing_mark - called when a mark is being destroyed for some reason.  The group 112  * 		MUST be holding a reference on each mark and that reference must be 123 	void (*freeing_mark)(struct fsnotify_mark *mark, struct fsnotify_group *group); 126 	void (*free_mark)(struct fsnotify_mark *mark); 177 	atomic_t num_marks;		/* 1 for each mark and 1 for not being 259 		struct fsnotify_mark *mark)  in fsnotify_iter_set_report_type_mark()  argument 261 	iter_info->marks[type] = mark;  in fsnotify_iter_set_report_type_mark() 309  * A mark is simply an object attached to an in core inode which allows an 320  * mnt->mnt_root->d_lock depending on the mark type. 323 	/* Mask this mark is for [mark->lock, group->mark_mutex] */ [all …] 
 | 
| /Linux-v5.4/net/netfilter/ipset/ | 
| D | ip_set_hash_ipmark.c | 4 /* Kernel module implementing an IP set type: the hash:ip,mark type */ 28 IP_SET_MODULE_DESC("hash:ip,mark", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX); 29 MODULE_ALIAS("ip_set_hash:ip,mark"); 40 	__u32 mark;  member 51 	       ip1->mark == ip2->mark;  in hash_ipmark4_data_equal() 59 	    nla_put_net32(skb, IPSET_ATTR_MARK, htonl(data->mark)))  in hash_ipmark4_data_list() 88 	e.mark = skb->mark;  in hash_ipmark4_kadt() 89 	e.mark &= h->markmask;  in hash_ipmark4_kadt() 121 	e.mark = ntohl(nla_get_be32(tb[IPSET_ATTR_MARK]));  in hash_ipmark4_uadt() 122 	e.mark &= h->markmask;  in hash_ipmark4_uadt() [all …] 
 | 
| /Linux-v5.4/lib/ | 
| D | xarray.c | 22  * @mark is an xa_mark_t; a small number indicating one of the mark bits. 65 static inline void xa_mark_set(struct xarray *xa, xa_mark_t mark)  in xa_mark_set()  argument 67 	if (!(xa->xa_flags & XA_FLAGS_MARK(mark)))  in xa_mark_set() 68 		xa->xa_flags |= XA_FLAGS_MARK(mark);  in xa_mark_set() 71 static inline void xa_mark_clear(struct xarray *xa, xa_mark_t mark)  in xa_mark_clear()  argument 73 	if (xa->xa_flags & XA_FLAGS_MARK(mark))  in xa_mark_clear() 74 		xa->xa_flags &= ~(XA_FLAGS_MARK(mark));  in xa_mark_clear() 77 static inline unsigned long *node_marks(struct xa_node *node, xa_mark_t mark)  in node_marks()  argument 79 	return node->marks[(__force unsigned)mark];  in node_marks() 83 		unsigned int offset, xa_mark_t mark)  in node_get_mark()  argument [all …] 
 | 
| /Linux-v5.4/drivers/misc/mic/scif/ | 
| D | scif_fence.c | 16  * The peer has requested a mark. 21 	int mark = 0;  in scif_recv_mark()  local 24 	err = _scif_fence_mark(ep, &mark);  in scif_recv_mark() 30 	msg->payload[2] = mark;  in scif_recv_mark() 339 static int _scif_fence_wait(scif_epd_t epd, int mark)  in _scif_fence_wait()  argument 342 	dma_cookie_t cookie = mark & ~SCIF_REMOTE_FENCE;  in _scif_fence_wait() 369 	int mark, err;  in scif_rma_handle_remote_fences()  local 381 		mark = fence->msg.payload[2];  in scif_rma_handle_remote_fences() 382 		err = _scif_fence_wait(ep, mark);  in scif_rma_handle_remote_fences() 396 static int _scif_send_fence(scif_epd_t epd, int uop, int mark, int *out_mark)  in _scif_send_fence()  argument [all …] 
 | 
| /Linux-v5.4/net/netfilter/ | 
| D | xt_connmark.c | 19 MODULE_DESCRIPTION("Xtables: connection mark operations"); 40 		newmark = (ct->mark & ~info->ctmask) ^ info->ctmark;  in connmark_tg_shift() 46 		if (ct->mark != newmark) {  in connmark_tg_shift() 47 			ct->mark = newmark;  in connmark_tg_shift() 52 		new_targetmark = (skb->mark & info->nfmask);  in connmark_tg_shift() 58 		newmark = (ct->mark & ~info->ctmask) ^  in connmark_tg_shift() 60 		if (ct->mark != newmark) {  in connmark_tg_shift() 61 			ct->mark = newmark;  in connmark_tg_shift() 66 		new_targetmark = (ct->mark & info->ctmask);  in connmark_tg_shift() 72 		newmark = (skb->mark & ~info->nfmask) ^  in connmark_tg_shift() [all …] 
