[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@18.191.238.6: ~ $
#ifndef _X_TABLES_H
#define _X_TABLES_H
#include <linux/kernel.h>
#include <linux/types.h>

#define XT_FUNCTION_MAXNAMELEN 30
#define XT_EXTENSION_MAXNAMELEN 29
#define XT_TABLE_MAXNAMELEN 32

struct xt_entry_match {
	union {
		struct {
			__u16 match_size;

			/* Used by userspace */
			char name[XT_EXTENSION_MAXNAMELEN];
			__u8 revision;
		} user;
		struct {
			__u16 match_size;

			/* Used inside the kernel */
			struct xt_match *match;
		} kernel;

		/* Total length */
		__u16 match_size;
	} u;

	unsigned char data[0];
};

struct xt_entry_target {
	union {
		struct {
			__u16 target_size;

			/* Used by userspace */
			char name[XT_EXTENSION_MAXNAMELEN];
			__u8 revision;
		} user;
		struct {
			__u16 target_size;

			/* Used inside the kernel */
			struct xt_target *target;
		} kernel;

		/* Total length */
		__u16 target_size;
	} u;

	unsigned char data[0];
};

#define XT_TARGET_INIT(__name, __size)					       \
{									       \
	.target.u.user = {						       \
		.target_size	= XT_ALIGN(__size),			       \
		.name		= __name,				       \
	},								       \
}

struct xt_standard_target {
	struct xt_entry_target target;
	int verdict;
};

struct xt_error_target {
	struct xt_entry_target target;
	char errorname[XT_FUNCTION_MAXNAMELEN];
};

/* The argument to IPT_SO_GET_REVISION_*.  Returns highest revision
 * kernel supports, if >= revision. */
struct xt_get_revision {
	char name[XT_EXTENSION_MAXNAMELEN];
	__u8 revision;
};

/* CONTINUE verdict for targets */
#define XT_CONTINUE 0xFFFFFFFF

/* For standard target */
#define XT_RETURN (-NF_REPEAT - 1)

/* this is a dummy structure to find out the alignment requirement for a struct
 * containing all the fundamental data types that are used in ipt_entry,
 * ip6t_entry and arpt_entry.  This sucks, and it is a hack.  It will be my
 * personal pleasure to remove it -HW
 */
struct _xt_align {
	__u8 u8;
	__u16 u16;
	__u32 u32;
	__u64 u64;
};

#define XT_ALIGN(s) __ALIGN_KERNEL((s), __alignof__(struct _xt_align))

/* Standard return verdict, or do jump. */
#define XT_STANDARD_TARGET ""
/* Error verdict. */
#define XT_ERROR_TARGET "ERROR"

#define SET_COUNTER(c,b,p) do { (c).bcnt = (b); (c).pcnt = (p); } while(0)
#define ADD_COUNTER(c,b,p) do { (c).bcnt += (b); (c).pcnt += (p); } while(0)

struct xt_counters {
	__u64 pcnt, bcnt;			/* Packet and byte counters */
};

/* The argument to IPT_SO_ADD_COUNTERS. */
struct xt_counters_info {
	/* Which table. */
	char name[XT_TABLE_MAXNAMELEN];

	unsigned int num_counters;

	/* The counters (actually `number' of these). */
	struct xt_counters counters[0];
};

#define XT_INV_PROTO		0x40	/* Invert the sense of PROTO. */

/* fn returns 0 to continue iteration */
#define XT_MATCH_ITERATE(type, e, fn, args...)			\
({								\
	unsigned int __i;					\
	int __ret = 0;						\
	struct xt_entry_match *__m;				\
								\
	for (__i = sizeof(type);				\
	     __i < (e)->target_offset;				\
	     __i += __m->u.match_size) {			\
		__m = (void *)e + __i;				\
								\
		__ret = fn(__m , ## args);			\
		if (__ret != 0)					\
			break;					\
	}							\
	__ret;							\
})

/* fn returns 0 to continue iteration */
#define XT_ENTRY_ITERATE_CONTINUE(type, entries, size, n, fn, args...) \
({								\
	unsigned int __i, __n;					\
	int __ret = 0;						\
	type *__entry;						\
								\
	for (__i = 0, __n = 0; __i < (size);			\
	     __i += __entry->next_offset, __n++) { 		\
		__entry = (void *)(entries) + __i;		\
		if (__n < n)					\
			continue;				\
								\
		__ret = fn(__entry , ## args);			\
		if (__ret != 0)					\
			break;					\
	}							\
	__ret;							\
})

/* fn returns 0 to continue iteration */
#define XT_ENTRY_ITERATE(type, entries, size, fn, args...) \
	XT_ENTRY_ITERATE_CONTINUE(type, entries, size, 0, fn, args)


