/linux-master/net/x25/ |
H A D | af_x25.c | 424 sockptr_t optval, unsigned int optlen) 438 if (copy_from_sockptr(&opt, optval, sizeof(int))) 451 char __user *optval, int __user *optlen) 474 rc = copy_to_user(optval, &val, len) ? -EFAULT : 0; 423 x25_setsockopt(struct socket *sock, int level, int optname, sockptr_t optval, unsigned int optlen) argument 450 x25_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen) argument
|
/linux-master/tools/testing/selftests/net/mptcp/ |
H A D | mptcp_connect.c | 1139 static void xsetsockopt(int fd, int level, int optname, const void *optval, socklen_t optlen) argument 1143 err = setsockopt(fd, level, optname, optval, optlen);
|
/linux-master/include/net/sctp/ |
H A D | structs.h | 438 sockptr_t optval, 443 char __user *optval,
|
/linux-master/net/netlink/ |
H A D | af_netlink.c | 1654 sockptr_t optval, unsigned int optlen) 1665 copy_from_sockptr(&val, optval, sizeof(val))) 1730 char __user *optval, int __user *optlen) 1766 (u32 __user *)(optval + pos))) { 1799 copy_to_user(optval, &val, len)) 1653 netlink_setsockopt(struct socket *sock, int level, int optname, sockptr_t optval, unsigned int optlen) argument 1729 netlink_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen) argument
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_maps.c | 1640 const int optval = 1; local 1661 &optval, sizeof(optval));
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | ctx_rewrite.c | 197 N(CGROUP_SOCKOPT, struct bpf_sockopt, optval), 198 .read = "$dst = *(u64 *)($ctx + bpf_sockopt_kern::optval);",
|
/linux-master/include/linux/ |
H A D | syscalls.h | 762 char __user *optval, int optlen); 764 char __user *optval, int __user *optlen); 1293 int __sys_getsockopt(int fd, int level, int optname, char __user *optval, 1295 int __sys_setsockopt(int fd, int level, int optname, char __user *optval,
|
H A D | filter.h | 947 int sk_get_filter(struct sock *sk, sockptr_t optval, unsigned int len); 1389 u8 *optval; member in struct:bpf_sockopt_kern
|
H A D | security.h | 1531 int security_socket_getpeersec_stream(struct socket *sock, sockptr_t optval, 1671 sockptr_t optval, 1670 security_socket_getpeersec_stream(struct socket *sock, sockptr_t optval, sockptr_t optlen, unsigned int len) argument
|
H A D | lsm_hook_defs.h | 334 sockptr_t optval, sockptr_t optlen, unsigned int len)
|
/linux-master/net/iucv/ |
H A D | af_iucv.c | 1477 sockptr_t optval, unsigned int optlen) 1490 if (copy_from_sockptr(&val, optval, sizeof(int))) 1527 char __user *optval, int __user *optlen) 1568 if (copy_to_user(optval, &val, len)) 1476 iucv_sock_setsockopt(struct socket *sock, int level, int optname, sockptr_t optval, unsigned int optlen) argument 1526 iucv_sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen) argument
|
/linux-master/net/mptcp/ |
H A D | protocol.h | 791 sockptr_t optval, unsigned int optlen); 793 char __user *optval, int __user *option);
|
/linux-master/net/ipv4/ |
H A D | igmp.c | 2536 sockptr_t optval, sockptr_t optlen) 2582 copy_to_sockptr(optval, msf, IP_MSFILTER_SIZE(0))) { 2586 copy_to_sockptr_offset(optval, 2596 sockptr_t optval, size_t ss_offset) 2633 if (copy_to_sockptr_offset(optval, ss_offset, 2535 ip_mc_msfget(struct sock *sk, struct ip_msfilter *msf, sockptr_t optval, sockptr_t optlen) argument 2595 ip_mc_gsfget(struct sock *sk, struct group_filter *gsf, sockptr_t optval, size_t ss_offset) argument
