Lines Matching refs:pru_sosend
781 * <pru_sosend>:EACCES[TCP]
782 * <pru_sosend>:EADDRINUSE[TCP]
783 * <pru_sosend>:EADDRNOTAVAIL[TCP]
784 * <pru_sosend>:EAFNOSUPPORT[TCP]
785 * <pru_sosend>:EAGAIN[TCP]
786 * <pru_sosend>:EBADF
787 * <pru_sosend>:ECONNRESET[TCP]
788 * <pru_sosend>:EFAULT
789 * <pru_sosend>:EHOSTUNREACH[TCP]
790 * <pru_sosend>:EINTR
791 * <pru_sosend>:EINVAL
792 * <pru_sosend>:EISCONN[AF_INET]
793 * <pru_sosend>:EMSGSIZE[TCP]
794 * <pru_sosend>:ENETDOWN[TCP]
795 * <pru_sosend>:ENETUNREACH[TCP]
796 * <pru_sosend>:ENOBUFS
797 * <pru_sosend>:ENOMEM[TCP]
798 * <pru_sosend>:ENOTCONN[AF_INET]
799 * <pru_sosend>:EOPNOTSUPP
800 * <pru_sosend>:EPERM[TCP]
801 * <pru_sosend>:EPIPE
802 * <pru_sosend>:EWOULDBLOCK
803 * <pru_sosend>:???[TCP] [ignorable: mostly IPSEC/firewall/DLIL]
804 * <pru_sosend>:???[AF_INET] [whatever a filter author chooses]
805 * <pru_sosend>:??? [value from so_error]
871 error = so->so_proto->pr_usrreqs->pru_sosend(so, to, uiop, 0, control,