Searched refs:add_set (Results 1 – 3 of 3) sorted by relevance
/linux/net/netfilter/ |
H A D | xt_set.c | 216 ADT_OPT(add_opt, xt_family(par), info->add_set.u.compat.dim, in set_target_v0() 217 info->add_set.u.compat.flags, 0, UINT_MAX, in set_target_v0() 223 if (info->add_set.index != IPSET_INVALID_ID) in set_target_v0() 224 ip_set_add(info->add_set.index, skb, par, &add_opt); in set_target_v0() 237 if (info->add_set.index != IPSET_INVALID_ID) { in set_target_v0_checkentry() 238 index = ip_set_nfnl_get_byindex(par->net, info->add_set.index); in set_target_v0_checkentry() 241 info->add_set.index); in set_target_v0_checkentry() 251 if (info->add_set.index != IPSET_INVALID_ID) in set_target_v0_checkentry() 252 ip_set_nfnl_put(par->net, info->add_set.index); in set_target_v0_checkentry() 256 if (info->add_set.u.flags[IPSET_DIM_MAX - 1] != 0 || in set_target_v0_checkentry() [all …]
|
/linux/include/uapi/linux/netfilter/ |
H A D | xt_set.h | 35 struct xt_set_info_v0 add_set; member 53 struct xt_set_info add_set; member 60 struct xt_set_info add_set; member 78 struct xt_set_info add_set; member
|
/linux/kernel/bpf/ |
H A D | btf.c | 8389 struct btf_id_set8 *add_set = kset->set; in btf_populate_kfunc_set() local 8402 if (!add_set->cnt) in btf_populate_kfunc_set() 8452 if (set_cnt > U32_MAX - add_set->cnt) { in btf_populate_kfunc_set() 8457 if (set_cnt + add_set->cnt > BTF_KFUNC_SET_MAX_CNT) { in btf_populate_kfunc_set() 8464 offsetof(struct btf_id_set8, pairs[set_cnt + add_set->cnt]), in btf_populate_kfunc_set() 8477 memcpy(set->pairs + set->cnt, add_set->pairs, add_set->cnt * sizeof(set->pairs[0])); in btf_populate_kfunc_set() 8479 for (i = set->cnt; i < set->cnt + add_set->cnt; i++) in btf_populate_kfunc_set() 8482 set->cnt += add_set->cnt; in btf_populate_kfunc_set()
|