Home
last modified time | relevance | path

Searched refs:uaddrlen (Results 1 – 9 of 9) sorted by relevance

/linux-6.12.1/include/linux/
Dbpf-cgroup.h128 int *uaddrlen,
241 #define BPF_CGROUP_RUN_SA_PROG(sk, uaddr, uaddrlen, atype) \ argument
245 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, uaddrlen, \
250 #define BPF_CGROUP_RUN_SA_PROG_LOCK(sk, uaddr, uaddrlen, atype, t_ctx) \ argument
255 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, uaddrlen, \
267 #define BPF_CGROUP_RUN_PROG_INET_BIND_LOCK(sk, uaddr, uaddrlen, atype, bind_flags) \ argument
273 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, uaddrlen, \
287 #define BPF_CGROUP_RUN_PROG_INET4_CONNECT(sk, uaddr, uaddrlen) \ argument
288 BPF_CGROUP_RUN_SA_PROG(sk, uaddr, uaddrlen, CGROUP_INET4_CONNECT)
290 #define BPF_CGROUP_RUN_PROG_INET6_CONNECT(sk, uaddr, uaddrlen) \ argument
[all …]
Dfilter.h1494 u32 uaddrlen; member
/linux-6.12.1/tools/testing/selftests/bpf/progs/
Drecvmsg_unix_prog.c27 if (sa_kern->uaddrlen != unaddrlen) in recvmsg_unix_prog()
Dgetpeername_unix_prog.c27 if (sa_kern->uaddrlen != unaddrlen) in getpeername_unix_prog()
Dgetsockname_unix_prog.c27 if (sa_kern->uaddrlen != unaddrlen) in getsockname_unix_prog()
Dsendmsg_unix_prog.c28 if (sa_kern->uaddrlen != unaddrlen) in sendmsg_unix_prog()
Dconnect_unix_prog.c28 if (sa_kern->uaddrlen != unaddrlen) in connect_unix_prog()
/linux-6.12.1/kernel/bpf/
Dcgroup.c1482 int *uaddrlen, in __cgroup_bpf_run_filter_sock_addr() argument
1506 ctx.uaddrlen = 0; in __cgroup_bpf_run_filter_sock_addr()
1508 ctx.uaddrlen = *uaddrlen; in __cgroup_bpf_run_filter_sock_addr()
1516 *uaddrlen = ctx.uaddrlen; in __cgroup_bpf_run_filter_sock_addr()
/linux-6.12.1/net/core/
Dfilter.c11951 sa_kern->uaddrlen = offsetof(struct sockaddr_un, sun_path) + sun_path__sz; in bpf_sock_addr_set_sun_path()