 | 
| D | xt_mark.c | 18 MODULE_DESCRIPTION("Xtables: packet mark operations"); 30 	skb->mark = (skb->mark & ~info->mask) ^ info->mark;  in mark_tg() 39 	return ((skb->mark & info->mask) == info->mark) ^ info->invert;  in mark_mt() 43 	.name           = "MARK", 52 	.name           = "mark",
  | 
| D | nft_chain_route.c | 24 	u32 mark;  in nf_route_table_hook4()  local 31 	mark = skb->mark;  in nf_route_table_hook4() 43 		    skb->mark != mark ||  in nf_route_table_hook4() 71 	u32 mark, flowlabel;  in nf_route_table_hook6()  local 79 	/* save source/dest address, mark, hoplimit, flowlabel, priority */  in nf_route_table_hook6() 82 	mark = skb->mark;  in nf_route_table_hook6() 92 	     skb->mark != mark ||  in nf_route_table_hook6()
  | 
| D | xt_TPROXY.c | 76 		skb->mark = (skb->mark & ~mark_mask) ^ mark_value;  in tproxy_tg4() 78 		pr_debug("redirecting: proto %hhu %pI4:%hu -> %pI4:%hu, mark: %x\n",  in tproxy_tg4() 80 			 &laddr, ntohs(lport), skb->mark);  in tproxy_tg4() 86 	pr_debug("no socket, dropping: proto %hhu %pI4:%hu -> %pI4:%hu, mark: %x\n",  in tproxy_tg4() 88 		 &iph->daddr, ntohs(hp->dest), skb->mark);  in tproxy_tg4() 170 		skb->mark = (skb->mark & ~tgi->mark_mask) ^ tgi->mark_value;  in tproxy_tg6_v1() 172 		pr_debug("redirecting: proto %hhu %pI6:%hu -> %pI6:%hu, mark: %x\n",  in tproxy_tg6_v1() 174 			 laddr, ntohs(lport), skb->mark);  in tproxy_tg6_v1() 180 	pr_debug("no socket, dropping: proto %hhu %pI6:%hu -> %pI6:%hu, mark: %x\n",  in tproxy_tg6_v1() 182 		 &iph->daddr, ntohs(hp->dest), skb->mark);  in tproxy_tg6_v1()
  | 
| /Linux-v5.4/Documentation/admin-guide/device-mapper/ | 
| D | log-writes.rst | 77     mark <description> 79 	You can use a dmsetup message to set an arbitrary mark in a log. 86 	  dmsetup message log 0 mark mkfs 89 	This would allow you to replay the log up to the mkfs mark and 93 	Every log has a mark at the end labeled "dm-log-writes-end". 110   dmsetup message log 0 mark mkfs 114   dmsetup message log 0 mark fsync 119   replay-log --log /dev/sdc --replay /dev/sdb --end-mark fsync 130   dmsetup message log 0 mark mkfs 138   replay-log --log /dev/sdc --replay /dev/sdb --end-mark mkfs [all …] 
 | 
| /Linux-v5.4/net/sched/ | 
| D | act_meta_mark.c | 3  * net/sched/act_meta_mark.c IFE skb->mark metadata module 24 	u32 ifemark = skb->mark;  in skbmark_encode() 33 	skb->mark = ntohl(ifemark);  in skbmark_decode() 39 	return ife_check_meta_u32(skb->mark, e);  in skbmark_check() 46 	.synopsis = "skb mark 32 bit metadata", 71 MODULE_DESCRIPTION("Inter-FE skb mark metadata module");
  | 
| /Linux-v5.4/include/net/tc_act/ | 
| D | tc_skbedit.h | 17 	u32 mark;  member 30 /* Return true iff action is mark */ 48 	u32 mark;  in tcf_skbedit_mark()  local 51 	mark = rcu_dereference(to_skbedit(a)->params)->mark;  in tcf_skbedit_mark() 54 	return mark;  in tcf_skbedit_mark()
  | 
| /Linux-v5.4/arch/powerpc/kernel/ | 
| D | smp-tbsync.c | 26 	volatile u64		mark;  member 39 static void enter_contest(u64 mark, long add)  in enter_contest()  argument 41 	while (get_tb() < mark)  in enter_contest() 73 		enter_contest(tbsync->mark, -1);  in smp_generic_take_timebase() 82 	u64 mark;  in start_contest()  local 90 		tbsync->mark = mark = tb + 400;  in start_contest() 101 		enter_contest(mark, 1);  in start_contest()
  |