Searched refs:uaddrlen (Results 1 – 9 of 9) sorted by relevance
/linux-6.12.1/include/linux/ |
D | bpf-cgroup.h | 128 int *uaddrlen, 241 #define BPF_CGROUP_RUN_SA_PROG(sk, uaddr, uaddrlen, atype) \ argument 245 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, uaddrlen, \ 250 #define BPF_CGROUP_RUN_SA_PROG_LOCK(sk, uaddr, uaddrlen, atype, t_ctx) \ argument 255 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, uaddrlen, \ 267 #define BPF_CGROUP_RUN_PROG_INET_BIND_LOCK(sk, uaddr, uaddrlen, atype, bind_flags) \ argument 273 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, uaddrlen, \ 287 #define BPF_CGROUP_RUN_PROG_INET4_CONNECT(sk, uaddr, uaddrlen) \ argument 288 BPF_CGROUP_RUN_SA_PROG(sk, uaddr, uaddrlen, CGROUP_INET4_CONNECT) 290 #define BPF_CGROUP_RUN_PROG_INET6_CONNECT(sk, uaddr, uaddrlen) \ argument [all …]
|
D | filter.h | 1494 u32 uaddrlen; member
|
/linux-6.12.1/tools/testing/selftests/bpf/progs/ |
D | recvmsg_unix_prog.c | 27 if (sa_kern->uaddrlen != unaddrlen) in recvmsg_unix_prog()
|
D | getpeername_unix_prog.c | 27 if (sa_kern->uaddrlen != unaddrlen) in getpeername_unix_prog()
|
D | getsockname_unix_prog.c | 27 if (sa_kern->uaddrlen != unaddrlen) in getsockname_unix_prog()
|
D | sendmsg_unix_prog.c | 28 if (sa_kern->uaddrlen != unaddrlen) in sendmsg_unix_prog()
|
D | connect_unix_prog.c | 28 if (sa_kern->uaddrlen != unaddrlen) in connect_unix_prog()
|
/linux-6.12.1/kernel/bpf/ |
D | cgroup.c | 1482 int *uaddrlen, in __cgroup_bpf_run_filter_sock_addr() argument 1506 ctx.uaddrlen = 0; in __cgroup_bpf_run_filter_sock_addr() 1508 ctx.uaddrlen = *uaddrlen; in __cgroup_bpf_run_filter_sock_addr() 1516 *uaddrlen = ctx.uaddrlen; in __cgroup_bpf_run_filter_sock_addr()
|
/linux-6.12.1/net/core/ |
D | filter.c | 11951 sa_kern->uaddrlen = offsetof(struct sockaddr_un, sun_path) + sun_path__sz; in bpf_sock_addr_set_sun_path()
|