/Linux-v4.19/net/ipv4/ |
D | ip_options.c | 50 memcpy(iph+sizeof(struct iphdr), opt->__data, opt->optlen); in ip_options_build() 95 int optlen; in __ip_options_echo() local 99 if (sopt->optlen == 0) in __ip_options_echo() 106 optlen = sptr[sopt->rr+1]; in __ip_options_echo() 108 dopt->rr = dopt->optlen + sizeof(struct iphdr); in __ip_options_echo() 109 memcpy(dptr, sptr+sopt->rr, optlen); in __ip_options_echo() 110 if (sopt->rr_needaddr && soffset <= optlen) { in __ip_options_echo() 111 if (soffset + 3 > optlen) in __ip_options_echo() 116 dptr += optlen; in __ip_options_echo() 117 dopt->optlen += optlen; in __ip_options_echo() [all …]
|
D | xfrm4_mode_beet.c | 43 int hdrlen, optlen; in xfrm4_beet_output() local 46 optlen = XFRM_MODE_SKB_CB(skb)->optlen; in xfrm4_beet_output() 47 if (unlikely(optlen)) in xfrm4_beet_output() 48 hdrlen += IPV4_BEET_PHMAXLEN - (optlen & 4); in xfrm4_beet_output() 64 if (unlikely(optlen)) { in xfrm4_beet_output() 65 BUG_ON(optlen < 0); in xfrm4_beet_output() 67 ph->padlen = 4 - (optlen & 4); in xfrm4_beet_output() 68 ph->hdrlen = optlen / 8; in xfrm4_beet_output() 86 int optlen = 0; in xfrm4_beet_input() local 99 optlen = ph->hdrlen * 8 + (IPV4_BEET_PHMAXLEN - phlen); in xfrm4_beet_input() [all …]
|
D | ip_sockglue.c | 78 if (IPCB(skb)->opt.optlen == 0) in ip_cmsg_recv_opts() 81 put_cmsg(msg, SOL_IP, IP_RECVOPTS, IPCB(skb)->opt.optlen, in ip_cmsg_recv_opts() 92 if (IPCB(skb)->opt.optlen == 0) in ip_cmsg_recv_retopts() 101 put_cmsg(msg, SOL_IP, IP_RETOPTS, opt->optlen, opt->__data); in ip_cmsg_recv_retopts() 591 int optname, char __user *optval, unsigned int optlen) in do_ip_setsockopt() argument 623 if (optlen >= sizeof(int)) { in do_ip_setsockopt() 626 } else if (optlen >= sizeof(char)) { in do_ip_setsockopt() 640 return ip_mroute_setsockopt(sk, optname, optval, optlen); in do_ip_setsockopt() 652 if (optlen > 40) in do_ip_setsockopt() 655 optval, optlen); in do_ip_setsockopt() [all …]
|
D | udp_impl.h | 15 char __user *optval, unsigned int optlen); 17 char __user *optval, int __user *optlen); 21 char __user *optval, unsigned int optlen); 23 char __user *optval, int __user *optlen);
|
D | raw.c | 587 sizeof(*inet_opt) + inet_opt->opt.optlen); in raw_sendmsg() 817 static int raw_seticmpfilter(struct sock *sk, char __user *optval, int optlen) in raw_seticmpfilter() argument 819 if (optlen > sizeof(struct icmp_filter)) in raw_seticmpfilter() 820 optlen = sizeof(struct icmp_filter); in raw_seticmpfilter() 821 if (copy_from_user(&raw_sk(sk)->filter, optval, optlen)) in raw_seticmpfilter() 826 static int raw_geticmpfilter(struct sock *sk, char __user *optval, int __user *optlen) in raw_geticmpfilter() argument 830 if (get_user(len, optlen)) in raw_geticmpfilter() 838 if (put_user(len, optlen) || in raw_geticmpfilter() 846 char __user *optval, unsigned int optlen) in do_raw_setsockopt() argument 852 return raw_seticmpfilter(sk, optval, optlen); in do_raw_setsockopt() [all …]
|
/Linux-v4.19/net/ipv6/ |
