mirror of
git://git.code.sf.net/p/xtables-addons/xtables-addons
synced 2025-09-21 12:04:56 +02:00
Compare commits
21 Commits
Author | SHA1 | Date | |
---|---|---|---|
![]() |
f86ced8d9f | ||
![]() |
9148c38428 | ||
![]() |
782fe01997 | ||
![]() |
41d337d916 | ||
![]() |
23cae38513 | ||
![]() |
4c986d8355 | ||
![]() |
91b61eaf08 | ||
![]() |
1d4b50b414 | ||
![]() |
acba495549 | ||
![]() |
ff8081243d | ||
![]() |
b44af767e8 | ||
![]() |
305af4210b | ||
![]() |
304bbf0846 | ||
![]() |
9a40807d00 | ||
![]() |
5adc20a066 | ||
![]() |
03710b6a5c | ||
![]() |
cf9b60a57e | ||
![]() |
e5eedb25c2 | ||
![]() |
e3ae8dcb81 | ||
![]() |
aca381d3b6 | ||
![]() |
bb15becc88 |
@@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
AC_INIT([xtables-addons], [1.29])
|
AC_INIT([xtables-addons], [1.30])
|
||||||
AC_CONFIG_HEADERS([config.h])
|
AC_CONFIG_HEADERS([config.h])
|
||||||
AC_CONFIG_MACRO_DIR([m4])
|
AC_CONFIG_MACRO_DIR([m4])
|
||||||
AC_PROG_INSTALL
|
AC_PROG_INSTALL
|
||||||
|
@@ -3,6 +3,17 @@ HEAD
|
|||||||
====
|
====
|
||||||
|
|
||||||
|
|
||||||
|
v1.30 (October 02 2010)
|
||||||
|
=======================
|
||||||
|
- update to ipset 4.4
|
||||||
|
* ipport{,ip,net}hash did not work with mixed "src" and "dst"
|
||||||
|
destination parameters
|
||||||
|
- deactivate building xt_TEE and xt_CHECKSUM by default, as these have been
|
||||||
|
merged upstream in Linux 2.6.35 and 2.6.36, respectively.
|
||||||
|
Distros still wishing to build this need to enable it in their build
|
||||||
|
script, e.g. perl -i -pe 's{^build_TEE=.*}{build_TEE=m}' mconfig;
|
||||||
|
|
||||||
|
|
||||||
v1.29 (September 29 2010)
|
v1.29 (September 29 2010)
|
||||||
=========================
|
=========================
|
||||||
- compat_xtables: return bool for match_check and target_check in 2.6.23..34
|
- compat_xtables: return bool for match_check and target_check in 2.6.23..34
|
||||||
|
@@ -494,7 +494,7 @@ static unsigned int ipt_acc_target(struct sk_buff **pskb, const struct xt_action
|
|||||||
"IPs %u.%u.%u.%u/%u.%u.%u.%u\n", info->table_nr,
|
"IPs %u.%u.%u.%u/%u.%u.%u.%u\n", info->table_nr,
|
||||||
NIPQUAD(src_ip), NIPQUAD(dst_ip));
|
NIPQUAD(src_ip), NIPQUAD(dst_ip));
|
||||||
spin_unlock_bh(&ipt_acc_lock);
|
spin_unlock_bh(&ipt_acc_lock);
|
||||||
return IPT_CONTINUE;
|
return XT_CONTINUE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* 8 bit network or "any" network */
|
/* 8 bit network or "any" network */
|
||||||
@@ -506,7 +506,7 @@ static unsigned int ipt_acc_target(struct sk_buff **pskb, const struct xt_action
|
|||||||
ipt_acc_tables[info->table_nr].netmask,
|
ipt_acc_tables[info->table_nr].netmask,
|
||||||
src_ip, dst_ip, size, &ipt_acc_tables[info->table_nr].itemcount);
|
src_ip, dst_ip, size, &ipt_acc_tables[info->table_nr].itemcount);
|
||||||
spin_unlock_bh(&ipt_acc_lock);
|
spin_unlock_bh(&ipt_acc_lock);
|
||||||
return IPT_CONTINUE;
|
return XT_CONTINUE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* 16 bit network */
|
/* 16 bit network */
|
||||||
@@ -517,7 +517,7 @@ static unsigned int ipt_acc_target(struct sk_buff **pskb, const struct xt_action
|
|||||||
ipt_acc_tables[info->table_nr].netmask,
