Home
last modified time | relevance | path

Searched refs:sock_fprog (Results 1 – 23 of 23) sorted by relevance

/linux-4.4.14/include/uapi/linux/
Dif_tun.h44 #define TUNATTACHFILTER _IOW('T', 213, struct sock_fprog)
45 #define TUNDETACHFILTER _IOW('T', 214, struct sock_fprog)
50 #define TUNGETFILTER _IOR('T', 219, struct sock_fprog)
Dppp-ioctl.h101 #define PPPIOCSPASS _IOW('t', 71, struct sock_fprog) /* set pass filter */
102 #define PPPIOCSACTIVE _IOW('t', 70, struct sock_fprog) /* set active filt */
Dfilter.h30 struct sock_fprog { /* Required for SO_ATTACH_FILTER. */ struct
/linux-4.4.14/tools/testing/selftests/seccomp/
Dseccomp_bpf.c160 struct sock_fprog prog = { in TEST()
192 struct sock_fprog prog = { }; in TEST()
229 struct sock_fprog prog = { }; in TEST()
266 struct sock_fprog prog = { in TEST()
289 struct sock_fprog prog = { in TEST()
314 struct sock_fprog prog = { in TEST()
331 struct sock_fprog prog = { in TEST()
350 struct sock_fprog prog = { in TEST_SIGNAL()
372 struct sock_fprog prog = { in TEST_SIGNAL()
393 struct sock_fprog prog = { in TEST_SIGNAL()
[all …]
/linux-4.4.14/samples/bpf/
Dtracex5_user.c18 struct sock_fprog prog = { in install_accept_all_seccomp()
/linux-4.4.14/samples/seccomp/
Ddropper.c41 struct sock_fprog prog = { in install_filter()
Dbpf-fancy.c80 struct sock_fprog prog = { in main()
Dbpf-direct.c144 struct sock_fprog prog = { in install_filter()
/linux-4.4.14/include/linux/
Dfilter.h444 int bpf_prog_create_from_user(struct bpf_prog **pfp, struct sock_fprog *fprog,
448 int sk_attach_filter(struct sock_fprog *fprog, struct sock *sk);
449 int __sk_attach_filter(struct sock_fprog *fprog, struct sock *sk,
/linux-4.4.14/tools/testing/selftests/net/
Dpsock_lib.h52 struct sock_fprog bpf_prog; in sock_setfilter()
/linux-4.4.14/net/
Dcompat.c316 struct sock_fprog __user *kfprog = compat_alloc_user_space(sizeof(struct sock_fprog)); in do_set_attach_filter()
321 !access_ok(VERIFY_WRITE, kfprog, sizeof(struct sock_fprog)) || in do_set_attach_filter()
329 sizeof(struct sock_fprog)); in do_set_attach_filter()
/linux-4.4.14/kernel/
Dseccomp.c346 static struct seccomp_filter *seccomp_prepare_filter(struct sock_fprog *fprog) in seccomp_prepare_filter()
394 struct sock_fprog fprog; in seccomp_prepare_user_filter()
/linux-4.4.14/net/core/
Dfilter.c837 const struct sock_fprog *fprog) in bpf_prog_store_orig_filter()
1093 int bpf_prog_create_from_user(struct bpf_prog **pfp, struct sock_fprog *fprog, in bpf_prog_create_from_user()
1177 int __sk_attach_filter(struct sock_fprog *fprog, struct sock *sk, in __sk_attach_filter()
1226 int sk_attach_filter(struct sock_fprog *fprog, struct sock *sk) in sk_attach_filter()
Dsock.c911 if (optlen == sizeof(struct sock_fprog)) { in sock_setsockopt()
912 struct sock_fprog fprog; in sock_setsockopt()
/linux-4.4.14/fs/
Dcompat_ioctl.c418 struct sock_fprog __user *u_fprog64 = compat_alloc_user_space(sizeof(struct sock_fprog)); in ppp_sock_fprog_ioctl_trans()
/linux-4.4.14/Documentation/prctl/
Dseccomp_filter.txt61 The 'prog' argument is a pointer to a struct sock_fprog which
/linux-4.4.14/tools/net/
Dbpf_dbg.c501 struct sock_fprog bpf = { in bpf_runnable()
/linux-4.4.14/Documentation/networking/
Dfilter.txt75 struct sock_fprog { /* Required for SO_ATTACH_FILTER. */
120 struct sock_fprog bpf = {
Dppp_generic.txt419 option is selected. The argument should point to a sock_fprog
/linux-4.4.14/drivers/net/
Dtun.c193 struct sock_fprog fprog;
/linux-4.4.14/drivers/net/ppp/
Dppp_generic.c546 struct sock_fprog uprog; in get_filter()
/linux-4.4.14/drivers/isdn/i4l/
Disdn_ppp.c449 struct sock_fprog uprog; in get_filter()
/linux-4.4.14/net/packet/
Daf_packet.c1560 struct sock_fprog fprog; in fanout_set_data_cbpf()