netfilter: ipset: Rename simple macro names to avoid namespace issues.
Reported-by: David Laight <David.Laight@ACULAB.COM> Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
This commit is contained in:
parent
a0f28dc754
commit
35b8dcf8c3
|
@ -398,4 +398,7 @@ bitmap_bytes(u32 a, u32 b)
|
|||
{ .bytes = ULLONG_MAX, .packets = ULLONG_MAX, \
|
||||
.timeout = (map)->timeout }
|
||||
|
||||
#define IPSET_CONCAT(a, b) a##b
|
||||
#define IPSET_TOKEN(a, b) IPSET_CONCAT(a, b)
|
||||
|
||||
#endif /*_IP_SET_H */
|
||||
|
|
|
@ -8,31 +8,28 @@
|
|||
#ifndef __IP_SET_BITMAP_IP_GEN_H
|
||||
#define __IP_SET_BITMAP_IP_GEN_H
|
||||
|
||||
#define CONCAT(a, b) a##b
|
||||
#define TOKEN(a,b) CONCAT(a, b)
|
||||
|
||||
#define mtype_do_test TOKEN(MTYPE, _do_test)
|
||||
#define mtype_gc_test TOKEN(MTYPE, _gc_test)
|
||||
#define mtype_is_filled TOKEN(MTYPE, _is_filled)
|
||||
#define mtype_do_add TOKEN(MTYPE, _do_add)
|
||||
#define mtype_do_del TOKEN(MTYPE, _do_del)
|
||||
#define mtype_do_list TOKEN(MTYPE, _do_list)
|
||||
#define mtype_do_head TOKEN(MTYPE, _do_head)
|
||||
#define mtype_adt_elem TOKEN(MTYPE, _adt_elem)
|
||||
#define mtype_add_timeout TOKEN(MTYPE, _add_timeout)
|
||||
#define mtype_gc_init TOKEN(MTYPE, _gc_init)
|
||||
#define mtype_kadt TOKEN(MTYPE, _kadt)
|
||||
#define mtype_uadt TOKEN(MTYPE, _uadt)
|
||||
#define mtype_destroy TOKEN(MTYPE, _destroy)
|
||||
#define mtype_flush TOKEN(MTYPE, _flush)
|
||||
#define mtype_head TOKEN(MTYPE, _head)
|
||||
#define mtype_same_set TOKEN(MTYPE, _same_set)
|
||||
#define mtype_elem TOKEN(MTYPE, _elem)
|
||||
#define mtype_test TOKEN(MTYPE, _test)
|
||||
#define mtype_add TOKEN(MTYPE, _add)
|
||||
#define mtype_del TOKEN(MTYPE, _del)
|
||||
#define mtype_list TOKEN(MTYPE, _list)
|
||||
#define mtype_gc TOKEN(MTYPE, _gc)
|
||||
#define mtype_do_test IPSET_TOKEN(MTYPE, _do_test)
|
||||
#define mtype_gc_test IPSET_TOKEN(MTYPE, _gc_test)
|
||||
#define mtype_is_filled IPSET_TOKEN(MTYPE, _is_filled)
|
||||
#define mtype_do_add IPSET_TOKEN(MTYPE, _do_add)
|
||||
#define mtype_do_del IPSET_TOKEN(MTYPE, _do_del)
|
||||
#define mtype_do_list IPSET_TOKEN(MTYPE, _do_list)
|
||||
#define mtype_do_head IPSET_TOKEN(MTYPE, _do_head)
|
||||
#define mtype_adt_elem IPSET_TOKEN(MTYPE, _adt_elem)
|
||||
#define mtype_add_timeout IPSET_TOKEN(MTYPE, _add_timeout)
|
||||
#define mtype_gc_init IPSET_TOKEN(MTYPE, _gc_init)
|
||||
#define mtype_kadt IPSET_TOKEN(MTYPE, _kadt)
|
||||
#define mtype_uadt IPSET_TOKEN(MTYPE, _uadt)
|
||||
#define mtype_destroy IPSET_TOKEN(MTYPE, _destroy)
|
||||
#define mtype_flush IPSET_TOKEN(MTYPE, _flush)
|
||||
#define mtype_head IPSET_TOKEN(MTYPE, _head)
|
||||
#define mtype_same_set IPSET_TOKEN(MTYPE, _same_set)
|
||||
#define mtype_elem IPSET_TOKEN(MTYPE, _elem)
|
||||
#define mtype_test IPSET_TOKEN(MTYPE, _test)
|
||||
#define mtype_add IPSET_TOKEN(MTYPE, _add)
|
||||
#define mtype_del IPSET_TOKEN(MTYPE, _del)
|
||||
#define mtype_list IPSET_TOKEN(MTYPE, _list)
|
||||
#define mtype_gc IPSET_TOKEN(MTYPE, _gc)
|
||||
#define mtype MTYPE
|
||||
|
||||
#define ext_timeout(e, m) \
|
||||
|
|
|
@ -25,12 +25,12 @@
|
|||
#include <linux/netfilter/ipset/ip_set.h>
|
||||
#include <linux/netfilter/ipset/ip_set_bitmap.h>
|
||||
|
||||
#define REVISION_MIN 0
|
||||
#define REVISION_MAX 1 /* Counter support added */
|
||||
#define IPSET_TYPE_REV_MIN 0
|
||||
