X-Git-Url: http://wagnertech.de/git?a=blobdiff_plain;f=i686-linux-gnu-4.7%2Fusr%2Finclude%2Flinux%2Fnetfilter%2Fxt_TPROXY.h;fp=i686-linux-gnu-4.7%2Fusr%2Finclude%2Flinux%2Fnetfilter%2Fxt_TPROXY.h;h=348957b02a8248ebc21c82144d8bb70750103a60;hb=94df942c2c7bd3457276fe5b7367623cbb8c1302;hp=0000000000000000000000000000000000000000;hpb=4dd7d9155a920895ff7b1cb6b9c9c676aa62000a;p=cross.git diff --git a/i686-linux-gnu-4.7/usr/include/linux/netfilter/xt_TPROXY.h b/i686-linux-gnu-4.7/usr/include/linux/netfilter/xt_TPROXY.h new file mode 100644 index 0000000..348957b --- /dev/null +++ b/i686-linux-gnu-4.7/usr/include/linux/netfilter/xt_TPROXY.h @@ -0,0 +1,25 @@ +/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ +#ifndef _XT_TPROXY_H +#define _XT_TPROXY_H + +#include +#include + +/* TPROXY target is capable of marking the packet to perform + * redirection. We can get rid of that whenever we get support for + * mutliple targets in the same rule. */ +struct xt_tproxy_target_info { + __u32 mark_mask; + __u32 mark_value; + __be32 laddr; + __be16 lport; +}; + +struct xt_tproxy_target_info_v1 { + __u32 mark_mask; + __u32 mark_value; + union nf_inet_addr laddr; + __be16 lport; +}; + +#endif /* _XT_TPROXY_H */