| /tools/testing/selftests/net/ |
| A D | bind_timewait.c | 12 socklen_t addrlen; in FIXTURE() local 35 self->addrlen = sizeof(self->addr); in FIXTURE_SETUP() 47 socklen_t addrlen; in create_timewait_socket() local 52 ret = bind(server_fd, (struct sockaddr *)&self->addr, self->addrlen); in create_timewait_socket() 58 ret = getsockname(server_fd, (struct sockaddr *)&self->addr, &self->addrlen); in create_timewait_socket() 64 ret = connect(client_fd, (struct sockaddr *)&self->addr, self->addrlen); in create_timewait_socket() 67 addrlen = sizeof(addr); in create_timewait_socket() 68 child_fd = accept(server_fd, (struct sockaddr *)&addr, &addrlen); in create_timewait_socket() 85 ret = bind(fd, (struct sockaddr *)&self->addr, self->addrlen);
|
| A D | reuseaddr_conflict.c | 26 int addrlen; in open_port() local 45 addrlen = sizeof(addr6); in open_port() 48 addrlen = sizeof(addr4); in open_port() 68 if (bind(fd, addr, addrlen) < 0) { in open_port()
|
| A D | so_incoming_cpu.c | 21 socklen_t addrlen; in FIXTURE() local 102 self->addrlen = sizeof(struct sockaddr_in); in FIXTURE_SETUP() 139 ret = bind(fd, &self->addr, self->addrlen); in create_server() 167 ret = getsockname(self->servers[i], &self->addr, &self->addrlen); in create_servers() 201 ret = connect(fd, &self->addr, self->addrlen); in create_clients() 218 fd = accept(self->servers[i], &self->addr, &self->addrlen); in verify_incoming_cpu() 268 client = accept(server, &self->addr, &self->addrlen); in TEST_F()
|
| A D | fin_ack_lat.c | 89 int addrlen = sizeof(address); in server() local 94 (socklen_t *)&addrlen); in server()
|
| A D | tcp_inq.c | 63 socklen_t addrlen = sizeof(addr); in start_server() local 71 fd = accept(server_fd, (struct sockaddr *)&addr, &addrlen); in start_server()
|
| /tools/testing/selftests/bpf/prog_tests/ |
| A D | decap_sanity.c | 23 socklen_t addrlen; in test_decap_sanity() local 52 addrlen = sizeof(addr); in test_decap_sanity() 54 (void *)&addr, &addrlen); in test_decap_sanity() 60 err = sendto(sockfd, buf, sizeof(buf), 0, (void *)&addr, addrlen); in test_decap_sanity()
|
| A D | sock_addr.c | 78 int addrlen; member 137 if (addrlen) in sock_addr_op() 138 args.addrlen = *addrlen; in sock_addr_op() 147 *addrlen, in sock_addr_op() 149 args.addrlen, 1), in sock_addr_op() 153 if (addrlen) in sock_addr_op() 154 *addrlen = args.addrlen; in sock_addr_op() 170 args.addr.addrlen = addrlen; in send_msg_op() 177 addrlen, in send_msg_op() 179 args.addr.addrlen, 1), in send_msg_op() [all …]
|
| A D | crypto_sanity.c | 92 socklen_t addrlen; in test_crypto_sanity() local 136 addrlen = sizeof(addr); in test_crypto_sanity() 138 (void *)&addr, &addrlen); in test_crypto_sanity() 150 err = sendto(sockfd, plain_text, sizeof(plain_text), 0, (void *)&addr, addrlen); in test_crypto_sanity() 175 err = sendto(sockfd, afalg_dst, sizeof(afalg_dst), 0, (void *)&addr, addrlen); in test_crypto_sanity()
|
| A D | migrate_reuseport.c | 54 socklen_t addrlen; member 225 &test_case->addr, &test_case->addrlen); in start_servers() 240 test_case->addrlen); in start_servers() 254 &test_case->addrlen); in start_servers() 309 test_case->addrlen); in start_clients()