D | ipv6_sockglue.c | 142 char __user *optval, unsigned int optlen) in do_ipv6_setsockopt() argument 153 if (optlen >= sizeof(int)) { in do_ipv6_setsockopt() 163 return ip6_mroute_setsockopt(sk, optname, optval, optlen); in do_ipv6_setsockopt() 172 if (optlen < sizeof(int)) in do_ipv6_setsockopt() 257 if (optlen < sizeof(int) || in do_ipv6_setsockopt() 265 if (optlen < sizeof(int)) in do_ipv6_setsockopt() 272 if (optlen < sizeof(int)) in do_ipv6_setsockopt() 279 if (optlen < sizeof(int)) in do_ipv6_setsockopt() 286 if (optlen < sizeof(int)) in do_ipv6_setsockopt() 293 if (optlen < sizeof(int)) in do_ipv6_setsockopt() [all …]
|
D | xfrm6_mode_beet.c | 44 int optlen, hdr_len; in xfrm6_beet_output() local 47 optlen = XFRM_MODE_SKB_CB(skb)->optlen; in xfrm6_beet_output() 48 if (unlikely(optlen)) in xfrm6_beet_output() 49 hdr_len += IPV4_BEET_PHMAXLEN - (optlen & 4); in xfrm6_beet_output() 62 if (unlikely(optlen)) { in xfrm6_beet_output() 64 BUG_ON(optlen < 0); in xfrm6_beet_output() 66 ph->padlen = 4 - (optlen & 4); in xfrm6_beet_output() 67 ph->hdrlen = optlen / 8; in xfrm6_beet_output()
|
D | udp_impl.h | 18 char __user *optval, int __user *optlen); 20 char __user *optval, unsigned int optlen); 23 char __user *optval, unsigned int optlen); 25 char __user *optval, int __user *optlen);
|
D | exthdrs_core.c | 135 int optlen; in ipv6_find_tlv() local 142 optlen = 1; in ipv6_find_tlv() 145 optlen = nh[offset + 1] + 2; in ipv6_find_tlv() 146 if (optlen > len) in ipv6_find_tlv() 150 offset += optlen; in ipv6_find_tlv() 151 len -= optlen; in ipv6_find_tlv()
|
D | raw.c | 963 char __user *optval, int optlen) in rawv6_seticmpfilter() argument 967 if (optlen > sizeof(struct icmp6_filter)) in rawv6_seticmpfilter() 968 optlen = sizeof(struct icmp6_filter); in rawv6_seticmpfilter() 969 if (copy_from_user(&raw6_sk(sk)->filter, optval, optlen)) in rawv6_seticmpfilter() 980 char __user *optval, int __user *optlen) in rawv6_geticmpfilter() argument 986 if (get_user(len, optlen)) in rawv6_geticmpfilter() 992 if (put_user(len, optlen)) in rawv6_geticmpfilter() 1006 char __user *optval, unsigned int optlen) in do_rawv6_setsockopt() argument 1053 char __user *optval, unsigned int optlen) in rawv6_setsockopt() argument 1062 return rawv6_seticmpfilter(sk, level, optname, optval, optlen); in rawv6_setsockopt() [all …]
|
/Linux-v4.19/net/ipv4/bpfilter/ |
D | sockopt.c | 10 unsigned int optlen, bool is_set); 15 unsigned int optlen, bool is_set) in bpfilter_mbox_request() argument 25 return bpfilter_process_sockopt(sk, optname, optval, optlen, is_set); in bpfilter_mbox_request() 29 unsigned int optlen) in bpfilter_ip_set_sockopt() argument 31 return bpfilter_mbox_request(sk, optname, optval, optlen, true); in bpfilter_ip_set_sockopt() 35 int __user *optlen) in bpfilter_ip_get_sockopt() argument 39 if (get_user(len, optlen)) in bpfilter_ip_get_sockopt()
|
/Linux-v4.19/net/sctp/ |
D | socket.c | 1425 int __user *optlen) in sctp_getsockopt_connectx3() argument 1458 if (put_user(sizeof(assoc_id), optlen)) in sctp_getsockopt_connectx3() 2307 unsigned int optlen) in sctp_setsockopt_disable_fragments() argument 2311 if (optlen < sizeof(int)) in sctp_setsockopt_disable_fragments() 2323 unsigned int optlen) in sctp_setsockopt_events() argument 2328 if (optlen > sizeof(struct sctp_event_subscribe)) in sctp_setsockopt_events() 2330 if (copy_from_user(&sctp_sk(sk)->subscribe, optval, optlen)) in sctp_setsockopt_events() 2366 unsigned int optlen) in sctp_setsockopt_autoclose() argument 2374 if (optlen != sizeof(int)) in sctp_setsockopt_autoclose() 2376 if (copy_from_user(&sp->autoclose, optval, optlen)) in sctp_setsockopt_autoclose() [all …]
