Home
last modified time | relevance | path

Searched refs:recvmsg (Results 1 – 25 of 131) sorted by relevance

123456

/Linux-v5.4/net/decnet/
DTODO19 o Using send/recvmsg() to get at connect/disconnect data (POSIX 1003.1g)
21 send/recvmsg() calls should simply be a vector of set/getsockopt()
/Linux-v5.4/Documentation/networking/
Drxrpc.txt7 of AF_RXRPC family, using sendmsg() and recvmsg() with control data to send and
204 aborted with an appropriate network error passed through recvmsg().
237 is received with a last recvmsg.
242 (*) When receiving data for a call, recvmsg flags MSG_MORE if there's more
245 (*) When receiving data or messages for a call, MSG_EOR is flagged by recvmsg
252 (*) Aborts, busy notifications and challenge packets are delivered by recvmsg,
268 its acceptance [recvmsg reports a special control message]. The server
270 is done, the first part of the request data will be delivered by recvmsg.
295 Notes on recvmsg:
298 the receive queue, then recvmsg will keep working through them until:
[all …]
Dmsg_zerocopy.rst118 send syscall is followed by a poll and recvmsg on the error queue.
132 ret = recvmsg(fd, &msg, MSG_ERRQUEUE);
134 error(1, errno, "recvmsg");
Dtimestamping.txt8 monotonic) system time. Reports the timestamp via recvmsg() in a
335 Timestamps are read using the ancillary data feature of recvmsg().
375 software timestamp will be generated in the recvmsg() call and passed
383 receives the timestamps by calling recvmsg() with flag MSG_ERRQUEUE
385 relevant metadata structures. The recvmsg call returns the original
425 accordingly. Until the process calls recvmsg() on the error queue,
442 on a normal recvmsg(). Since this is not a socket error, it is not
/Linux-v5.4/net/rxrpc/
DMakefile27 recvmsg.o \
/Linux-v5.4/kernel/
Dsys_ni.c253 COND_SYSCALL(recvmsg);
254 COND_SYSCALL_COMPAT(recvmsg);
/Linux-v5.4/net/ipv4/
Dudplite.c49 .recvmsg = udp_recvmsg,
/Linux-v5.4/net/ipv6/
Dudplite.c46 .recvmsg = udpv6_recvmsg,
/Linux-v5.4/crypto/
Dalgif_rng.c113 .recvmsg = rng_recvmsg,
Dalgif_skcipher.c204 .recvmsg = skcipher_recvmsg,
300 .recvmsg = skcipher_recvmsg_nokey,
Dalgif_hash.c290 .recvmsg = hash_recvmsg,
397 .recvmsg = hash_recvmsg_nokey,
Dalgif_aead.c373 .recvmsg = aead_recvmsg,
469 .recvmsg = aead_recvmsg_nokey,
/Linux-v5.4/net/nfc/
Drawsock.c282 .recvmsg = rawsock_recvmsg,
302 .recvmsg = rawsock_recvmsg,
/Linux-v5.4/tools/bpf/bpftool/Documentation/
Dbpftool-cgroup.rst98 **recvmsg4** call to recvfrom(2), recvmsg(2), recvmmsg(2) for
100 **recvmsg6** call to recvfrom(2), recvmsg(2), recvmmsg(2) for
/Linux-v5.4/net/atm/
Dpvc.c127 .recvmsg = vcc_recvmsg,
/Linux-v5.4/net/ieee802154/
Dsocket.c397 .recvmsg = raw_recvmsg,
423 .recvmsg = sock_common_recvmsg,
959 .recvmsg = dgram_recvmsg,
986 .recvmsg = sock_common_recvmsg,
/Linux-v5.4/net/phonet/
Ddatagram.c175 .recvmsg = pn_recvmsg,
/Linux-v5.4/tools/testing/selftests/net/
Dtcp_inq.c161 if (recvmsg(fd, &msg, 0) != iov[0].iov_len) in main()
Dipv6_flowlabel.c94 ret = recvmsg(fd, &msg, 0); in do_recv()
Dtls.c447 EXPECT_NE(recvmsg(self->cfd, &hdr, 0), -1); in TEST_F()
465 EXPECT_NE(recvmsg(self->cfd, &hdr, 0), -1); in TEST_F()
490 EXPECT_NE(recvmsg(self->cfd, &hdr, 0), -1); in TEST_F()
1044 EXPECT_EQ(recvmsg(self->cfd, &msg, MSG_WAITALL | MSG_PEEK), send_len); in TEST_F()
1058 EXPECT_EQ(recvmsg(self->cfd, &msg, MSG_WAITALL), send_len); in TEST_F()
/Linux-v5.4/arch/um/os-Linux/drivers/
Dtuntap_user.c101 n = recvmsg(me, &msg, 0); in tuntap_open_tramp()
/Linux-v5.4/net/bluetooth/bnep/
Dsock.c182 .recvmsg = sock_no_recvmsg,
/Linux-v5.4/net/bluetooth/cmtp/
Dsock.c185 .recvmsg = sock_no_recvmsg,
/Linux-v5.4/tools/testing/selftests/android/ion/
Dipcsocket.c202 ret = recvmsg(sockfd, &msgh, MSG_DONTWAIT); in receivefromsocket()
/Linux-v5.4/net/l2tp/
Dl2tp_ip.c595 .recvmsg = l2tp_ip_recvmsg,
623 .recvmsg = sock_common_recvmsg,

123456