|
| A D | select_reuseport.c | 232 socklen_t addrlen; in check_data() local 235 addrlen = sizeof(cli_sa); in check_data() 237 &addrlen); in check_data() 589 socklen_t addrlen; in prepare_sk_fds() local 595 addrlen = sizeof(srv_sa); in prepare_sk_fds() 620 err = bind(sk_fds[i], (struct sockaddr *)&srv_sa, addrlen); in prepare_sk_fds() 637 socklen_t addrlen = sizeof(srv_sa); in prepare_sk_fds() local 640 &addrlen); in prepare_sk_fds()
|
| A D | bpf_iter_setsockopt.c | 96 socklen_t addrlen = sizeof(addr); in get_local_port() local 98 if (!getsockname(fd, (struct sockaddr *)&addr, &addrlen)) in get_local_port()
|
| A D | sock_fields.c | 277 socklen_t addrlen = sizeof(struct sockaddr_in6); in test() local 286 err = getsockname(listen_fd, (struct sockaddr *)&srv_sa6, &addrlen); in test() 296 err = getsockname(cli_fd, (struct sockaddr *)&cli_sa6, &addrlen); in test()
|
| /tools/testing/selftests/bpf/progs/ |
| A D | lsm_cgroup.c | 103 int addrlen) in real_bind() argument 131 int addrlen) in BPF_PROG() argument 134 return real_bind(sock, address, addrlen); in BPF_PROG() 140 int addrlen) in BPF_PROG() argument 143 return real_bind(sock, address, addrlen); in BPF_PROG()
|
| A D | test_probe_user.c | 23 int addrlen) in BPF_KSYSCALL() argument
|
| /tools/perf/ui/browsers/ |
| A D | map.c | 22 u8 addrlen; member 34 mb->addrlen, sym->start, mb->addrlen, sym->end, in map_browser__write() 37 width = browser->width - ((mb->addrlen * 2) + 4); in map_browser__write() 134 mb.addrlen = snprintf(tmp, sizeof(tmp), "%" PRIx64, maxaddr); in map__browse()
|
| /tools/testing/selftests/net/af_unix/ |
| A D | unix_connect.c | 118 socklen_t addrlen; in TEST_F() local 127 addrlen = offsetof(struct sockaddr_un, sun_path) + variant->len; in TEST_F() 130 err = bind(self->server, (struct sockaddr *)&addr, addrlen); in TEST_F() 144 err = connect(self->client, (struct sockaddr *)&addr, addrlen); in TEST_F()
|
| A D | scm_rights.c | 187 socklen_t addrlen; in create_listeners() local 194 addrlen = sizeof(addr.sun_family); in create_listeners() 195 ret = bind(self->fd[i], (struct sockaddr *)&addr, addrlen); in create_listeners() 207 addrlen = sizeof(addr); in create_listeners() 208 ret = getsockname(self->fd[i], (struct sockaddr *)&addr, &addrlen); in create_listeners() 214 ret = connect(self->fd[i + 1], (struct sockaddr *)&addr, addrlen); in create_listeners()
|
| A D | scm_pidfd.c | 312 socklen_t addrlen; member 379 addr->addrlen = offsetof(struct sockaddr_un, sun_path); in fill_sockaddr() 381 addr->addrlen += strlen(addr->sock_name); in fill_sockaddr() 384 addr->addrlen++; in fill_sockaddr() 428 if (bind(cfd, (struct sockaddr *)&self->client_addr->listen_addr, self->client_addr->addrlen)) { in client() 435 self->server_addr.addrlen) != 0) { in client() 499 …= bind(self->server, (struct sockaddr *)&self->server_addr.listen_addr, self->server_addr.addrlen); in TEST_F() 538 …, sizeof(char), 0, (struct sockaddr *)&self->client_addr->listen_addr, self->client_addr->addrlen); in TEST_F()
