/Linux-v5.10/tools/testing/selftests/bpf/ |
D | network_helpers.c | 115 if (getsockname(server_fd, (struct sockaddr *)&addr, &addrlen)) { in fastopen_connect() 170 if (getsockname(server_fd, (struct sockaddr *)&addr, &addrlen)) { in connect_to_fd() 203 if (getsockname(server_fd, (struct sockaddr *)&addr, &len)) { in connect_fd_to_fd()
|
D | test_socket_cookie.c | 73 if (getsockname(server_fd, (struct sockaddr *)&addr, &len)) { in connect_to_server() 110 err = getsockname(client_fd, (struct sockaddr *)&addr, &len); in validate_map()
|
D | tcp_server.py | 45 sn = serverSocket.getsockname()
|
D | test_tcp_check_syncookie_user.c | 56 if (getsockname(server_fd, (struct sockaddr *)&addr, &len)) { in connect_to_server()
|
D | test_sock_addr.c | 1153 return cmp_sock_addr(getsockname, sock1, addr2, /*cmp_port*/ 0); in cmp_local_ip() 1158 return cmp_sock_addr(getsockname, sock1, addr2, /*cmp_port*/ 1); in cmp_local_addr()
|
/Linux-v5.10/tools/testing/selftests/net/ |
D | fin_ack_lat.c | 75 if (getsockname(sock, (struct sockaddr *)&laddr, &len) == -1) in client() 140 if (getsockname(sock, (struct sockaddr *)&laddr, &len) == -1) in main()
|
D | tls.c | 55 ret = getsockname(sfd, &addr, &len); in FIXTURE_SETUP() 145 ret = getsockname(sfd, &addr, &len); in FIXTURE_SETUP() 1255 ret = getsockname(sfd, &addr, &len); in TEST() 1298 ret = getsockname(sfd, &addr, &len); in TEST()
|
/Linux-v5.10/tools/testing/selftests/bpf/prog_tests/ |
D | btf_skc_cls_ingress.c | 104 err = getsockname(listen_fd, (struct sockaddr *)&srv_sa6, &addrlen); in test_conn() 153 err = getsockname(listen_fd, (struct sockaddr *)&srv_sa6, &addrlen); in test_syncookie()
|
D | cgroup_skb_sk_lookup.c | 20 err = getsockname(serv_sk, (struct sockaddr *)&addr, &addr_len); in run_lookup_test()
|
D | sockmap_ktls.c | 49 err = getsockname(srv, (struct sockaddr *)&addr, &len); in test_sockmap_ktls_disconnect_after_delete()
|
D | sock_fields.c | 271 err = getsockname(listen_fd, (struct sockaddr *)&srv_sa6, &addrlen); in test() 281 err = getsockname(cli_fd, (struct sockaddr *)&cli_sa6, &addrlen); in test()
|
D | connect_force_port.c | 14 if (getsockname(fd, (struct sockaddr *)&addr, &len)) { in verify_ports()
|
D | sockopt_inherit.c | 22 if (getsockname(server_fd, (struct sockaddr *)&addr, &len)) { in connect_to_server()
|
D | cls_redirect.c | 103 if (CHECK_FAIL(getsockname(*server, sa, &slen))) in set_up_conn() 114 if (CHECK_FAIL(getsockname(*conn, sa, &slen))) in set_up_conn()
|
D | tcp_hdr_options.c | 141 if (CHECK(getsockname(sk_fds->srv_fd, (struct sockaddr *)&addr6, in sk_fds_connect() 148 if (CHECK(getsockname(sk_fds->active_fd, (struct sockaddr *)&addr6, in sk_fds_connect()
|
D | bpf_tcp_ca.c | 124 err = getsockname(lfd, (struct sockaddr *)&sa6, &addrlen); in do_test()
|
D | sk_assign.c | 113 if (CHECK_FAIL(getsockname(fd, (struct sockaddr *)&ss, &slen))) in get_port()
|
D | select_reuseport.c | 255 err = getsockname(cli_fd, (struct sockaddr *)&cli_sa, in check_data() 658 err = getsockname(sk_fds[i], (struct sockaddr *)&srv_sa, in prepare_sk_fds()
|
/Linux-v5.10/tools/bpf/bpftool/Documentation/ |
D | bpftool-cgroup.rst | 107 **getsockname4** call to getsockname(2) for an inet4 socket (since 5.8); 108 **getsockname6** call to getsockname(2) for an inet6 socket (since 5.8).
|
/Linux-v5.10/samples/bpf/ |
D | test_probe_write_user_user.c | 71 assert(getsockname(serverfd, &serv_addr, &sockaddr_len) == 0); in main()
|
/Linux-v5.10/tools/testing/selftests/uevent/ |
D | uevent_filtering.c | 116 ret = getsockname(sk_fd, (struct sockaddr *)&sk_addr, &sk_addr_len); in uevent_listener()
|
/Linux-v5.10/kernel/ |
D | sys_ni.c | 241 COND_SYSCALL(getsockname);
|
/Linux-v5.10/tools/lib/bpf/ |
D | netlink.c | 58 if (getsockname(sock, (struct sockaddr *)&sa, &addrlen) < 0) { in libbpf_netlink_open()
|
/Linux-v5.10/Documentation/networking/ |
D | phonet.rst | 91 It is ignored by bind() and getsockname().
|
/Linux-v5.10/arch/mips/kernel/syscalls/ |
D | syscall_n32.tbl | 60 50 n32 getsockname sys_getsockname
|