Searched refs:sockopt (Results 1 – 6 of 6) sorted by relevance
44 struct options sockopt; member151 if (t->sockopt.so_timestamp) in print_test_case()153 if (t->sockopt.so_timestampns) in print_test_case()155 if (t->sockopt.so_timestamping) { in print_test_case()158 if (t->sockopt.so_timestamping & sof_flags[f].mask) in print_test_case()352 config_so_flags(rcv, test_cases[test_num].sockopt); in run_test_case()
160 int sockopt; in sock_fanout_getopts() local161 socklen_t sockopt_len = sizeof(sockopt); in sock_fanout_getopts()164 &sockopt, &sockopt_len)) { in sock_fanout_getopts()168 *typeflags = sockopt >> 16; in sock_fanout_getopts()169 *group_id = sockopt & 0xfffff; in sock_fanout_getopts()
5 mib.o pm_netlink.o sockopt.o pm_userspace.o fastopen.o sched.o \
22 sockopt and it has writable context: it can modify the supplied arguments44 sockopt. The BPF hook can observe ``optval``, ``optlen`` and ``retval``
535 A keyring is passed to the server socket by naming it in a sockopt. The server821 the key bound to the socket with the RXRPC_SECURITY_KEY sockopt. Calls1089 (#) Apply the RXRPC_MIN_SECURITY_LEVEL sockopt to a socket from within in the
2969 sockopt. When it's unset, no SCTP_PEER_ADDR_CHANGE event with2971 can be got via SCTP_GET_PEER_ADDR_INFO sockopt; When it's enabled,2974 SCTP_GET_PEER_ADDR_INFO sockopt; When it's disabled, no2977 sockopt.