/linux-master/net/bluetooth/rfcomm/ |
H A D | sock.c | 1013 .sendmsg = rfcomm_sock_sendmsg,
|
/linux-master/net/llc/ |
H A D | af_llc.c | 1241 .sendmsg = llc_ui_sendmsg,
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | sk_lookup.c | 423 n = sendmsg(fd, &msg, 0); 424 if (CHECK(n <= 0, "sendmsg", "failed\n")) {
|
H A D | tc_redirect.c | 604 ret = sendmsg(fd, &msg, 0); 605 ASSERT_EQ(ret, s, "sendmsg");
|
/linux-master/drivers/target/iscsi/ |
H A D | iscsi_target_util.c | 1180 tx_sent = conn->sock->ops->sendmsg(conn->sock, &msghdr, 1184 pr_err("sendmsg/splice returned -EAGAIN\n"); 1188 pr_err("sendmsg/splice failure: %d\n", tx_sent);
|
/linux-master/net/ipv4/ |
H A D | ping.c | 1010 .sendmsg = ping_v4_sendmsg,
|
/linux-master/net/can/j1939/ |
H A D | socket.c | 1322 .sendmsg = j1939_sk_sendmsg,
|
/linux-master/net/l2tp/ |
H A D | l2tp_ppp.c | 23 * regular socket sendmsg() / recvmsg() calls. Kernel parameters of the socket 261 /* This is the sendmsg for the PPPoL2TP pppol2tp_session socket. We come here 262 * when a user application does a sendmsg() on the session socket. L2TP and 1663 .sendmsg = pppol2tp_sendmsg,
|
/linux-master/drivers/net/ |
H A D | tap.c | 1279 .sendmsg = tap_sendmsg,
|
/linux-master/net/sctp/ |
H A D | ipv6.c | 1093 .sendmsg = inet_sendmsg,
|
/linux-master/crypto/ |
H A D | af_alg.c | 489 .sendmsg = sock_no_sendmsg, 923 * af_alg_sendmsg - implementation of sendmsg system call handler 925 * The sendmsg system call handler obtains the user data and stores it
|
/linux-master/net/bluetooth/ |
H A D | sco.c | 1430 .sendmsg = sco_sock_sendmsg,
|
H A D | hci_sock.c | 2167 .sendmsg = hci_sock_sendmsg,
|
/linux-master/net/netrom/ |
H A D | af_netrom.c | 1369 .sendmsg = nr_sendmsg,
|
/linux-master/net/phonet/ |
H A D | pep.c | 1356 .sendmsg = pep_sendmsg,
|
/linux-master/net/tipc/ |
H A D | socket.c | 3371 .sendmsg = tipc_sendmsg, 3391 .sendmsg = tipc_send_packet, 3411 .sendmsg = tipc_sendstream,
|
/linux-master/net/unix/ |
H A D | af_unix.c | 422 * poll and sendmsg need to test. The dgram recv code will do a wake 845 .sendmsg = unix_stream_sendmsg, 870 .sendmsg = unix_dgram_sendmsg, 894 .sendmsg = unix_seqpacket_sendmsg,
|
/linux-master/net/mptcp/ |
H A D | protocol.c | 3741 /* if reaching here via the fastopen/sendmsg path, the caller already 3794 .sendmsg = mptcp_sendmsg, 4049 .sendmsg = inet_sendmsg, 4148 .sendmsg = inet6_sendmsg,
|
/linux-master/net/core/ |
H A D | skbuff.c | 3220 int len, sendmsg_func sendmsg) 3241 ret = INDIRECT_CALL_2(sendmsg, sendmsg_locked, 3283 ret = INDIRECT_CALL_2(sendmsg, sendmsg_locked, 3219 __skb_send_sock(struct sock *sk, struct sk_buff *skb, int offset, int len, sendmsg_func sendmsg) argument
|
/linux-master/net/can/ |
H A D | bcm.c | 1748 .sendmsg = bcm_sendmsg,
|
H A D | isotp.c | 1690 .sendmsg = isotp_sendmsg,
|
/linux-master/net/xdp/ |
H A D | xsk.c | 1686 .sendmsg = xsk_sendmsg,
|
/linux-master/net/appletalk/ |
H A D | ddp.c | 1905 .sendmsg = atalk_sendmsg,
|
/linux-master/net/ipv6/ |
H A D | udp.c | 1774 .sendmsg = udpv6_sendmsg,
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_sockmap.c | 579 sent = sendmsg(fd, &msg, flags); 586 perror("sendmsg loop error"); 590 "sendmsg loop error expected: %i errno %i\n", 1313 return "sendmsg"; 2046 } else if (strcmp(optarg, "sendmsg") == 0) {
|