/linux-6.12.1/net/ipv4/netfilter/ |
D | arpt_mangle.c | 15 const struct arpt_mangle *mangle = par->targinfo; in target() local 28 if (mangle->flags & ARPT_MANGLE_SDEV) { in target() 32 memcpy(arpptr, mangle->src_devaddr, hln); in target() 35 if (mangle->flags & ARPT_MANGLE_SIP) { in target() 39 memcpy(arpptr, &mangle->u_s.src_ip, pln); in target() 42 if (mangle->flags & ARPT_MANGLE_TDEV) { in target() 46 memcpy(arpptr, mangle->tgt_devaddr, hln); in target() 49 if (mangle->flags & ARPT_MANGLE_TIP) { in target() 53 memcpy(arpptr, &mangle->u_t.tgt_ip, pln); in target() 55 return mangle->target; in target() [all …]
|
D | Kconfig | 257 # mangle + specific targets 263 This option adds a `mangle' table to iptables: see the man page for 274 This option adds a `ECN' target, which can be used in the iptables mangle
|
/linux-6.12.1/drivers/net/ethernet/mellanox/mlx5/core/en/tc/act/ |
D | vlan_mangle.c | 21 .mangle.htype = FLOW_ACT_MANGLE_HDR_TYPE_ETH, in mlx5e_tc_act_vlan_add_rewrite_action() 22 .mangle.offset = offsetof(struct vlan_ethhdr, h_vlan_TCI), in mlx5e_tc_act_vlan_add_rewrite_action() 23 .mangle.mask = ~(u32)be16_to_cpu(*(__be16 *)&mask16), in mlx5e_tc_act_vlan_add_rewrite_action() 24 .mangle.val = (u32)be16_to_cpu(*(__be16 *)&val16), in mlx5e_tc_act_vlan_add_rewrite_action()
|
D | pedit.c | 53 u8 htype = act->mangle.htype; in mlx5e_tc_act_pedit_parse_action() 67 mask = act->mangle.mask; in mlx5e_tc_act_pedit_parse_action() 68 val = act->mangle.val; in mlx5e_tc_act_pedit_parse_action() 69 offset = act->mangle.offset; in mlx5e_tc_act_pedit_parse_action()
|
/linux-6.12.1/scripts/ |
D | headerdep.pl | 164 sub mangle { subroutine 179 mangle($header), $header; 188 mangle($header), mangle($dep->[1]);
|
/linux-6.12.1/drivers/net/ethernet/mediatek/ |
D | mtk_ppe_offload.c | 75 void *dest = eth + act->mangle.offset; in mtk_flow_offload_mangle_eth() 76 const void *src = &act->mangle.val; in mtk_flow_offload_mangle_eth() 78 if (act->mangle.offset > 8) in mtk_flow_offload_mangle_eth() 81 if (act->mangle.mask == 0xffff) { in mtk_flow_offload_mangle_eth() 86 memcpy(dest, src, act->mangle.mask ? 2 : 4); in mtk_flow_offload_mangle_eth() 124 u32 val = ntohl(act->mangle.val); in mtk_flow_mangle_ports() 126 switch (act->mangle.offset) { in mtk_flow_mangle_ports() 128 if (act->mangle.mask == ~htonl(0xffff)) in mtk_flow_mangle_ports() 149 switch (act->mangle.offset) { in mtk_flow_mangle_ipv4() 160 memcpy(dest, &act->mangle.val, sizeof(u32)); in mtk_flow_mangle_ipv4() [all …]
|
/linux-6.12.1/fs/ |
D | proc_namespace.c | 87 static inline void mangle(struct seq_file *m, const char *s) in mangle() function 94 mangle(m, sb->s_type->name); in show_type() 97 mangle(m, sb->s_subtype); in show_type() 114 mangle(m, r->mnt_devname ? r->mnt_devname : "none"); in show_vfsmnt() 180 mangle(m, r->mnt_devname ? r->mnt_devname : "none"); in show_mountinfo() 210 mangle(m, r->mnt_devname); in show_vfsstat()
|
/linux-6.12.1/drivers/net/ethernet/sfc/ |
