/linux-6.3-rc2/net/ipv4/netfilter/ |
A D | arpt_mangle.c | 28 if (mangle->flags & ARPT_MANGLE_SDEV) { in target() 32 memcpy(arpptr, mangle->src_devaddr, hln); in target() 35 if (mangle->flags & ARPT_MANGLE_SIP) { in target() 39 memcpy(arpptr, &mangle->u_s.src_ip, pln); in target() 42 if (mangle->flags & ARPT_MANGLE_TDEV) { in target() 49 if (mangle->flags & ARPT_MANGLE_TIP) { in target() 55 return mangle->target; in target() 62 if (mangle->flags & ~ARPT_MANGLE_MASK || in checkentry() 63 !(mangle->flags & ARPT_MANGLE_MASK)) in checkentry() 66 if (mangle->target != NF_DROP && mangle->target != NF_ACCEPT && in checkentry() [all …]
|
A D | Kconfig | 251 # mangle + specific targets 256 This option adds a `mangle' table to iptables: see the man page for 267 This option adds a `ECN' target, which can be used in the iptables mangle
|
/linux-6.3-rc2/drivers/net/ethernet/mellanox/mlx5/core/en/tc/act/ |
A D | vlan_mangle.c | 21 .mangle.htype = FLOW_ACT_MANGLE_HDR_TYPE_ETH, in mlx5e_tc_act_vlan_add_rewrite_action() 22 .mangle.offset = offsetof(struct vlan_ethhdr, h_vlan_TCI), in mlx5e_tc_act_vlan_add_rewrite_action() 23 .mangle.mask = ~(u32)be16_to_cpu(*(__be16 *)&mask16), in mlx5e_tc_act_vlan_add_rewrite_action() 24 .mangle.val = (u32)be16_to_cpu(*(__be16 *)&val16), in mlx5e_tc_act_vlan_add_rewrite_action()
|
A D | pedit.c | 52 u8 htype = act->mangle.htype; in mlx5e_tc_act_pedit_parse_action() 66 mask = act->mangle.mask; in mlx5e_tc_act_pedit_parse_action() 67 val = act->mangle.val; in mlx5e_tc_act_pedit_parse_action() 68 offset = act->mangle.offset; in mlx5e_tc_act_pedit_parse_action()
|
/linux-6.3-rc2/drivers/net/ethernet/mediatek/ |
A D | mtk_ppe_offload.c | 75 void *dest = eth + act->mangle.offset; in mtk_flow_offload_mangle_eth() 76 const void *src = &act->mangle.val; in mtk_flow_offload_mangle_eth() 78 if (act->mangle.offset > 8) in mtk_flow_offload_mangle_eth() 81 if (act->mangle.mask == 0xffff) { in mtk_flow_offload_mangle_eth() 86 memcpy(dest, src, act->mangle.mask ? 2 : 4); in mtk_flow_offload_mangle_eth() 123 u32 val = ntohl(act->mangle.val); in mtk_flow_mangle_ports() 125 switch (act->mangle.offset) { in mtk_flow_mangle_ports() 127 if (act->mangle.mask == ~htonl(0xffff)) in mtk_flow_mangle_ports() 148 switch (act->mangle.offset) { in mtk_flow_mangle_ipv4() 159 memcpy(dest, &act->mangle.val, sizeof(u32)); in mtk_flow_mangle_ipv4() [all …]
|
/linux-6.3-rc2/scripts/ |
A D | headerdep.pl | 164 sub mangle { subroutine 179 mangle($header), $header; 188 mangle($header), mangle($dep->[1]);
|
/linux-6.3-rc2/fs/ |
A D | proc_namespace.c | 87 static inline void mangle(struct seq_file *m, const char *s) in mangle() function 94 mangle(m, sb->s_type->name); in show_type() 97 mangle(m, sb->s_subtype); in show_type() 114 mangle(m, r->mnt_devname ? r->mnt_devname : "none"); in show_vfsmnt() 184 mangle(m, r->mnt_devname ? r->mnt_devname : "none"); in show_mountinfo() 214 mangle(m, r->mnt_devname); in show_vfsstat()
|
/linux-6.3-rc2/Documentation/networking/ |
