[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.19
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
include
/
linux
/
netfilter
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📁 ipset
SET
[ DEL ]
📄 nf_conntrack_common.h
4,588 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_conntrack_ftp.h
438 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_conntrack_sctp.h
576 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_conntrack_tcp.h
1,415 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_conntrack_tuple_common.h
896 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_log.h
538 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_nat.h
1,522 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_osf.h
1,948 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_tables.h
49,401 B
SET
[ EDIT ]
|
[ DEL ]
📄 nf_tables_compat.h
731 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink.h
2,428 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink_acct.h
900 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink_compat.h
2,444 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink_conntrack.h
6,160 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink_cthelper.h
1,202 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink_cttimeout.h
2,930 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink_log.h
2,799 B
SET
[ EDIT ]
|
[ DEL ]
📄 nfnetlink_queue.h
3,499 B
SET
[ EDIT ]
|
[ DEL ]
📄 x_tables.h
4,467 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_AUDIT.h
718 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_CHECKSUM.h
563 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_CLASSIFY.h
217 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_CONNMARK.h
199 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_CONNSECMARK.h
301 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_CT.h
853 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_DSCP.h
697 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_HMARK.h
933 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_IDLETIMER.h
1,393 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_LED.h
470 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_LOG.h
642 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_MARK.h
184 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_NFLOG.h
556 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_NFQUEUE.h
779 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_RATEEST.h
390 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_SECMARK.h
648 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_SYNPROXY.h
419 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_TCPMSS.h
235 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_TCPOPTSTRIP.h
407 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_TEE.h
333 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_TPROXY.h
575 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_addrtype.h
1,084 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_bpf.h
935 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_cgroup.h
463 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_cluster.h
374 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_comment.h
230 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_connbytes.h
577 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_connlabel.h
360 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_connlimit.h
575 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_connmark.h
900 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_conntrack.h
2,557 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_cpu.h
199 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_dccp.h
483 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_devgroup.h
429 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_dscp.h
701 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_ecn.h
736 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_esp.h
418 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_hashlimit.h
3,256 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_helper.h
188 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_ipcomp.h
485 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_iprange.h
581 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_ipvs.h
680 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_l2tp.h
739 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_length.h
221 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_limit.h
673 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_mac.h
227 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_mark.h
260 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_multiport.h
721 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_nfacct.h
301 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_osf.h
1,833 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_owner.h
420 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_physdev.h
553 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_pkttype.h
188 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_policy.h
