/linux-master/net/sctp/ |
H A D | socket.c | 4559 * ret = getsockopt(int sd, int level, int optname, void __user *optval, 4561 * ret = setsockopt(int sd, int level, int optname, const void __user *optval, 4566 * optname - the option name. 4570 static int sctp_setsockopt(struct sock *sk, int level, int optname, argument 4576 pr_debug("%s: sk:%p, optname:%d\n", __func__, sk, optname); 4587 return af->setsockopt(sk, level, optname, optval, optlen); 4602 switch (optname) { 8058 static int sctp_getsockopt(struct sock *sk, int level, int optname, argument 8064 pr_debug("%s: sk:%p, optname 8293 sctp_bpf_bypass_getsockopt(int level, int optname) argument [all...] |
/linux-master/net/ipv6/ |
H A D | tcp_ipv6.c | 606 static int tcp_v6_parse_md5_keys(struct sock *sk, int optname, argument 629 if (optname == TCP_MD5SIG_EXT && 639 if (optname == TCP_MD5SIG_EXT && cmd.tcpm_ifindex &&
|
/linux-master/include/net/ |
H A D | xfrm.h | 1717 int xfrm_user_policy(struct sock *sk, int optname, sockptr_t optval, 1720 static inline int xfrm_user_policy(struct sock *sk, int optname, argument
|
/linux-master/drivers/bus/ |
H A D | ti-sysc.c | 1518 #define SYSC_QUIRK(optname, optbase, optrev, optsysc, optsyss, \ 1521 .name = (optname), \
|
/linux-master/include/uapi/linux/ |
H A D | bpf.h | 2819 * long bpf_setsockopt(void *bpf_socket, int level, int optname, void *optval, int optlen) 2823 * which the option resides and the name *optname* of the option 2836 * * **SOL_SOCKET**, which supports the following *optname*\ s: 2841 * * **IPPROTO_TCP**, which supports the following *optname*\ s: 2849 * * **IPPROTO_IP**, which supports *optname* **IP_TOS**. 2850 * * **IPPROTO_IPV6**, which supports the following *optname*\ s: 3057 * long bpf_getsockopt(void *bpf_socket, int level, int optname, void *optval, int optlen) 3061 * which the option resides and the name *optname* of the option 3073 * It supports the same set of *optname*\ s that is supported by 7325 __s32 optname; member in struct:bpf_sockopt [all...] |
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 2819 * long bpf_setsockopt(void *bpf_socket, int level, int optname, void *optval, int optlen) 2823 * which the option resides and the name *optname* of the option 2836 * * **SOL_SOCKET**, which supports the following *optname*\ s: 2841 * * **IPPROTO_TCP**, which supports the following *optname*\ s: 2849 * * **IPPROTO_IP**, which supports *optname* **IP_TOS**. 2850 * * **IPPROTO_IPV6**, which supports the following *optname*\ s: 3057 * long bpf_getsockopt(void *bpf_socket, int level, int optname, void *optval, int optlen) 3061 * which the option resides and the name *optname* of the option 3073 * It supports the same set of *optname*\ s that is supported by 7325 __s32 optname; member in struct:bpf_sockopt [all...] |
/linux-master/include/linux/ |
H A D | filter.h | 1392 s32 optname; member in struct:bpf_sockopt_kern
|
/linux-master/net/ipv4/ |
H A D | tcp_ipv4.c | 1490 static int tcp_v4_parse_md5_keys(struct sock *sk, int optname, argument 1513 if (optname == TCP_MD5SIG_EXT && 1520 if (optname == TCP_MD5SIG_EXT && cmd.tcpm_ifindex &&
|
/linux-master/security/selinux/ |
H A D | hooks.c | 4978 static int selinux_socket_setsockopt(struct socket *sock, int level, int optname) argument 4986 return selinux_netlbl_socket_setsockopt(sock, level, optname); 4990 int optname) 5401 * based on their @optname. 5403 static int selinux_sctp_bind_connect(struct sock *sk, int optname, argument 5440 switch (optname) { 4989 selinux_socket_getsockopt(struct socket *sock, int level, int optname) argument
|
/linux-master/net/xfrm/ |
H A D | xfrm_state.c | 2600 int xfrm_user_policy(struct sock *sk, int optname, sockptr_t optval, int optlen) argument 2640 pol = km->compile_policy(sk, optname, data,
|
/linux-master/net/unix/ |
H A D | af_unix.c | 915 static bool unix_bpf_bypass_getsockopt(int level, int optname) argument 918 switch (optname) {
|