#define IPSET_TYPE_REV_MAX 1 /* Counter support added */
|
||||
|
||||
MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
|
||||
IP_SET_MODULE_DESC("bitmap:ip", REVISION_MIN, REVISION_MAX);
|
||||
IP_SET_MODULE_DESC("bitmap:ip", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX);
|
||||
MODULE_ALIAS("ip_set_bitmap:ip");
|
||||
|
||||
#define MTYPE bitmap_ip
|
||||
|
@ -401,8 +401,8 @@ static struct ip_set_type bitmap_ip_type __read_mostly = {
|
|||
.features = IPSET_TYPE_IP,
|
||||
.dimension = IPSET_DIM_ONE,
|
||||
.family = NFPROTO_IPV4,
|
||||
.revision_min = REVISION_MIN,
|
||||
.revision_max = REVISION_MAX,
|
||||
.revision_min = IPSET_TYPE_REV_MIN,
|
||||
.revision_max = IPSET_TYPE_REV_MAX,
|
||||
.create = bitmap_ip_create,
|
||||
.create_policy = {
|
||||
[IPSET_ATTR_IP] = { .type = NLA_NESTED },
|
||||
|
|
|
@ -25,12 +25,12 @@
|
|||
#include <linux/netfilter/ipset/ip_set.h>
|
||||
#include <linux/netfilter/ipset/ip_set_bitmap.h>
|
||||
|
||||
#define REVISION_MIN 0
|
||||
#define REVISION_MAX 1 /* Counter support added */
|
||||
#define IPSET_TYPE_REV_MIN 0
|
||||
#define IPSET_TYPE_REV_MAX 1 /* Counter support added */
|
||||
|
||||
MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
|
||||
IP_SET_MODULE_DESC("bitmap:ip,mac", REVISION_MIN, REVISION_MAX);
|
||||
IP_SET_MODULE_DESC("bitmap:ip,mac", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX);
|
||||
MODULE_ALIAS("ip_set_bitmap:ip,mac");
|
||||
|
||||
#define MTYPE bitmap_ipmac
|
||||
|
@ -460,8 +460,8 @@ static struct ip_set_type bitmap_ipmac_type = {
|
|||
.features = IPSET_TYPE_IP | IPSET_TYPE_MAC,
|
||||
.dimension = IPSET_DIM_TWO,
|
||||
.family = NFPROTO_IPV4,
|
||||
.revision_min = REVISION_MIN,
|
||||
.revision_max = REVISION_MAX,
|
||||
.revision_min = IPSET_TYPE_REV_MIN,
|
||||
.revision_max = IPSET_TYPE_REV_MAX,
|
||||
.create = bitmap_ipmac_create,
|
||||
.create_policy = {
|
||||
[IPSET_ATTR_IP] = { .type = NLA_NESTED },
|
||||
|
|
|
@ -20,12 +20,12 @@
|
|||
#include <linux/netfilter/ipset/ip_set_bitmap.h>
|
||||
#include <linux/netfilter/ipset/ip_set_getport.h>
|
||||
|
||||
#define REVISION_MIN 0
|
||||
#define REVISION_MAX 1 /* Counter support added */
|
||||
#define IPSET_TYPE_REV_MIN 0
|
||||
#define IPSET_TYPE_REV_MAX 1 /* Counter support added */
|
||||
|
||||
MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
|
||||
IP_SET_MODULE_DESC("bitmap:port", REVISION_MIN, REVISION_MAX);
|
||||
IP_SET_MODULE_DESC("bitmap:port", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX);
|
||||
MODULE_ALIAS("ip_set_bitmap:port");
|
||||
|
||||
#define MTYPE bitmap_port
|
||||
|
@ -333,8 +333,8 @@ static struct ip_set_type bitmap_port_type = {
|
|||
.features = IPSET_TYPE_PORT,
|
||||
.dimension = IPSET_DIM_ONE,
|
||||
.family = NFPROTO_UNSPEC,
|
||||
.revision_min = REVISION_MIN,
|
||||
.revision_max = REVISION_MAX,
|
||||
.revision_min = IPSET_TYPE_REV_MIN,
|
||||
.revision_max = IPSET_TYPE_REV_MAX,
|
||||
.create = bitmap_port_create,
|
||||
.create_policy = {
|
||||
[IPSET_ATTR_PORT] = { .type = NLA_U16 },
|
||||
|
|
|
@ -17,9 +17,6 @@
|
|||
|
||||
#define rcu_dereference_bh_nfnl(p) rcu_dereference_bh_check(p, 1)
|
||||
|
||||
#define CONCAT(a, b) a##b
|
||||
#define TOKEN(a, b) CONCAT(a, b)
|
||||
|
||||
/* Hashing which uses arrays to resolve clashing. The hash table is resized
|
||||
* (doubled) when searching becomes too long.
