/linux/net/ipv4/netfilter/ |
H A D | arpt_mangle.c | 10 MODULE_DESCRIPTION("arptables arp payload mangle target"); 15 const struct arpt_mangle *mangle = par->targinfo; in target() local 28 if (mangle->flags & ARPT_MANGLE_SDEV) { in target() 32 memcpy(arpptr, mangle->src_devaddr, hln); in target() 35 if (mangle->flags & ARPT_MANGLE_SIP) { in target() 39 memcpy(arpptr, &mangle->u_s.src_ip, pln); in target() 42 if (mangle->flags & ARPT_MANGLE_TDEV) { in target() 46 memcpy(arpptr, mangle->tgt_devaddr, hln); in target() 49 if (mangle->flags & ARPT_MANGLE_TIP) { in target() 53 memcpy(arpptr, &mangle in target() 60 const struct arpt_mangle *mangle = par->targinfo; checkentry() local [all...] |
H A D | Kconfig | 264 # mangle + specific targets 270 This option adds a `mangle' table to iptables: see the man page for 281 This option adds a `ECN' target, which can be used in the iptables mangle
|
/linux/drivers/net/ethernet/mellanox/mlx5/core/en/tc/act/ |
H A D | vlan_mangle.c | 21 .mangle.htype = FLOW_ACT_MANGLE_HDR_TYPE_ETH, in mlx5e_tc_act_vlan_add_rewrite_action() 22 .mangle.offset = offsetof(struct vlan_ethhdr, h_vlan_TCI), in mlx5e_tc_act_vlan_add_rewrite_action() 23 .mangle.mask = ~(u32)be16_to_cpu(*(__be16 *)&mask16), in mlx5e_tc_act_vlan_add_rewrite_action() 24 .mangle.val = (u32)be16_to_cpu(*(__be16 *)&val16), in mlx5e_tc_act_vlan_add_rewrite_action()
|
H A D | pedit.c | 53 u8 htype = act->mangle.htype; in mlx5e_tc_act_pedit_parse_action() 67 mask = act->mangle.mask; in mlx5e_tc_act_pedit_parse_action() 68 val = act->mangle.val; in mlx5e_tc_act_pedit_parse_action() 69 offset = act->mangle.offset; in mlx5e_tc_act_pedit_parse_action()
|
/linux/scripts/ |
H A D | headerdep.pl | 164 sub mangle { subroutine 179 mangle($header), $header; 188 mangle($header), mangle($dep->[1]);
|
/linux/fs/ |
H A D | proc_namespace.c | 87 static inline void mangle(struct seq_file *m, const char *s) in mangle() function 94 mangle(m, sb->s_type->name); in show_type() 97 mangle(m, sb->s_subtype); in show_type() 114 mangle(m, r->mnt_devname); in show_vfsmnt() 180 mangle(m, r->mnt_devname); in show_mountinfo() 208 mangle(m, r->mnt_devname); in show_vfsstat()
|
/linux/drivers/net/ethernet/sfc/ |
H A D | tc.c | 1162 switch (fa->mangle.htype) { in efx_tc_pedit_add() 1164 switch (fa->mangle.offset) { in efx_tc_pedit_add() 1167 if (fa->mangle.mask != ~EFX_TC_HDR_TYPE_TTL_MASK) in efx_tc_pedit_add() 1173 if ((fa->mangle.val & EFX_TC_HDR_TYPE_TTL_MASK) != U8_MAX) in efx_tc_pedit_add() 1189 switch (fa->mangle.offset) { in efx_tc_pedit_add() 1192 if (fa->mangle.mask != EFX_TC_HDR_TYPE_HLIMIT_MASK) in efx_tc_pedit_add() 1198 if ((fa->mangle.val >> 24) != U8_MAX) in efx_tc_pedit_add() 1219 fa->mangle.htype, fa->mangle.offset, in efx_tc_pedit_add() 1220 fa->mangle in efx_tc_pedit_add() [all...] |
H A D | tc_conntrack.c | 294 /* Is this the first mangle we've processed for this rule? */ in efx_tc_ct_mangle() 298 switch (fa->mangle.htype) { in efx_tc_ct_mangle() 300 switch (fa->mangle.offset) { in efx_tc_ct_mangle() 305 if (fa->mangle.mask) in efx_tc_ct_mangle() 307 conn->nat_ip = htonl(fa->mangle.val); in efx_tc_ct_mangle() 321 switch (fa->mangle.offset) { in efx_tc_ct_mangle() 330 if (~fa->mangle.mask != 0xffff) in efx_tc_ct_mangle() 332 conn->l4_natport = htons(fa->mangle.val); in efx_tc_ct_mangle() 342 /* first mangle tells us whether this is SNAT or DNAT; in efx_tc_ct_mangle()