D | tc.c | 1162 switch (fa->mangle.htype) { in efx_tc_pedit_add() 1164 switch (fa->mangle.offset) { in efx_tc_pedit_add() 1167 if (fa->mangle.mask != ~EFX_TC_HDR_TYPE_TTL_MASK) in efx_tc_pedit_add() 1173 if ((fa->mangle.val & EFX_TC_HDR_TYPE_TTL_MASK) != U8_MAX) in efx_tc_pedit_add() 1189 switch (fa->mangle.offset) { in efx_tc_pedit_add() 1192 if (fa->mangle.mask != EFX_TC_HDR_TYPE_HLIMIT_MASK) in efx_tc_pedit_add() 1198 if ((fa->mangle.val >> 24) != U8_MAX) in efx_tc_pedit_add() 1219 fa->mangle.htype, fa->mangle.offset, in efx_tc_pedit_add() 1220 fa->mangle.val, fa->mangle.mask); in efx_tc_pedit_add() 1249 switch (fa->mangle.htype) { in efx_tc_mangle() [all …]
|
D | tc_conntrack.c | 298 switch (fa->mangle.htype) { in efx_tc_ct_mangle() 300 switch (fa->mangle.offset) { in efx_tc_ct_mangle() 305 if (fa->mangle.mask) in efx_tc_ct_mangle() 307 conn->nat_ip = htonl(fa->mangle.val); in efx_tc_ct_mangle() 321 switch (fa->mangle.offset) { in efx_tc_ct_mangle() 330 if (~fa->mangle.mask != 0xffff) in efx_tc_ct_mangle() 332 conn->l4_natport = htons(fa->mangle.val); in efx_tc_ct_mangle()
|
/linux-6.12.1/Documentation/networking/ |
D | tproxy.rst | 19 # iptables -t mangle -N DIVERT 20 # iptables -t mangle -A PREROUTING -p tcp -m socket --transparent -j DIVERT 21 # iptables -t mangle -A DIVERT -j MARK --set-mark 1 22 # iptables -t mangle -A DIVERT -j ACCEPT 69 # iptables -t mangle -A PREROUTING -p tcp --dport 80 -j TPROXY \
|
/linux-6.12.1/drivers/net/ethernet/netronome/nfp/flower/ |
D | conntrack.c | 146 act->mangle.htype == htype) { in get_mangled_key() 147 off = act->mangle.offset - offset; in get_mangled_key() 148 msk = act->mangle.mask; in get_mangled_key() 149 key = act->mangle.val; in get_mangled_key() 690 switch (a_in->mangle.htype) { in nfp_fl_get_csum_flag() 1420 switch (mangle_action->mangle.htype) { in nfp_nft_ct_translate_mangle_action() 1423 mangle_action->mangle.val = (__force u32)cpu_to_be32(mangle_action->mangle.val); in nfp_nft_ct_translate_mangle_action() 1424 mangle_action->mangle.mask = (__force u32)cpu_to_be32(mangle_action->mangle.mask); in nfp_nft_ct_translate_mangle_action() 1434 if (mangle_action->mangle.offset == offsetof(struct tcphdr, source)) { in nfp_nft_ct_translate_mangle_action() 1435 mangle_action->mangle.val = in nfp_nft_ct_translate_mangle_action() [all …]
|
D | action.c | 545 mask = ~act->mangle.mask; in nfp_fl_set_eth() 546 exact = act->mangle.val; in nfp_fl_set_eth() 582 mask = (__force __be32)~act->mangle.mask; in nfp_fl_set_ip4() 583 exact = (__force __be32)act->mangle.val; in nfp_fl_set_ip4() 723 mask = (__force __be32)~act->mangle.mask; in nfp_fl_set_ip6() 724 exact = (__force __be32)act->mangle.val; in nfp_fl_set_ip6() 763 mask = ~act->mangle.mask; in nfp_fl_set_tport() 764 exact = act->mangle.val; in nfp_fl_set_tport() 917 htype = act->mangle.htype; in nfp_fl_pedit() 918 offset = act->mangle.offset; in nfp_fl_pedit()
|
/linux-6.12.1/drivers/net/ethernet/chelsio/cxgb4/ |
D | cxgb4_tc_flower.c | 549 htype = act->mangle.htype; in cxgb4_process_flow_actions() 550 mask = act->mangle.mask; in cxgb4_process_flow_actions() 551 val = act->mangle.val; in cxgb4_process_flow_actions() 552 offset = act->mangle.offset; in cxgb4_process_flow_actions() 592 htype = act->mangle.htype; in valid_pedit_action() 593 mask = act->mangle.mask; in valid_pedit_action() 594 offset = act->mangle.offset; in valid_pedit_action()
|
/linux-6.12.1/net/sched/ |