|
ipt_acc_tables[info->table_nr].netmask,
|
||||||
src_ip, dst_ip, size, &ipt_acc_tables[info->table_nr].itemcount);
|
src_ip, dst_ip, size, &ipt_acc_tables[info->table_nr].itemcount);
|
||||||
spin_unlock_bh(&ipt_acc_lock);
|
spin_unlock_bh(&ipt_acc_lock);
|
||||||
return IPT_CONTINUE;
|
return XT_CONTINUE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* 24 bit network */
|
/* 24 bit network */
|
||||||
@@ -528,7 +528,7 @@ static unsigned int ipt_acc_target(struct sk_buff **pskb, const struct xt_action
|
|||||||
ipt_acc_tables[info->table_nr].netmask,
|
ipt_acc_tables[info->table_nr].netmask,
|
||||||
src_ip, dst_ip, size, &ipt_acc_tables[info->table_nr].itemcount);
|
src_ip, dst_ip, size, &ipt_acc_tables[info->table_nr].itemcount);
|
||||||
spin_unlock_bh(&ipt_acc_lock);
|
spin_unlock_bh(&ipt_acc_lock);
|
||||||
return IPT_CONTINUE;
|
return XT_CONTINUE;
|
||||||
}
|
}
|
||||||
|
|
||||||
printk("ACCOUNT: ipt_acc_target: Unable to process packet. "
|
printk("ACCOUNT: ipt_acc_target: Unable to process packet. "
|
||||||
@@ -536,7 +536,7 @@ static unsigned int ipt_acc_target(struct sk_buff **pskb, const struct xt_action
|
|||||||
info->table_nr, NIPQUAD(src_ip), NIPQUAD(dst_ip));
|
info->table_nr, NIPQUAD(src_ip), NIPQUAD(dst_ip));
|
||||||
|
|
||||||
spin_unlock_bh(&ipt_acc_lock);
|
spin_unlock_bh(&ipt_acc_lock);
|
||||||
return IPT_CONTINUE;
|
return XT_CONTINUE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@@ -30,6 +30,7 @@ obj-${build_ipset} += ipset/
|
|||||||
obj-${build_ipv4options} += xt_ipv4options.o
|
obj-${build_ipv4options} += xt_ipv4options.o
|
||||||
obj-${build_length2} += xt_length2.o
|
obj-${build_length2} += xt_length2.o
|
||||||
obj-${build_lscan} += xt_lscan.o
|
obj-${build_lscan} += xt_lscan.o
|
||||||
|
obj-${build_mp2t} += xt_mp2t.o
|
||||||
obj-${build_pknock} += pknock/
|
obj-${build_pknock} += pknock/
|
||||||
obj-${build_psd} += xt_psd.o
|
obj-${build_psd} += xt_psd.o
|
||||||
obj-${build_quota2} += xt_quota2.o
|
obj-${build_quota2} += xt_quota2.o
|
||||||
|
@@ -22,6 +22,7 @@ obj-${build_ipset} += ipset/
|
|||||||
obj-${build_ipv4options} += libxt_ipv4options.so
|
obj-${build_ipv4options} += libxt_ipv4options.so
|
||||||
obj-${build_length2} += libxt_length2.so
|
obj-${build_length2} += libxt_length2.so
|
||||||
obj-${build_lscan} += libxt_lscan.so
|
obj-${build_lscan} += libxt_lscan.so
|
||||||
|
obj-${build_mp2t} += libxt_mp2t.so
|
||||||
obj-${build_pknock} += pknock/
|
obj-${build_pknock} += pknock/
|
||||||
obj-${build_psd} += libxt_psd.so
|
obj-${build_psd} += libxt_psd.so
|
||||||
obj-${build_quota2} += libxt_quota2.so
|
obj-${build_quota2} += libxt_quota2.so
|
||||||
|
@@ -68,7 +68,7 @@ ipporthash_test(struct ip_set *set, ip_set_ip_t ip, ip_set_ip_t port)
|
|||||||
if (flags[1] == 0) \
|
if (flags[1] == 0) \
|
||||||
return 0; \
|
return 0; \
|
||||||
\
|
\
|
||||||
port = get_port(skb, flags++); \
|
port = get_port(skb, ++flags); \
|
||||||
\
|
\
|
||||||
if (port == INVALID_PORT) \
|
if (port == INVALID_PORT) \
|
||||||
return 0;
|
return 0;
|
||||||
|
@@ -72,8 +72,8 @@ ipportiphash_test(struct ip_set *set,
|
|||||||