|
/linux/Documentation/networking/ |
H A D | tproxy.rst | 19 # iptables -t mangle -N DIVERT 20 # iptables -t mangle -A PREROUTING -p tcp -m socket --transparent -j DIVERT 21 # iptables -t mangle -A DIVERT -j MARK --set-mark 1 22 # iptables -t mangle -A DIVERT -j ACCEPT 69 # iptables -t mangle -A PREROUTING -p tcp --dport 80 -j TPROXY \
|
/linux/drivers/net/ethernet/netronome/nfp/flower/ |
H A D | conntrack.c | 126 * get_mangled_key() - Mangle the key if mangle act exists 146 act->mangle.htype == htype) { in get_mangled_key() 147 off = act->mangle.offset - offset; in get_mangled_key() 148 msk = act->mangle.mask; in get_mangled_key() 149 key = act->mangle.val; in get_mangled_key() 232 * the former flow whose mangle action need be taken into account 246 * Supported fields to mangle: in nfp_ct_merge_check() 684 /* get the csum flag according the ip proto and mangle action. */ 690 switch (a_in->mangle.htype) { in nfp_fl_get_csum_flag() 774 /* nft entry is generated by tc ct, which mangle actio in nfp_fl_merge_actions_offload() [all...] |
H A D | action.c | 545 mask = ~act->mangle.mask; in nfp_fl_set_eth() 546 exact = act->mangle.val; in nfp_fl_set_eth() 582 mask = (__force __be32)~act->mangle.mask; in nfp_fl_set_ip4() 583 exact = (__force __be32)act->mangle.val; in nfp_fl_set_ip4() 723 mask = (__force __be32)~act->mangle.mask; in nfp_fl_set_ip6() 724 exact = (__force __be32)act->mangle.val; in nfp_fl_set_ip6() 763 mask = ~act->mangle.mask; in nfp_fl_set_tport() 764 exact = act->mangle.val; in nfp_fl_set_tport() 917 htype = act->mangle.htype; in nfp_fl_pedit() 918 offset = act->mangle in nfp_fl_pedit() [all...] |
/linux/drivers/net/ethernet/airoha/ |
H A D | airoha_ppe.c | 136 void *dest = eth + act->mangle.offset; in airoha_ppe_flow_mangle_eth() 137 const void *src = &act->mangle.val; in airoha_ppe_flow_mangle_eth() 139 if (act->mangle.offset > 8) in airoha_ppe_flow_mangle_eth() 142 if (act->mangle.mask == 0xffff) { in airoha_ppe_flow_mangle_eth() 147 memcpy(dest, src, act->mangle.mask ? 2 : 4); in airoha_ppe_flow_mangle_eth() 153 u32 val = be32_to_cpu((__force __be32)act->mangle.val); in airoha_ppe_flow_mangle_ports() 155 switch (act->mangle.offset) { in airoha_ppe_flow_mangle_ports() 157 if ((__force __be32)act->mangle.mask == ~cpu_to_be32(0xffff)) in airoha_ppe_flow_mangle_ports() 177 switch (act->mangle.offset) { in airoha_ppe_flow_mangle_ipv4() 188 memcpy(dest, &act->mangle in airoha_ppe_flow_mangle_ipv4() [all...] |
/linux/net/sched/ |
H A D | act_pedit.c | 575 entry->mangle.htype = tcf_pedit_htype(act, k); in tcf_pedit_offload_act_setup() 576 entry->mangle.mask = tcf_pedit_mask(act, k); in tcf_pedit_offload_act_setup() 577 entry->mangle.val = tcf_pedit_val(act, k); in tcf_pedit_offload_act_setup() 578 entry->mangle.offset = tcf_pedit_offset(act, k); in tcf_pedit_offload_act_setup()
|
H A D | act_ct.c | 85 entry->mangle.htype = htype; in tcf_ct_add_mangle_action() 86 entry->mangle.mask = ~mask; in tcf_ct_add_mangle_action() 87 entry->mangle.offset = offset; in tcf_ct_add_mangle_action() 88 entry->mangle.val = val; in tcf_ct_add_mangle_action() 93 * and/or ip is needed, and add the relevant mangle actions.
