Home
last modified time | relevance | path

Searched refs:add_set (Results 1 – 3 of 3) sorted by relevance

/linux/net/netfilter/
H A Dxt_set.c216 ADT_OPT(add_opt, xt_family(par), info->add_set.u.compat.dim, in set_target_v0()
217 info->add_set.u.compat.flags, 0, UINT_MAX, in set_target_v0()
223 if (info->add_set.index != IPSET_INVALID_ID) in set_target_v0()
224 ip_set_add(info->add_set.index, skb, par, &add_opt); in set_target_v0()
237 if (info->add_set.index != IPSET_INVALID_ID) { in set_target_v0_checkentry()
238 index = ip_set_nfnl_get_byindex(par->net, info->add_set.index); in set_target_v0_checkentry()
241 info->add_set.index); in set_target_v0_checkentry()
251 if (info->add_set.index != IPSET_INVALID_ID) in set_target_v0_checkentry()
252 ip_set_nfnl_put(par->net, info->add_set.index); in set_target_v0_checkentry()
256 if (info->add_set.u.flags[IPSET_DIM_MAX - 1] != 0 || in set_target_v0_checkentry()
[all …]
/linux/include/uapi/linux/netfilter/
H A Dxt_set.h35 struct xt_set_info_v0 add_set; member
53 struct xt_set_info add_set; member
60 struct xt_set_info add_set; member
78 struct xt_set_info add_set; member
/linux/kernel/bpf/
H A Dbtf.c8389 struct btf_id_set8 *add_set = kset->set; in btf_populate_kfunc_set() local
8402 if (!add_set->cnt) in btf_populate_kfunc_set()
8452 if (set_cnt > U32_MAX - add_set->cnt) { in btf_populate_kfunc_set()
8457 if (set_cnt + add_set->cnt > BTF_KFUNC_SET_MAX_CNT) { in btf_populate_kfunc_set()
8464 offsetof(struct btf_id_set8, pairs[set_cnt + add_set->cnt]), in btf_populate_kfunc_set()
8477 memcpy(set->pairs + set->cnt, add_set->pairs, add_set->cnt * sizeof(set->pairs[0])); in btf_populate_kfunc_set()
8479 for (i = set->cnt; i < set->cnt + add_set->cnt; i++) in btf_populate_kfunc_set()
8482 set->cnt += add_set->cnt; in btf_populate_kfunc_set()