Searched refs:uaddrlen (Results 1 - 9 of 9) sorted by relevance
/linux-master/include/linux/ |
H A D | bpf-cgroup.h | 128 int *uaddrlen, 241 #define BPF_CGROUP_RUN_SA_PROG(sk, uaddr, uaddrlen, atype) \ 245 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, uaddrlen, \ 250 #define BPF_CGROUP_RUN_SA_PROG_LOCK(sk, uaddr, uaddrlen, atype, t_ctx) \ 255 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, uaddrlen, \ 267 #define BPF_CGROUP_RUN_PROG_INET_BIND_LOCK(sk, uaddr, uaddrlen, atype, bind_flags) \ 273 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, uaddrlen, \ 287 #define BPF_CGROUP_RUN_PROG_INET4_CONNECT(sk, uaddr, uaddrlen) \ 288 BPF_CGROUP_RUN_SA_PROG(sk, uaddr, uaddrlen, CGROUP_INET4_CONNECT) 290 #define BPF_CGROUP_RUN_PROG_INET6_CONNECT(sk, uaddr, uaddrlen) \ [all...] |
H A D | filter.h | 1341 u32 uaddrlen; member in struct:bpf_sock_addr_kern
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | getpeername_unix_prog.c | 27 if (sa_kern->uaddrlen != unaddrlen)
|
H A D | connect_unix_prog.c | 28 if (sa_kern->uaddrlen != unaddrlen)
|
H A D | getsockname_unix_prog.c | 27 if (sa_kern->uaddrlen != unaddrlen)
|
H A D | sendmsg_unix_prog.c | 28 if (sa_kern->uaddrlen != unaddrlen)
|
H A D | recvmsg_unix_prog.c | 27 if (sa_kern->uaddrlen != unaddrlen)
|
/linux-master/kernel/bpf/ |
H A D | cgroup.c | 1450 * @uaddrlen: Pointer to the size of the sockaddr struct provided by user. It is 1465 int *uaddrlen, 1489 ctx.uaddrlen = 0; 1491 ctx.uaddrlen = *uaddrlen; 1499 *uaddrlen = ctx.uaddrlen; 1463 __cgroup_bpf_run_filter_sock_addr(struct sock *sk, struct sockaddr *uaddr, int *uaddrlen, enum cgroup_bpf_attach_type atype, void *t_ctx, u32 *flags) argument
|
/linux-master/net/core/ |
H A D | filter.c | 11890 sa_kern->uaddrlen = offsetof(struct sockaddr_un, sun_path) + sun_path__sz;
|
Completed in 257 milliseconds