|
||||
* Internally jhash is used with the assumption that the size of the
|
||||
|
@ -222,41 +219,41 @@ hbucket_elem_add(struct hbucket *n, u8 ahash_max, size_t dsize)
|
|||
|
||||
#undef HKEY
|
||||
|
||||
#define mtype_data_equal TOKEN(MTYPE, _data_equal)
|
||||
#define mtype_data_equal IPSET_TOKEN(MTYPE, _data_equal)
|
||||
#ifdef IP_SET_HASH_WITH_NETS
|
||||
#define mtype_do_data_match TOKEN(MTYPE, _do_data_match)
|
||||
#define mtype_do_data_match IPSET_TOKEN(MTYPE, _do_data_match)
|
||||
#else
|
||||
#define mtype_do_data_match(d) 1
|
||||
#endif
|
||||
#define mtype_data_set_flags TOKEN(MTYPE, _data_set_flags)
|
||||
#define mtype_data_reset_flags TOKEN(MTYPE, _data_reset_flags)
|
||||
#define mtype_data_netmask TOKEN(MTYPE, _data_netmask)
|
||||
#define mtype_data_list TOKEN(MTYPE, _data_list)
|
||||
#define mtype_data_next TOKEN(MTYPE, _data_next)
|
||||
#define mtype_elem TOKEN(MTYPE, _elem)
|
||||
#define mtype_add_cidr TOKEN(MTYPE, _add_cidr)
|
||||
#define mtype_del_cidr TOKEN(MTYPE, _del_cidr)
|
||||
#define mtype_ahash_memsize TOKEN(MTYPE, _ahash_memsize)
|
||||
#define mtype_flush TOKEN(MTYPE, _flush)
|
||||
#define mtype_destroy TOKEN(MTYPE, _destroy)
|
||||
#define mtype_gc_init TOKEN(MTYPE, _gc_init)
|
||||
#define mtype_same_set TOKEN(MTYPE, _same_set)
|
||||
#define mtype_kadt TOKEN(MTYPE, _kadt)
|
||||
#define mtype_uadt TOKEN(MTYPE, _uadt)
|
||||
#define mtype_data_set_flags IPSET_TOKEN(MTYPE, _data_set_flags)
|
||||
#define mtype_data_reset_flags IPSET_TOKEN(MTYPE, _data_reset_flags)
|
||||
#define mtype_data_netmask IPSET_TOKEN(MTYPE, _data_netmask)
|
||||
#define mtype_data_list IPSET_TOKEN(MTYPE, _data_list)
|
||||
#define mtype_data_next IPSET_TOKEN(MTYPE, _data_next)
|
||||
#define mtype_elem IPSET_TOKEN(MTYPE, _elem)
|
||||
#define mtype_add_cidr IPSET_TOKEN(MTYPE, _add_cidr)
|
||||
#define mtype_del_cidr IPSET_TOKEN(MTYPE, _del_cidr)
|
||||
#define mtype_ahash_memsize IPSET_TOKEN(MTYPE, _ahash_memsize)
|
||||
#define mtype_flush IPSET_TOKEN(MTYPE, _flush)
|
||||
#define mtype_destroy IPSET_TOKEN(MTYPE, _destroy)
|
||||
#define mtype_gc_init IPSET_TOKEN(MTYPE, _gc_init)
|
||||
#define mtype_same_set IPSET_TOKEN(MTYPE, _same_set)
|
||||
#define mtype_kadt IPSET_TOKEN(MTYPE, _kadt)
|
||||
#define mtype_uadt IPSET_TOKEN(MTYPE, _uadt)
|
||||
#define mtype MTYPE
|
||||
|
||||
#define mtype_elem TOKEN(MTYPE, _elem)
|
||||
#define mtype_add TOKEN(MTYPE, _add)
|
||||
#define mtype_del TOKEN(MTYPE, _del)
|
||||
#define mtype_test_cidrs TOKEN(MTYPE, _test_cidrs)
|
||||
#define mtype_test TOKEN(MTYPE, _test)
|
||||
#define mtype_expire TOKEN(MTYPE, _expire)
|
||||
#define mtype_resize TOKEN(MTYPE, _resize)
|
||||
#define mtype_head TOKEN(MTYPE, _head)
|
||||
#define mtype_list TOKEN(MTYPE, _list)
|
||||
#define mtype_gc TOKEN(MTYPE, _gc)
|
||||
#define mtype_variant TOKEN(MTYPE, _variant)
|
||||
#define mtype_data_match TOKEN(MTYPE, _data_match)
|
||||
#define mtype_elem IPSET_TOKEN(MTYPE, _elem)
|
||||
#define mtype_add IPSET_TOKEN(MTYPE, _add)
|
||||
#define mtype_del IPSET_TOKEN(MTYPE, _del)
|
||||
#define mtype_test_cidrs IPSET_TOKEN(MTYPE, _test_cidrs)
|
||||
#define mtype_test IPSET_TOKEN(MTYPE, _test)
|
||||
#define mtype_expire IPSET_TOKEN(MTYPE, _expire)
