Searched refs:uaddrlen (Results 1 - 9 of 9) sorted by relevance

/linux-master/include/linux/
H A Dbpf-cgroup.h128 int *uaddrlen,
241 #define BPF_CGROUP_RUN_SA_PROG(sk, uaddr, uaddrlen, atype) \
245 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, uaddrlen, \
250 #define BPF_CGROUP_RUN_SA_PROG_LOCK(sk, uaddr, uaddrlen, atype, t_ctx) \
255 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, uaddrlen, \
267 #define BPF_CGROUP_RUN_PROG_INET_BIND_LOCK(sk, uaddr, uaddrlen, atype, bind_flags) \
273 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, uaddrlen, \
287 #define BPF_CGROUP_RUN_PROG_INET4_CONNECT(sk, uaddr, uaddrlen) \
288 BPF_CGROUP_RUN_SA_PROG(sk, uaddr, uaddrlen, CGROUP_INET4_CONNECT)
290 #define BPF_CGROUP_RUN_PROG_INET6_CONNECT(sk, uaddr, uaddrlen) \
[all...]
H A Dfilter.h1341 u32 uaddrlen; member in struct:bpf_sock_addr_kern
/linux-master/tools/testing/selftests/bpf/progs/
H A Dgetpeername_unix_prog.c27 if (sa_kern->uaddrlen != unaddrlen)
H A Dconnect_unix_prog.c28 if (sa_kern->uaddrlen != unaddrlen)
H A Dgetsockname_unix_prog.c27 if (sa_kern->uaddrlen != unaddrlen)
H A Dsendmsg_unix_prog.c28 if (sa_kern->uaddrlen != unaddrlen)
H A Drecvmsg_unix_prog.c27 if (sa_kern->uaddrlen != unaddrlen)
/linux-master/kernel/bpf/
H A Dcgroup.c1450 * @uaddrlen: Pointer to the size of the sockaddr struct provided by user. It is
1465 int *uaddrlen,
1489 ctx.uaddrlen = 0;
1491 ctx.uaddrlen = *uaddrlen;
1499 *uaddrlen = ctx.uaddrlen;
1463 __cgroup_bpf_run_filter_sock_addr(struct sock *sk, struct sockaddr *uaddr, int *uaddrlen, enum cgroup_bpf_attach_type atype, void *t_ctx, u32 *flags) argument
/linux-master/net/core/
H A Dfilter.c11890 sa_kern->uaddrlen = offsetof(struct sockaddr_un, sun_path) + sun_path__sz;

Completed in 257 milliseconds