Lines Matching refs:__ret
227 int __ret = 0; \
229 __ret = __cgroup_bpf_run_filter_skb(sk, skb, \
232 __ret; \
237 int __ret = 0; \
241 __ret = __cgroup_bpf_run_filter_skb(__sk, skb, \
244 __ret; \
249 int __ret = 0; \
251 __ret = __cgroup_bpf_run_filter_sk(sk, type); \
253 __ret; \
270 int __ret = 0; \
272 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, type, \
274 __ret; \
279 int __ret = 0; \
282 __ret = __cgroup_bpf_run_filter_sock_addr(sk, uaddr, type, \
286 __ret; \
339 int __ret = 0; \
341 __ret = __cgroup_bpf_run_filter_sock_ops(sk, \
344 __ret; \
349 int __ret = 0; \
353 __ret = __cgroup_bpf_run_filter_sock_ops(__sk, \
357 __ret; \
362 int __ret = 0; \
364 __ret = __cgroup_bpf_check_dev_permission(type, major, minor, \
368 __ret; \
374 int __ret = 0; \
376 __ret = __cgroup_bpf_run_filter_sysctl(head, table, write, \
379 __ret; \
385 int __ret = 0; \
387 __ret = __cgroup_bpf_run_filter_setsockopt(sock, level, \
391 __ret; \
396 int __ret = 0; \
398 get_user(__ret, optlen); \
399 __ret; \
405 int __ret = retval; \
407 __ret = __cgroup_bpf_run_filter_getsockopt(sock, level, \
411 __ret; \