A D | tproxy.rst | 19 # iptables -t mangle -N DIVERT 20 # iptables -t mangle -A PREROUTING -p tcp -m socket -j DIVERT 21 # iptables -t mangle -A DIVERT -j MARK --set-mark 1 22 # iptables -t mangle -A DIVERT -j ACCEPT 69 # iptables -t mangle -A PREROUTING -p tcp --dport 80 -j TPROXY \
|
/linux-6.3-rc2/drivers/net/ethernet/netronome/nfp/flower/ |
A D | action.c | 530 mask = ~act->mangle.mask; in nfp_fl_set_eth() 531 exact = act->mangle.val; in nfp_fl_set_eth() 567 mask = (__force __be32)~act->mangle.mask; in nfp_fl_set_ip4() 568 exact = (__force __be32)act->mangle.val; in nfp_fl_set_ip4() 708 mask = (__force __be32)~act->mangle.mask; in nfp_fl_set_ip6() 709 exact = (__force __be32)act->mangle.val; in nfp_fl_set_ip6() 748 mask = ~act->mangle.mask; in nfp_fl_set_tport() 749 exact = act->mangle.val; in nfp_fl_set_tport() 902 htype = act->mangle.htype; in nfp_fl_pedit() 903 offset = act->mangle.offset; in nfp_fl_pedit()
|
A D | conntrack.c | 135 act->mangle.htype == htype) { in get_mangled_key() 136 off = act->mangle.offset - offset; in get_mangled_key() 137 msk = act->mangle.mask; in get_mangled_key() 138 key = act->mangle.val; in get_mangled_key() 663 switch (a_in->mangle.htype) { in nfp_fl_get_csum_flag() 1375 switch (mangle_action->mangle.htype) { in nfp_nft_ct_translate_mangle_action() 1378 mangle_action->mangle.val = (__force u32)cpu_to_be32(mangle_action->mangle.val); in nfp_nft_ct_translate_mangle_action() 1379 mangle_action->mangle.mask = (__force u32)cpu_to_be32(mangle_action->mangle.mask); in nfp_nft_ct_translate_mangle_action() 1384 mangle_action->mangle.val = (__force u16)cpu_to_be16(mangle_action->mangle.val); in nfp_nft_ct_translate_mangle_action() 1385 mangle_action->mangle.mask = (__force u16)cpu_to_be16(mangle_action->mangle.mask); in nfp_nft_ct_translate_mangle_action()
|
/linux-6.3-rc2/drivers/net/ethernet/chelsio/cxgb4/ |
A D | cxgb4_tc_flower.c | 543 htype = act->mangle.htype; in cxgb4_process_flow_actions() 544 mask = act->mangle.mask; in cxgb4_process_flow_actions() 545 val = act->mangle.val; in cxgb4_process_flow_actions() 546 offset = act->mangle.offset; in cxgb4_process_flow_actions() 586 htype = act->mangle.htype; in valid_pedit_action() 587 mask = act->mangle.mask; in valid_pedit_action() 588 offset = act->mangle.offset; in valid_pedit_action()
|
/linux-6.3-rc2/net/sched/ |
A D | act_pedit.c | 541 entry->mangle.htype = tcf_pedit_htype(act, k); in tcf_pedit_offload_act_setup() 542 entry->mangle.mask = tcf_pedit_mask(act, k); in tcf_pedit_offload_act_setup() 543 entry->mangle.val = tcf_pedit_val(act, k); in tcf_pedit_offload_act_setup() 544 entry->mangle.offset = tcf_pedit_offset(act, k); in tcf_pedit_offload_act_setup()
|
A D | act_ct.c | 80 entry->mangle.htype = htype; in tcf_ct_add_mangle_action() 81 entry->mangle.mask = ~mask; in tcf_ct_add_mangle_action() 82 entry->mangle.offset = offset; in tcf_ct_add_mangle_action() 83 entry->mangle.val = val; in tcf_ct_add_mangle_action()
|
/linux-6.3-rc2/tools/testing/selftests/net/ |
