Searched refs:af (Results 1 – 8 of 8) sorted by relevance
| /tools/testing/selftests/net/ |
| D | sk_so_peek_off.c | 13 static char *afstr(int af, int proto) in afstr() argument 16 return af == AF_INET ? "TCP/IPv4" : "TCP/IPv6"; in afstr() 18 return af == AF_INET ? "UDP/IPv4" : "UDP/IPv6"; in afstr() 21 int sk_peek_offset_probe(sa_family_t af, int proto) in sk_peek_offset_probe() argument 28 s = socket(af, type, proto); in sk_peek_offset_probe() 35 printf("%s does not support SO_PEEK_OFF\n", afstr(af, proto)); in sk_peek_offset_probe() 57 static int sk_peek_offset_test(sa_family_t af, int proto) in sk_peek_offset_test() argument 73 a.sa.sa_family = af; in sk_peek_offset_test() 75 s[0] = recv_sock = socket(af, type, proto); in sk_peek_offset_test() 76 s[1] = socket(af, type, proto); in sk_peek_offset_test() [all …]
|
| /tools/perf/util/ |
| D | probe-finder.c | 1399 struct available_var_finder *af = data; in collect_variables_cb() local 1404 vl = &af->vls[af->nvls - 1]; in collect_variables_cb() 1409 ret = convert_variable_location(die_mem, af->pf.addr, in collect_variables_cb() 1410 af->pf.fb_ops, &af->pf.sp_die, in collect_variables_cb() 1411 af->pf.machine, NULL); in collect_variables_cb() 1414 bool externs = !af->child; in collect_variables_cb() 1435 ret2 = die_get_var_range(&af->pf.sp_die, in collect_variables_cb() 1448 if (af->child && dwarf_haspc(die_mem, af->pf.addr)) in collect_variables_cb() 1458 static bool available_var_finder_overlap(struct available_var_finder *af) in available_var_finder_overlap() argument 1462 for (i = 0; i < af->nvls; i++) { in available_var_finder_overlap() [all …]
|
| /tools/testing/selftests/net/mptcp/ |
| D | mptcp_sockopt.sh | 113 local af=$2 117 if [ $af -eq 6 ];then
|
| /tools/testing/selftests/bpf/bpf_testmod/ |
| D | bpf_testmod_kfunc.h | 68 int af; member
|
| D | bpf_testmod.c | 756 switch (args->af) { in bpf_kfunc_init_sock() 765 pr_err("invalid address family %d\n", args->af); in bpf_kfunc_init_sock() 770 err = sock_create_kern(current->nsproxy->net_ns, args->af, args->type, in bpf_kfunc_init_sock()
|
| /tools/testing/selftests/bpf/prog_tests/ |
| D | sock_addr.c | 76 int af; member 120 static int kernel_init_sock(int af, int type, int protocol) in kernel_init_sock() argument 123 .af = af, in kernel_init_sock()
|
| /tools/testing/selftests/net/netfilter/ |
| D | nft_flowtable.sh | 648 KEY_SHA="0x"$(ps -af | sha1sum | cut -d " " -f 1) 649 KEY_AES="0x"$(ps -af | md5sum | cut -d " " -f 1)
|
| /tools/arch/x86/lib/ |
| D | x86-opcode-map.txt | 233 af: SCAS/W/D/Q rAX,Yv (!REX2) 530 af: IMUL Gv,Ev 786 af: vfnmsub213ss/d Vx,Hx,Wx (66),(v),(v1) 1005 af: IMUL Gv,Ev (es) | IMUL Gv,Ev (66),(es) 1088 af: vfnmsub213sh Vx,Hx,Wx (66),(ev)
|