|
||||
#define mtype_resize IPSET_TOKEN(MTYPE, _resize)
|
||||
#define mtype_head IPSET_TOKEN(MTYPE, _head)
|
||||
#define mtype_list IPSET_TOKEN(MTYPE, _list)
|
||||
#define mtype_gc IPSET_TOKEN(MTYPE, _gc)
|
||||
#define mtype_variant IPSET_TOKEN(MTYPE, _variant)
|
||||
#define mtype_data_match IPSET_TOKEN(MTYPE, _data_match)
|
||||
|
||||
#ifndef HKEY_DATALEN
|
||||
#define HKEY_DATALEN sizeof(struct mtype_elem)
|
||||
|
@ -941,13 +938,13 @@ nla_put_failure:
|
|||
}
|
||||
|
||||
static int
|
||||
TOKEN(MTYPE, _kadt)(struct ip_set *set, const struct sk_buff *skb,
|
||||
const struct xt_action_param *par,
|
||||
enum ipset_adt adt, struct ip_set_adt_opt *opt);
|
||||
IPSET_TOKEN(MTYPE, _kadt)(struct ip_set *set, const struct sk_buff *skb,
|
||||
const struct xt_action_param *par,
|
||||
enum ipset_adt adt, struct ip_set_adt_opt *opt);
|
||||
|
||||
static int
|
||||
TOKEN(MTYPE, _uadt)(struct ip_set *set, struct nlattr *tb[],
|
||||
enum ipset_adt adt, u32 *lineno, u32 flags, bool retried);
|
||||
IPSET_TOKEN(MTYPE, _uadt)(struct ip_set *set, struct nlattr *tb[],
|
||||
enum ipset_adt adt, u32 *lineno, u32 flags, bool retried);
|
||||
|
||||
static const struct ip_set_type_variant mtype_variant = {
|
||||
.kadt = mtype_kadt,
|
||||
|
@ -967,7 +964,7 @@ static const struct ip_set_type_variant mtype_variant = {
|
|||
|
||||
#ifdef IP_SET_EMIT_CREATE
|
||||
static int
|
||||
TOKEN(HTYPE, _create)(struct ip_set *set, struct nlattr *tb[], u32 flags)
|
||||
IPSET_TOKEN(HTYPE, _create)(struct ip_set *set, struct nlattr *tb[], u32 flags)
|
||||
{
|
||||
u32 hashsize = IPSET_DEFAULT_HASHSIZE, maxelem = IPSET_DEFAULT_MAXELEM;
|
||||
u32 cadt_flags = 0;
|
||||
|
@ -1045,9 +1042,9 @@ TOKEN(HTYPE, _create)(struct ip_set *set, struct nlattr *tb[], u32 flags)
|
|||
|
||||
set->data = h;
|
||||
if (set->family == NFPROTO_IPV4)
|
||||
set->variant = &TOKEN(HTYPE, 4_variant);
|
||||
set->variant = &IPSET_TOKEN(HTYPE, 4_variant);
|
||||
else
|
||||
set->variant = &TOKEN(HTYPE, 6_variant);
|
||||
set->variant = &IPSET_TOKEN(HTYPE, 6_variant);
|
||||
|
||||
if (tb[IPSET_ATTR_CADT_FLAGS])
|
||||
cadt_flags = ip_set_get_h32(tb[IPSET_ATTR_CADT_FLAGS]);
|
||||
|
@ -1058,64 +1055,74 @@ TOKEN(HTYPE, _create)(struct ip_set *set, struct nlattr *tb[], u32 flags)
|
|||
ip_set_timeout_uget(tb[IPSET_ATTR_TIMEOUT]);
|
||||
set->extensions |= IPSET_EXT_TIMEOUT;
|
||||
if (set->family == NFPROTO_IPV4) {
|
||||
h->dsize =
|
||||
sizeof(struct TOKEN(HTYPE, 4ct_elem));
|
||||
h->dsize = sizeof(struct
|
||||
IPSET_TOKEN(HTYPE, 4ct_elem));
|
||||
h->offset[IPSET_OFFSET_TIMEOUT] =
|
||||
offsetof(struct TOKEN(HTYPE, 4ct_elem),
|
||||
timeout);
|
||||
offsetof(struct
|
||||
IPSET_TOKEN(HTYPE, 4ct_elem),
|
||||
timeout);
|
||||
h->offset[IPSET_OFFSET_COUNTER] =
|
||||
offsetof(struct TOKEN(HTYPE, 4ct_elem),
|
||||
counter);
|
||||
TOKEN(HTYPE, 4_gc_init)(set,
|
||||
TOKEN(HTYPE, 4_gc));
|
||||
offsetof(struct
|
||||
IPSET_TOKEN(HTYPE, 4ct_elem),
|
||||
counter);
|
||||
IPSET_TOKEN(HTYPE, 4_gc_init)(set,
|
||||
IPSET_TOKEN(HTYPE, 4_gc));
|
||||
} else {
|
||||
h->dsize =
|
||||
sizeof(struct TOKEN(HTYPE, 6ct_elem));
|
||||
h->dsize = sizeof(struct
|
||||
IPSET_TOKEN(HTYPE, 6ct_elem));
