/linux-master/tools/testing/selftests/net/tcp_ao/lib/ |
H A D | repair.c | 48 if (setsockopt(sk, SOL_TCP, TCP_REPAIR_QUEUE, &queue, sizeof(queue))) 49 test_error("setsockopt(TCP_REPAIR_QUEUE)"); 129 if (setsockopt(sk, SOL_TCP, TCP_REPAIR_QUEUE, &queue, sizeof(queue))) 130 test_error("setsockopt(TCP_REPAIR_QUEUE)"); 132 if (setsockopt(sk, SOL_TCP, TCP_QUEUE_SEQ, &seq, sizeof(seq))) 133 test_error("setsockopt(TCP_QUEUE_SEQ)"); 144 if (setsockopt(sk, SOL_TCP, TCP_REPAIR_QUEUE, &queue, sizeof(queue))) 145 test_error("setsockopt(TCP_REPAIR_QUEUE)"); 181 if (device != NULL && setsockopt(sk, SOL_SOCKET, SO_BINDTODEVICE, 183 test_error("setsockopt(SO_BINDTODEVIC [all...] |
/linux-master/tools/testing/selftests/net/ |
H A D | sk_bind_sendto_listen.c | 27 if (setsockopt(fd1, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one))) { 28 error(1, errno, "setsockopt(SO_REUSEADDR) fd1"); 49 if (setsockopt(fd2, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one))) { 50 error(1, errno, "setsockopt(SO_REUSEADDR) fd2");
|
H A D | ip_local_port_range.c | 195 err = setsockopt(fd, SOL_IP, IP_LOCAL_PORT_RANGE, &val16, sizeof(val16)); 196 EXPECT_TRUE(err) TH_LOG("expected setsockopt(IP_LOCAL_PORT_RANGE) to fail"); 201 err = setsockopt(fd, SOL_IP, IP_LOCAL_PORT_RANGE, &val32, sizeof(val32)); 202 EXPECT_TRUE(err) TH_LOG("expected setsockopt(IP_LOCAL_PORT_RANGE) to fail"); 207 err = setsockopt(fd, SOL_IP, IP_LOCAL_PORT_RANGE, &val64, sizeof(val64)); 208 EXPECT_TRUE(err) TH_LOG("expected setsockopt(IP_LOCAL_PORT_RANGE) to fail"); 244 err = setsockopt(fd, SOL_IP, IP_LOCAL_PORT_RANGE, &range, sizeof(range)); 245 ASSERT_TRUE(!err) TH_LOG("#%d: setsockopt(IP_LOCAL_PORT_RANGE) failed", i); 290 err = setsockopt(fd, SOL_IP, IP_LOCAL_PORT_RANGE, &range, sizeof(range)); 291 ASSERT_TRUE(!err) TH_LOG("setsockopt(IP_LOCAL_PORT_RANG [all...] |
H A D | reuseaddr_conflict.c | 56 if (ipv6 && setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (void*)&v6only, 58 perror("setsockopt IPV6_V6ONLY"); 62 if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &reuseaddr, 64 perror("setsockopt SO_REUSEADDR");
|
H A D | fin_ack_lat.c | 48 if (setsockopt(sock, SOL_SOCKET, SO_LINGER, &sl, sizeof(sl))) 49 error(-1, errno, "setsockopt(linger)"); 51 if (setsockopt(sock, IPPROTO_TCP, TCP_NODELAY, 53 error(-1, errno, "setsockopt(nodelay)"); 125 if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR | SO_REUSEPORT, 127 error(-1, errno, "setsockopt");
|
H A D | tcp_mmap.c | 325 if (rcvbuf && setsockopt(fd, SOL_SOCKET, 327 perror("setsockopt SO_RCVBUF"); 330 if (sndbuf && setsockopt(fd, SOL_SOCKET, 332 perror("setsockopt SO_SNDBUF"); 374 if (setsockopt(fdlisten, SOL_SOCKET, SO_RCVLOWAT, 376 perror("setsockopt SO_RCVLOWAT"); 526 setsockopt(fdlisten, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)); 531 setsockopt(fdlisten, IPPROTO_TCP, TCP_MAXSEG, 533 perror("setsockopt TCP_MAXSEG"); 563 setsockopt(f [all...] |
H A D | reuseport_bpf.c | 124 if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &bpf_fd, 146 if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_CBPF, &p, sizeof(p))) 163 if (setsockopt(fd[i], SOL_SOCKET, SO_REUSEPORT, &opt, 175 if (setsockopt(fd[i], SOL_TCP, TCP_FASTOPEN, &opt, 197 if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one))) 320 if (setsockopt(fd1, SOL_SOCKET, SO_REUSEPORT, &opt, sizeof(opt))) 322 if (setsockopt(fd2, SOL_SOCKET, SO_REUSEPORT, &opt, sizeof(opt))) 376 if (!setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &bpf_fd, 378 error(1, errno, "setsockopt should have returned EINVAL"); 381 if (!setsockopt(f [all...] |
