PATH:
usr
/
include
/
linux
/
netfilter
#ifndef _X_TABLES_H #define _X_TABLES_H #include <linux/kernel.h> #include <linux/types.h> #define XT_FUNCTION_MAXNAMELEN 30 #define XT_EXTENSION_MAXNAMELEN 29 #define XT_TABLE_MAXNAMELEN 32 struct xt_entry_match { union { struct { __u16 match_size; /* Used by userspace */ char name[XT_EXTENSION_MAXNAMELEN]; __u8 revision; } user; struct { __u16 match_size; /* Used inside the kernel */ struct xt_match *match; } kernel; /* Total length */ __u16 match_size; } u; unsigned char data[0]; }; struct xt_entry_target { union { struct { __u16 target_size; /* Used by userspace */ char name[XT_EXTENSION_MAXNAMELEN]; __u8 revision; } user; struct { __u16 target_size; /* Used inside the kernel */ struct xt_target *target; } kernel; /* Total length */ __u16 target_size; } u; unsigned char data[0]; }; #define XT_TARGET_INIT(__name, __size) \ { \ .target.u.user = { \ .target_size = XT_ALIGN(__size), \ .name = __name, \ }, \ } struct xt_standard_target { struct xt_entry_target target; int verdict; }; struct xt_error_target { struct xt_entry_target target; char errorname[XT_FUNCTION_MAXNAMELEN]; }; /* The argument to IPT_SO_GET_REVISION_*. Returns highest revision * kernel supports, if >= revision. */ struct xt_get_revision { char name[XT_EXTENSION_MAXNAMELEN]; __u8 revision; }; /* CONTINUE verdict for targets */ #define XT_CONTINUE 0xFFFFFFFF /* For standard target */ #define XT_RETURN (-NF_REPEAT - 1) /* this is a dummy structure to find out the alignment requirement for a struct * containing all the fundamental data types that are used in ipt_entry, * ip6t_entry and arpt_entry. This sucks, and it is a hack. It will be my * personal pleasure to remove it -HW */ struct _xt_align { __u8 u8; __u16 u16; __u32 u32; __u64 u64; }; #define XT_ALIGN(s) __ALIGN_KERNEL((s), __alignof__(struct _xt_align)) /* Standard return verdict, or do jump. */ #define XT_STANDARD_TARGET "" /* Error verdict. */ #define XT_ERROR_TARGET "ERROR" #define SET_COUNTER(c,b,p) do { (c).bcnt = (b); (c).pcnt = (p); } while(0) #define ADD_COUNTER(c,b,p) do { (c).bcnt += (b); (c).pcnt += (p); } while(0) struct xt_counters { __u64 pcnt, bcnt; /* Packet and byte counters */ }; /* The argument to IPT_SO_ADD_COUNTERS. */ struct xt_counters_info { /* Which table. */ char name[XT_TABLE_MAXNAMELEN]; unsigned int num_counters; /* The counters (actually `number' of these). */ struct xt_counters counters[0]; }; #define XT_INV_PROTO 0x40 /* Invert the sense of PROTO. */ /* fn returns 0 to continue iteration */ #define XT_MATCH_ITERATE(type, e, fn, args...) \ ({ \ unsigned int __i; \ int __ret = 0; \ struct xt_entry_match *__m; \ \ for (__i = sizeof(type); \ __i < (e)->target_offset; \ __i += __m->u.match_size) { \ __m = (void *)e + __i; \ \ __ret = fn(__m , ## args); \ if (__ret != 0) \ break; \ } \ __ret; \ }) /* fn returns 0 to continue iteration */ #define XT_ENTRY_ITERATE_CONTINUE(type, entries, size, n, fn, args...) \ ({ \ unsigned int __i, __n; \ int __ret = 0; \ type *__entry; \ \ for (__i = 0, __n = 0; __i < (size); \ __i += __entry->next_offset, __n++) { \ __entry = (void *)(entries) + __i; \ if (__n < n) \ continue; \ \ __ret = fn(__entry , ## args); \ if (__ret != 0) \ break; \ } \ __ret; \ }) /* fn returns 0 to continue iteration */ #define XT_ENTRY_ITERATE(type, entries, size, fn, args...) \ XT_ENTRY_ITERATE_CONTINUE(type, entries, size, 0, fn, args) /* pos is normally a struct ipt_entry/ip6t_entry/etc. */ #define xt_entry_foreach(pos, ehead, esize) \ for ((pos) = (typeof(pos))(ehead); \ (pos) < (typeof(pos))((char *)(ehead) + (esize)); \ (pos) = (typeof(pos))((char *)(pos) + (pos)->next_offset)) /* can only be xt_entry_match, so no use of typeof here */ #define xt_ematch_foreach(pos, entry) \ for ((pos) = (struct xt_entry_match *)entry->elems; \ (pos) < (struct xt_entry_match *)((char *)(entry) + \ (entry)->target_offset); \ (pos) = (struct xt_entry_match *)((char *)(pos) + \ (pos)->u.match_size)) #endif /* _X_TABLES_H */
[-] xt_helper.h
[edit]
[-] xt_HMARK.h
[edit]
[-] xt_time.h
[edit]
[-] xt_dccp.h
[edit]
[-] xt_IDLETIMER.h
[edit]
[-] xt_recent.h
[edit]
[-] nfnetlink_acct.h
[edit]
[-] xt_mac.h
[edit]
[-] xt_rateest.h
[edit]
[-] x_tables.h
[edit]
[-] xt_mark.h
[edit]
[-] xt_devgroup.h
[edit]
[-] xt_connlimit.h
[edit]
[-] nf_conntrack_ftp.h
[edit]
[-] nfnetlink_cthelper.h
[edit]
[+]
..