|
/linux/tools/testing/selftests/net/ |
H A D | amt.sh | 168 ip netns exec "${RELAY}" iptables -t mangle -I PREROUTING \ 170 ip netns exec "${RELAY}" ip6tables -t mangle -I PREROUTING \
|
H A D | fib_tests.sh | 2288 iptables -t mangle -L OUTPUT &> /dev/null 2299 ip6tables -t mangle -L OUTPUT &> /dev/null 2340 $NS_EXEC iptables -t mangle -A OUTPUT -j MARK --set-mark 1 2347 $NS_EXEC iptables -t mangle -D OUTPUT -j MARK --set-mark 1 2398 $NS_EXEC ip6tables -t mangle -A OUTPUT -j MARK --set-mark 1 2405 $NS_EXEC ip6tables -t mangle -D OUTPUT -j MARK --set-mark 1
|
/linux/drivers/net/ethernet/mellanox/mlxsw/ |
H A D | spectrum_flower.c | 227 enum flow_action_mangle_base htype = act->mangle.htype; in mlxsw_sp_flower_parse_actions() 228 __be32 be_mask = (__force __be32) act->mangle.mask; in mlxsw_sp_flower_parse_actions() 229 __be32 be_val = (__force __be32) act->mangle.val; in mlxsw_sp_flower_parse_actions() 230 u32 offset = act->mangle.offset; in mlxsw_sp_flower_parse_actions() 297 NL_SET_ERR_MSG_MOD(extack, "Unsupported mangle field"); in mlxsw_sp_flower_parse_actions()
|
/linux/fs/smb/server/ |
H A D | smb_common.c | 25 #define mangle(V) ((char)(basechars[(V) % MANGLE_BASE])) macro 553 out[baselen + 1] = mangle(csum / MANGLE_BASE); in ksmbd_extract_shortname() 554 out[baselen + 2] = mangle(csum); in ksmbd_extract_shortname()
|
/linux/tools/testing/selftests/net/netfilter/ |
H A D | conntrack_vrf.sh | 149 type filter hook postrouting priority mangle;
|
/linux/net/netfilter/ |
H A D | nf_flow_table_offload.c | 209 entry->mangle.htype = htype; in flow_offload_mangle() 210 entry->mangle.offset = offset; in flow_offload_mangle() 211 memcpy(&entry->mangle.mask, mask, sizeof(u32)); in flow_offload_mangle() 212 memcpy(&entry->mangle.val, value, sizeof(u32)); in flow_offload_mangle()
|
/linux/drivers/net/ethernet/mellanox/mlx5/core/en/ |
H A D | tc_ct.c | 301 offset = act->mangle.offset; in mlx5_tc_ct_rule_to_tuple_nat() 302 val = act->mangle.val; in mlx5_tc_ct_rule_to_tuple_nat() 303 switch (act->mangle.htype) { in mlx5_tc_ct_rule_to_tuple_nat() 611 u32 offset = act->mangle.offset, field; in mlx5_tc_ct_parse_mangle_to_mod_act() 613 switch (act->mangle.htype) { in mlx5_tc_ct_parse_mangle_to_mod_act() 673 MLX5_SET(set_action_in, modact, data, act->mangle.val); in mlx5_tc_ct_parse_mangle_to_mod_act()
|
/linux/drivers/net/ethernet/broadcom/bnxt/ |
H A D | bnxt_tc.c | 192 offset = act->mangle.offset; in bnxt_tc_parse_pedit() 193 htype = act->mangle.htype; in bnxt_tc_parse_pedit() 194 mask = ~act->mangle.mask; in bnxt_tc_parse_pedit() 195 val = act->mangle.val; in bnxt_tc_parse_pedit()
|
/linux/include/net/ |
H A D | flow_offload.h | 260 } mangle; member
|
/linux/tools/testing/selftests/wireguard/ |
H A D | netns.sh | 352 n1 iptables -t mangle -I OUTPUT -j MARK --set-xmark 1 355 n1 iptables -t mangle -D OUTPUT -j MARK --set-xmark 1
|
/linux/net/ipv6/netfilter/ |
H A D | Kconfig | 239 This option adds a `mangle' table to iptables: see the man page for
|