|
||||
h->offset[IPSET_OFFSET_TIMEOUT] =
|
||||
offsetof(struct TOKEN(HTYPE, 6ct_elem),
|
||||
timeout);
|
||||
offsetof(struct
|
||||
IPSET_TOKEN(HTYPE, 6ct_elem),
|
||||
timeout);
|
||||
h->offset[IPSET_OFFSET_COUNTER] =
|
||||
offsetof(struct TOKEN(HTYPE, 6ct_elem),
|
||||
counter);
|
||||
TOKEN(HTYPE, 6_gc_init)(set,
|
||||
TOKEN(HTYPE, 6_gc));
|
||||
offsetof(struct
|
||||
IPSET_TOKEN(HTYPE, 6ct_elem),
|
||||
counter);
|
||||
IPSET_TOKEN(HTYPE, 6_gc_init)(set,
|
||||
IPSET_TOKEN(HTYPE, 6_gc));
|
||||
}
|
||||
} else {
|
||||
if (set->family == NFPROTO_IPV4) {
|
||||
h->dsize =
|
||||
sizeof(struct TOKEN(HTYPE, 4c_elem));
|
||||
sizeof(struct
|
||||
IPSET_TOKEN(HTYPE, 4c_elem));
|
||||
h->offset[IPSET_OFFSET_COUNTER] =
|
||||
offsetof(struct TOKEN(HTYPE, 4c_elem),
|
||||
counter);
|
||||
offsetof(struct
|
||||
IPSET_TOKEN(HTYPE, 4c_elem),
|
||||
counter);
|
||||
} else {
|
||||
h->dsize =
|
||||
sizeof(struct TOKEN(HTYPE, 6c_elem));
|
||||
sizeof(struct
|
||||
IPSET_TOKEN(HTYPE, 6c_elem));
|
||||
h->offset[IPSET_OFFSET_COUNTER] =
|
||||
offsetof(struct TOKEN(HTYPE, 6c_elem),
|
||||
counter);
|
||||
offsetof(struct
|
||||
IPSET_TOKEN(HTYPE, 6c_elem),
|
||||
counter);
|
||||
}
|
||||
}
|
||||
} else if (tb[IPSET_ATTR_TIMEOUT]) {
|
||||
h->timeout = ip_set_timeout_uget(tb[IPSET_ATTR_TIMEOUT]);
|
||||
set->extensions |= IPSET_EXT_TIMEOUT;
|
||||
if (set->family == NFPROTO_IPV4) {
|
||||
h->dsize = sizeof(struct TOKEN(HTYPE, 4t_elem));
|
||||
h->dsize = sizeof(struct IPSET_TOKEN(HTYPE, 4t_elem));
|
||||
h->offset[IPSET_OFFSET_TIMEOUT] =
|
||||
offsetof(struct TOKEN(HTYPE, 4t_elem),
|
||||
offsetof(struct IPSET_TOKEN(HTYPE, 4t_elem),
|
||||
timeout);
|
||||
TOKEN(HTYPE, 4_gc_init)(set, TOKEN(HTYPE, 4_gc));
|
||||
IPSET_TOKEN(HTYPE, 4_gc_init)(set,
|
||||
IPSET_TOKEN(HTYPE, 4_gc));
|
||||
} else {
|
||||
h->dsize = sizeof(struct TOKEN(HTYPE, 6t_elem));
|
||||
h->dsize = sizeof(struct IPSET_TOKEN(HTYPE, 6t_elem));
|
||||
h->offset[IPSET_OFFSET_TIMEOUT] =
|
||||
offsetof(struct TOKEN(HTYPE, 6t_elem),
|
||||
offsetof(struct IPSET_TOKEN(HTYPE, 6t_elem),
|
||||
timeout);
|
||||
TOKEN(HTYPE, 6_gc_init)(set, TOKEN(HTYPE, 6_gc));
|
||||
IPSET_TOKEN(HTYPE, 6_gc_init)(set,
|
||||
IPSET_TOKEN(HTYPE, 6_gc));
|
||||
}
|
||||
} else {
|
||||
if (set->family == NFPROTO_IPV4)
|
||||
h->dsize = sizeof(struct TOKEN(HTYPE, 4_elem));
|
||||
h->dsize = sizeof(struct IPSET_TOKEN(HTYPE, 4_elem));
|
||||
else
|
||||
h->dsize = sizeof(struct TOKEN(HTYPE, 6_elem));
|
||||
h->dsize = sizeof(struct IPSET_TOKEN(HTYPE, 6_elem));
|
||||
}
|
||||
|
||||
pr_debug("create %s hashsize %u (%u) maxelem %u: %p(%p)\n",
|
||||
|
|
|
@ -23,12 +23,12 @@
|
|||
#include <linux/netfilter/ipset/ip_set.h>
|
||||
#include <linux/netfilter/ipset/ip_set_hash.h>
|
||||
|
||||
#define REVISION_MIN 0
|
||||
#define REVISION_MAX 1 /* Counters support */
|
||||
#define IPSET_TYPE_REV_MIN 0
|
||||
#define IPSET_TYPE_REV_MAX 1 /* Counters support */
|
||||
|
||||
MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
|
||||
IP_SET_MODULE_DESC("hash:ip", REVISION_MIN, REVISION_MAX);
|
||||
IP_SET_MODULE_DESC("hash:ip", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX);
|
||||
MODULE_ALIAS("ip_set_hash:ip");
|
||||