[-] xt_u32.h
[edit]
[-] xt_rpfilter.h
[edit]
[-] nf_tables_compat.h
[edit]
[-] xt_policy.h
[edit]
[-] xt_CLASSIFY.h
[edit]
[-] xt_quota.h
[edit]
[-] xt_TCPOPTSTRIP.h
[edit]
[-] xt_comment.h
[edit]
[-] xt_sctp.h
[edit]
[-] xt_tcpudp.h
[edit]
[-] xt_tcpmss.h
[edit]
[-] xt_nfacct.h
[edit]
[-] xt_TCPMSS.h
[edit]
[-] xt_length.h
[edit]
[-] xt_connlabel.h
[edit]
[-] xt_cpu.h
[edit]
[-] xt_osf.h
[edit]
[-] xt_bpf.h
[edit]
[-] xt_hashlimit.h
[edit]
[-] xt_NFLOG.h
[edit]
[-] nfnetlink_conntrack.h
[edit]
[-] xt_AUDIT.h
[edit]
[-] xt_pkttype.h
[edit]
[-] xt_set.h
[edit]
[-] xt_string.h
[edit]
[-] xt_ipvs.h
[edit]
[-] xt_socket.h
[edit]
[-] nf_tables.h
[edit]
[-] xt_CONNSECMARK.h
[edit]
[-] xt_CONNMARK.h
[edit]
[-] xt_NFQUEUE.h
[edit]
[-] nf_nat.h
[edit]
[-] xt_connbytes.h
[edit]
[-] xt_addrtype.h
[edit]
[-] nfnetlink_log.h
[edit]
[-] xt_LED.h
[edit]
[-] xt_LOG.h
[edit]
[-] xt_physdev.h
[edit]
[-] xt_state.h
[edit]
[-] xt_realm.h
[edit]
[-] xt_SECMARK.h
[edit]
[-] xt_ecn.h
[edit]
[-] xt_cluster.h
[edit]
[+]
ipset
[-] xt_connmark.h
[edit]
[-] xt_esp.h
[edit]
[-] xt_TEE.h
[edit]
[-] xt_owner.h
[edit]
[-] nfnetlink_compat.h
[edit]
[-] xt_cgroup.h
[edit]
[-] xt_CHECKSUM.h
[edit]
[-] xt_TPROXY.h
[edit]
[-] xt_CT.h
[edit]
[-] nf_conntrack_tcp.h
[edit]
[-] xt_iprange.h
[edit]
[-] nf_conntrack_sctp.h
[edit]
[-] xt_DSCP.h
[edit]
[-] nf_conntrack_common.h
[edit]
[-] xt_MARK.h
[edit]
[-] nfnetlink.h
[edit]
[-] xt_conntrack.h
[edit]
[-] nfnetlink_cttimeout.h
[edit]
[-] xt_limit.h
[edit]
[-] xt_RATEEST.h
[edit]
[-] nfnetlink_queue.h
[edit]
[-] nf_conntrack_tuple_common.h
[edit]
[-] xt_dscp.h
[edit]
[-] xt_statistic.h
[edit]
[-] xt_multiport.h
[edit]