if (flags[2] == 0) \
|
if (flags[2] == 0) \
|
||||||
return 0; \
|
return 0; \
|
||||||
\
|
\
|
||||||
port = get_port(skb, flags++); \
|
port = get_port(skb, ++flags); \
|
||||||
ip1 = ipaddr(skb, flags++); \
|
ip1 = ipaddr(skb, ++flags); \
|
||||||
\
|
\
|
||||||
if (port == INVALID_PORT) \
|
if (port == INVALID_PORT) \
|
||||||
return 0;
|
return 0;
|
||||||
|
@@ -116,8 +116,8 @@ ipportnethash_utest(struct ip_set *set, const void *data, u_int32_t size)
|
|||||||
if (flags[2] == 0) \
|
if (flags[2] == 0) \
|
||||||
return 0; \
|
return 0; \
|
||||||
\
|
\
|
||||||
port = get_port(skb, flags++); \
|
port = get_port(skb, ++flags); \
|
||||||
ip1 = ipaddr(skb, flags++); \
|
ip1 = ipaddr(skb, ++flags); \
|
||||||
\
|
\
|
||||||
if (port == INVALID_PORT) \
|
if (port == INVALID_PORT) \
|
||||||
return 0;
|
return 0;
|
||||||
|
@@ -30,7 +30,7 @@
|
|||||||
#define PROC_SYS_MODPROBE "/proc/sys/kernel/modprobe"
|
#define PROC_SYS_MODPROBE "/proc/sys/kernel/modprobe"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#define IPSET_VERSION "4.3"
|
#define IPSET_VERSION "4.4"
|
||||||
|
|
||||||
char program_name[] = "ipset";
|
char program_name[] = "ipset";
|
||||||
char program_version[] = IPSET_VERSION;
|
char program_version[] = IPSET_VERSION;
|
||||||
|
189
extensions/libxt_mp2t.c
Normal file
189
extensions/libxt_mp2t.c
Normal file
@@ -0,0 +1,189 @@
|
|||||||
|
/*
|
||||||
|
* Userspace interface for MPEG2 TS match extension "mp2t" for Xtables.
|
||||||
|
*
|
||||||
|
* Copyright (c) Jesper Dangaard Brouer <jdb@comx.dk>, 2009+
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or
|
||||||
|
* modify it under the terms of the GNU General Public License; either
|
||||||
|
* version 2 of the License, or any later version, as published by the
|
||||||
|
* Free Software Foundation.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <getopt.h>
|
||||||
|
#include <netdb.h>
|
||||||
|
#include <stdbool.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <stddef.h>
|
||||||
|
|
||||||
|
#include <xtables.h>
|
||||||
|
#include "xt_mp2t.h"
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Userspace iptables/xtables interface for mp2t module.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/* FIXME: don't think this compat check does not cover all versions */
|
||||||
|
#ifndef XTABLES_VERSION
|
||||||
|
#define xtables_error exit_error
|
||||||
|
#endif
|
||||||
|
|
||||||
|
static const struct option mp2t_mt_opts[] = {
|
||||||
|
{.name = "name", .has_arg = true, .val = 'n'},
|
||||||
|
{.name = "drop", .has_arg = false, .val = 'd'},
|
||||||
|
{.name = "drop-detect", .has_arg = false, .val = 'd'},
|
||||||
|
{.name = "max", .has_arg = true, .val = 'x'},
|
||||||
|
{.name = "max-streams", .has_arg = true, .val = 'x'},
|
||||||
|
{NULL},
|
||||||
|
};
|
||||||
|
|
||||||
|
static void mp2t_mt_help(void)
|
||||||
|
{
|
||||||
|
printf(
|
||||||
|
"mp2t (MPEG2 Transport Stream) match options:\n"
|
||||||
|
" [--name <name>] Name for proc file /proc/net/xt_mp2t/rule_NAME\n"
|
||||||
|
" [--drop-detect] Match lost TS frames (occured before this packet)\n"
|
||||||
|
" [--max-streams <num>] Track 'max' number of streams (per rule)\n"