|
||||
/* Type specific function prefix */
|
||||
|
@ -304,8 +304,8 @@ static struct ip_set_type hash_ip_type __read_mostly = {
|
|||
.features = IPSET_TYPE_IP,
|
||||
.dimension = IPSET_DIM_ONE,
|
||||
.family = NFPROTO_UNSPEC,
|
||||
.revision_min = REVISION_MIN,
|
||||
.revision_max = REVISION_MAX,
|
||||
.revision_min = IPSET_TYPE_REV_MIN,
|
||||
.revision_max = IPSET_TYPE_REV_MAX,
|
||||
.create = hash_ip_create,
|
||||
.create_policy = {
|
||||
[IPSET_ATTR_HASHSIZE] = { .type = NLA_U32 },
|
||||
|
|
|
@ -24,13 +24,13 @@
|
|||
#include <linux/netfilter/ipset/ip_set_getport.h>
|
||||
#include <linux/netfilter/ipset/ip_set_hash.h>
|
||||
|
||||
#define REVISION_MIN 0
|
||||
/* 1 SCTP and UDPLITE support added */
|
||||
#define REVISION_MAX 2 /* Counters support added */
|
||||
#define IPSET_TYPE_REV_MIN 0
|
||||
/* 1 SCTP and UDPLITE support added */
|
||||
#define IPSET_TYPE_REV_MAX 2 /* Counters support added */
|
||||
|
||||
MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
|
||||
IP_SET_MODULE_DESC("hash:ip,port", REVISION_MIN, REVISION_MAX);
|
||||
IP_SET_MODULE_DESC("hash:ip,port", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX);
|
||||
MODULE_ALIAS("ip_set_hash:ip,port");
|
||||
|
||||
/* Type specific function prefix */
|
||||
|
@ -396,8 +396,8 @@ static struct ip_set_type hash_ipport_type __read_mostly = {
|
|||
.features = IPSET_TYPE_IP | IPSET_TYPE_PORT,
|
||||
.dimension = IPSET_DIM_TWO,
|
||||
.family = NFPROTO_UNSPEC,
|
||||
.revision_min = REVISION_MIN,
|
||||
.revision_max = REVISION_MAX,
|
||||
.revision_min = IPSET_TYPE_REV_MIN,
|
||||
.revision_max = IPSET_TYPE_REV_MAX,
|
||||
.create = hash_ipport_create,
|
||||
.create_policy = {
|
||||
[IPSET_ATTR_HASHSIZE] = { .type = NLA_U32 },
|
||||
|
|
|
@ -24,13 +24,13 @@
|
|||
#include <linux/netfilter/ipset/ip_set_getport.h>
|
||||
#include <linux/netfilter/ipset/ip_set_hash.h>
|
||||
|
||||
#define REVISION_MIN 0
|
||||
/* 1 SCTP and UDPLITE support added */
|
||||
#define REVISION_MAX 2 /* Counters support added */
|
||||
#define IPSET_TYPE_REV_MIN 0
|
||||
/* 1 SCTP and UDPLITE support added */
|
||||
#define IPSET_TYPE_REV_MAX 2 /* Counters support added */
|
||||
|
||||
MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
|
||||
IP_SET_MODULE_DESC("hash:ip,port,ip", REVISION_MIN, REVISION_MAX);
|
||||
IP_SET_MODULE_DESC("hash:ip,port,ip", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX);
|
||||
MODULE_ALIAS("ip_set_hash:ip,port,ip");
|
||||
|
||||
/* Type specific function prefix */
|
||||
|
@ -414,8 +414,8 @@ static struct ip_set_type hash_ipportip_type __read_mostly = {
|
|||
.features = IPSET_TYPE_IP | IPSET_TYPE_PORT | IPSET_TYPE_IP2,
|
||||
.dimension = IPSET_DIM_THREE,
|
||||
.family = NFPROTO_UNSPEC,
|
||||
.revision_min = REVISION_MIN,
|
||||
.revision_max = REVISION_MAX,
|
||||
.revision_min = IPSET_TYPE_REV_MIN,
|
||||
.revision_max = IPSET_TYPE_REV_MAX,
|
||||
.create = hash_ipportip_create,
|
||||
.create_policy = {
|
||||
[IPSET_ATTR_HASHSIZE] = { .type = NLA_U32 },
|
||||
|
|
|
@ -24,15 +24,15 @@
|
|||
#include <linux/netfilter/ipset/ip_set_getport.h>
|
||||
#include <linux/netfilter/ipset/ip_set_hash.h>
|
||||
|
||||
#define REVISION_MIN 0
|
||||