|
/Linux-v4.19/net/dccp/ |
D | proto.c | 409 char __user *optval, unsigned int optlen) in dccp_setsockopt_service() argument 415 optlen > DCCP_SERVICE_LIST_MAX_LEN * sizeof(u32)) in dccp_setsockopt_service() 418 if (optlen > sizeof(service)) { in dccp_setsockopt_service() 419 sl = kmalloc(optlen, GFP_KERNEL); in dccp_setsockopt_service() 423 sl->dccpsl_nr = optlen / sizeof(u32) - 1; in dccp_setsockopt_service() 426 optlen - sizeof(service)) || in dccp_setsockopt_service() 480 char __user *optval, unsigned int optlen) in dccp_setsockopt_ccid() argument 485 if (optlen < 1 || optlen > DCCP_FEAT_MAX_SP_VALS) in dccp_setsockopt_ccid() 488 val = memdup_user(optval, optlen); in dccp_setsockopt_ccid() 494 rc = dccp_feat_register_sp(sk, DCCPF_CCID, 1, val, optlen); in dccp_setsockopt_ccid() [all …]
|
D | ccid.h | 84 int __user *optlen); 88 int __user *optlen); 246 u32 __user *optval, int __user *optlen) in ccid_hc_rx_getsockopt() argument 251 optval, optlen); in ccid_hc_rx_getsockopt() 257 u32 __user *optval, int __user *optlen) in ccid_hc_tx_getsockopt() argument 262 optval, optlen); in ccid_hc_tx_getsockopt()
|
/Linux-v4.19/net/ |
D | compat.c | 339 char __user *optval, unsigned int optlen) in do_set_attach_filter() argument 352 int optname, char __user *optval, unsigned int optlen) in do_set_sock_timeout() argument 359 if (optlen < sizeof(*up)) in do_set_sock_timeout() 374 char __user *optval, unsigned int optlen) in compat_sock_setsockopt() argument 379 optval, optlen); in compat_sock_setsockopt() 382 return do_set_sock_timeout(sock, level, optname, optval, optlen); in compat_sock_setsockopt() 384 return sock_setsockopt(sock, level, optname, optval, optlen); in compat_sock_setsockopt() 388 char __user *optval, unsigned int optlen) in __compat_sys_setsockopt() argument 402 optname, optval, optlen); in __compat_sys_setsockopt() 405 optname, optval, optlen); in __compat_sys_setsockopt() [all …]
|
/Linux-v4.19/net/ipv6/netfilter/ |
D | ip6t_hbh.c | 60 unsigned int optlen; in hbh_mt6() local 141 optlen = *lp + 2; in hbh_mt6() 144 optlen = 1; in hbh_mt6() 148 pr_debug("len%04X\n", optlen); in hbh_mt6() 150 if ((ptr > skb->len - optlen || hdrlen < optlen) && in hbh_mt6() 155 ptr += optlen; in hbh_mt6() 156 hdrlen -= optlen; in hbh_mt6()
|
/Linux-v4.19/net/rds/ |
D | af_rds.c | 298 int optlen) in rds_set_bool_option() argument 302 if (optlen < sizeof(int)) in rds_set_bool_option() 311 int optlen) in rds_cong_monitor() argument 315 ret = rds_set_bool_option(&rs->rs_cong_monitor, optval, optlen); in rds_cong_monitor() 329 int optlen) in rds_set_transport() argument 336 if (optlen != sizeof(int)) in rds_set_transport() 351 int optlen) in rds_enable_recvtstamp() argument 355 if (optlen != sizeof(int)) in rds_enable_recvtstamp() 372 int optlen) in rds_recv_track_latency() argument 377 if (optlen != sizeof(struct rds_rx_trace_so)) in rds_recv_track_latency() [all …]