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void mp2t_mt_init(struct xt_entry_match *match)
|
||||||
|
{
|
||||||
|
struct xt_mp2t_mtinfo *info = (void *)match->data;
|
||||||
|
/* Enable drop detection per default */
|
||||||
|
info->flags = XT_MP2T_DETECT_DROP;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int mp2t_mt_parse(int c, char **argv, int invert, unsigned int *flags,
|
||||||
|
const void *entry, struct xt_entry_match **match)
|
||||||
|
{
|
||||||
|
struct xt_mp2t_mtinfo *info = (void *)(*match)->data;
|
||||||
|
uint32_t num;
|
||||||
|
|
||||||
|
switch (c) {
|
||||||
|
case 'n': /* --name */
|
||||||
|
xtables_param_act(XTF_ONLY_ONCE, "mp2t", "--name",
|
||||||
|
*flags & XT_MP2T_PARAM_NAME);
|
||||||
|
if (invert)
|
||||||
|
xtables_error(PARAMETER_PROBLEM, "Inverting name?");
|
||||||
|
if (strlen(optarg) == 0)
|
||||||
|
xtables_error(PARAMETER_PROBLEM, "Zero-length name?");
|
||||||
|
if (strchr(optarg, '"') != NULL)
|
||||||
|
xtables_error(PARAMETER_PROBLEM,
|
||||||
|
"Illegal character in name (\")!");
|
||||||
|
strncpy(info->rule_name, optarg, sizeof(info->rule_name));
|
||||||
|
info->flags |= XT_MP2T_PARAM_NAME;
|
||||||
|
*flags |= XT_MP2T_PARAM_NAME;
|
||||||
|
break;
|
||||||
|
|
||||||
|
case 'd': /* --drop-detect */
|
||||||
|
if (*flags & XT_MP2T_DETECT_DROP)
|
||||||
|
xtables_error(PARAMETER_PROBLEM,
|
||||||
|
"Can't specify --drop option twice");
|
||||||
|
*flags |= XT_MP2T_DETECT_DROP;
|
||||||
|
|
||||||
|
if (invert)
|
||||||
|
info->flags &= ~XT_MP2T_DETECT_DROP;
|
||||||
|
else
|
||||||
|
info->flags |= XT_MP2T_DETECT_DROP;
|
||||||
|
|
||||||
|
break;
|
||||||
|
|
||||||
|
case 'x': /* --max-streams */
|
||||||
|
if (*flags & XT_MP2T_MAX_STREAMS)
|
||||||
|
xtables_error(PARAMETER_PROBLEM,
|
||||||
|
"Can't specify --max-streams option twice");
|
||||||
|
*flags |= XT_MP2T_MAX_STREAMS;
|
||||||
|
|
||||||
|
if (invert) {
|
||||||
|
info->cfg.max = 0;
|
||||||
|
/* printf("inverted\n"); */
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* OLD iptables style
|
||||||
|
if (string_to_number(optarg, 0, 0xffffffff, &num) == -1)
|
||||||
|
xtables_error(PARAMETER_PROBLEM,
|
||||||
|
"bad --max-stream: `%s'", optarg);
|
||||||
|
*/
|
||||||
|
|
||||||
|
/* C-style
|
||||||
|
char *end;
|
||||||
|
num = strtoul(optarg, &end, 0);
|
||||||
|
*/
|
||||||
|
|
||||||
|
/* New xtables style */
|
||||||
|
if (!xtables_strtoui(optarg, NULL, &num, 0, UINT32_MAX))
|
||||||
|
xtables_error(PARAMETER_PROBLEM,
|
||||||
|
"bad --max-stream: `%s'", optarg);
|
||||||
|
|
||||||
|
/* DEBUG: printf("--max-stream=%lu\n", num); */
|
||||||
|
info->flags |= XT_MP2T_MAX_STREAMS;
|
||||||
|
info->cfg.max = num;
|
||||||
|
|
||||||
|
break;
|
||||||
|
|
||||||
|
default:
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void mp2t_mt_print(const void *entry,
|
||||||
|
const struct xt_entry_match *match, int numeric)
|
||||||
|
{
|
||||||
|
const struct xt_mp2t_mtinfo *info = (const void *)(match->data);
|
||||||
|
|
||||||
|
/* Always indicate this is a mp2t match rule */
|
||||||
|
printf("mp2t match");
|
||||||
|
|
||||||