/* 1 SCTP and UDPLITE support added */
|
||||
/* 2 Range as input support for IPv4 added */
|
||||
/* 3 nomatch flag support added */
|
||||
#define REVISION_MAX 4 /* Counters support added */
|
||||
#define IPSET_TYPE_REV_MIN 0
|
||||
/* 1 SCTP and UDPLITE support added */
|
||||
/* 2 Range as input support for IPv4 added */
|
||||
/* 3 nomatch flag support added */
|
||||
#define IPSET_TYPE_REV_MAX 4 /* Counters support added */
|
||||
|
||||
MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
|
||||
IP_SET_MODULE_DESC("hash:ip,port,net", REVISION_MIN, REVISION_MAX);
|
||||
IP_SET_MODULE_DESC("hash:ip,port,net", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX);
|
||||
MODULE_ALIAS("ip_set_hash:ip,port,net");
|
||||
|
||||
/* Type specific function prefix */
|
||||
|
@ -574,8 +574,8 @@ static struct ip_set_type hash_ipportnet_type __read_mostly = {
|
|||
IPSET_TYPE_NOMATCH,
|
||||
.dimension = IPSET_DIM_THREE,
|
||||
.family = NFPROTO_UNSPEC,
|
||||
.revision_min = REVISION_MIN,
|
||||
.revision_max = REVISION_MAX,
|
||||
.revision_min = IPSET_TYPE_REV_MIN,
|
||||
.revision_max = IPSET_TYPE_REV_MAX,
|
||||
.create = hash_ipportnet_create,
|
||||
.create_policy = {
|
||||
[IPSET_ATTR_HASHSIZE] = { .type = NLA_U32 },
|
||||
|
|
|
@ -22,14 +22,14 @@
|
|||
#include <linux/netfilter/ipset/ip_set.h>
|
||||
#include <linux/netfilter/ipset/ip_set_hash.h>
|
||||
|
||||
#define REVISION_MIN 0
|
||||
/* 1 Range as input support for IPv4 added */
|
||||
/* 2 nomatch flag support added */
|
||||
#define REVISION_MAX 3 /* Counters support added */
|
||||
#define IPSET_TYPE_REV_MIN 0
|
||||
/* 1 Range as input support for IPv4 added */
|
||||
/* 2 nomatch flag support added */
|
||||
#define IPSET_TYPE_REV_MAX 3 /* Counters support added */
|
||||
|
||||
MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
|
||||
IP_SET_MODULE_DESC("hash:net", REVISION_MIN, REVISION_MAX);
|
||||
IP_SET_MODULE_DESC("hash:net", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX);
|
||||
MODULE_ALIAS("ip_set_hash:net");
|
||||
|
||||
/* Type specific function prefix */
|
||||
|
@ -406,8 +406,8 @@ static struct ip_set_type hash_net_type __read_mostly = {
|
|||
.features = IPSET_TYPE_IP | IPSET_TYPE_NOMATCH,
|
||||
.dimension = IPSET_DIM_ONE,
|
||||
.family = NFPROTO_UNSPEC,
|
||||
.revision_min = REVISION_MIN,
|
||||
.revision_max = REVISION_MAX,
|
||||
.revision_min = IPSET_TYPE_REV_MIN,
|
||||
.revision_max = IPSET_TYPE_REV_MAX,
|
||||
.create = hash_net_create,
|
||||
.create_policy = {
|
||||
[IPSET_ATTR_HASHSIZE] = { .type = NLA_U32 },
|
||||
|
|
|
@ -23,14 +23,14 @@
|
|||
#include <linux/netfilter/ipset/ip_set.h>
|
||||
#include <linux/netfilter/ipset/ip_set_hash.h>
|
||||
|
||||
#define REVISION_MIN 0
|
||||
/* 1 nomatch flag support added */
|
||||
/* 2 /0 support added */
|
||||
#define REVISION_MAX 3 /* Counters support added */
|
||||
#define IPSET_TYPE_REV_MIN 0
|
||||
/* 1 nomatch flag support added */
|
||||
/* 2 /0 support added */
|
||||
#define IPSET_TYPE_REV_MAX 3 /* Counters support added */
|
||||
|
||||
MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
|
||||
IP_SET_MODULE_DESC("hash:net,iface", REVISION_MIN, REVISION_MAX);
|
||||
