/openbmc/linux/include/net/ |
H A D | inet_sock.h | 42 unsigned char optlen; member
|
H A D | xfrm.h | 672 u8 optlen; member 1719 int optlen); 1722 sockptr_t optval, int optlen) in xfrm_user_policy() argument 2142 int (*xlate_user_policy_sockptr)(u8 **pdata32, int optlen);
|
/openbmc/linux/net/iucv/ |
H A D | af_iucv.c | 1479 sockptr_t optval, unsigned int optlen) in iucv_sock_setsockopt() argument 1489 if (optlen < sizeof(int)) in iucv_sock_setsockopt() 1529 char __user *optval, int __user *optlen) in iucv_sock_getsockopt() argument 1539 if (get_user(len, optlen)) in iucv_sock_getsockopt() 1568 if (put_user(len, optlen)) in iucv_sock_getsockopt()
|
/openbmc/linux/net/netlink/ |
H A D | af_netlink.c | 1662 sockptr_t optval, unsigned int optlen) in netlink_setsockopt() argument 1672 if (optlen >= sizeof(int) && in netlink_setsockopt() 1738 char __user *optval, int __user *optlen) in netlink_getsockopt() argument 1748 if (get_user(len, optlen)) in netlink_getsockopt() 1779 if (put_user(ALIGN(BITS_TO_BYTES(nlk->ngroups), sizeof(u32)), optlen)) in netlink_getsockopt() 1803 if (put_user(len, optlen) || in netlink_getsockopt()
|
/openbmc/linux/drivers/isdn/mISDN/ |
H A D | socket.c | 436 char __user *optval, int __user *optlen) in data_sock_getsockopt() argument 441 if (get_user(len, optlen)) in data_sock_getsockopt()
|
/openbmc/linux/net/bluetooth/ |
H A D | hci_sock.c | 2061 char __user *optval, int __user *optlen) in hci_sock_getsockopt_old() argument 2069 if (get_user(len, optlen)) in hci_sock_getsockopt_old() 2127 char __user *optval, int __user *optlen) in hci_sock_getsockopt() argument 2136 optlen); in hci_sock_getsockopt()
|
/openbmc/linux/net/xfrm/ |
H A D | xfrm_state.c | 2587 int xfrm_user_policy(struct sock *sk, int optname, sockptr_t optval, int optlen) in xfrm_user_policy() argument 2594 if (sockptr_is_null(optval) && !optlen) { in xfrm_user_policy() 2601 if (optlen <= 0 || optlen > PAGE_SIZE) in xfrm_user_policy() 2604 data = memdup_sockptr(optval, optlen); in xfrm_user_policy() 2616 err = xtr->xlate_user_policy_sockptr(&data, optlen); in xfrm_user_policy() 2628 optlen, &err); in xfrm_user_policy()
|
/openbmc/linux/net/sctp/ |
H A D | protocol.c | 187 inet_opt->opt.optlen, GFP_ATOMIC); in sctp_v4_copy_ip_options() 190 inet_opt->opt.optlen); in sctp_v4_copy_ip_options() 208 len = inet_opt->opt.optlen; in sctp_v4_ip_options_len()
|
/openbmc/linux/include/linux/ |
H A D | syscalls.h | 744 char __user *optval, int optlen); 746 char __user *optval, int __user *optlen); 1271 int __user *optlen); 1273 int optlen);
|
H A D | security.h | 1453 sockptr_t optlen, unsigned int len); 1593 sockptr_t optlen, in security_socket_getpeersec_stream() argument
|
H A D | lsm_hook_defs.h | 315 sockptr_t optval, sockptr_t optlen, unsigned int len)
|
/openbmc/linux/net/ipv4/ |
H A D | ip_input.c | 279 opt->optlen = iph->ihl*4 - sizeof(struct iphdr); in ip_rcv_options()
|
H A D | icmp.c | 434 if (icmp_param->replyopts.opt.opt.optlen) { in icmp_reply() 751 room -= sizeof(struct iphdr) + icmp_param.replyopts.opt.opt.optlen; in __icmp_send()
|
H A D | tcp_ipv4.c | 282 inet_csk(sk)->icsk_ext_hdr_len = inet_opt->opt.optlen; in tcp_v4_connect() 1330 sockptr_t optval, int optlen) in tcp_v4_parse_md5_keys() argument 1339 if (optlen < sizeof(cmd)) in tcp_v4_parse_md5_keys() 1604 inet_csk(newsk)->icsk_ext_hdr_len = inet_opt->opt.optlen; in tcp_v4_syn_recv_sock()
|
/openbmc/linux/tools/testing/selftests/net/mptcp/ |
H A D | mptcp_connect.c | 1139 static void xsetsockopt(int fd, int level, int optname, const void *optval, socklen_t optlen) in xsetsockopt() argument 1143 err = setsockopt(fd, level, optname, optval, optlen); in xsetsockopt()
|
/openbmc/linux/net/qrtr/ |
H A D | af_qrtr.c | 66 u8 optlen; member 479 hdrlen = sizeof(*v2) + v2->optlen; in qrtr_endpoint_post()
|
/openbmc/linux/include/net/sctp/ |
H A D | structs.h | 442 unsigned int optlen); 447 int __user *optlen);
|
/openbmc/linux/tools/testing/selftests/bpf/ |
H A D | test_maps.c | 1630 socklen_t optlen, addrlen; in prepare_reuseport_grp() local 1645 optlen = sizeof(sk_cookie); in prepare_reuseport_grp() 1685 &optlen); in prepare_reuseport_grp()
|
/openbmc/qemu/util/ |
H A D | qemu-sockets.c | 98 socklen_t optlen = sizeof(optval); in fd_is_socket() local 99 return !getsockopt(fd, SOL_SOCKET, SO_TYPE, &optval, &optlen); in fd_is_socket()
|
/openbmc/linux/net/netfilter/ |
H A D | nft_flow_offload.c | 284 if (unlikely(opt->optlen)) in nft_flow_offload_skip()
|
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | ctx_rewrite.c | 179 N(CGROUP_SOCKOPT, struct bpf_sockopt, optlen),
|
/openbmc/linux/security/apparmor/ |
H A D | lsm.c | 1155 sockptr_t optval, sockptr_t optlen, in apparmor_socket_getpeersec_stream() argument 1185 if (copy_to_sockptr(optlen, &slen, sizeof(slen))) in apparmor_socket_getpeersec_stream()
|
/openbmc/linux/tools/testing/selftests/net/ |
H A D | nettest.c | 383 socklen_t optlen = len; in get_bind_to_device() local 386 rc = getsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, &optlen); in get_bind_to_device()
|
/openbmc/linux/net/dccp/ |
H A D | ipv4.c | 107 inet_csk(sk)->icsk_ext_hdr_len = inet_opt->opt.optlen; in dccp_v4_connect()
|
/openbmc/linux/net/ipv6/ |
H A D | tcp_ipv6.c | 605 sockptr_t optval, int optlen) in tcp_v6_parse_md5_keys() argument 613 if (optlen < sizeof(cmd)) in tcp_v6_parse_md5_keys()
|