D | act_pedit.c | 575 entry->mangle.htype = tcf_pedit_htype(act, k); in tcf_pedit_offload_act_setup() 576 entry->mangle.mask = tcf_pedit_mask(act, k); in tcf_pedit_offload_act_setup() 577 entry->mangle.val = tcf_pedit_val(act, k); in tcf_pedit_offload_act_setup() 578 entry->mangle.offset = tcf_pedit_offset(act, k); in tcf_pedit_offload_act_setup()
|
D | act_ct.c | 85 entry->mangle.htype = htype; in tcf_ct_add_mangle_action() 86 entry->mangle.mask = ~mask; in tcf_ct_add_mangle_action() 87 entry->mangle.offset = offset; in tcf_ct_add_mangle_action() 88 entry->mangle.val = val; in tcf_ct_add_mangle_action()
|
/linux-6.12.1/tools/testing/selftests/net/ |
D | amt.sh | 168 ip netns exec "${RELAY}" iptables -t mangle -I PREROUTING \ 170 ip netns exec "${RELAY}" ip6tables -t mangle -I PREROUTING \
|
D | fib_tests.sh | 2259 iptables -t mangle -L OUTPUT &> /dev/null 2270 ip6tables -t mangle -L OUTPUT &> /dev/null 2311 $NS_EXEC iptables -t mangle -A OUTPUT -j MARK --set-mark 1 2318 $NS_EXEC iptables -t mangle -D OUTPUT -j MARK --set-mark 1 2369 $NS_EXEC ip6tables -t mangle -A OUTPUT -j MARK --set-mark 1 2376 $NS_EXEC ip6tables -t mangle -D OUTPUT -j MARK --set-mark 1
|
/linux-6.12.1/drivers/net/ethernet/mellanox/mlxsw/ |
D | spectrum_flower.c | 222 enum flow_action_mangle_base htype = act->mangle.htype; in mlxsw_sp_flower_parse_actions() 223 __be32 be_mask = (__force __be32) act->mangle.mask; in mlxsw_sp_flower_parse_actions() 224 __be32 be_val = (__force __be32) act->mangle.val; in mlxsw_sp_flower_parse_actions() 225 u32 offset = act->mangle.offset; in mlxsw_sp_flower_parse_actions()
|
/linux-6.12.1/fs/smb/server/ |
D | smb_common.c | 25 #define mangle(V) ((char)(basechars[(V) % MANGLE_BASE])) macro 553 out[baselen + 1] = mangle(csum / MANGLE_BASE); in ksmbd_extract_shortname() 554 out[baselen + 2] = mangle(csum); in ksmbd_extract_shortname()
|
/linux-6.12.1/net/netfilter/ |
D | nf_flow_table_offload.c | 209 entry->mangle.htype = htype; in flow_offload_mangle() 210 entry->mangle.offset = offset; in flow_offload_mangle() 211 memcpy(&entry->mangle.mask, mask, sizeof(u32)); in flow_offload_mangle() 212 memcpy(&entry->mangle.val, value, sizeof(u32)); in flow_offload_mangle()
|
/linux-6.12.1/drivers/net/ethernet/mellanox/mlx5/core/en/ |
D | tc_ct.c | 301 offset = act->mangle.offset; in mlx5_tc_ct_rule_to_tuple_nat() 302 val = act->mangle.val; in mlx5_tc_ct_rule_to_tuple_nat() 303 switch (act->mangle.htype) { in mlx5_tc_ct_rule_to_tuple_nat() 611 u32 offset = act->mangle.offset, field; in mlx5_tc_ct_parse_mangle_to_mod_act() 613 switch (act->mangle.htype) { in mlx5_tc_ct_parse_mangle_to_mod_act() 673 MLX5_SET(set_action_in, modact, data, act->mangle.val); in mlx5_tc_ct_parse_mangle_to_mod_act()
|
/linux-6.12.1/tools/testing/selftests/net/netfilter/ |
D | conntrack_vrf.sh | 160 type filter hook postrouting priority mangle;
|
/linux-6.12.1/drivers/net/ethernet/broadcom/bnxt/ |
D | bnxt_tc.c | 192 offset = act->mangle.offset; in bnxt_tc_parse_pedit() 193 htype = act->mangle.htype; in bnxt_tc_parse_pedit() 194 mask = ~act->mangle.mask; in bnxt_tc_parse_pedit() 195 val = act->mangle.val; in bnxt_tc_parse_pedit()
|
/linux-6.12.1/tools/testing/selftests/wireguard/ |
D | netns.sh | 351 n1 iptables -t mangle -I OUTPUT -j MARK --set-xmark 1 354 n1 iptables -t mangle -D OUTPUT -j MARK --set-xmark 1
|
/linux-6.12.1/include/net/ |
D | flow_offload.h | 260 } mangle; member
|