|
/Linux-v4.19/net/netfilter/ |
D | xt_tcpmss.c | 36 unsigned int i, optlen; in tcpmss_mt() local 47 optlen = th->doff*4 - sizeof(*th); in tcpmss_mt() 48 if (!optlen) in tcpmss_mt() 52 op = skb_header_pointer(skb, par->thoff + sizeof(*th), optlen, _opt); in tcpmss_mt() 56 for (i = 0; i < optlen; ) { in tcpmss_mt() 58 && (optlen - i) >= TCPOLEN_MSS in tcpmss_mt()
|
/Linux-v4.19/net/can/ |
D | raw.c | 490 char __user *optval, unsigned int optlen) in raw_setsockopt() argument 507 if (optlen % sizeof(struct can_filter) != 0) in raw_setsockopt() 510 if (optlen > CAN_RAW_FILTER_MAX * sizeof(struct can_filter)) in raw_setsockopt() 513 count = optlen / sizeof(struct can_filter); in raw_setsockopt() 517 filter = memdup_user(optval, optlen); in raw_setsockopt() 571 if (optlen != sizeof(err_mask)) in raw_setsockopt() 574 if (copy_from_user(&err_mask, optval, optlen)) in raw_setsockopt() 610 if (optlen != sizeof(ro->loopback)) in raw_setsockopt() 613 if (copy_from_user(&ro->loopback, optval, optlen)) in raw_setsockopt() 619 if (optlen != sizeof(ro->recv_own_msgs)) in raw_setsockopt() [all …]
|
/Linux-v4.19/net/tls/ |
D | tls_main.c | 322 int __user *optlen) argument 329 if (get_user(len, optlen)) 390 char __user *optval, int __user *optlen) argument 396 rc = do_tls_getsockopt_tx(sk, optval, optlen); 406 char __user *optval, int __user *optlen) argument 411 return ctx->getsockopt(sk, level, optname, optval, optlen); 413 return do_tls_getsockopt(sk, optname, optval, optlen); 417 unsigned int optlen, int tx) argument 424 if (!optval || (optlen < sizeof(*crypto_info))) { 454 if (optlen != sizeof(struct tls12_crypto_info_aes_gcm_128)) { [all …]
|
/Linux-v4.19/include/linux/ |
D | bpfilter.h | 9 unsigned int optlen); 11 int __user *optlen); 14 unsigned int optlen, bool is_set);
|
/Linux-v4.19/samples/bpf/ |
D | test_cgrp2_sock.c | 128 socklen_t optlen = len; in get_bind_to_device() local 132 rc = getsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, &optlen); in get_bind_to_device() 142 socklen_t optlen = sizeof(mark); in get_somark() local 145 rc = getsockopt(sd, SOL_SOCKET, SO_MARK, &mark, &optlen); in get_somark() 155 socklen_t optlen = sizeof(prio); in get_priority() local 158 rc = getsockopt(sd, SOL_SOCKET, SO_PRIORITY, &prio, &optlen); in get_priority()
|
/Linux-v4.19/include/net/ |
D | gue.h | 87 static inline int validate_gue_flags(struct guehdr *guehdr, size_t optlen) in validate_gue_flags() argument 96 if (len > optlen) in validate_gue_flags() 110 if (len > optlen) in validate_gue_flags()
|
D | inet_connection_sock.h | 52 char __user *optval, unsigned int optlen); 54 char __user *optval, int __user *optlen); 58 char __user *optval, unsigned int optlen); 61 char __user *optval, int __user *optlen); 312 char __user *optval, int __user *optlen); 314 char __user *optval, unsigned int optlen);
|
/Linux-v4.19/net/bridge/ |
D | br_netfilter_ipv6.c | 65 int optlen = nh[off + 1] + 2; in br_nf_check_hbh_len() local 69 optlen = 1; in br_nf_check_hbh_len() 90 if (optlen > len) in br_nf_check_hbh_len() 94 off += optlen; in br_nf_check_hbh_len() 95 len -= optlen; in br_nf_check_hbh_len()
|