| /src/lib/libc/sys/ |
| accept4.c | 1 /* $NetBSD: accept4.c,v 1.2 2017/02/08 18:03:57 maya Exp $ */ 30 __RCSID("$NetBSD: accept4.c,v 1.2 2017/02/08 18:03:57 maya Exp $"); 38 accept4(int s, struct sockaddr * restrict addr, socklen_t * restrict addrlen, function
|
| /src/tests/net/net/ |
| t_tcp.c | 169 acpt = accept4(srvr, NULL, NULL, 203 acpt = accept4(srvr, NULL, NULL, 282 atf_tc_set_md_var(tc, "descr", "Check that accept4(2) resets " 321 atf_tc_set_md_var(tc, "descr", "Check that accept4(2) resets " 360 atf_tc_set_md_var(tc, "descr", "Check that accept4(2) resets "
|
| /src/tests/kernel/ |
| t_cloexec.c | 88 RL(saccept = accept4(slisten, /*addr*/NULL, /*addrlen*/NULL, 404 "accept4(SOCK_CLOEXEC) is closed in child on posix_spawn");
|
| t_clofork.c | 89 RL(saccept = accept4(slisten, /*addr*/NULL, /*addrlen*/NULL, 381 "accept4(SOCK_CLOFORK) is closed in child on posix_spawn");
|
| /src/sys/sys/ |
| socket.h | 624 int accept4(int, struct sockaddr * __restrict, socklen_t * __restrict, int);
|
| /src/lib/libpthread/ |
| pthread_cancelstub.c | 175 accept4(int s, struct sockaddr *addr, socklen_t *addrlen, int flags) function
|
| /src/usr.bin/nc/ |
| netcat.c | 68 #define accept4(a, b, c, d) paccept((a), (b), (c), NULL, (d)) macro 611 connfd = accept4(s, (struct sockaddr *)&cliaddr,
|
| /src/external/gpl3/gcc.old/dist/c++tools/ |
| server.cc | 551 int client_fd = accept4 (sock_fd, ip6 ? (sockaddr *)&addr : nullptr,
|
| configure | 3657 # Avoid some fnctl calls by using accept4, when available. 3658 # Check for accept4 3659 { $as_echo "$as_me:${as_lineno-$LINENO}: checking for accept4" >&5 3660 $as_echo_n "checking for accept4... " >&6; } 3673 int err = accept4 (1, 0, 0, SOCK_NONBLOCK);
|
| /src/external/bsd/libevent/dist/ |
| CMakeLists.txt | 491 accept4
|
| evutil.c | 2628 /* Internal wrapper around 'accept' or 'accept4' to provide Linux-style 2642 result = accept4(sockfd, addr, addrlen, flags);
|
| configure | 14246 accept4 \
|
| /src/external/bsd/ntp/dist/sntp/libevent/ |
| CMakeLists.txt | 491 accept4
|
| evutil.c | 2626 /* Internal wrapper around 'accept' or 'accept4' to provide Linux-style 2640 result = accept4(sockfd, addr, addrlen, flags);
|
| /src/tests/lib/libpthread/ |
| t_cancellation.c | 166 RL(accept4(sock, NULL, NULL, O_CLOEXEC));
|
| /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
| sanitizer_common_interceptors.inc | 2839 INTERCEPTOR(int, accept4, int fd, void *addr, unsigned *addrlen, int f) { 2841 COMMON_INTERCEPTOR_ENTER(ctx, accept4, fd, addr, addrlen, f); 2850 int fd2 = REAL(accept4)(fd, addr, addrlen, f); 2858 #define INIT_ACCEPT4 COMMON_INTERCEPT_FUNCTION(accept4);
|
| /src/external/bsd/nsd/dist/ |
| remote.c | 596 newfd = accept4(fd, (struct sockaddr*)&addr, &addrlen, SOCK_NONBLOCK);
|
| server.c | 5509 errno=EINTR; /* stop error printout as error in accept4 5516 return accept4(fd, addr, addrlen, SOCK_NONBLOCK);
|
| /src/external/gpl3/gcc.old/dist/libsanitizer/sanitizer_common/ |
| sanitizer_common_interceptors.inc | 2950 INTERCEPTOR(int, accept4, int fd, void *addr, unsigned *addrlen, int f) { 2952 COMMON_INTERCEPTOR_ENTER(ctx, accept4, fd, addr, addrlen, f); 2961 int fd2 = REAL(accept4)(fd, addr, addrlen, f); 2969 #define INIT_ACCEPT4 COMMON_INTERCEPT_FUNCTION(accept4);
|
| /src/external/bsd/unbound/dist/util/ |
| netevent.c | 2985 new_fd = accept4(c->fd, (struct sockaddr*)addr, addrlen, SOCK_NONBLOCK);
|