Searched refs:add (Results 1 – 8 of 8) sorted by relevance
/net/netfilter/ |
D | xt_recent.c | 478 int add; in recent_old_proc_write() local 500 add = 0; in recent_old_proc_write() 506 add = 1; in recent_old_proc_write() 514 if (add) in recent_old_proc_write() 518 if (add) in recent_old_proc_write() 547 bool add, succ; in recent_mt_proc_write() local 566 add = false; in recent_mt_proc_write() 569 add = true; in recent_mt_proc_write() 595 if (add) in recent_mt_proc_write() 598 if (add) in recent_mt_proc_write()
|
D | Kconfig | 474 Workaround: activate this option and add a rule to your firewall 568 It will also add a "tos" match, which allows you to match packets
|
/net/ipv4/ |
D | ip_sockglue.c | 721 int omode, add; in do_ip_setsockopt() local 731 add = 1; in do_ip_setsockopt() 734 add = 0; in do_ip_setsockopt() 745 add = 1; in do_ip_setsockopt() 748 add = 0; in do_ip_setsockopt() 750 err = ip_mc_source(add, omode, sk, &mreqs, 0); in do_ip_setsockopt() 786 int omode, add; in do_ip_setsockopt() local 807 add = 1; in do_ip_setsockopt() 810 add = 0; in do_ip_setsockopt() 823 add = 1; in do_ip_setsockopt() [all …]
|
D | igmp.c | 1849 int ip_mc_source(int add, int omode, struct sock *sk, struct in ip_mc_source() argument 1903 if (!add) { in ip_mc_source()
|
/net/ipv6/ |
D | ipv6_sockglue.c | 583 int omode, add; in do_ipv6_setsockopt() local 598 add = 1; in do_ipv6_setsockopt() 601 add = 0; in do_ipv6_setsockopt() 612 add = 1; in do_ipv6_setsockopt() 615 add = 0; in do_ipv6_setsockopt() 617 retv = ip6_mc_source(add, omode, sk, &greqs); in do_ipv6_setsockopt()
|
D | mcast.c | 358 int ip6_mc_source(int add, int omode, struct sock *sk, in ip6_mc_source() argument 414 if (!add) { in ip6_mc_source()
|
/net/mac80211/ |
D | mesh.h | 240 struct ieee80211_sub_if_data *sdata, bool add);
|
/net/sched/ |
D | Kconfig | 497 Say Y here to add a simple action for demonstration purposes.
|