/linux-6.12.1/tools/testing/selftests/net/netfilter/ |
D | conntrack_reverse_clash.c | 99 if (recvfrom(s2, buf, LEN, 0, (struct sockaddr *)&peer, &plen) < 0) in main() 108 if (recvfrom(s1, buf, LEN, 0, (struct sockaddr *)&peer, &plen) < 0) in main()
|
D | sctp_collision.c | 62 ret = recvfrom(sd, buf, sizeof(buf), 0, (struct sockaddr *)&daddr, &len); in main() 88 ret = recvfrom(sd, buf, sizeof(buf), 0, (struct sockaddr *)&daddr, &len); in main()
|
D | audit_logread.c | 35 ret = recvfrom(fd, rep, sizeof(*rep), 0, in audit_recv()
|
/linux-6.12.1/tools/bpf/bpftool/Documentation/ |
D | bpftool-cgroup.rst | 110 …- **recvmsg4** call to recvfrom(2), recvmsg(2), recvmmsg(2) for an unconnected udp4 socket (since … 111 …- **recvmsg6** call to recvfrom(2), recvmsg(2), recvmmsg(2) for an unconnected udp6 socket (since … 112 …- **recvmsg_unix** call to recvfrom(2), recvmsg(2), recvmmsg(2) for an unconnected unix socket (si…
|
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/ |
D | ip_check_defrag.c | 254 len = recvfrom(srv_fd, buf, sizeof(buf), 0, (struct sockaddr *)&caddr, &caddr_len); in test_bpf_ip_check_defrag_ok() 262 len = recvfrom(client_rx_fd, buf, sizeof(buf), 0, NULL, NULL); in test_bpf_ip_check_defrag_ok()
|
D | sk_assign.c | 106 return recvfrom(srv_client, &buf, sizeof(buf), 0, NULL, NULL); in rcv_msg()
|
D | xdp_metadata.c | 290 ret = recvfrom(xsk_socket__fd(xsk->socket), NULL, 0, MSG_DONTWAIT, NULL, NULL); in verify_xsk_metadata()
|
/linux-6.12.1/Documentation/networking/ |
D | mctp.rst | 176 ``recvfrom()``, ``recvmsg()``, ``recv()`` : receive an MCTP message 180 ``recvfrom()``, ``recvmsg()``, or ``recv()`` system calls. Using ``recvfrom()`` 192 len = recvfrom(sd, buf, sizeof(buf), 0, 201 The address argument to ``recvfrom`` and ``recvmsg`` is populated with the
|
D | j1939.rst | 196 to ``bind(2)``, ``connect(2)``, ``sendto(2)`` and ``recvfrom(2)``. A ``write(2)`` with size 4 will 316 ``recvfrom(2)`` can provide. For example package priority and timestamp. The
|
D | phonet.rst | 114 len = recvfrom(fd, buf, sizeof(buf), 0,
|
/linux-6.12.1/kernel/ |
D | sys_ni.c | 156 COND_SYSCALL(recvfrom); 157 COND_SYSCALL_COMPAT(recvfrom);
|
/linux-6.12.1/arch/um/drivers/ |
D | net_user.c | 112 CATCH_EINTR(n = recvfrom(fd, buf, len, 0, NULL, NULL)); in net_recvfrom()
|
D | mconsole_user.c | 86 req->len = recvfrom(fd, &req->request, sizeof(req->request), 0, in mconsole_get_request()
|
/linux-6.12.1/samples/bpf/ |
D | cookie_uid_helper_example.c | 255 recv_len = recvfrom(s_rcv, &buf, sizeof(buf), 0, in udp_client()
|
/linux-6.12.1/tools/testing/selftests/net/rds/ |
D | test.py | 205 recv_data, address = receiver.recvfrom(1024)
|
/linux-6.12.1/arch/x86/entry/syscalls/ |
D | syscall_64.tbl | 57 45 64 recvfrom sys_recvfrom 401 517 x32 recvfrom compat_sys_recvfrom
|
/linux-6.12.1/tools/perf/arch/x86/entry/syscalls/ |
D | syscall_64.tbl | 57 45 64 recvfrom sys_recvfrom 401 517 x32 recvfrom compat_sys_recvfrom
|
/linux-6.12.1/tools/virtio/ |
D | vhost_net_test.c | 313 n = recvfrom(dev->sock, dev->res_buf, TEST_BUF_LEN, 0, NULL, NULL); in run_tx_test()
|
/linux-6.12.1/net/ |
D | compat.c | 398 COMPAT_SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, buf, compat_size_t, len, in COMPAT_SYSCALL_DEFINE6() argument
|
/linux-6.12.1/tools/perf/arch/mips/entry/syscalls/ |
D | syscall_n64.tbl | 54 44 n64 recvfrom sys_recvfrom
|
/linux-6.12.1/tools/testing/selftests/bpf/ |
D | xdp_features.c | 234 n = recvfrom(sockfd, buf, sizeof(buf), MSG_WAITALL, in dut_echo_thread()
|
/linux-6.12.1/arch/mips/kernel/syscalls/ |
D | syscall_n64.tbl | 54 44 n64 recvfrom sys_recvfrom
|
D | syscall_n32.tbl | 54 44 n32 recvfrom compat_sys_recvfrom
|
/linux-6.12.1/arch/arm64/tools/ |
D | syscall_64.tbl | 251 207 common recvfrom sys_recvfrom compat_sys_recvfrom
|
/linux-6.12.1/tools/testing/selftests/net/ |
D | psock_tpacket.c | 479 while ((ret = recvfrom(rcv_sock, packet, sizeof(packet), in walk_tx()
|