Home
last modified time | relevance | path

Searched refs:NLMSG_ERROR (Results 1 – 24 of 24) sorted by relevance

/linux-6.12.1/tools/accounting/
Dprocacct.c189 if (ans.n.nlmsg_type == NLMSG_ERROR || in get_family_id()
359 if (msg.n.nlmsg_type == NLMSG_ERROR || in main()
Dgetdelays.c182 if (ans.n.nlmsg_type == NLMSG_ERROR || in get_family_id()
476 if (msg.n.nlmsg_type == NLMSG_ERROR || in main()
/linux-6.12.1/Documentation/userspace-api/netlink/
Dintro.rst184 - ``NLMSG_ERROR`` - carries the return code of an operation;
188 ``NLMSG_ERROR`` and ``NLMSG_DONE`` are of practical importance.
191 with ``NLMSG_ERROR`` if there is no error. To avoid having to special-case
194 The format of ``NLMSG_ERROR`` is described by struct nlmsgerr::
209 and second of the request. ``NLMSG_ERROR`` carries the information about
221 The second optional element of ``NLMSG_ERROR`` are the extended ACK
333 __u16 nlmsg_type: NLMSG_ERROR
361 in ``NLMSG_ERROR`` and ``NLMSG_DONE`` messages. To maintain backward
443 user) and does not involve any control messages like ``NLMSG_ERROR`` or
/linux-6.12.1/tools/testing/selftests/net/netfilter/
Daudit_logread.c42 rep->nlh.nlmsg_type == NLMSG_ERROR) /* short-cut for now */ in audit_recv()
/linux-6.12.1/tools/include/uapi/linux/
Dnetlink.h103 #define NLMSG_ERROR 0x2 /* Error */ macro
/linux-6.12.1/include/uapi/linux/
Dnetlink.h113 #define NLMSG_ERROR 0x2 /* Error */ macro
/linux-6.12.1/samples/connector/
Ducon.c217 case NLMSG_ERROR: in main()
/linux-6.12.1/tools/testing/selftests/net/
Dipsec.c295 } else if (answer.hdr.nlmsg_type != NLMSG_ERROR) { in netlink_check_answer()
1050 if (answer.nh.nlmsg_type == NLMSG_ERROR) { in xfrm_state_check()
1316 } else if (answer.nh.nlmsg_type != NLMSG_ERROR) { in xfrm_state_allocspi()
1405 } else if (req.nh.nlmsg_type != NLMSG_ERROR) { in xfrm_monitor_acquire()
1479 } else if (req.nh.nlmsg_type != NLMSG_ERROR) { in xfrm_expire_state()
1557 } else if (req.nh.nlmsg_type != NLMSG_ERROR) { in xfrm_expire_policy()
1632 } else if (req.nh.nlmsg_type != NLMSG_ERROR) { in xfrm_spdinfo_set_thresh()
1706 } else if (req.nh.nlmsg_type != NLMSG_ERROR) { in xfrm_spdinfo_attrs()
/linux-6.12.1/tools/testing/selftests/nci/
Dnci_dev.c196 if (ans.n.nlmsg_type == NLMSG_ERROR || resp_len < 0 || in get_family_id()
267 if (msg->n.nlmsg_type == NLMSG_ERROR || in get_nci_devid()
664 if (ans.n.nlmsg_type == NLMSG_ERROR || resp_len < 0 || in get_taginfo()
/linux-6.12.1/tools/testing/selftests/net/mptcp/
Dpm_nl_ctl.c133 if (nh->nlmsg_type == NLMSG_ERROR) in capture_events()
134 error(1, NLMSG_ERROR, "received invalid NL message"); in capture_events()
231 if (nh->nlmsg_type == NLMSG_ERROR && nl_error(nh)) in do_nl_req()
1059 if (nh->nlmsg_type == NLMSG_ERROR) in print_addrs()
1195 if (nh->nlmsg_type == NLMSG_ERROR) in print_limits()
/linux-6.12.1/tools/testing/selftests/connector/
Dproc_filter.c140 if (hdr->nlmsg_type == NLMSG_ERROR) { in handle_packet()
/linux-6.12.1/tools/testing/selftests/bpf/
Dnetlink_helpers.c215 if (h->nlmsg_type == NLMSG_ERROR) { in __rtnl_talk_iov()
Dxsk.c373 case NLMSG_ERROR: in netlink_recv()
/linux-6.12.1/tools/testing/vsock/
Dvsock_diag_test.c287 if (h->nlmsg_type == NLMSG_ERROR) { in read_vsock_stat()
/linux-6.12.1/tools/testing/selftests/net/tcp_ao/lib/
Dnetlink.c45 } else if (answer.hdr.nlmsg_type != NLMSG_ERROR) { in netlink_check_answer()
/linux-6.12.1/tools/net/ynl/lib/
Dynl.py33 NLMSG_ERROR = 2 variable in Netlink
201 if self.nl_type == Netlink.NLMSG_ERROR:
Dynl.c525 case NLMSG_ERROR: in __ynl_sock_read_msgs()
/linux-6.12.1/net/ncsi/
Dncsi-netlink.c581 NLMSG_ERROR, sizeof(*nle), 0); in ncsi_send_netlink_err()
/linux-6.12.1/tools/bpf/bpftool/
Dnet.c186 case NLMSG_ERROR: in netlink_recv()
/linux-6.12.1/tools/lib/bpf/
Dnetlink.c187 case NLMSG_ERROR: in libbpf_netlink_recv()
/linux-6.12.1/net/ipv6/
Dip6mr.c783 nlh->nlmsg_type = NLMSG_ERROR; in ip6mr_destroy_unres()
1025 nlh->nlmsg_type = NLMSG_ERROR; in ip6mr_cache_resolve()
/linux-6.12.1/net/ipv4/
Dipmr.c733 nlh->nlmsg_type = NLMSG_ERROR; in ipmr_destroy_unres()
998 nlh->nlmsg_type = NLMSG_ERROR; in ipmr_cache_resolve()
/linux-6.12.1/net/netfilter/ipset/
Dip_set_core.c1772 nlh->nlmsg_seq, NLMSG_ERROR, payload, 0); in call_ad()
/linux-6.12.1/net/netlink/
Daf_netlink.c2478 NLMSG_ERROR, sizeof(*errmsg), flags); in netlink_ack()