|
H A D | tcp_ipv4.c | 1491 sockptr_t optval, int optlen) 1504 if (copy_from_sockptr(&cmd, optval, sizeof(cmd))) 1490 tcp_v4_parse_md5_keys(struct sock *sk, int optname, sockptr_t optval, int optlen) argument
|
/linux-master/include/net/ |
H A D | xfrm.h | 1717 int xfrm_user_policy(struct sock *sk, int optname, sockptr_t optval, 1721 sockptr_t optval, int optlen) 1720 xfrm_user_policy(struct sock *sk, int optname, sockptr_t optval, int optlen) argument
|
/linux-master/security/apparmor/ |
H A D | lsm.c | 1326 * @optval: output - buffer to copy peer name to 1327 * @optlen: output - size of copied name in @optval 1328 * @len: size of @optval buffer 1334 sockptr_t optval, sockptr_t optlen, 1361 if (copy_to_sockptr(optval, name, slen)) 1333 apparmor_socket_getpeersec_stream(struct socket *sock, sockptr_t optval, sockptr_t optlen, unsigned int len) argument
|
/linux-master/net/netfilter/ipset/ |
H A D | ip_set_core.c | 2220 ip_set_sockfn_get(struct sock *sk, int optval, void __user *user, int *len) argument 2230 if (optval != SO_IP_SET)
|
/linux-master/net/ipv6/ |
H A D | tcp_ipv6.c | 607 sockptr_t optval, int optlen) 620 if (copy_from_sockptr(&cmd, optval, sizeof(cmd))) 606 tcp_v6_parse_md5_keys(struct sock *sk, int optname, sockptr_t optval, int optlen) argument
|
H A D | mcast.c | 583 sockptr_t optval, size_t ss_offset) 623 if (copy_to_sockptr_offset(optval, ss_offset, &ss, sizeof(ss))) 582 ip6_mc_msfget(struct sock *sk, struct group_filter *gsf, sockptr_t optval, size_t ss_offset) argument
|
/linux-master/security/ |
H A D | security.c | 4609 * @optval: destination buffer 4621 int security_socket_getpeersec_stream(struct socket *sock, sockptr_t optval, argument 4624 return call_int_hook(socket_getpeersec_stream, sock, optval, optlen,
|
/linux-master/drivers/nvme/host/ |
H A D | tcp.c | 1728 sockptr_t optval = KERNEL_SOCKPTR(iface); local 1731 optval, strlen(iface));
|
/linux-master/include/uapi/linux/ |
H A D | bpf.h | 2819 * long bpf_setsockopt(void *bpf_socket, int level, int optname, void *optval, int optlen) 2825 * The option value of length *optlen* is pointed by *optval*. 3057 * long bpf_getsockopt(void *bpf_socket, int level, int optname, void *optval, int optlen) 7027 /* Copy the SYN pkt to optval 7054 * -ENOSPC: Not enough space in optval. Only optlen number of 7321 __bpf_md_ptr(void *, optval);
|
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 2819 * long bpf_setsockopt(void *bpf_socket, int level, int optname, void *optval, int optlen) 2825 * The option value of length *optlen* is pointed by *optval*. 3057 * long bpf_getsockopt(void *bpf_socket, int level, int optname, void *optval, int optlen) 7027 /* Copy the SYN pkt to optval 7054 * -ENOSPC: Not enough space in optval. Only optlen number of 7321 __bpf_md_ptr(void *, optval);
|
/linux-master/net/xfrm/ |
H A D | xfrm_state.c | 2600 int xfrm_user_policy(struct sock *sk, int optname, sockptr_t optval, int optlen) argument 2607 if (sockptr_is_null(optval) && !optlen) { 2617 data = memdup_sockptr(optval, optlen);
|
/linux-master/security/smack/ |
H A D | smack_lsm.c | 4230 * @optval: user's destination 4237 sockptr_t optval, sockptr_t optlen, 4255 if (copy_to_sockptr(optval, rcp, slen)) 4236 smack_socket_getpeersec_stream(struct socket *sock, sockptr_t optval, sockptr_t optlen, unsigned int len) argument
|