|
if (info->flags & XT_MP2T_PARAM_NAME)
|
||||||
|
printf(" name:\"%s\"", info->rule_name);
|
||||||
|
|
||||||
|
if (!(info->flags & XT_MP2T_DETECT_DROP))
|
||||||
|
printf(" !drop-detect");
|
||||||
|
|
||||||
|
if (info->flags & XT_MP2T_MAX_STREAMS)
|
||||||
|
printf(" max-streams:%u ", info->cfg.max);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void mp2t_mt_save(const void *entry,
|
||||||
|
const struct xt_entry_match *match)
|
||||||
|
{
|
||||||
|
const struct xt_mp2t_mtinfo *info = (const void *)(match->data);
|
||||||
|
|
||||||
|
/* We need to handle --name, --drop-detect, and --max-streams. */
|
||||||
|
if (info->flags & XT_MP2T_PARAM_NAME)
|
||||||
|
printf("--name \"%s\" ", info->rule_name);
|
||||||
|
|
||||||
|
if (!(info->flags & XT_MP2T_DETECT_DROP))
|
||||||
|
printf("! --drop-detect ");
|
||||||
|
|
||||||
|
if (info->flags & XT_MP2T_MAX_STREAMS)
|
||||||
|
printf("--max-streams %u ", info->cfg.max);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
static struct xtables_match mp2t_mt_reg = {
|
||||||
|
.version = XTABLES_VERSION,
|
||||||
|
.name = "mp2t",
|
||||||
|
.revision = 0,
|
||||||
|
.family = PF_UNSPEC,
|
||||||
|
.size = XT_ALIGN(sizeof(struct xt_mp2t_mtinfo)),
|
||||||
|
.userspacesize = offsetof(struct xt_mp2t_mtinfo, hinfo),
|
||||||
|
.init = mp2t_mt_init,
|
||||||
|
.help = mp2t_mt_help,
|
||||||
|
.parse = mp2t_mt_parse,
|
||||||
|
/* .final_check = mp2t_mt_check,*/
|
||||||
|
.print = mp2t_mt_print,
|
||||||
|
.save = mp2t_mt_save,
|
||||||
|
.extra_opts = mp2t_mt_opts,
|
||||||
|
};
|
||||||
|
|
||||||
|
static void _init(void)
|
||||||
|
{
|
||||||
|
xtables_register_match(&mp2t_mt_reg);
|
||||||
|
}
|
@@ -2,7 +2,7 @@
|
|||||||
* "LOGMARK" target extension to Xtables
|
* "LOGMARK" target extension to Xtables
|
||||||
* useful for debugging
|
* useful for debugging
|
||||||
*
|
*
|
||||||
* Copyright © Jan Engelhardt <jengelh [at] medozas de>, 2008
|
* Copyright © Jan Engelhardt <jengelh [at] medozas de>, 2008-2010
|
||||||
*
|
*
|
||||||
* This program is free software; you can redistribute it and/or
|
* This program is free software; you can redistribute it and/or
|
||||||
* modify it under the terms of the GNU General Public License; either
|
* modify it under the terms of the GNU General Public License; either
|
||||||
@@ -75,6 +75,8 @@ logmark_tg(struct sk_buff **pskb, const struct xt_action_param *par)
|
|||||||
printk("%s""ASSURED", prev++ ? "," : "");
|
printk("%s""ASSURED", prev++ ? "," : "");
|
||||||
if (ct->status & IPS_CONFIRMED)
|
if (ct->status & IPS_CONFIRMED)
|
||||||
printk("%s""CONFIRMED", prev++ ? "," : "");
|
printk("%s""CONFIRMED", prev++ ? "," : "");
|
||||||
|
printk(" lifetime=%lus",
|
||||||
|
(jiffies - ct->timeout.expires) / HZ);
|
||||||
}
|
}
|
||||||
|
|
||||||
printk("\n");
|
printk("\n");
|
||||||
|
1410
extensions/xt_mp2t.c
Normal file
1410
extensions/xt_mp2t.c
Normal file
File diff suppressed because it is too large
Load Diff
58
extensions/xt_mp2t.h
Normal file
58
extensions/xt_mp2t.h
Normal file
@@ -0,0 +1,58 @@
|
|||||||
|
/*
|
||||||
|
* Header file for MPEG2 TS match extension "mp2t" for Xtables.
