/openbmc/linux/net/ipv4/ |
H A D | ping.c | 755 sizeof(*inet_opt) + inet_opt->opt.optlen); in ping_v4_sendmsg()
|
H A D | igmp.c | 2536 sockptr_t optval, sockptr_t optlen) in ip_mc_msfget() argument 2581 if (copy_to_sockptr(optlen, &msf_size, sizeof(int)) || in ip_mc_msfget()
|
H A D | route.c | 1223 opt.optlen = ip_hdr(skb)->ihl * 4 - sizeof(struct iphdr); in ipv4_send_dest_unreach()
|
/openbmc/linux/net/mptcp/ |
H A D | protocol.h | 756 sockptr_t optval, unsigned int optlen);
|
H A D | protocol.c | 3214 inet_opt->opt.optlen, GFP_ATOMIC); in mptcp_copy_ip_options() 3217 inet_opt->opt.optlen); in mptcp_copy_ip_options()
|
/openbmc/linux/security/ |
H A D | security.c | 4400 sockptr_t optlen, unsigned int len) in security_socket_getpeersec_stream() argument 4410 rc = hp->hook.socket_getpeersec_stream(sock, optval, optlen, in security_socket_getpeersec_stream()
|
/openbmc/qemu/linux-user/ |
H A D | strace.c | 2794 abi_ulong sockfd, level, optname, optval, optlen; in do_print_sockopt() local 2800 get_user_ualx(optlen, arg1, 4); in do_print_sockopt() 3039 print_raw_param(TARGET_ABI_FMT_ld, optlen, 1); in do_print_sockopt()
|
/openbmc/linux/net/ipv6/ |
H A D | route.c | 4119 int optlen, on_link; in rt6_do_redirect() local 4122 optlen = skb_tail_pointer(skb) - skb_transport_header(skb); in rt6_do_redirect() 4123 optlen -= sizeof(*msg); in rt6_do_redirect() 4125 if (optlen < 0) { in rt6_do_redirect() 4157 if (!ndisc_parse_options(skb->dev, msg->opt, optlen, &ndopts)) { in rt6_do_redirect()
|
/openbmc/linux/include/linux/ |
H A D | filter.h | 1343 s32 optlen; member
|
/openbmc/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 7179 __s32 optlen; member
|
/openbmc/linux/include/uapi/linux/ |
H A D | bpf.h | 7179 __s32 optlen; member
|
/openbmc/linux/security/smack/ |
H A D | smack_lsm.c | 4161 sockptr_t optval, sockptr_t optlen, in smack_socket_getpeersec_stream() argument 4182 if (copy_to_sockptr(optlen, &slen, sizeof(slen))) in smack_socket_getpeersec_stream()
|
/openbmc/linux/Documentation/networking/ |
H A D | rxrpc.rst | 452 The optval pointer points to the description string, and optlen indicates 463 made subsequently on this socket. optval should be NULL and optlen 0.
|
/openbmc/openbmc/poky/meta/recipes-extended/tcp-wrappers/tcp-wrappers-7.6/ |
H A D | 10_usagi-ipv6.patch | 18 int optlen;
|
/openbmc/linux/security/selinux/ |
H A D | hooks.c | 5133 sockptr_t optval, sockptr_t optlen, in selinux_socket_getpeersec_stream() argument 5161 if (copy_to_sockptr(optlen, &scontext_len, sizeof(scontext_len))) in selinux_socket_getpeersec_stream()
|