/openbmc/linux/tools/testing/selftests/net/ |
H A D | cmsg_sender.c | 53 } sockopt; member 147 opt.sockopt.mark = atoi(optarg); in cs_parse_args() 168 opt.sockopt.tclass = atoi(optarg); in cs_parse_args() 397 if (opt.sockopt.mark && in ca_set_sockopts() 399 &opt.sockopt.mark, sizeof(opt.sockopt.mark))) in ca_set_sockopts() 401 if (opt.sockopt.dontfrag && in ca_set_sockopts() 403 &opt.sockopt.dontfrag, sizeof(opt.sockopt.dontfrag))) in ca_set_sockopts() 405 if (opt.sockopt.tclass && in ca_set_sockopts() 407 &opt.sockopt.tclass, sizeof(opt.sockopt.tclass))) in ca_set_sockopts() 409 if (opt.sockopt.hlimit && in ca_set_sockopts() [all …]
|
H A D | rxtimestamp.c | 44 struct options sockopt; member 133 if (t->sockopt.so_timestamp) in print_test_case() 135 if (t->sockopt.so_timestampns) in print_test_case() 137 if (t->sockopt.so_timestamping) { in print_test_case() 140 if (t->sockopt.so_timestamping & sof_flags[f].mask) in print_test_case() 334 config_so_flags(rcv, test_cases[test_num].sockopt); in run_test_case()
|
H A D | psock_fanout.c | 132 int sockopt; in sock_fanout_getopts() local 133 socklen_t sockopt_len = sizeof(sockopt); in sock_fanout_getopts() 136 &sockopt, &sockopt_len)) { in sock_fanout_getopts() 140 *typeflags = sockopt >> 16; in sock_fanout_getopts() 141 *group_id = sockopt & 0xfffff; in sock_fanout_getopts()
|
/openbmc/linux/net/ipv4/bpfilter/ |
H A D | sockopt.c | 20 if (!bpfilter_ops.sockopt) { in bpfilter_mbox_request() 25 if (!bpfilter_ops.sockopt) { in bpfilter_mbox_request() 39 err = bpfilter_ops.sockopt(sk, optname, optval, optlen, is_set); in bpfilter_mbox_request()
|
H A D | Makefile | 2 obj-$(CONFIG_BPFILTER) += sockopt.o
|
/openbmc/linux/net/bpfilter/ |
H A D | bpfilter_kern.c | 113 bpfilter_ops.sockopt = &bpfilter_process_sockopt; in load_umh() 128 bpfilter_ops.sockopt = NULL; in fini_umh()
|
/openbmc/linux/include/linux/ |
H A D | bpfilter.h | 19 int (*sockopt)(struct sock *sk, int optname, sockptr_t optval, member
|
/openbmc/linux/net/mptcp/ |
H A D | Makefile | 5 mib.o pm_netlink.o sockopt.o pm_userspace.o fastopen.o sched.o
|
/openbmc/linux/Documentation/bpf/ |
H A D | prog_cgroup_sockopt.rst | 22 sockopt and it has writable context: it can modify the supplied arguments 44 sockopt. The BPF hook can observe ``optval``, ``optlen`` and ``retval``
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/nspr/ |
H A D | nspr_4.35.bb | 130 sockopt \
|
/openbmc/openbmc/poky/meta/recipes-devtools/rust/files/ |
H A D | rv32-rustix-libc-backend.patch | 19 …sockopt.rs":"178a6622bab25bf1813d6c17151f48d820e238db8cbd05be3aae563902d6c53e","src/backend/libc/n… 21 …sockopt.rs":"178a6622bab25bf1813d6c17151f48d820e238db8cbd05be3aae563902d6c53e","src/backend/libc/n…
|
H A D | rv32-cargo-rustix-0.38.19-fix.patch | 37 …sockopt.rs":"c1e9974478f027d9053fed5b4f28e6dce49dd15f05e1ed574cb4eddf1be47b7c","src/backend/libc/n… 39 …sockopt.rs":"c1e9974478f027d9053fed5b4f28e6dce49dd15f05e1ed574cb4eddf1be47b7c","src/backend/libc/n…
|
/openbmc/linux/Documentation/networking/ |
H A D | rxrpc.rst | 535 A keyring is passed to the server socket by naming it in a sockopt. The server 821 the key bound to the socket with the RXRPC_SECURITY_KEY sockopt. Calls 1089 (#) Apply the RXRPC_MIN_SECURITY_LEVEL sockopt to a socket from within in the
|
H A D | ip-sysctl.rst | 2861 sockopt. When it's unset, no SCTP_PEER_ADDR_CHANGE event with 2863 can be got via SCTP_GET_PEER_ADDR_INFO sockopt; When it's enabled, 2866 SCTP_GET_PEER_ADDR_INFO sockopt; When it's disabled, no 2869 sockopt.
|
/openbmc/ |
H A D | opengrok2.0.log | 17955 …essChildren: not file-less due to: /opengrok/data/xref/openbmc/linux/net/ipv4/bpfilter/sockopt.c.gz
|
H A D | opengrok1.0.log | 18473 …essChildren: not file-less due to: /opengrok/data/xref/openbmc/linux/net/ipv4/bpfilter/sockopt.c.gz
|