/openbmc/linux/net/kcm/ |
H A D | kcmsock.c | 1110 sockptr_t optval, unsigned int optlen) in kcm_setsockopt() argument 1122 if (copy_from_sockptr(&val, optval, sizeof(int))) in kcm_setsockopt() 1144 char __user *optval, int __user *optlen) in kcm_getsockopt() argument 1170 if (copy_to_user(optval, &val, len)) in kcm_getsockopt()
|
/openbmc/linux/include/net/ |
H A D | tcp.h | 406 int optname, sockptr_t optval, sockptr_t optlen); 408 char __user *optval, int __user *optlen); 411 sockptr_t optval, unsigned int optlen); 412 int tcp_setsockopt(struct sock *sk, int level, int optname, sockptr_t optval, 2128 sockptr_t optval,
|
H A D | xfrm.h | 1718 int xfrm_user_policy(struct sock *sk, int optname, sockptr_t optval, 1722 sockptr_t optval, int optlen) in xfrm_user_policy() argument
|
/openbmc/linux/drivers/net/bonding/ |
H A D | bond_options.c | 811 struct bond_opt_value optval; in bond_opt_tryset_rtnl() local 816 bond_opt_initstr(&optval, buf); in bond_opt_tryset_rtnl() 817 ret = __bond_opt_set_notify(bond, option, &optval); in bond_opt_tryset_rtnl()
|
/openbmc/linux/include/uapi/linux/ |
H A D | if_bridge.h | 823 __u32 optval; member
|
/openbmc/linux/include/linux/ |
H A D | syscalls.h | 744 char __user *optval, int optlen); 746 char __user *optval, int __user *optlen); 1270 int __sys_getsockopt(int fd, int level, int optname, char __user *optval, 1272 int __sys_setsockopt(int fd, int level, int optname, char __user *optval,
|
H A D | filter.h | 902 int sk_get_filter(struct sock *sk, sockptr_t optval, unsigned int len); 1339 u8 *optval; member
|
H A D | security.h | 1452 int security_socket_getpeersec_stream(struct socket *sock, sockptr_t optval, 1592 sockptr_t optval, in security_socket_getpeersec_stream() argument
|
H A D | lsm_hook_defs.h | 315 sockptr_t optval, sockptr_t optlen, unsigned int len)
|
/openbmc/linux/net/iucv/ |
H A D | af_iucv.c | 1479 sockptr_t optval, unsigned int optlen) in iucv_sock_setsockopt() argument 1492 if (copy_from_sockptr(&val, optval, sizeof(int))) in iucv_sock_setsockopt() 1529 char __user *optval, int __user *optlen) in iucv_sock_getsockopt() argument 1570 if (copy_to_user(optval, &val, len)) in iucv_sock_getsockopt()
|
/openbmc/linux/net/netlink/ |
H A D | af_netlink.c | 1662 sockptr_t optval, unsigned int optlen) in netlink_setsockopt() argument 1673 copy_from_sockptr(&val, optval, sizeof(val))) in netlink_setsockopt() 1738 char __user *optval, int __user *optlen) in netlink_getsockopt() argument 1774 (u32 __user *)(optval + pos))) { in netlink_getsockopt() 1804 copy_to_user(optval, &val, len)) in netlink_getsockopt()
|
/openbmc/linux/net/ipv4/ |
H A D | igmp.c | 2536 sockptr_t optval, sockptr_t optlen) in ip_mc_msfget() argument 2582 copy_to_sockptr(optval, msf, IP_MSFILTER_SIZE(0))) { in ip_mc_msfget() 2586 copy_to_sockptr_offset(optval, in ip_mc_msfget() 2596 sockptr_t optval, size_t ss_offset) in ip_mc_gsfget() argument 2633 if (copy_to_sockptr_offset(optval, ss_offset, in ip_mc_gsfget()
|
/openbmc/linux/tools/testing/selftests/net/mptcp/ |
H A D | mptcp_connect.c | 1139 static void xsetsockopt(int fd, int level, int optname, const void *optval, socklen_t optlen) in xsetsockopt() argument 1143 err = setsockopt(fd, level, optname, optval, optlen); in xsetsockopt()
|
/openbmc/linux/include/net/sctp/ |
H A D | structs.h | 441 sockptr_t optval, 446 char __user *optval,
|
/openbmc/linux/net/mptcp/ |
H A D | protocol.h | 756 sockptr_t optval, unsigned int optlen); 758 char __user *optval, int __user *option);
|
/openbmc/linux/tools/testing/selftests/bpf/ |
H A D | test_maps.c | 1633 const int optval = 1; in prepare_reuseport_grp() local 1654 &optval, sizeof(optval)); in prepare_reuseport_grp()
|
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | ctx_rewrite.c | 197 N(CGROUP_SOCKOPT, struct bpf_sockopt, optval),
|
/openbmc/linux/security/apparmor/ |
H A D | lsm.c | 1155 sockptr_t optval, sockptr_t optlen, in apparmor_socket_getpeersec_stream() argument 1182 if (copy_to_sockptr(optval, name, slen)) in apparmor_socket_getpeersec_stream()
|
/openbmc/linux/Documentation/networking/ |
H A D | rxrpc.rst | 452 The optval pointer points to the description string, and optlen indicates 463 made subsequently on this socket. optval should be NULL and optlen 0. 468 this socket. optval must point to an int containing one of the following 488 upgrade one bound service to the other if requested by the client. optval
|
/openbmc/linux/net/ipv6/ |
H A D | tcp_ipv6.c | 605 sockptr_t optval, int optlen) in tcp_v6_parse_md5_keys() argument 616 if (copy_from_sockptr(&cmd, optval, sizeof(cmd))) in tcp_v6_parse_md5_keys()
|
/openbmc/linux/net/xfrm/ |
H A D | xfrm_state.c | 2587 int xfrm_user_policy(struct sock *sk, int optname, sockptr_t optval, int optlen) in xfrm_user_policy() argument 2594 if (sockptr_is_null(optval) && !optlen) { in xfrm_user_policy() 2604 data = memdup_sockptr(optval, optlen); in xfrm_user_policy()
|
/openbmc/linux/security/ |
H A D | security.c | 4399 int security_socket_getpeersec_stream(struct socket *sock, sockptr_t optval, in security_socket_getpeersec_stream() argument 4410 rc = hp->hook.socket_getpeersec_stream(sock, optval, optlen, in security_socket_getpeersec_stream()
|
/openbmc/linux/net/netfilter/ipset/ |
H A D | ip_set_core.c | 2237 ip_set_sockfn_get(struct sock *sk, int optval, void __user *user, int *len) in ip_set_sockfn_get() argument 2247 if (optval != SO_IP_SET) in ip_set_sockfn_get()
|
/openbmc/linux/drivers/nvme/host/ |
H A D | tcp.c | 1585 sockptr_t optval = KERNEL_SOCKPTR(iface); in nvme_tcp_alloc_queue() local 1588 optval, strlen(iface)); in nvme_tcp_alloc_queue()
|
/openbmc/linux/Documentation/netlink/specs/ |
H A D | rt_link.yaml | 697 name: optval
|