Home
last modified time | relevance | path

Searched refs:add_set (Results 1 – 4 of 4) sorted by relevance

/linux-6.3-rc2/net/netfilter/
A Dxt_set.c217 info->add_set.u.compat.flags, 0, UINT_MAX, in set_target_v0()
223 if (info->add_set.index != IPSET_INVALID_ID) in set_target_v0()
241 info->add_set.index); in set_target_v0_checkentry()
267 compat_flags(&info->add_set); in set_target_v0_checkentry()
278 if (info->add_set.index != IPSET_INVALID_ID) in set_target_v0_destroy()
292 info->add_set.flags, 0, UINT_MAX, in set_target_v1()
316 info->add_set.index); in set_target_v1_checkentry()
331 if (info->add_set.dim > IPSET_DIM_MAX || in set_target_v1_checkentry()
442 info->add_set.index); in set_target_v3_checkentry()
445 info->add_set.index); in set_target_v3_checkentry()
[all …]
/linux-6.3-rc2/include/uapi/linux/netfilter/
A Dxt_set.h35 struct xt_set_info_v0 add_set; member
53 struct xt_set_info add_set; member
60 struct xt_set_info add_set; member
78 struct xt_set_info add_set; member
/linux-6.3-rc2/tools/bpf/resolve_btfids/
A Dmain.c249 static struct btf_id *add_set(struct object *obj, char *name, bool is_set8) in add_set() function
464 id = add_set(obj, prefix, true); in symbols_collect()
476 id = add_set(obj, prefix, false); in symbols_collect()
/linux-6.3-rc2/kernel/bpf/
A Dbtf.c7584 struct btf_id_set8 *add_set) in BTF_ID_LIST_GLOBAL()
7597 if (!add_set->cnt) in BTF_ID_LIST_GLOBAL()
7622 tab->sets[hook] = add_set; in BTF_ID_LIST_GLOBAL()
7635 if (set_cnt > U32_MAX - add_set->cnt) { in BTF_ID_LIST_GLOBAL()
7640 if (set_cnt + add_set->cnt > BTF_KFUNC_SET_MAX_CNT) { in BTF_ID_LIST_GLOBAL()
7647 offsetof(struct btf_id_set8, pairs[set_cnt + add_set->cnt]), in BTF_ID_LIST_GLOBAL()
7660 memcpy(set->pairs + set->cnt, add_set->pairs, add_set->cnt * sizeof(set->pairs[0])); in BTF_ID_LIST_GLOBAL()
7661 set->cnt += add_set->cnt; in BTF_ID_LIST_GLOBAL()

Completed in 25 milliseconds