/linux-6.12.1/tools/testing/selftests/net/ |
D | fin_ack_lat.c | 75 if (getsockname(sock, (struct sockaddr *)&laddr, &len) == -1) in client() 140 if (getsockname(sock, (struct sockaddr *)&laddr, &len) == -1) in main()
|
D | bind_timewait.c | 58 ret = getsockname(server_fd, (struct sockaddr *)&self->addr, &self->addrlen); in create_timewait_socket()
|
D | sk_so_peek_off.c | 86 if (getsockname(s[0], &a.sa, &((socklen_t) { sizeof(a) })) < 0) { in sk_peek_offset_test()
|
D | so_incoming_cpu.c | 167 ret = getsockname(self->servers[i], &self->addr, &self->addrlen); in create_servers()
|
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/ |
D | sockmap_ktls.c | 46 err = getsockname(srv, (struct sockaddr *)&addr, &len); in test_sockmap_ktls_disconnect_after_delete() 109 err = getsockname(s, (struct sockaddr *)&addr, &len); in test_sockmap_ktls_update_fails_when_sock_has_ulp()
|
D | btf_skc_cls_ingress.c | 87 err = getsockname(listen_fd, (struct sockaddr *)&srv_sa6, &addrlen); in test_conn() 142 err = getsockname(listen_fd, (struct sockaddr *)&srv_sa6, &addrlen); in test_syncookie()
|
D | cgroup_skb_sk_lookup.c | 20 err = getsockname(serv_sk, (struct sockaddr *)&addr, &addr_len); in run_lookup_test()
|
D | socket_cookie.c | 61 err = getsockname(client_fd, (struct sockaddr *)&addr, &addr_len); in test_socket_cookie()
|
D | sock_addr.c | 288 int (*getsockname)(int fd, struct sockaddr *addr, socklen_t *addrlen); member 324 .getsockname = getsockname, 335 .getsockname = kernel_getsockname, 346 .getsockname = kernel_getsockname, 2303 err = cmp_sock_addr(test->ops->getsockname, serv, &expected_addr, in test_bind() 2367 err = cmp_sock_addr(test->ops->getsockname, client, in test_connect() 2506 err = cmp_sock_addr(test->ops->getsockname, serv, &expected_addr, expected_addr_len, true); in test_getsockname()
|
D | bpf_iter_setsockopt_unix.c | 29 err = getsockname(fd, (struct sockaddr *)&addr, &len); in create_unix_socket()
|
D | connect_ping.c | 68 if (!ASSERT_OK(getsockname(sock_fd, sa, &sa_len), in subtest()
|
D | sock_fields.c | 286 err = getsockname(listen_fd, (struct sockaddr *)&srv_sa6, &addrlen); in test() 296 err = getsockname(cli_fd, (struct sockaddr *)&cli_sa6, &addrlen); in test()
|
D | cls_redirect.c | 73 if (CHECK_FAIL(getsockname(*server, sa, &slen))) in set_up_conn() 84 if (CHECK_FAIL(getsockname(*conn, sa, &slen))) in set_up_conn()
|
D | connect_force_port.c | 14 if (getsockname(fd, (struct sockaddr *)&addr, &len)) { in verify_ports()
|
D | tcp_hdr_options.c | 113 if (!ASSERT_OK(getsockname(sk_fds->srv_fd, (struct sockaddr *)&addr6, in sk_fds_connect() 119 if (!ASSERT_OK(getsockname(sk_fds->active_fd, (struct sockaddr *)&addr6, in sk_fds_connect()
|
D | bpf_iter_setsockopt.c | 98 if (!getsockname(fd, (struct sockaddr *)&addr, &addrlen)) in get_local_port()
|
D | assign_reuse.c | 44 ASSERT_EQ(getsockname(fd_cl, (void *)&addr, &len), 0, "getsockname"); in echo_test_udp()
|
D | sk_assign.c | 82 if (CHECK_FAIL(getsockname(fd, (struct sockaddr *)&ss, &slen))) in get_port()
|
D | cgrp_local_storage.c | 126 err = getsockname(client_fd, (struct sockaddr *)&addr, &addr_len); in test_attach_cgroup()
|
/linux-6.12.1/tools/bpf/bpftool/Documentation/ |
D | bpftool-cgroup.rst | 119 - **getsockname4** call to getsockname(2) for an inet4 socket (since 5.8) 120 - **getsockname6** call to getsockname(2) for an inet6 socket (since 5.8) 121 - **getsockname_unix** call to getsockname(2) for a unix socket (since 6.7)
|
/linux-6.12.1/tools/testing/selftests/bpf/ |
D | network_helpers.c | 198 if (getsockname(fds[0], (struct sockaddr *)&addr, &addrlen)) in start_reuseport_server() 231 if (getsockname(server_fd, (struct sockaddr *)&addr, &addrlen)) { in fastopen_connect() 342 if (getsockname(server_fd, (struct sockaddr *)&addr, &addrlen)) { in connect_to_fd_opts() 376 if (getsockname(server_fd, (struct sockaddr *)&addr, &len)) { in connect_fd_to_fd() 557 err = getsockname(sock_fd, (struct sockaddr *)&addr, &addrlen); in get_socket_local_port()
|
/linux-6.12.1/samples/bpf/ |
D | test_probe_write_user_user.c | 71 assert(getsockname(serverfd, &serv_addr, &sockaddr_len) == 0); in main()
|
/linux-6.12.1/tools/testing/selftests/net/af_unix/ |
D | scm_rights.c | 144 ret = getsockname(self->fd[i], (struct sockaddr *)&addr, &addrlen); in create_listeners()
|
/linux-6.12.1/tools/testing/selftests/net/tcp_ao/lib/ |
D | repair.c | 82 if (getsockname(sk, addr, &len) || len != addr_size) in __test_sock_checkpoint()
|
/linux-6.12.1/tools/testing/selftests/uevent/ |
D | uevent_filtering.c | 116 ret = getsockname(sk_fd, (struct sockaddr *)&sk_addr, &sk_addr_len); in uevent_listener()
|