H A D | sk_connect_zero_addr.c | 27 if (setsockopt(fd1, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one))) { 28 error(1, errno, "setsockopt(SO_REUSEADDR) fd1");
|
H A D | toeplitz.c | 272 if (setsockopt(fd, SOL_PACKET, PACKET_RX_RING, &req3, sizeof(req3))) 273 error(1, errno, "setsockopt PACKET_RX_RING"); 303 if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_FILTER, &prog, sizeof(prog))) 304 error(1, errno, "setsockopt filter"); 332 if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_FILTER, &prog, sizeof(prog))) 333 error(1, errno, "setsockopt filter"); 351 if (setsockopt(fd, SOL_PACKET, PACKET_VERSION, &val, sizeof(val))) 352 error(1, errno, "setsockopt PACKET_VERSION"); 368 if (setsockopt(fd, SOL_PACKET, PACKET_FANOUT, &args, sizeof(args))) { 375 setsockopt(f [all...] |
H A D | psock_fanout.c | 94 err = setsockopt(fd, SOL_PACKET, PACKET_FANOUT, &args, 98 err = setsockopt(fd, SOL_PACKET, PACKET_FANOUT, &val, 123 if (setsockopt(fd, SOL_PACKET, PACKET_FANOUT_DATA, &bpf_prog, 179 if (setsockopt(fd, SOL_PACKET, PACKET_FANOUT_DATA, &pfd, sizeof(pfd))) { 201 if (setsockopt(fd, SOL_PACKET, PACKET_VERSION, (void *) &val, 203 perror("packetsock ring setsockopt version"); 206 if (setsockopt(fd, SOL_PACKET, PACKET_RX_RING, (void *) &req, 208 perror("packetsock ring setsockopt");
|
H A D | tls.c | 142 ret = setsockopt(*fd, IPPROTO_TCP, TCP_ULP, "tls", sizeof("tls")); 150 ret = setsockopt(*cfd, IPPROTO_TCP, TCP_ULP, "tls", sizeof("tls")); 250 EXPECT_EQ(setsockopt(self->fd, SOL_TLS, TLS_TX, &tls12, sizeof(struct tls12_crypto_info_aes_gcm_128)), -1); 254 EXPECT_EQ(setsockopt(self->fd, SOL_TLS, TLS_TX, &tls12, sizeof(struct tls12_crypto_info_aes_gcm_128)), -1); 258 EXPECT_EQ(setsockopt(self->fd, SOL_TLS, TLS_TX, &tls12, sizeof(struct tls12_crypto_info_aes_gcm_128)), -1); 262 EXPECT_EQ(setsockopt(self->fd, SOL_TLS, TLS_TX, &tls12, sizeof(struct tls12_crypto_info_aes_gcm_128)), -1); 266 EXPECT_EQ(setsockopt(self->fd, SOL_TLS, TLS_TX, &tls12, sizeof(struct tls12_crypto_info_aes_gcm_128)), -1); 382 ret = setsockopt(self->fd, SOL_TLS, TLS_TX, &tls12, tls12.len); 385 ret = setsockopt(self->cfd, SOL_TLS, TLS_RX, &tls12, tls12.len); 389 ret = setsockopt(sel [all...] |
H A D | tcp_inq.c | 128 if (setsockopt(server_fd, SOL_SOCKET, SO_REUSEADDR, 130 error(1, errno, "setsockopt(SO_REUSEADDR)"); 146 if (setsockopt(fd, SOL_TCP, TCP_INQ, &one, sizeof(one)) != 0) 147 error(1, errno, "setsockopt(TCP_INQ)");
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | sockopt_qos_to_cc.c | 15 err = setsockopt(sock_fd, SOL_IPV6, IPV6_TCLASS, &buf, sizeof(buf)); 16 if (!ASSERT_OK(err, "setsockopt(sock_fd, IPV6_TCLASS)")) 19 /* Verify the setsockopt cc change */ 51 err = setsockopt(sock_fd, SOL_TCP, TCP_CONGESTION, &cc_cubic, 53 if (!ASSERT_OK(err, "setsockopt(sock_fd, TCP_CONGESTION)"))
|
H A D | sockopt_sk.c | 43 err = setsockopt(fd, SOL_IP, IP_TOS, big_buf, optlen); 45 log_err("Failed to call setsockopt(IP_TOS)"); 66 err = setsockopt(fd, SOL_IP, IP_TTL, &buf, 1); 68 log_err("Unexpected success from setsockopt(IP_TTL)"); 75 err = setsockopt(fd, SOL_CUSTOM, 0, &buf, 1); 77 log_err("Failed to call setsockopt"); 103 err = setsockopt(fd, SOL_IP, IP_FREEBIND, big_buf, optlen); 105 log_err("Failed to call setsockopt, ret=%d", err); 123 err = setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &buf, 4); 125 log_err("Failed to call setsockopt(SO_SNDBU [all...] |
