/system/netd/libnetdutils/ |
D | SyscallsTest.cpp | 110 TEST_F(SyscallsTest, getsockopt) { in TEST_F() argument 119 EXPECT_CALL(mSyscalls, getsockopt(kFd, kLevel, kOptname, &expected, &optLen)) in TEST_F() 121 EXPECT_EQ(status::ok, sys.getsockopt(kFd, kLevel, kOptname, &expected, &optLen)); in TEST_F() 125 EXPECT_CALL(mSyscalls, getsockopt(kFd, kLevel, kOptname, &expected, &optLen)) in TEST_F() 127 EXPECT_EQ(kError, sys.getsockopt(kFd, kLevel, kOptname, &expected, &optLen)); in TEST_F()
|
D | Syscalls.cpp | 68 Status getsockopt(Fd sock, int level, int optname, void* optval, in getsockopt() function in android::netdutils::RealSyscalls 70 auto rv = ::getsockopt(sock.get(), level, optname, optval, optlen); in getsockopt()
|
/system/netd/server/ |
D | FwmarkServer.cpp | 146 if (getsockopt(*socketFd, SOL_SOCKET, SO_DOMAIN, &family, &familyLen) == -1) { in processClient() 155 if (getsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in processClient() 219 const int ret = getsockopt(*socketFd, SOL_SOCKET, SO_PROTOCOL, &socketProto, &intSize); in processClient()
|
D | XfrmControllerTest.cpp | 147 EXPECT_CALL(mockSyscalls, getsockopt(Fd(sockFd), IPPROTO_UDP, UDP_ENCAP, _, _)) in TEST_F() 185 EXPECT_CALL(mockSyscalls, getsockopt(Fd(sockFd), IPPROTO_UDP, UDP_ENCAP, _, _)) in TEST_F() 196 EXPECT_CALL(mockSyscalls, getsockopt(Fd(sockFd), IPPROTO_UDP, UDP_ENCAP, _, _)) in TEST_F()
|
D | XfrmController.cpp | 474 getSyscallInstance().getsockopt(Fd(fd), IPPROTO_UDP, UDP_ENCAP, &optval, &optlen); in ipSecSetEncapSocketOwner()
|
/system/netd/libnetdutils/include/netdutils/ |
D | Syscalls.h | 52 virtual Status getsockopt(Fd sock, int level, int optname, void *optval, 125 Status getsockopt(Fd sock, int level, int optname, void* optval, socklen_t* optlen) const { in getsockopt() function 126 return getsockopt(sock, level, optname, optval, optlen); in getsockopt()
|
D | MockSyscalls.h | 40 MOCK_CONST_METHOD5(getsockopt, Status(Fd sock, int level, int optname, void* optval,
|
/system/nvram/hal/ |
D | fake-nvram-seccomp-arm64.policy | 19 getsockopt: 1
|
D | fake-nvram-seccomp-arm.policy | 19 getsockopt: 1
|
D | fake-nvram-seccomp-x86.policy | 19 getsockopt: 1
|
D | fake-nvram-seccomp-x86_64.policy | 19 getsockopt: 1
|
/system/core/libcutils/ |
D | uevent.cpp | 111 getsockopt(s, SOL_SOCKET, SO_RCVBUF, &buf_sz_readback, &optlen) < 0) { in uevent_open_socket()
|
D | socket_network_client_unix.cpp | 98 if (getsockopt(s, SOL_SOCKET, SO_ERROR, &error, &len) < 0) { in socket_network_client_timeout()
|
/system/netd/client/ |
D | NetdClient.cpp | 74 if (getsockopt(socketFd, SOL_SOCKET, SO_DOMAIN, &family, &familyLen) == -1) { in checkSocket() 106 if (getsockopt(acceptedSocket, SOL_SOCKET, SO_DOMAIN, &family, &familyLen) == -1) { in netdClientAccept4() 355 if (getsockopt(socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in getNetworkForSocket()
|
/system/core/libsysutils/src/ |
D | SocketClient.cpp | 59 int err = getsockopt(socket, SOL_SOCKET, SO_PEERCRED, &creds, &szCreds); in init()
|
/system/bpf/libbpf_android/ |
D | BpfUtils.cpp | 208 int res = getsockopt(sockFd, SOL_SOCKET, SO_COOKIE, &sock_cookie, &cookie_len); in getSocketCookie()
|
/system/core/debuggerd/tombstoned/ |
D | tombstoned.cpp | 314 int ret = getsockopt(sockfd, SOL_SOCKET, SO_PEERCRED, &cr, &len); in crash_request_cb()
|
/system/core/adb/ |
D | test_adb.py | 298 linger = sock.getsockopt(socket.SOL_SOCKET, socket.SO_LINGER, 16)
|
/system/netd/resolv/ |
D | res_send.cpp | 738 getsockopt(statp->_vcsock, SOL_SOCKET, SO_MARK, &old_mark, &mark_size) < 0 || in send_vc() 963 if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, &len) < 0 || error) { in retrying_poll()
|
/system/core/init/ |
D | property_service.cpp | 526 if (getsockopt(s, SOL_SOCKET, SO_PEERCRED, &cr, &cr_size) < 0) { in handle_property_set_fd()
|
/system/netd/tests/ |
D | binder_test.cpp | 3175 EXPECT_NE(-1, getsockopt(testSocket, SOL_SOCKET, SO_MARK, &(fwmark->intValue), &fwmarkLen)); in sendIPv6PacketFromUid()
|