Home
last modified time | relevance | path

Searched refs:parse_msg (Results 1 – 7 of 7) sorted by relevance

/Linux-v4.19/Documentation/networking/
Dstrparser.txt30 callbacks include a parse_msg function that is called to perform
97 int (*parse_msg)(struct strparser *strp, struct sk_buff *skb);
99 parse_msg is called to determine the length of the next message
105 the offset field is relevant in parse_msg and gives the offset
121 the error on TCP socket and wake it up. If parse_msg returned
195 parse_msg is greater than the socket buffer size then the stream parser
/Linux-v4.19/net/strparser/
Dstrparser.c229 len = (*strp->cb.parse_msg)(strp, head); in __strp_recv()
460 if (!cb || !cb->rcv_msg || !cb->parse_msg) in strp_init()
486 strp->cb.parse_msg = cb->parse_msg; in strp_init()
/Linux-v4.19/include/net/
Dstrparser.h47 int (*parse_msg)(struct strparser *strp, struct sk_buff *skb); member
/Linux-v4.19/drivers/staging/nvec/
Dnvec.c412 static int parse_msg(struct nvec_chip *nvec, struct nvec_msg *msg) in parse_msg() function
456 parse_msg(nvec, msg); in nvec_dispatch()
/Linux-v4.19/net/tls/
Dtls_sw.c1288 cb.parse_msg = tls_read_size; in tls_set_sw_offload()
/Linux-v4.19/net/kcm/
Dkcmsock.c1381 .parse_msg = kcm_parse_func_strparser, in kcm_attach()
/Linux-v4.19/kernel/bpf/
Dsockmap.c1547 .parse_msg = smap_parse_func_strparser, in smap_init_sock()