IP_SET_MODULE_DESC("hash:net,iface", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX);
|
||||
MODULE_ALIAS("ip_set_hash:net,iface");
|
||||
|
||||
/* Interface name rbtree */
|
||||
|
@ -645,8 +645,8 @@ static struct ip_set_type hash_netiface_type __read_mostly = {
|
|||
IPSET_TYPE_NOMATCH,
|
||||
.dimension = IPSET_DIM_TWO,
|
||||
.family = NFPROTO_UNSPEC,
|
||||
.revision_min = REVISION_MIN,
|
||||
.revision_max = REVISION_MAX,
|
||||
.revision_min = IPSET_TYPE_REV_MIN,
|
||||
.revision_max = IPSET_TYPE_REV_MAX,
|
||||
.create = hash_netiface_create,
|
||||
.create_policy = {
|
||||
[IPSET_ATTR_HASHSIZE] = { .type = NLA_U32 },
|
||||
|
|
|
@ -23,15 +23,15 @@
|
|||
#include <linux/netfilter/ipset/ip_set_getport.h>
|
||||
#include <linux/netfilter/ipset/ip_set_hash.h>
|
||||
|
||||
#define REVISION_MIN 0
|
||||
/* 1 SCTP and UDPLITE support added */
|
||||
/* 2 Range as input support for IPv4 added */
|
||||
/* 3 nomatch flag support added */
|
||||
#define REVISION_MAX 4 /* Counters support added */
|
||||
#define IPSET_TYPE_REV_MIN 0
|
||||
/* 1 SCTP and UDPLITE support added */
|
||||
/* 2 Range as input support for IPv4 added */
|
||||
/* 3 nomatch flag support added */
|
||||
#define IPSET_TYPE_REV_MAX 4 /* Counters support added */
|
||||
|
||||
MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
|
||||
IP_SET_MODULE_DESC("hash:net,port", REVISION_MIN, REVISION_MAX);
|
||||
IP_SET_MODULE_DESC("hash:net,port", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX);
|
||||
MODULE_ALIAS("ip_set_hash:net,port");
|
||||
|
||||
/* Type specific function prefix */
|
||||
|
@ -518,8 +518,8 @@ static struct ip_set_type hash_netport_type __read_mostly = {
|
|||
.features = IPSET_TYPE_IP | IPSET_TYPE_PORT | IPSET_TYPE_NOMATCH,
|
||||
.dimension = IPSET_DIM_TWO,
|
||||
.family = NFPROTO_UNSPEC,
|
||||
.revision_min = REVISION_MIN,
|
||||
.revision_max = REVISION_MAX,
|
||||
.revision_min = IPSET_TYPE_REV_MIN,
|
||||
.revision_max = IPSET_TYPE_REV_MAX,
|
||||
.create = hash_netport_create,
|
||||
.create_policy = {
|
||||
[IPSET_ATTR_HASHSIZE] = { .type = NLA_U32 },
|
||||
|
|
|
@ -15,12 +15,12 @@
|
|||
#include <linux/netfilter/ipset/ip_set.h>
|
||||
#include <linux/netfilter/ipset/ip_set_list.h>
|
||||
|
||||
#define REVISION_MIN 0
|
||||
#define REVISION_MAX 1 /* Counters support added */
|
||||
#define IPSET_TYPE_REV_MIN 0
|
||||
#define IPSET_TYPE_REV_MAX 1 /* Counters support added */
|
||||
|
||||
MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
|
||||
IP_SET_MODULE_DESC("list:set", REVISION_MIN, REVISION_MAX);
|
||||
IP_SET_MODULE_DESC("list:set", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX);
|
||||
MODULE_ALIAS("ip_set_list:set");
|
||||
|
||||
/* Member elements */
|
||||
|
@ -703,8 +703,8 @@ static struct ip_set_type list_set_type __read_mostly = {
|
|||
.features = IPSET_TYPE_NAME | IPSET_DUMP_LAST,
|
||||
.dimension = IPSET_DIM_ONE,
|
||||
.family = NFPROTO_UNSPEC,
|
||||
.revision_min = REVISION_MIN,
|
||||
.revision_max = REVISION_MAX,
|
||||
.revision_min = IPSET_TYPE_REV_MIN,
|
||||
.revision_max = IPSET_TYPE_REV_MAX,
|
||||
.create = list_set_create,
|
||||
.create_policy = {
|
||||
[IPSET_ATTR_SIZE] = { .type = NLA_U32 },
|
||||
|
|
Loading…
Reference in New Issue