/Linux-v5.4/net/ipv4/netfilter/ |
D | arpt_mangle.c | 15 const struct arpt_mangle *mangle = par->targinfo; in target() local 28 if (mangle->flags & ARPT_MANGLE_SDEV) { in target() 32 memcpy(arpptr, mangle->src_devaddr, hln); in target() 35 if (mangle->flags & ARPT_MANGLE_SIP) { in target() 39 memcpy(arpptr, &mangle->u_s.src_ip, pln); in target() 42 if (mangle->flags & ARPT_MANGLE_TDEV) { in target() 46 memcpy(arpptr, mangle->tgt_devaddr, hln); in target() 49 if (mangle->flags & ARPT_MANGLE_TIP) { in target() 53 memcpy(arpptr, &mangle->u_t.tgt_ip, pln); in target() 55 return mangle->target; in target() [all …]
|
D | Kconfig | 253 # mangle + specific targets 258 This option adds a `mangle' table to iptables: see the man page for 283 This option adds a `ECN' target, which can be used in the iptables mangle
|
/Linux-v5.4/scripts/ |
D | headerdep.pl | 164 sub mangle { subroutine 179 mangle($header), $header; 188 mangle($header), mangle($dep->[1]);
|
/Linux-v5.4/fs/ |
D | proc_namespace.c | 83 static inline void mangle(struct seq_file *m, const char *s) in mangle() function 90 mangle(m, sb->s_type->name); in show_type() 93 mangle(m, sb->s_subtype); in show_type() 110 mangle(m, r->mnt_devname ? r->mnt_devname : "none"); in show_vfsmnt() 180 mangle(m, r->mnt_devname ? r->mnt_devname : "none"); in show_mountinfo() 210 mangle(m, r->mnt_devname); in show_vfsstat()
|
/Linux-v5.4/Documentation/networking/ |
D | tproxy.txt | 16 # iptables -t mangle -N DIVERT 17 # iptables -t mangle -A PREROUTING -p tcp -m socket -j DIVERT 18 # iptables -t mangle -A DIVERT -j MARK --set-mark 1 19 # iptables -t mangle -A DIVERT -j ACCEPT 66 # iptables -t mangle -A PREROUTING -p tcp --dport 80 -j TPROXY \
|
D | netdev-FAQ.rst | 265 get things done. Don't mangle whitespace, and as is common, don't 268 unpatched tree to confirm infrastructure didn't mangle it.
|
/Linux-v5.4/drivers/net/ethernet/netronome/nfp/flower/ |
D | action.c | 498 mask = ~act->mangle.mask; in nfp_fl_set_eth() 499 exact = act->mangle.val; in nfp_fl_set_eth() 535 mask = (__force __be32)~act->mangle.mask; in nfp_fl_set_ip4() 536 exact = (__force __be32)act->mangle.val; in nfp_fl_set_ip4() 676 mask = (__force __be32)~act->mangle.mask; in nfp_fl_set_ip6() 677 exact = (__force __be32)act->mangle.val; in nfp_fl_set_ip6() 716 mask = ~act->mangle.mask; in nfp_fl_set_tport() 717 exact = act->mangle.val; in nfp_fl_set_tport() 871 htype = act->mangle.htype; in nfp_fl_pedit() 872 offset = act->mangle.offset; in nfp_fl_pedit()
|
/Linux-v5.4/drivers/net/ethernet/chelsio/cxgb4/ |
D | cxgb4_tc_flower.c | 432 htype = act->mangle.htype; in cxgb4_process_flow_actions() 433 mask = act->mangle.mask; in cxgb4_process_flow_actions() 434 val = act->mangle.val; in cxgb4_process_flow_actions() 435 offset = act->mangle.offset; in cxgb4_process_flow_actions() 465 htype = act->mangle.htype; in valid_pedit_action() 466 mask = act->mangle.mask; in valid_pedit_action() 467 offset = act->mangle.offset; in valid_pedit_action()
|
/Linux-v5.4/drivers/net/ethernet/mellanox/mlx5/core/ |
D | en_tc.c | 2511 htype = act->mangle.htype; in parse_tc_pedit_action() 2525 mask = act->mangle.mask; in parse_tc_pedit_action() 2526 val = act->mangle.val; in parse_tc_pedit_action() 2527 offset = act->mangle.offset; in parse_tc_pedit_action() 2627 htype = act->mangle.htype; in is_action_keys_supported() 2628 offset = act->mangle.offset; in is_action_keys_supported() 2629 mask = ~act->mangle.mask; in is_action_keys_supported() 2751 .mangle.htype = FLOW_ACT_MANGLE_HDR_TYPE_ETH, in add_vlan_rewrite_action() 2752 .mangle.offset = offsetof(struct vlan_ethhdr, h_vlan_TCI), in add_vlan_rewrite_action() 2753 .mangle.mask = ~(u32)be16_to_cpu(*(__be16 *)&mask16), in add_vlan_rewrite_action() [all …]
|
/Linux-v5.4/include/net/ |
D | flow_offload.h | 176 } mangle; member
|
/Linux-v5.4/net/ipv6/netfilter/ |
D | Kconfig | 230 This option adds a `mangle' table to iptables: see the man page for
|
/Linux-v5.4/net/netfilter/ |
D | Kconfig | 733 The target allows you to create rules in the "mangle" table which alter 782 This option adds a `CHECKSUM' target, which can be used in the iptables mangle 850 the "mangle" table which alter the Type Of Service field of an IPv4 877 The target allows you to create rules in the "raw" and "mangle" tables 1049 REDIRECT. It can only be used in the mangle table and is useful
|
/Linux-v5.4/Documentation/vm/ |
D | transhuge.rst | 44 if any driver is going to mangle over the page structure of the tail
|
/Linux-v5.4/net/sched/ |
D | cls_api.c | 3516 entry->mangle.htype = tcf_pedit_htype(act, k); in tc_setup_flow_action() 3517 entry->mangle.mask = tcf_pedit_mask(act, k); in tc_setup_flow_action() 3518 entry->mangle.val = tcf_pedit_val(act, k); in tc_setup_flow_action() 3519 entry->mangle.offset = tcf_pedit_offset(act, k); in tc_setup_flow_action()
|
D | Kconfig | 804 Say Y here if you want to mangle the content of packets.
|
/Linux-v5.4/Documentation/process/ |
D | email-clients.rst | 272 Thunderbird is an Outlook clone that likes to mangle text, but there are ways
|
D | howto.rst | 421 use a mail program that does not mangle spaces and tab characters. A
|
/Linux-v5.4/Documentation/kernel-hacking/ |
D | hacking.rst | 733 you create or mangle significantly. This is the first place people
|
/Linux-v5.4/ |
D | CREDITS | 3916 D: netfilter: IPv6 mangle table
|