1,022 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_quota.h
400 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_rateest.h
859 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_realm.h
220 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_recent.h
1,058 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_rpfilter.h
320 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_sctp.h
2,326 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_set.h
1,827 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_socket.h
640 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_state.h
331 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_statistic.h
716 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_string.h
664 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_tcpmss.h
253 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_tcpudp.h
1,250 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_time.h
730 B
SET
[ EDIT ]
|
[ DEL ]
📄 xt_u32.h
752 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: x_tables.h
/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ #ifndef _X_TABLES_H #define _X_TABLES_H #include <linux/kernel.h> #include <linux/types.h> #define XT_FUNCTION_MAXNAMELEN 30 #define XT_EXTENSION_MAXNAMELEN 29 #define XT_TABLE_MAXNAMELEN 32 struct xt_entry_match { union { struct { __u16 match_size; /* Used by userspace */ char name[XT_EXTENSION_MAXNAMELEN]; __u8 revision; } user; struct { __u16 match_size; /* Used inside the kernel */ struct xt_match *match; } kernel; /* Total length */ __u16 match_size; } u; unsigned char data[0]; }; struct xt_entry_target { union { struct { __u16 target_size; /* Used by userspace */ char name[XT_EXTENSION_MAXNAMELEN]; __u8 revision; } user; struct { __u16 target_size; /* Used inside the kernel */ struct xt_target *target; } kernel; /* Total length */ __u16 target_size; } u; unsigned char data[0]; }; #define XT_TARGET_INIT(__name, __size) \ { \ .target.u.user = { \ .target_size = XT_ALIGN(__size), \ .name = __name, \ }, \ } struct xt_standard_target { struct xt_entry_target target; int verdict; }; struct xt_error_target { struct xt_entry_target target; char errorname[XT_FUNCTION_MAXNAMELEN]; }; /* The argument to IPT_SO_GET_REVISION_*. Returns highest revision * kernel supports, if >= revision. */ struct xt_get_revision { char name[XT_EXTENSION_MAXNAMELEN]; __u8 revision; }; /* CONTINUE verdict for targets */ #define XT_CONTINUE 0xFFFFFFFF /* For standard target */ #define XT_RETURN (-NF_REPEAT - 1) /* this is a dummy structure to find out the alignment requirement for a struct * containing all the fundamental data types that are used in ipt_entry, * ip6t_entry and arpt_entry. This sucks, and it is a hack. It will be my * personal pleasure to remove it -HW */ struct _xt_align { __u8 u8; __u16 u16; __u32 u32; __u64 u64; }; #define XT_ALIGN(s) __ALIGN_KERNEL((s), __alignof__(struct _xt_align)) /* Standard return verdict, or do jump. */ #define XT_STANDARD_TARGET "" /* Error verdict. */ #define XT_ERROR_TARGET "ERROR" #define SET_COUNTER(c,b,p) do { (c).bcnt = (b); (c).pcnt = (p); } while(0) #define ADD_COUNTER(c,b,p) do { (c).bcnt += (b); (c).pcnt += (p); } while(0) struct xt_counters { __u64 pcnt, bcnt; /* Packet and byte counters */ }; /* The argument to IPT_SO_ADD_COUNTERS. */ struct xt_counters_info { /* Which table. */ char name[XT_TABLE_MAXNAMELEN]; unsigned int num_counters; /* The counters (actually `number' of these). */ struct xt_counters counters[0]; }; #define XT_INV_PROTO 0x40 /* Invert the sense of PROTO. */ /* fn returns 0 to continue iteration */ #define XT_MATCH_ITERATE(type, e, fn, args...) \ ({ \ unsigned int __i; \ int __ret = 0; \ struct xt_entry_match *__m; \ \ for (__i = sizeof(type); \ __i < (e)->target_offset; \ __i += __m->u.match_size) { \ __m = (void *)e + __i; \ \ __ret = fn(__m , ## args); \ if (__ret != 0) \ break; \ } \ __ret; \ }) /* fn returns 0 to continue iteration */ #define XT_ENTRY_ITERATE_CONTINUE(type, entries, size, n, fn, args...) \ ({ \ unsigned int __i, __n; \ int __ret = 0; \ type *__entry; \ \ for (__i = 0, __n = 0; __i < (size); \ __i += __entry->next_offset, __n++) { \ __entry = (void *)(entries) + __i; \ if (__n < n) \ continue; \ \ __ret = fn(__entry , ## args); \ if (__ret != 0) \ break; \ } \ __ret; \ }) /* fn returns 0 to continue iteration */ #define XT_ENTRY_ITERATE(type, entries, size, fn, args...) \ XT_ENTRY_ITERATE_CONTINUE(type, entries, size, 0, fn, args) /* pos is normally a struct ipt_entry/ip6t_entry/etc. */ #define xt_entry_foreach(pos, ehead, esize) \ for ((pos) = (typeof(pos))(ehead); \ (pos) < (typeof(pos))((char *)(ehead) + (esize)); \ (pos) = (typeof(pos))((char *)(pos) + (pos)->next_offset)) /* can only be xt_entry_match, so no use of typeof here */ #define xt_ematch_foreach(pos, entry) \ for ((pos) = (struct xt_entry_match *)entry->elems; \ (pos) < (struct xt_entry_match *)((char *)(entry) + \ (entry)->target_offset); \ (pos) = (struct xt_entry_match *)((char *)(pos) + \ (pos)->u.match_size)) #endif /* _X_TABLES_H */