Searched refs:sockopt (Results 1 – 11 of 11) sorted by relevance
/Linux-v6.1/tools/testing/selftests/net/ |
D | cmsg_sender.c | 53 } sockopt; member 147 opt.sockopt.mark = atoi(optarg); in cs_parse_args() 161 opt.sockopt.dontfrag = atoi(optarg); in cs_parse_args() 168 opt.sockopt.tclass = atoi(optarg); in cs_parse_args() 175 opt.sockopt.hlimit = atoi(optarg); in cs_parse_args() 397 if (opt.sockopt.mark && in ca_set_sockopts() 399 &opt.sockopt.mark, sizeof(opt.sockopt.mark))) in ca_set_sockopts() 401 if (opt.sockopt.dontfrag && in ca_set_sockopts() 403 &opt.sockopt.dontfrag, sizeof(opt.sockopt.dontfrag))) in ca_set_sockopts() 405 if (opt.sockopt.tclass && in ca_set_sockopts() [all …]
|
D | rxtimestamp.c | 44 struct options sockopt; member 133 if (t->sockopt.so_timestamp) in print_test_case() 135 if (t->sockopt.so_timestampns) in print_test_case() 137 if (t->sockopt.so_timestamping) { in print_test_case() 140 if (t->sockopt.so_timestamping & sof_flags[f].mask) in print_test_case() 334 config_so_flags(rcv, test_cases[test_num].sockopt); in run_test_case()
|
D | psock_fanout.c | 132 int sockopt; in sock_fanout_getopts() local 133 socklen_t sockopt_len = sizeof(sockopt); in sock_fanout_getopts() 136 &sockopt, &sockopt_len)) { in sock_fanout_getopts() 140 *typeflags = sockopt >> 16; in sock_fanout_getopts() 141 *group_id = sockopt & 0xfffff; in sock_fanout_getopts()
|
/Linux-v6.1/net/ipv4/bpfilter/ |
D | sockopt.c | 29 if (!bpfilter_ops.sockopt) { in bpfilter_mbox_request() 34 if (!bpfilter_ops.sockopt) { in bpfilter_mbox_request() 48 err = bpfilter_ops.sockopt(sk, optname, optval, optlen, is_set); in bpfilter_mbox_request()
|
D | Makefile | 2 obj-$(CONFIG_BPFILTER) += sockopt.o
|
/Linux-v6.1/net/bpfilter/ |
D | bpfilter_kern.c | 113 bpfilter_ops.sockopt = &bpfilter_process_sockopt; in load_umh() 128 bpfilter_ops.sockopt = NULL; in fini_umh()
|
/Linux-v6.1/include/linux/ |
D | bpfilter.h | 20 int (*sockopt)(struct sock *sk, int optname, sockptr_t optval, member
|
/Linux-v6.1/net/mptcp/ |
D | Makefile | 5 mib.o pm_netlink.o sockopt.o pm_userspace.o
|
/Linux-v6.1/Documentation/bpf/ |
D | prog_cgroup_sockopt.rst | 22 sockopt and it has writable context: it can modify the supplied arguments 44 sockopt. The BPF hook can observe ``optval``, ``optlen`` and ``retval``
|
/Linux-v6.1/Documentation/networking/ |
D | rxrpc.rst | 535 A keyring is passed to the server socket by naming it in a sockopt. The server 821 the key bound to the socket with the RXRPC_SECURITY_KEY sockopt. Calls 1082 (#) Apply the RXRPC_MIN_SECURITY_LEVEL sockopt to a socket from within in the
|
D | ip-sysctl.rst | 2704 sockopt. When it's unset, no SCTP_PEER_ADDR_CHANGE event with 2706 can be got via SCTP_GET_PEER_ADDR_INFO sockopt; When it's enabled, 2709 SCTP_GET_PEER_ADDR_INFO sockopt; When it's diabled, no 2712 sockopt.
|