Lines Matching refs:__ret
245 int __ret = 0; \
247 __ret = __cgroup_bpf_run_filter_skb(sk, skb, \
250 __ret; \
255 int __ret = 0; \
259 __ret = __cgroup_bpf_run_filter_skb(__sk, skb, \
262 __ret; \
267 int __ret = 0; \
269 __ret = __cgroup_bpf_run_filter_sk(sk, atype); \
271 __ret; \
289 int __ret = 0; \
291 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, atype, \
294 __ret; \
300 int __ret = 0; \
303 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, atype, \
308 __ret; \
319 int __ret = 0; \
322 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, atype, \
328 __ret; \
377 int __ret = 0; \
379 __ret = __cgroup_bpf_run_filter_sock_ops(sk, \
382 __ret; \
387 int __ret = 0; \
391 __ret = __cgroup_bpf_run_filter_sock_ops(__sk, \
395 __ret; \
400 int __ret = 0; \
402 __ret = __cgroup_bpf_check_dev_permission(atype, major, minor, \
406 __ret; \
412 int __ret = 0; \
414 __ret = __cgroup_bpf_run_filter_sysctl(head, table, write, \
417 __ret; \
423 int __ret = 0; \
425 __ret = __cgroup_bpf_run_filter_setsockopt(sock, level, \
429 __ret; \
434 int __ret = 0; \
436 get_user(__ret, optlen); \
437 __ret; \
443 int __ret = retval; \
449 __ret = __cgroup_bpf_run_filter_getsockopt( \
452 __ret; \
458 int __ret = retval; \
460 __ret = __cgroup_bpf_run_filter_getsockopt_kern( \
462 __ret; \