/* pos is normally a struct ipt_entry/ip6t_entry/etc. */
#define xt_entry_foreach(pos, ehead, esize) \
	for ((pos) = (typeof(pos))(ehead); \
	     (pos) < (typeof(pos))((char *)(ehead) + (esize)); \
	     (pos) = (typeof(pos))((char *)(pos) + (pos)->next_offset))

/* can only be xt_entry_match, so no use of typeof here */
#define xt_ematch_foreach(pos, entry) \
	for ((pos) = (struct xt_entry_match *)entry->elems; \
	     (pos) < (struct xt_entry_match *)((char *)(entry) + \
	             (entry)->target_offset); \
	     (pos) = (struct xt_entry_match *)((char *)(pos) + \
	             (pos)->u.match_size))


#endif /* _X_TABLES_H */

Filemanager

Name Type Size Permission Actions
ipset Folder 0755
nf_conntrack_common.h File 4.09 KB 0644
nf_conntrack_ftp.h File 375 B 0644
nf_conntrack_sctp.h File 595 B 0644
nf_conntrack_tcp.h File 1.24 KB 0644
nf_conntrack_tuple_common.h File 708 B 0644
nf_nat.h File 1.12 KB 0644
nf_tables.h File 31.31 KB 0644
nf_tables_compat.h File 668 B 0644
nfnetlink.h File 2.01 KB 0644
nfnetlink_acct.h File 522 B 0644
nfnetlink_compat.h File 2.33 KB 0644
nfnetlink_conntrack.h File 5.42 KB 0644
nfnetlink_cthelper.h File 1.11 KB 0644
nfnetlink_cttimeout.h File 2.8 KB 0644
nfnetlink_log.h File 2.51 KB 0644
nfnetlink_queue.h File 2.88 KB 0644
x_tables.h File 4.3 KB 0644
xt_AUDIT.h File 655 B 0644
xt_CHECKSUM.h File 500 B 0644
xt_CLASSIFY.h File 154 B 0644
xt_CONNMARK.h File 136 B 0644
xt_CONNSECMARK.h File 238 B 0644
xt_CT.h File 790 B 0644
xt_DSCP.h File 634 B 0644
xt_HMARK.h File 841 B 0644
xt_IDLETIMER.h File 1.3 KB 0644
xt_LED.h File 407 B 0644
xt_LOG.h File 579 B 0644
xt_MARK.h File 121 B 0644
xt_NFLOG.h File 326 B 0644
xt_NFQUEUE.h File 716 B 0644
xt_RATEEST.h File 305 B 0644
xt_SECMARK.h File 486 B 0644
xt_TCPMSS.h File 172 B 0644
xt_TCPOPTSTRIP.h File 344 B 0644
xt_TEE.h File 240 B 0644
xt_TPROXY.h File 483 B 0644
xt_addrtype.h File 1021 B 0644
xt_bpf.h File 340 B 0644
xt_cgroup.h File 149 B 0644
xt_cluster.h File 311 B 0644
xt_comment.h File 167 B 0644
xt_connbytes.h File 514 B 0644
xt_connlabel.h File 217 B 0644
xt_connlimit.h File 512 B 0644
xt_connmark.h File 691 B 0644
xt_conntrack.h File 2.43 KB 0644
xt_cpu.h File 136 B 0644
xt_dccp.h File 420 B 0644
xt_devgroup.h File 366 B 0644
xt_dscp.h File 638 B 0644
xt_ecn.h File 673 B 0644
xt_esp.h File 355 B 0644
xt_hashlimit.h File 1.83 KB 0644
xt_helper.h File 125 B 0644
xt_iprange.h File 518 B 0644
xt_ipvs.h File 588 B 0644
xt_length.h File 158 B 0644
xt_limit.h File 610 B 0644
xt_mac.h File 135 B 0644
xt_mark.h File 197 B 0644
xt_multiport.h File 658 B 0644
xt_nfacct.h File 238 B 0644
xt_osf.h File 3.27 KB 0644
xt_owner.h File 306 B 0644
xt_physdev.h File 469 B 0644
xt_pkttype.h File 125 B 0644
xt_policy.h File 914 B 0644
xt_quota.h File 337 B 0644
xt_rateest.h File 774 B 0644
xt_realm.h File 157 B 0644
xt_recent.h File 966 B 0644
xt_rpfilter.h File 257 B 0644
xt_sctp.h File 2.22 KB 0644
xt_set.h File 1.72 KB 0644
xt_socket.h File 382 B 0644
xt_state.h File 268 B 0644
xt_statistic.h File 653 B 0644
xt_string.h File 601 B 0644
xt_tcpmss.h File 190 B 0644
xt_tcpudp.h File 1.16 KB 0644
xt_time.h File 667 B 0644
xt_u32.h File 689 B 0644