Lines Matching refs:pru_send
1483 * <pru_send>:ECONNRESET[TCP]
1484 * <pru_send>:EINVAL[TCP]
1485 * <pru_send>:ENOBUFS[TCP]
1486 * <pru_send>:EADDRINUSE[TCP]
1487 * <pru_send>:EADDRNOTAVAIL[TCP]
1488 * <pru_send>:EAFNOSUPPORT[TCP]
1489 * <pru_send>:EACCES[TCP]
1490 * <pru_send>:EAGAIN[TCP]
1491 * <pru_send>:EPERM[TCP]
1492 * <pru_send>:EMSGSIZE[TCP]
1493 * <pru_send>:EHOSTUNREACH[TCP]
1494 * <pru_send>:ENETUNREACH[TCP]
1495 * <pru_send>:ENETDOWN[TCP]
1496 * <pru_send>:ENOMEM[TCP]
1497 * <pru_send>:ENOBUFS[TCP]
1498 * <pru_send>:???[TCP] [ignorable: mostly IPSEC/firewall/DLIL]
1499 * <pru_send>:EINVAL[AF_UNIX]
1500 * <pru_send>:EOPNOTSUPP[AF_UNIX]
1501 * <pru_send>:EPIPE[AF_UNIX]
1502 * <pru_send>:ENOTCONN[AF_UNIX]
1503 * <pru_send>:EISCONN[AF_UNIX]
1504 * <pru_send>:???[AF_UNIX] [whatever a filter author chooses]
1507 * Notes: Other <pru_send> returns depend on the protocol family; all
1783 /* Compute flags here, for pru_send and NKEs */
1816 error = (*so->so_proto->pr_usrreqs->pru_send)