A D | amt.sh | 162 ip netns exec "${RELAY}" iptables -t mangle -I PREROUTING \ 164 ip netns exec "${RELAY}" ip6tables -t mangle -I PREROUTING \
|
A D | fib_tests.sh | 1950 iptables -t mangle -L OUTPUT &> /dev/null 1961 ip6tables -t mangle -L OUTPUT &> /dev/null 2002 $NS_EXEC iptables -t mangle -A OUTPUT -j MARK --set-mark 1 2009 $NS_EXEC iptables -t mangle -D OUTPUT -j MARK --set-mark 1 2060 $NS_EXEC ip6tables -t mangle -A OUTPUT -j MARK --set-mark 1 2067 $NS_EXEC ip6tables -t mangle -D OUTPUT -j MARK --set-mark 1
|
/linux-6.3-rc2/fs/ksmbd/ |
A D | smb_common.c | 25 #define mangle(V) ((char)(basechars[(V) % MANGLE_BASE])) macro 421 out[baselen + 1] = mangle(csum / MANGLE_BASE); in ksmbd_extract_shortname() 422 out[baselen + 2] = mangle(csum); in ksmbd_extract_shortname()
|
/linux-6.3-rc2/drivers/net/ethernet/mellanox/mlxsw/ |
A D | spectrum_flower.c | 212 enum flow_action_mangle_base htype = act->mangle.htype; in mlxsw_sp_flower_parse_actions() 213 __be32 be_mask = (__force __be32) act->mangle.mask; in mlxsw_sp_flower_parse_actions() 214 __be32 be_val = (__force __be32) act->mangle.val; in mlxsw_sp_flower_parse_actions() 215 u32 offset = act->mangle.offset; in mlxsw_sp_flower_parse_actions()
|
/linux-6.3-rc2/tools/testing/selftests/netfilter/ |
A D | conntrack_vrf.sh | 170 type filter hook postrouting priority mangle;
|
/linux-6.3-rc2/net/netfilter/ |
A D | nf_flow_table_offload.c | 209 entry->mangle.htype = htype; in flow_offload_mangle() 210 entry->mangle.offset = offset; in flow_offload_mangle() 211 memcpy(&entry->mangle.mask, mask, sizeof(u32)); in flow_offload_mangle() 212 memcpy(&entry->mangle.val, value, sizeof(u32)); in flow_offload_mangle()
|
/linux-6.3-rc2/drivers/net/ethernet/mellanox/mlx5/core/en/ |
A D | tc_ct.c | 297 offset = act->mangle.offset; in mlx5_tc_ct_rule_to_tuple_nat() 298 val = act->mangle.val; in mlx5_tc_ct_rule_to_tuple_nat() 299 switch (act->mangle.htype) { in mlx5_tc_ct_rule_to_tuple_nat() 611 u32 offset = act->mangle.offset, field; in mlx5_tc_ct_parse_mangle_to_mod_act() 613 switch (act->mangle.htype) { in mlx5_tc_ct_parse_mangle_to_mod_act() 673 MLX5_SET(set_action_in, modact, data, act->mangle.val); in mlx5_tc_ct_parse_mangle_to_mod_act()
|
/linux-6.3-rc2/drivers/net/ethernet/broadcom/bnxt/ |
A D | bnxt_tc.c | 192 offset = act->mangle.offset; in bnxt_tc_parse_pedit() 193 htype = act->mangle.htype; in bnxt_tc_parse_pedit() 194 mask = ~act->mangle.mask; in bnxt_tc_parse_pedit() 195 val = act->mangle.val; in bnxt_tc_parse_pedit()
|
/linux-6.3-rc2/include/net/ |
A D | flow_offload.h | 254 } mangle; member
|
/linux-6.3-rc2/tools/testing/selftests/wireguard/ |
A D | netns.sh | 351 n1 iptables -t mangle -I OUTPUT -j MARK --set-xmark 1 354 n1 iptables -t mangle -D OUTPUT -j MARK --set-xmark 1
|
/linux-6.3-rc2/Documentation/process/ |
A D | maintainer-netdev.rst | 220 get things done. Don't mangle whitespace, and as is common, don't 223 unpatched tree to confirm infrastructure didn't mangle it.
|
/linux-6.3-rc2/net/ipv6/netfilter/ |
A D | Kconfig | 225 This option adds a `mangle' table to iptables: see the man page for
|