|
||||||
|
*
|
||||||
|
* Copyright (c) Jesper Dangaard Brouer <jdb@comx.dk>, 2009+
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or
|
||||||
|
* modify it under the terms of the GNU General Public License; either
|
||||||
|
* version 2 of the License, or any later version, as published by the
|
||||||
|
* Free Software Foundation.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
#ifndef _LINUX_NETFILTER_XT_MP2T_MATCH_H
|
||||||
|
#define _LINUX_NETFILTER_XT_MP2T_MATCH_H 1
|
||||||
|
|
||||||
|
enum {
|
||||||
|
XT_MP2T_DETECT_DROP = 1 << 0,
|
||||||
|
XT_MP2T_MAX_STREAMS = 1 << 1,
|
||||||
|
XT_MP2T_PARAM_NAME = 1 << 2,
|
||||||
|
};
|
||||||
|
|
||||||
|
/* Details of this hash structure is hidden in kernel space xt_mp2t.c */
|
||||||
|
struct xt_rule_mp2t_conn_htable;
|
||||||
|
|
||||||
|
struct mp2t_cfg {
|
||||||
|
|
||||||
|
/* Hash table setup */
|
||||||
|
__u32 size; /* how many hash buckets */
|
||||||
|
__u32 max; /* max number of entries */
|
||||||
|
__u32 max_list; /* warn if list searches exceed this number */
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
|
struct xt_mp2t_mtinfo {
|
||||||
|
__u16 flags;
|
||||||
|
|
||||||
|
/* FIXME:
|
||||||
|
|
||||||
|
I need to fix the problem, where I have to reallocated data
|
||||||
|
each time a single rule change occur.
|
||||||
|
|
||||||
|
The idea with rule_name and rule_id is that the name is
|
||||||
|
optional, simply to provide a name in /proc/, the rule_id
|
||||||
|
is the real lookup-key in the internal kernel list of the
|
||||||
|
rules associated dynamic-allocated-data.
|
||||||
|
|
||||||
|
*/
|
||||||
|
char rule_name[IFNAMSIZ];
|
||||||
|
|
||||||
|
struct mp2t_cfg cfg;
|
||||||
|
|
||||||
|
/** Below used internally by the kernel **/
|
||||||
|
__u32 rule_id;
|
||||||
|
|
||||||
|
/* Hash table pointer */
|
||||||
|
struct xt_rule_mp2t_conn_htable *hinfo __attribute__((aligned(8)));
|
||||||
|
};
|
||||||
|
|
||||||
|
#endif /* _LINUX_NETFILTER_XT_MP2T_MATCH_H */
|
5
mconfig
5
mconfig
@@ -2,7 +2,7 @@
|
|||||||
#
|
#
|
||||||
build_ACCOUNT=m
|
build_ACCOUNT=m
|
||||||
build_CHAOS=m
|
build_CHAOS=m
|
||||||
build_CHECKSUM=m
|
build_CHECKSUM=
|
||||||
build_DELUDE=m
|
build_DELUDE=m
|
||||||
build_DHCPMAC=m
|
build_DHCPMAC=m
|
||||||
build_ECHO=
|
build_ECHO=
|
||||||
@@ -12,7 +12,7 @@ build_RAWNAT=m
|
|||||||
build_STEAL=m
|
build_STEAL=m
|
||||||
build_SYSRQ=m
|
build_SYSRQ=m
|
||||||
build_TARPIT=m
|
build_TARPIT=m
|
||||||
build_TEE=m
|
build_TEE=
|
||||||
build_condition=m
|
build_condition=m
|
||||||
build_fuzzy=m
|
build_fuzzy=m
|
||||||
build_geoip=m
|
build_geoip=m
|
||||||
@@ -22,6 +22,7 @@ build_ipset=m
|
|||||||
build_ipv4options=m
|
build_ipv4options=m
|
||||||
build_length2=m
|
build_length2=m
|
||||||
build_lscan=m
|
build_lscan=m
|
||||||
|
build_mp2t=m
|
||||||
build_pknock=m
|
build_pknock=m
|
||||||
build_psd=m
|
build_psd=m
|
||||||
build_quota2=m
|
build_quota2=m
|
||||||
|
@@ -1,4 +1,4 @@
|
|||||||
.TH xtables-addons 8 "v1.29 (2010-09-29)" "" "v1.29 (2010-09-29)"
|
.TH xtables-addons 8 "v1.30 (2010-10-02)" "" "v1.30 (2010-10-02)"
|
||||||
.SH Name
|
.SH Name
|
||||||
Xtables-addons \(em additional extensions for iptables, ip6tables, etc.
|
Xtables-addons \(em additional extensions for iptables, ip6tables, etc.
|
||||||
.SH Targets
|
.SH Targets
|
||||||
|
Reference in New Issue
Block a user