|
| A D | msg_oob.c | 60 socklen_t addrlen; in create_tcp_socketpair() local 70 addrlen = sizeof(addr); in create_tcp_socketpair() 71 ret = getsockname(listen_fd, (struct sockaddr *)&addr, &addrlen); in create_tcp_socketpair() 77 ret = connect(self->fd[2], (struct sockaddr *)&addr, addrlen); in create_tcp_socketpair() 80 self->fd[3] = accept(listen_fd, (struct sockaddr *)&addr, &addrlen); in create_tcp_socketpair()
|
| /tools/testing/selftests/bpf/ |
| A D | network_helpers.c | 120 if (bind(fd, (struct sockaddr *)addr, addrlen) < 0) { in start_server_addr() 143 socklen_t addrlen; in start_server_str() local 180 socklen_t addrlen; in start_reuseport_server() local 227 socklen_t addrlen = sizeof(addr); in fastopen_connect() local 247 addrlen); in fastopen_connect() 315 socklen_t addrlen; in connect_to_addr_str() local 323 return connect_to_addr(type, &addr, addrlen, opts); in connect_to_addr_str() 329 socklen_t addrlen, optlen; in connect_to_fd_opts() local 341 addrlen = sizeof(addr); in connect_to_fd_opts() 347 return connect_to_addr(type, &addr, addrlen, opts); in connect_to_fd_opts() [all …]
|
| A D | xdp_features.c | 231 socklen_t addrlen; in dut_echo_thread() local 235 (struct sockaddr *)&addr, &addrlen); in dut_echo_thread() 243 (struct sockaddr *)&addr, addrlen); in dut_echo_thread() 366 socklen_t addrlen; in dut_run() local 376 ctrl_sockfd = accept(*sockfd, (struct sockaddr *)&ctrl_addr, &addrlen); in dut_run()
|
| /tools/testing/selftests/net/netfilter/ |
| A D | audit_logread.c | 31 socklen_t addrlen = sizeof(addr); in audit_recv() local 36 (struct sockaddr *)&addr, &addrlen); in audit_recv() 40 addrlen != sizeof(addr) || in audit_recv()
|
| /tools/perf/trace/beauty/include/linux/ |
| A D | socket.h | 447 extern int __sys_bind(int fd, struct sockaddr __user *umyaddr, int addrlen); 449 int addrlen); 451 int addrlen, int file_flags); 453 int addrlen);
|
| /tools/testing/selftests/bpf/test_kmods/ |
| A D | bpf_testmod.c | 842 if (args->addrlen > sizeof(args->addr)) in bpf_kfunc_call_kernel_connect() 854 args->addrlen, 0); in bpf_kfunc_call_kernel_connect() 865 if (args->addrlen > sizeof(args->addr)) in bpf_kfunc_call_kernel_bind() 906 .msg_namelen = args->addr.addrlen, in bpf_kfunc_call_kernel_sendmsg() 911 if (args->addr.addrlen > sizeof(args->addr.addr) || in bpf_kfunc_call_kernel_sendmsg() 927 args->addr.addrlen = msg.msg_namelen; in bpf_kfunc_call_kernel_sendmsg() 938 .msg_namelen = args->addr.addrlen, in bpf_kfunc_call_sock_sendmsg() 943 if (args->addr.addrlen > sizeof(args->addr.addr) || in bpf_kfunc_call_sock_sendmsg() 960 args->addr.addrlen = msg.msg_namelen; in bpf_kfunc_call_sock_sendmsg() 983 args->addrlen = err; in bpf_kfunc_call_kernel_getsockname() [all …]
|
| /tools/testing/selftests/landlock/ |
| A D | audit.h | 88 socklen_t addrlen = sizeof(addr); in audit_recv() local 97 (struct sockaddr *)&addr, &addrlen); in audit_recv() 103 if (addrlen != sizeof(addr) || addr.nl_pid != 0) in audit_recv()
|