H A D | setget_sockopt.c | 112 ret = setsockopt(fd, IPPROTO_TCP, TCP_ULP, "tls", sizeof("tls")); 113 if (!ASSERT_OK(ret, "setsockopt")) 115 ret = setsockopt(cfd, IPPROTO_TCP, TCP_ULP, "tls", sizeof("tls")); 116 if (!ASSERT_OK(ret, "setsockopt")) 123 ret = setsockopt(fd, SOL_TLS, TLS_TX, &aes128, sizeof(aes128)); 124 if (!ASSERT_OK(ret, "setsockopt")) 127 ret = setsockopt(cfd, SOL_TLS, TLS_RX, &aes128, sizeof(aes128)); 128 if (!ASSERT_OK(ret, "setsockopt"))
|
H A D | sockopt_multi.c | 19 err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1); 21 log_err("Failed to call setsockopt(IP_TOS)"); 95 err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1); 97 log_err("Failed to call setsockopt(IP_TOS)"); 131 err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1); 133 log_err("Failed to call setsockopt(IP_TOS)"); 170 err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1); 172 log_err("Failed to call setsockopt(IP_TOS)"); 198 err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1); 200 log_err("Failed to call setsockopt(IP_TO [all...] |
H A D | sockmap_ktls.c | 62 err = setsockopt(cli, IPPROTO_TCP, TCP_ULP, "tls", strlen("tls")); 63 if (!ASSERT_OK(err, "setsockopt(TCP_ULP)")) 118 err = setsockopt(s, IPPROTO_TCP, TCP_ULP, "tls", strlen("tls")); 119 if (!ASSERT_OK(err, "setsockopt(TCP_ULP)")) 127 /* call sk->sk_prot->setsockopt to dispatch to saved sk_prot */ 128 err = setsockopt(s, IPPROTO_TCP, TCP_NODELAY, &zero, sizeof(zero)); 129 ASSERT_OK(err, "setsockopt(TCP_NODELAY)");
|
H A D | cgroup_getset_retval.c | 30 /* Attach setsockopt that sets EUNATCH, assert that 31 * we actually get that error when we run setsockopt() 38 if (!ASSERT_ERR(setsockopt(sock_fd, SOL_SOCKET, SO_REUSEADDR, 39 &zero, sizeof(int)), "setsockopt")) 41 if (!ASSERT_EQ(errno, EUNATCH, "setsockopt-errno")) 66 /* Attach setsockopt that sets EUNATCH, and one that gets the 78 if (!ASSERT_ERR(setsockopt(sock_fd, SOL_SOCKET, SO_REUSEADDR, 79 &zero, sizeof(int)), "setsockopt")) 81 if (!ASSERT_EQ(errno, EUNATCH, "setsockopt-errno")) 109 /* Attach setsockopt tha [all...] |
/linux-master/arch/um/drivers/ |
H A D | umcast_user.c | 87 if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &yes, sizeof(yes)) < 0) { 96 if (setsockopt(fd, SOL_IP, IP_MULTICAST_TTL, &pri->ttl, 105 if (setsockopt(fd, SOL_IP, IP_MULTICAST_LOOP, 126 if (setsockopt(fd, SOL_IP, IP_ADD_MEMBERSHIP, 158 if (setsockopt(fd, SOL_IP, IP_DROP_MEMBERSHIP,
|
/linux-master/tools/testing/selftests/netfilter/ |
H A D | connect_close.c | 58 setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)); 59 setsockopt(s, SOL_SOCKET, SO_REUSEPORT, &one, sizeof(one));
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | cgroup_getset_retval_hooks.h | 20 BPF_RETVAL_HOOK(setsockopt, "cgroup/setsockopt", bpf_sockopt, 0)
|
/linux-master/tools/usb/usbip/src/ |
H A D | usbip_network.c | 215 ret = setsockopt(sockfd, SOL_SOCKET, SO_REUSEADDR, &val, sizeof(val)); 217 dbg("setsockopt: SO_REUSEADDR"); 227 ret = setsockopt(sockfd, IPPROTO_TCP, TCP_NODELAY, &val, sizeof(val)); 229 dbg("setsockopt: TCP_NODELAY"); 239 ret = setsockopt(sockfd, SOL_SOCKET, SO_KEEPALIVE, &val, sizeof(val)); 241 dbg("setsockopt: SO_KEEPALIVE"); 251 ret = setsockopt(sockfd, IPPROTO_IPV6, IPV6_V6ONLY, &val, sizeof(val)); 253 dbg("setsockopt: IPV6_V6ONLY");
|
/linux-master/samples/bpf/ |
H A D | sockex1_user.c | 38 assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd,
|
H A D | sockex2_user.c | 42 assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd,
|
/linux-master/tools/testing/vsock/ |
H A D | msg_zerocopy_common.c | 21 if (setsockopt(fd, SOL_SOCKET, SO_ZEROCOPY, &val, sizeof(val))) { 22 perror("setsockopt");
|